{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,5]],"date-time":"2026-04-05T04:43:30Z","timestamp":1775364210197,"version":"3.50.1"},"reference-count":34,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/prdc.2004.1276594","type":"proceedings-article","created":{"date-parts":[[2004,6,10]],"date-time":"2004-06-10T10:19:45Z","timestamp":1086862785000},"page":"383-388","source":"Crossref","is-referenced-by-count":15,"title":["Honeypots: practical means to validate malicious fault assumptions practical experience report"],"prefix":"10.1109","author":[{"given":"M.","family":"Dacier","sequence":"first","affiliation":[]},{"given":"F.","family":"Pouget","sequence":"additional","affiliation":[]},{"given":"H.","family":"Debar","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","year":"0","journal-title":"Internet Management Workshop 2001"},{"key":"17","year":"0","journal-title":"Honeypots Mailing List"},{"key":"18","year":"2001","journal-title":"Know Your Enemy Statistics Analyzing the Past Predicting the Future"},{"key":"33","year":"0","journal-title":"WISE Wireless Information Security Experiment"},{"key":"15","article-title":"Design and implementation of a sniffer detector","author":"grundschober","year":"1998","journal-title":"2nd Workshop on Recent Advances in Intrusion Detection"},{"key":"34","author":"zalewski","year":"0","journal-title":"The Museum of Broken Packet"},{"key":"16","year":"0"},{"key":"13","author":"farmer","year":"0","journal-title":"Coroner Toolkit"},{"key":"14","author":"grundschober","year":"1998","journal-title":"Sniffer Detector Report"},{"key":"11","year":"0","journal-title":"The Disco Tool Home Page"},{"key":"12","author":"evers","year":"2001","journal-title":"Experts Most Code Red Attacks Coming from Asia"},{"key":"21","year":"0","journal-title":"Internet Management Conference 2003"},{"key":"20","year":"0","journal-title":"Internet Management Workshop 2002"},{"key":"22","author":"jacksch","year":"2002","journal-title":"Tenebris Wireless Honeypot Project Assessing the Threat Against Wireless Access Points 1 0"},{"key":"23","doi-asserted-by":"crossref","DOI":"10.21236\/ADA400003","author":"moore","year":"2001","journal-title":"Inferring Internet Denial-of-Service Activity"},{"key":"24","year":"0","journal-title":"Netgeo Utility"},{"key":"25","author":"neville","year":"2003","journal-title":"IDS Logs in Forensics Investigations An Analysis of a Compromised Honeypot"},{"key":"26","author":"pouget","year":"0","journal-title":"Honeypot A Comparative Survey"},{"key":"27","year":"0","journal-title":"Honeyd Home Page"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1145\/42411.42412"},{"key":"29","author":"spitzner","year":"2002","journal-title":"Honeypots Tracking Hackers"},{"key":"3","article-title":"There be dragons","author":"bellovin","year":"1992","journal-title":"Proc of the 11 th USENIX Security Symposium"},{"key":"2","article-title":"ICMP usage in scanning - The complete know-how","author":"arkin","year":"2001","journal-title":"The Sys-Security Group Version 3 0"},{"key":"10","article-title":"Observations on the Internet traffic reaching broadband-connected users","author":"debar","year":"2003","journal-title":"EIC Conference"},{"key":"1","article-title":"An experimental sniffer detector: SnifferWall","author":"abdelallahelhadj","year":"2002","journal-title":"Internet Security Communication Workshop (SECI'02)"},{"key":"30","author":"spitzner","year":"2003","journal-title":"Honeytokens The Other Honeypot"},{"key":"7","article-title":"An evening with Berferd in which a cracker is lured, endured and studied","author":"cheswick","year":"1992","journal-title":"Proc Winter Usenix Conf"},{"key":"6","year":"2003","journal-title":"The Sleuth Kit V1 62"},{"key":"32","year":"0","journal-title":"VMWARE User's Manual Version 3 1"},{"key":"5","year":"0"},{"key":"31","year":"0","journal-title":"Tcpdump Home Page"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/174194.174199"},{"key":"9","author":"cracknell","year":"0","journal-title":"The Wireless Honeypot Project A Brief Look at Haw Wireless Networks Are Used and Misused in the City of London"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1201\/9781420019087.sec2"}],"event":{"name":"10th IEEE Pacific Rim International Symposium on Dependable Computing, 2004.","location":"Papeete, Tahiti, French Polynesia"},"container-title":["10th IEEE Pacific Rim International Symposium on Dependable Computing, 2004. Proceedings."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8995\/28541\/01276594.pdf?arnumber=1276594","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,5,30]],"date-time":"2018-05-30T08:04:50Z","timestamp":1527667490000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1276594\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/prdc.2004.1276594","relation":{},"subject":[]}}