{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,13]],"date-time":"2024-09-13T05:54:07Z","timestamp":1726206847684},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,5]]},"DOI":"10.1109\/sarnof.2012.6222760","type":"proceedings-article","created":{"date-parts":[[2012,7,9]],"date-time":"2012-07-09T15:34:06Z","timestamp":1341848046000},"page":"1-6","source":"Crossref","is-referenced-by-count":11,"title":["Catching the Wily Hacker: A multilayer deception system"],"prefix":"10.1109","author":[{"given":"Wei","family":"Wang","sequence":"first","affiliation":[]},{"given":"Jeffrey","family":"Bickford","sequence":"additional","affiliation":[]},{"given":"Ilona","family":"Murynets","sequence":"additional","affiliation":[]},{"given":"Ramesh","family":"Subbaraman","sequence":"additional","affiliation":[]},{"given":"Andrea G.","family":"Forte","sequence":"additional","affiliation":[]},{"given":"Gokul","family":"Singaraju","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"17","DOI":"10.3923\/itj.2011.2068.2075"},{"doi-asserted-by":"publisher","key":"15","DOI":"10.1002\/sec.528"},{"doi-asserted-by":"publisher","key":"16","DOI":"10.1109\/MILCOM.1991.258231"},{"year":"0","journal-title":"A Web Based Honeypot Network","key":"13"},{"key":"14","article-title":"Honeydroid - Creating a smartphone honeypot","author":"mulliner","year":"2011","journal-title":"Technical Report Technische Universita?t Berlin"},{"key":"11","article-title":"An evening with Berferd, in which a cracker is lured, endured, and studied","author":"cheswick","year":"1992","journal-title":"Proc USENIX"},{"year":"2003","journal-title":"Know Your Enemy Defining Virtual Honeynets","key":"12"},{"year":"2011","journal-title":"Night Dragon","key":"3"},{"year":"2010","journal-title":"The Command Structure of the Aurora Botnet","key":"2"},{"year":"2011","journal-title":"Rsa Security Brief Mobilizing Intelligent Security Operations for Advanced Persistent Threats","key":"1"},{"year":"0","author":"schneier","key":"10"},{"doi-asserted-by":"publisher","key":"7","DOI":"10.1109\/IAW.2004.1437806"},{"year":"2010","author":"amoroso","journal-title":"Cyber Attacks Protecting National Infrastructure","key":"6"},{"year":"2002","author":"spitzner","journal-title":"Honeypots Tracking Hackers","key":"5"},{"year":"2011","key":"4"},{"year":"0","author":"fiedler","journal-title":"Secure Your Database by Building Honeypot Architecture Using A Sql Database Firewall","key":"9"},{"key":"8","first-page":"26","author":"yuill","year":"2006","journal-title":"Using Deception to Hide Things from Hackers Processes Principles and Techniques"}],"event":{"name":"2012 35th IEEE Sarnoff Symposium","start":{"date-parts":[[2012,5,21]]},"location":"Newark, NJ, USA","end":{"date-parts":[[2012,5,22]]}},"container-title":["2012 35th IEEE Sarnoff Symposium"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6218073\/6222708\/06222760.pdf?arnumber=6222760","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T15:52:56Z","timestamp":1490111576000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6222760\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,5]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/sarnof.2012.6222760","relation":{},"subject":[],"published":{"date-parts":[[2012,5]]}}}