{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,12]],"date-time":"2025-12-12T13:42:58Z","timestamp":1765546978290},"reference-count":0,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,9,23]],"date-time":"2022-09-23T00:00:00Z","timestamp":1663891200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,9,23]],"date-time":"2022-09-23T00:00:00Z","timestamp":1663891200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,9,23]]},"DOI":"10.1109\/seeda-cecnsm57760.2022.9932907","type":"proceedings-article","created":{"date-parts":[[2022,11,3]],"date-time":"2022-11-03T21:41:14Z","timestamp":1667511674000},"page":"1-8","source":"Crossref","is-referenced-by-count":2,"title":["Security Revisited: Honeytokens meet Google Authenticator"],"prefix":"10.1109","author":[{"given":"Vassilis","family":"Papaspirou","sequence":"first","affiliation":[{"name":"University of West Attica,Department of Informatics and Computer Engineering,Athens,Greece"}]},{"given":"Maria","family":"Papathanasaki","sequence":"additional","affiliation":[{"name":"University of Thessaly,Department of CS and Telecommunications,Lamia,Greece"}]},{"given":"Leandros","family":"Maglaras","sequence":"additional","affiliation":[{"name":"Cyber Technology Institute De Montfort University,Leicester,UK"}]},{"given":"Ioanna","family":"Kantzavelou","sequence":"additional","affiliation":[{"name":"University of West Attica,Department of Informatics and Computer Engineering,Athens,Greece"}]},{"given":"Christos","family":"Douligeris","sequence":"additional","affiliation":[{"name":"University of Piraeus,Department of Informatics,Piraeus,Greece"}]},{"given":"Mohamed Amine","family":"Ferrag","sequence":"additional","affiliation":[{"name":"Guelma University,Department of Computer Science,Guelma,Algeria"}]},{"given":"Helge","family":"Janicke","sequence":"additional","affiliation":[{"name":"Cyber Security CRC and Edith Cowan University Perth, Australia,Perth,Australia,6027"}]}],"member":"263","event":{"name":"2022 7th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM)","start":{"date-parts":[[2022,9,23]]},"location":"Ioannina, Greece","end":{"date-parts":[[2022,9,25]]}},"container-title":["2022 7th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9932892\/9932894\/09932907.pdf?arnumber=9932907","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,21]],"date-time":"2022-11-21T16:31:31Z","timestamp":1669048291000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9932907\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,23]]},"references-count":0,"URL":"https:\/\/doi.org\/10.1109\/seeda-cecnsm57760.2022.9932907","relation":{},"subject":[],"published":{"date-parts":[[2022,9,23]]}}}