{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T02:43:59Z","timestamp":1775097839879,"version":"3.50.1"},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,10,31]],"date-time":"2023-10-31T00:00:00Z","timestamp":1698710400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,10,31]],"date-time":"2023-10-31T00:00:00Z","timestamp":1698710400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001321","name":"National Research Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001321","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001352","name":"National University of Singapore","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001352","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001321","name":"National Research Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001321","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,10,31]]},"DOI":"10.1109\/smartgridcomm57358.2023.10333917","type":"proceedings-article","created":{"date-parts":[[2023,12,6]],"date-time":"2023-12-06T18:29:31Z","timestamp":1701887371000},"page":"1-7","source":"Crossref","is-referenced-by-count":13,"title":["Taxonomy of Fingerprinting Techniques for Evaluation of Smart Grid Honeypot Realism"],"prefix":"10.1109","author":[{"given":"Vanessa","family":"Tay","sequence":"first","affiliation":[{"name":"National University of Singapore,Singapore"}]},{"given":"Xinran","family":"Li","sequence":"additional","affiliation":[{"name":"National University of Singapore,Singapore"}]},{"given":"Daisuke","family":"Mashima","sequence":"additional","affiliation":[{"name":"Illinois Advanced Research Center at Singapore,Singapore"}]},{"given":"Bennet","family":"Ng","sequence":"additional","affiliation":[{"name":"Illinois Advanced Research Center at Singapore,Singapore"}]},{"given":"Phuong","family":"Cao","sequence":"additional","affiliation":[{"name":"University of Illinois Urbana-Champaign,National Center for Supercomputing Applications"}]},{"given":"Zbigniew","family":"Kalbarczyk","sequence":"additional","affiliation":[{"name":"University of Illinois Urbana-Champaign,Champaign,Illinois"}]},{"given":"Ravishankar K","family":"Iyer","sequence":"additional","affiliation":[{"name":"University of Illinois Urbana-Champaign,Champaign,Illinois"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"Research: Nearly 70,000 sensitive industrial control systems exposed","author":"Basin"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2018.01.015"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1049\/iet-cps.2016.0019"},{"key":"ref4","first-page":"667","article-title":"Caudit: Continuous auditing of ssh servers to mitigate brute-force attacks","volume":"19","author":"Cao","year":"2019","journal-title":"NSDI"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3372318.3372322"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2799979.2800004"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2008.4630086"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-56538-5_13"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3139292"},{"key":"ref10","volume-title":"Industrial Cybersecurity: Efficiently secure critical infrastructure systems","author":"Ackerman","year":"2017"},{"key":"ref11","volume-title":"Smart grid: Cyber attacks, critical defense approaches, and digital twin","author":"Zheng","year":"2022"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.3390\/en14185894"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/iccs.2008.4737365"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2017.8340689"},{"key":"ref15","volume-title":"Test procedures for goose performance according to iec 61850-5 and iec 61850-10","author":"Schimmel","year":"2011"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ECBS-EERC.2015.29"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/S1474-6670(17)48532-6"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-12786-2_3"},{"key":"ref19","first-page":"1","article-title":"Ieee standard communication delivery time performance requirements for electric power substation automation","year":"2005","journal-title":"IEEE Std 1646-2004"},{"key":"ref20","volume-title":"Op 060 \u2013 performance considerations in digital substation applications","author":"Meier","year":"2015"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.3390\/s21186225"},{"key":"ref22","article-title":"On design and enhancement of smart grid honeypot system for practical collection of threat intelligence","volume-title":"13th USENIX Workshop on Cyber Security Experimentation and Test (CSET 20)","author":"Mashima"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-78120-0_21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/DSN-S58398.2023.00024"},{"key":"ref25","volume-title":"Cyber physical system vulnerability research","author":"Redwood","year":"2016"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"37","DOI":"10.26636\/jtit.2015.4.983","article-title":"Shape: A honeypot for electric power substation","volume":"2015","author":"Koltys","year":"2015","journal-title":"Journal of Telecommunications and Information Technology"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10329-7_12"},{"key":"ref28","volume-title":"Evasion of honeypot detection mechanisms through improved interactivity of ics-based systems","author":"Dougherty","year":"2020"},{"key":"ref29","volume-title":"Energy-grid threat analysis using honeypots","author":"Kendrick","year":"2019"}],"event":{"name":"2023 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","location":"Glasgow, United Kingdom","start":{"date-parts":[[2023,10,31]]},"end":{"date-parts":[[2023,11,3]]}},"container-title":["2023 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10333305\/10333870\/10333917.pdf?arnumber=10333917","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,5]],"date-time":"2024-11-05T10:26:55Z","timestamp":1730802415000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10333917\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,31]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/smartgridcomm57358.2023.10333917","relation":{},"subject":[],"published":{"date-parts":[[2023,10,31]]}}}