{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T08:20:27Z","timestamp":1769847627861,"version":"3.49.0"},"reference-count":38,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Key R&#x0026;D Program of China","award":["2023YFB2904004"],"award-info":[{"award-number":["2023YFB2904004"]}]},{"name":"National Key R&#x0026;D Program of China","award":["2023YFB2904000"],"award-info":[{"award-number":["2023YFB2904000"]}]},{"name":"Jiangsu Key Development Planning Project","award":["BE2023004-2"],"award-info":[{"award-number":["BE2023004-2"]}]},{"DOI":"10.13039\/501100004608","name":"Natural Science Foundation of Jiangsu Province","doi-asserted-by":"publisher","award":["20KJA520001"],"award-info":[{"award-number":["20KJA520001"]}],"id":[{"id":"10.13039\/501100004608","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Equipment Development Department","award":["315107402"],"award-info":[{"award-number":["315107402"]}]},{"DOI":"10.13039\/501100001475","name":"Nanyang Technological University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001475","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2026,1]]},"DOI":"10.1109\/tdsc.2025.3611450","type":"journal-article","created":{"date-parts":[[2025,9,18]],"date-time":"2025-09-18T17:48:59Z","timestamp":1758217739000},"page":"799-813","source":"Crossref","is-referenced-by-count":1,"title":["A Game Theory-Based Method for Secure Deployment of Mimic Honeynet"],"prefix":"10.1109","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-9026-0133","authenticated-orcid":false,"given":"Sisi","family":"Shao","sequence":"first","affiliation":[{"name":"School of Internet of Things, Nanjing University of Posts and Telecommunications, Nanjing, China"}]},{"given":"Zongkai","family":"Ji","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Nanjing University of Posts and Telecommunications, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7019-3942","authenticated-orcid":false,"given":"Yimu","family":"Ji","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Nanjing University of Posts and Telecommunications, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4203-1572","authenticated-orcid":false,"given":"Anwitaman","family":"Datta","sequence":"additional","affiliation":[{"name":"De Montfort University, Leicester, U.K."}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2021.07.006"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.2963978"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-021-3379-2"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.2987793"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2023.3275986"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2020.102661"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-022-3635-2"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.eng.2021.05.015"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3106669"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3044576"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2021.3071513"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-023-28613-0"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101732"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3318942"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3080527"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.103792"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1117\/12.2629089"},{"key":"ref18","first-page":"30","article-title":"A survey on channel coding theorem and mimic defense security architecture","volume":"7","author":"Shao","year":"2023","journal-title":"China Commun."},{"key":"ref19","first-page":"2018","article-title":"Research on intelligent dynamic honeynet technology for power industrial control system","volume-title":"Proc. IEEE 3rd Int. Conf. Inf. Technol., Big Data Artif. Intell.","author":"Fei"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICFEICT57213.2022.00110"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICCBD56965.2022.10080304"},{"key":"ref22","first-page":"483","article-title":"Automated honeynet deployment strategy for active defense in container-based cloud","volume-title":"Proc. IEEE 22nd Int. Conf. High Perform. Comput. Commun.; IEEE 18th Int. Conf. Smart City; IEEE 6th Int. Conf. Data Sci. Syst.","author":"Tong"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICCC59590.2023.10507582"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/6GIoTT57212.2022.00014"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.3390\/electronics13020361"},{"key":"ref26","first-page":"1008","article-title":"Dynamical model and analysis of malware propagation on the dynamically-deployed heterogeneous honeynet","volume-title":"Proc. ITM Web Conf.","author":"Li"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1186\/s13677-022-00379-2"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3102874"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2547994"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101870"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC49033.2022.9700616"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2022.3179965"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s11859-016-1140-2"},{"key":"ref34","first-page":"564","article-title":"Quantification method for heterogeneity on web server with mimic construction","volume":"31","author":"Zhang","year":"2020","journal-title":"J. Softw."},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2021.3122372"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2023.100544"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2023.01.004"},{"key":"ref38","first-page":"1","article-title":"GTM: Game theoretic methodology for optimal cybersecurity defending strategies and investments","volume-title":"Proc. 17th Int. Conf. Availability, Rel. Secur.","author":"Farao"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/8858\/11354469\/11173195.pdf?arnumber=11173195","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,20]],"date-time":"2026-01-20T23:23:11Z","timestamp":1768951391000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11173195\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1]]},"references-count":38,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2025.3611450","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"value":"1545-5971","type":"print"},{"value":"1941-0018","type":"electronic"},{"value":"2160-9209","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1]]}}}