{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,20]],"date-time":"2025-11-20T12:49:52Z","timestamp":1763642992660},"reference-count":40,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Emerg. Top. Comput. Intell."],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/tetci.2020.3023447","type":"journal-article","created":{"date-parts":[[2020,10,5]],"date-time":"2020-10-05T21:10:02Z","timestamp":1601932202000},"page":"1-15","source":"Crossref","is-referenced-by-count":15,"title":["D-FRI-Honeypot: A Secure Sting Operation for Hacking the Hackers Using Dynamic Fuzzy Rule Interpolation"],"prefix":"10.1109","author":[{"given":"Nitin","family":"Naik","sequence":"first","affiliation":[]},{"given":"Changjing","family":"Shang","sequence":"additional","affiliation":[]},{"given":"Paul","family":"Jenkins","sequence":"additional","affiliation":[]},{"given":"Qiang","family":"Shen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.99.3.432"},{"key":"ref38","first-page":"1","article-title":"Best practices in exploratory factor analysis: Four recommendations for getting the most from your analysis","volume":"10","author":"costello","year":"2005","journal-title":"Practical Assessment Res Eval"},{"key":"ref33","article-title":"A fuzzy approach to remote active operating system fingerprinting","author":"arkin","year":"2003"},{"key":"ref32","article-title":"Nmap Service DB","author":"lyon","year":"2011"},{"key":"ref31","article-title":"Nmap OS Fingerprinting 2nd Generation DB","author":"lyon","year":"2017"},{"key":"ref30","article-title":"Chapter 7. Service and Application Version Detection","author":"lyon","year":"2009"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1177\/001316446002000116"},{"key":"ref36","article-title":"Updated specification of the IPv4 ID Field","author":"touch","year":"2014"},{"key":"ref35","article-title":"Xprobe2(1) - Linux man page","author":"arkin","year":"2018"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2009.5270338"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1080\/03081079908935231"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/BF02289447"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/0888-613X(93)90010-B"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1002\/scj.4690261008"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2017.2755000"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZ-IEEE.2016.7737671"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZ-IEEE.2017.8015461"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZ-IEEE.2019.8858999"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC\/SmartCity\/DSS.2018.00250"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SSCI.2018.8628775"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-7373(75)80002-2"},{"key":"ref28","first-page":"1","article-title":"Toward undetected operating system fingerprinting","volume":"7","author":"greenwald","year":"2007","journal-title":"WOOT"},{"key":"ref4","article-title":"Active network defense system and method","author":"cantrell","year":"2008"},{"key":"ref27","article-title":"Chapter 9. Nmap Scripting Engine","author":"lyon","year":"2009"},{"key":"ref3","article-title":"Cisco report confirms cyber attacks more sophisticated","author":"vizard","year":"0"},{"key":"ref6","article-title":"Building a cognizant honeypot for detecting active fingerprinting attacks using dynamic fuzzy rule interpolation","author":"naik","year":"2020","journal-title":"Expert Syst"},{"key":"ref29","article-title":"Chapter 15. Nmap Reference Guide","author":"lyon","year":"2009"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1201\/b10738"},{"key":"ref8","volume":"1","author":"spitzner","year":"2003","journal-title":"Honeypots Tracking Hackers"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1002\/9781119396260"},{"key":"ref2","article-title":"AI: A new route for cyber-attacks or a way to prevent them?","author":"of?laherty","year":"2019"},{"key":"ref9","article-title":"A computational intelligence enabled honeypot for chasing ghosts in the wires","author":"naik","year":"2020","journal-title":"Complex Intell Syst"},{"key":"ref1","article-title":"Top AI-based attacks that shocked the world in","author":"balaganur","year":"2019"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2005.859324"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2006.269"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZ-IEEE.2018.8491456"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/SysEng.2018.8544408"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.23919\/ICIF.2018.8455555"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/SSCI.2018.8628658"},{"key":"ref25","article-title":"OS and Application Fingerprinting Techniques","author":"allen","year":"2008"}],"container-title":["IEEE Transactions on Emerging Topics in Computational Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7433297\/7777658\/09212649.pdf?arnumber=9212649","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T14:54:06Z","timestamp":1652194446000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9212649\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/tetci.2020.3023447","relation":{},"ISSN":["2471-285X"],"issn-type":[{"value":"2471-285X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]}}}