{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T07:30:48Z","timestamp":1761895848477},"reference-count":39,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2014,5,1]],"date-time":"2014-05-01T00:00:00Z","timestamp":1398902400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Ind. Inf."],"published-print":{"date-parts":[[2014,5]]},"DOI":"10.1109\/tii.2014.2304633","type":"journal-article","created":{"date-parts":[[2014,2,27]],"date-time":"2014-02-27T19:04:07Z","timestamp":1393527847000},"page":"1337-1347","source":"Crossref","is-referenced-by-count":54,"title":["Cyber-Physical System Security With Deceptive Virtual Hosts for Industrial Control Networks"],"prefix":"10.1109","volume":"10","author":[{"given":"Todd","family":"Vollmer","sequence":"first","affiliation":[]},{"given":"Milos","family":"Manic","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","author":"sherry","year":"2010","journal-title":"Applications of the IP timestamp option to internet measurement"},{"key":"ref38","author":"fonseca","year":"2005","journal-title":"IP options are not an option"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2013.2270373"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ISRCS.2012.6309292"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1142\/S0218539307002568"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2009.5178592"},{"key":"ref37","year":"1981","journal-title":"Internet Protocol"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/IAW.2007.381919"},{"key":"ref35","author":"hay","year":"2008","journal-title":"OSSEC Host-Based Intrusion Detection Guide"},{"key":"ref34","article-title":"Honeypot based secure network system","volume":"3","author":"jain","year":"2011","journal-title":"Int J Comput Sci Eng"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/HSI.2009.5091050"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1965724.1965748"},{"key":"ref12","author":"provos","year":"2007","journal-title":"Virtual Honeypots"},{"key":"ref13","author":"hieb","year":"2004","journal-title":"Anomaly-based intrusion detection for network monitoring using a dynamic honeypot"},{"key":"ref14","year":"0"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2010.327"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1002\/nem.751"},{"key":"ref17","author":"lyon","year":"2008","journal-title":"Nmap Network Scanning"},{"key":"ref18","author":"duggan","year":"2005","journal-title":"Penetration testing of industrial control systems"},{"key":"ref19","first-page":"4880","article-title":"Dynamic honeypot construction","author":"hecker","year":"2006","journal-title":"Proc 10th Coll Inf Syst Secur Educ"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-008-0107-z"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.2172\/1070117"},{"key":"ref27","year":"0","journal-title":"Ntop network traffic probe"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/HSI.2009.5091051"},{"key":"ref6","year":"2010","journal-title":"Utility-scale Smart Meter Deployments Plans and Proposals"},{"key":"ref29","year":"2005","journal-title":"Micrologix Ethernet Interface User Manual"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGRID.2010.5622074"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.25"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2010.2099234"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2009.06.001"},{"key":"ref9","first-page":"1","article-title":"Dynamic hybrid system of honeypot and IDS for network security analysis","volume":"2013","author":"chao","year":"2013","journal-title":"IPSJ SIG Notes"},{"key":"ref1","author":"shea","year":"2004","journal-title":"Critical Infrastructure Control Systems and the Terrorist Threat"},{"key":"ref20","author":"jiang","year":"2004","journal-title":"BAIT-TRAP A Catering Honeypot Framework"},{"key":"ref22","year":"0","journal-title":"SCADA Honeynets"},{"key":"ref21","author":"pothamsetty","year":"0","journal-title":"SCADA Honeynet Project"},{"key":"ref24","year":"0","journal-title":"Tshark Network Analyzer"},{"key":"ref23","year":"0"},{"key":"ref26","year":"0","journal-title":"Tcpdump Packet Analyzer"},{"key":"ref25","first-page":"229","article-title":"Snort: Lightweight intrusion detection for networks","author":"roesch","year":"1999","journal-title":"Proc 13th Syst Admin Conf (LISA)"}],"container-title":["IEEE Transactions on Industrial Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9424\/6809862\/06750078.pdf?arnumber=6750078","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:53:48Z","timestamp":1642006428000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6750078\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5]]},"references-count":39,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tii.2014.2304633","relation":{},"ISSN":["1551-3203","1941-0050"],"issn-type":[{"value":"1551-3203","type":"print"},{"value":"1941-0050","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,5]]}}}