{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T14:25:50Z","timestamp":1774967150439,"version":"3.50.1"},"reference-count":50,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62372129"],"award-info":[{"award-number":["62372129"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U20B2046"],"award-info":[{"award-number":["U20B2046"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Key Research and Development Program of China","award":["2021YFB2012402"],"award-info":[{"award-number":["2021YFB2012402"]}]},{"name":"Guangzhou University Graduate Innovation Ability Training Project"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. on Mobile Comput."],"published-print":{"date-parts":[[2025,1]]},"DOI":"10.1109\/tmc.2024.3455564","type":"journal-article","created":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T19:30:36Z","timestamp":1725996636000},"page":"198-209","source":"Crossref","is-referenced-by-count":26,"title":["PHCG: PLC Honeypoint Communication Generator for Industrial IoT"],"prefix":"10.1109","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7073-8444","authenticated-orcid":false,"given":"Hao","family":"Liu","sequence":"first","affiliation":[{"name":"Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9424-8282","authenticated-orcid":false,"given":"Yinghai","family":"Zhou","sequence":"additional","affiliation":[{"name":"Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou, China"}]},{"given":"Binxing","family":"Fang","sequence":"additional","affiliation":[{"name":"Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8157-5337","authenticated-orcid":false,"given":"Yanbin","family":"Sun","sequence":"additional","affiliation":[{"name":"Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8355-0969","authenticated-orcid":false,"given":"Ning","family":"Hu","sequence":"additional","affiliation":[{"name":"Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9409-5359","authenticated-orcid":false,"given":"Zhihong","family":"Tian","sequence":"additional","affiliation":[{"name":"Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2018.2866249"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3002255"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CCGridW59191.2023.00017"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2022.3142820"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.15302\/J-SSCAE-2023.06.007"},{"issue":"5","key":"ref6","first-page":"1230","article-title":"Development of deception defense technology and exploration of its large language model applications","volume":"61","author":"Wang","year":"2024","journal-title":"J. Comput. Res. Develop."},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.002.2200553"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3200127"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2017.2705680"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2018.2824325"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2018.2883952"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2019.2907593"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2019.2922316"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2019.2954872"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2020.2967041"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2020.2972530"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2020.3003079"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2021.3125949"},{"key":"ref19","article-title":"SCADA honeynet project: Building honeypots for industrial networks","author":"Pothamsetty","year":"2005"},{"key":"ref20","article-title":"mushorg\/conpot: Ics\/scada honeypot","year":"2005"},{"key":"ref21","article-title":"Gaspot released at blackhat 2015","author":"Hilt","year":"2016"},{"key":"ref22","article-title":"scy-phy\/minicps: Minicps: A framework for cyber-physical systems real-time simulation, built on top of mininet","year":"2017"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2016.7745468"},{"key":"ref24","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2021.102598","article-title":"Don\u2019t get stung, cover your ICS in honey: How do honeypots fit within industrial control system security","volume":"114","author":"Maesschalck","year":"2022","journal-title":"Comput. Secur."},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/WFCS57264.2023.10144119"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10329-7_12"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2016.103"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-89500-0_36"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-73830-7_30"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3423356"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICTC46691.2019.8939925"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.23919\/CyCon49761.2020.9131734"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ICC42927.2021.9500567"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-022-03057-y"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ISNCC55209.2022.9851732"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/CSR54599.2022.9850329"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW59978.2023.00044"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/2994487.2994493"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2023.3283022"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2020.3001225"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2021.3120057"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2024.3373472"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2022.3186496"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2020.3017079"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/3617680"},{"key":"ref46","article-title":"Cross-lingual language model pretraining","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Conneau"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1162\/tacl_a_00343"},{"key":"ref48","article-title":"Unified language model pre-training for natural language understanding and generation","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Dong"},{"issue":"140","key":"ref49","first-page":"1","article-title":"Exploring the limits of transfer learning with a unified text-to-text transformer","volume":"21","author":"Raffel","year":"2020","journal-title":"J. Mach. Learn. Res."},{"key":"ref50","article-title":"Modbus application protocol specification v1.1b3","year":"2012"}],"container-title":["IEEE Transactions on Mobile Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/7755\/10777875\/10675395.pdf?arnumber=10675395","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,5]],"date-time":"2024-12-05T06:30:15Z","timestamp":1733380215000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10675395\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1]]},"references-count":50,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tmc.2024.3455564","relation":{},"ISSN":["1536-1233","1558-0660","2161-9875"],"issn-type":[{"value":"1536-1233","type":"print"},{"value":"1558-0660","type":"electronic"},{"value":"2161-9875","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1]]}}}