{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,31]],"date-time":"2025-08-31T10:06:50Z","timestamp":1756634810810,"version":"3.37.3"},"reference-count":18,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,4,26]],"date-time":"2023-04-26T00:00:00Z","timestamp":1682467200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,4,26]],"date-time":"2023-04-26T00:00:00Z","timestamp":1682467200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001292","name":"School of Computing, Engineering & the Built Environment at Edinburgh Napier University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001292","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,4,26]]},"DOI":"10.1109\/wfcs57264.2023.10144119","type":"proceedings-article","created":{"date-parts":[[2023,6,7]],"date-time":"2023-06-07T17:24:28Z","timestamp":1686158668000},"page":"1-4","source":"Crossref","is-referenced-by-count":6,"title":["Fake PLC in the Cloud, We Thought the Attackers Believed that: How ICS Honeypot Deception Gets Impacted by Cloud Deployments?"],"prefix":"10.1109","author":[{"given":"Stanislava","family":"Ivanova","sequence":"first","affiliation":[{"name":"School of Computing, Engineering and the Built Environment, Edinburgh Napier University,Edinburgh,UK"}]},{"given":"Naghmeh","family":"Moradpoor","sequence":"additional","affiliation":[{"name":"School of Computing, Engineering and the Built Environment, Edinburgh Napier University,Edinburgh,UK"}]}],"member":"263","reference":[{"journal-title":"CVE-2017&#x2013;9841","year":"2017","key":"ref13"},{"journal-title":"Exploit Database","article-title":"Netlink GPON Router 1.0.11 - Remote Code Execution","year":"2020","key":"ref12"},{"journal-title":"Critical RCE Vulnerability Found in Over a Million GPON Home Routers","year":"2022","key":"ref15"},{"journal-title":"Exploit Database","article-title":"inurl.autodiscover\/autodiscover","year":"2016","key":"ref14"},{"journal-title":"GeoIP","year":"2022","key":"ref11"},{"key":"ref10","article-title":"Wireshark user's guide","volume":"4","author":"lamping","year":"2004","journal-title":"International"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jmsy.2020.10.011"},{"journal-title":"The convergence of it and ot in critical infrastructure","year":"2017","author":"murray","key":"ref1"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CompComm.2017.8323069"},{"journal-title":"Ukraine blames Russia for most of over 2 000 cyberattacks in 2022","year":"2023","key":"ref16"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-022-03057-y"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3423356"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3338499.3357361"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICC42927.2021.9500567"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1233341.1233399"},{"key":"ref3","first-page":"4","article-title":"Honeyd-a virtual honeypot daemon","volume":"2","author":"provos","year":"2003","journal-title":"10th dfn-cert work-shop Hamburg Germany"},{"key":"ref6","first-page":"112","article-title":"Creating effective industrial-control-system honeypots","volume":"20","author":"rowe","year":"2020","journal-title":"American Journal of Management"},{"journal-title":"Managing cybersecurity for Industrial control systems","year":"2019","author":"dinapoli","key":"ref5"}],"event":{"name":"2023 IEEE 19th International Conference on Factory Communication Systems (WFCS)","start":{"date-parts":[[2023,4,26]]},"location":"Pavia, Italy","end":{"date-parts":[[2023,4,28]]}},"container-title":["2023 IEEE 19th International Conference on Factory Communication Systems (WFCS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10144222\/10144112\/10144119.pdf?arnumber=10144119","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,26]],"date-time":"2023-06-26T18:01:26Z","timestamp":1687802486000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10144119\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,26]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/wfcs57264.2023.10144119","relation":{},"subject":[],"published":{"date-parts":[[2023,4,26]]}}}