{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T05:11:19Z","timestamp":1729660279972,"version":"3.28.0"},"reference-count":43,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,7]]},"DOI":"10.1109\/iccsa.2017.8000014","type":"proceedings-article","created":{"date-parts":[[2017,8,3]],"date-time":"2017-08-03T16:24:52Z","timestamp":1501777492000},"page":"1-8","source":"Crossref","is-referenced-by-count":2,"title":["Deception planning models for cyber security"],"prefix":"10.1109","author":[{"given":"Cristiano","family":"De Faveri","sequence":"first","affiliation":[]},{"given":"Ana","family":"Moreira","sequence":"additional","affiliation":[]},{"given":"Eric","family":"Souza","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Tech Rep","article-title":"Joint publication 3&#x2013;13.4 - military deception","year":"2006","key":"ref39"},{"journal-title":"The art of darkness Deception and urban operations","year":"2000","author":"gerwehr","key":"ref38"},{"journal-title":"Defensive Computer-security Deception Operations Processes Principles and Techniques","year":"2006","author":"yuill","key":"ref33"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-90-481-3658-2_39"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"240","DOI":"10.1049\/iet-ifs.2014.0063","article-title":"Aspectising honeytokens to contain the insider threat","volume":"9","author":"padayachee","year":"2014","journal-title":"IET Information Security"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2011.5984063"},{"article-title":"Field manual 90&#x2013;2, battlefield deception","year":"1988","author":"army","key":"ref37"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1080\/01402398208437105"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1080\/01402398208437106"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2008.09.009"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1201\/9781420019087.sec2"},{"key":"ref40","first-page":"127","article-title":"Planning and integrating deception into computer security defenses","author":"almeshekah","year":"2014","journal-title":"ACM"},{"journal-title":"Strategic Military Deception","year":"1982","author":"daniel","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1037\/a0025940"},{"key":"ref13","article-title":"The cognitive bases of intelligence analysis","author":"thompson","year":"1984","journal-title":"DTIC Document Tech Rep"},{"key":"ref14","first-page":"724","article-title":"The evolution of cognitive bias","author":"haselton","year":"2005","journal-title":"The Handbook of Evolutionary Psychology"},{"journal-title":"The Handbook of Evolutionary Psychology","year":"2005","author":"buss","key":"ref15"},{"article-title":"Thinking and deciding 4th ed","year":"2008","author":"baron","key":"ref16"},{"journal-title":"Using deception to enhance security A Taxonomy Model and Novel Uses","year":"2015","author":"almeshekah","key":"ref17"},{"journal-title":"Psychology of Intelligence Analysis Center for the Study of Intelligence","year":"1999","author":"heuer","key":"ref18"},{"key":"ref19","volume":"1","author":"spitzner","year":"2003","journal-title":"Honeypots Tracking Hackers"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/IAW.2004.1437806"},{"key":"ref4","article-title":"The deception toolkit","volume":"19","author":"cohen","year":"1998","journal-title":"Risks Digest"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2818000.2818015"},{"key":"ref3","first-page":"20","article-title":"An evening with berferd in which a cracker is lured, endured, and studied","author":"cheswick","year":"1992","journal-title":"Proceedings of the San Francisco USENIX conference"},{"key":"ref6","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-25133-2","author":"heckman","year":"2015","journal-title":"Cyber Denial Deception and Counter Deception"},{"journal-title":"Baiting Inside Attackers Using Decoy Documents","year":"2009","author":"bowen","key":"ref29"},{"article-title":"Deception: Theory and Practice","year":"2012","author":"monroe","key":"ref5"},{"journal-title":"Why We Lie The Evolutionary Roots of Deception and the Unconscious Mind","year":"2005","author":"smith","key":"ref8"},{"journal-title":"Cheating and Deception","year":"1991","author":"bell","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1063\/1.2810663"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.chom.2015.05.003"},{"key":"ref1","first-page":"147","article-title":"Defining deception","volume":"20","author":"masip","year":"2004","journal-title":"Anales de Psicolog&#x00ED;a\/Annals of Psychology"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1193207"},{"journal-title":"Design implementation and operation of a mobile honeypot","year":"2013","author":"w\u00e4hlisch","key":"ref22"},{"key":"ref21","first-page":"19","article-title":"Client honeypots: Approaches and challenges","author":"qassrawi","year":"2010","journal-title":"New Trends in Information Science and Service Science (NISS) 2010 4th InternationalConference on IEEE"},{"article-title":"Requirements engineering: from system goals to uml models to software specifications","year":"2009","author":"van lamsweerde","key":"ref42"},{"key":"ref24","article-title":"A conceptual framework for smart mobile honeypots","author":"ho","year":"0","journal-title":"Available inr Acessed in Mar 2016"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2016.44"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2659651.2659663"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516671"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2004.1317437"},{"article-title":"Honeytokens: The other honeypot","year":"2003","author":"spitzner","key":"ref25"}],"event":{"name":"2017 17th International Conference on Computational Science and Its Applications (ICCSA)","start":{"date-parts":[[2017,7,3]]},"location":"Trieste, Italy","end":{"date-parts":[[2017,7,6]]}},"container-title":["2017 17th International Conference on Computational Science and Its Applications (ICCSA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7991627\/7999641\/08000014.pdf?arnumber=8000014","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T20:46:10Z","timestamp":1569962770000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8000014\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7]]},"references-count":43,"URL":"https:\/\/doi.org\/10.1109\/iccsa.2017.8000014","relation":{},"subject":[],"published":{"date-parts":[[2017,7]]}}}