{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T15:44:21Z","timestamp":1730303061605,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1109\/vlhcc.2018.8506515","type":"proceedings-article","created":{"date-parts":[[2018,10,25]],"date-time":"2018-10-25T23:44:51Z","timestamp":1540511091000},"page":"205-209","source":"Crossref","is-referenced-by-count":1,"title":["Visual Modeling of Cyber Deception"],"prefix":"10.1109","author":[{"given":"Cristiano De","family":"Faveri","sequence":"first","affiliation":[]},{"given":"Ana","family":"Moreira","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/0167-6423(93)90021-G"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ISRE.1997.566873"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1080\/01402398208437106"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2009.67"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2818000.2818015"},{"journal-title":"Requirements Engineering From System Goals to UML Models to Software Specifications","year":"2009","author":"van lamsweerde","key":"ref15"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-32699-3"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-41187-3"},{"key":"ref6","first-page":"177","article-title":"Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware","author":"chen","year":"2008","journal-title":"Proceedings of the International Conference on Dependable Systems and Networks"},{"key":"ref5","volume":"1","author":"spitzner","year":"2002","journal-title":"Honeypots Tracking Hackers"},{"journal-title":"Using deception to enhance security A Taxonomy Model and Novel Uses","year":"2015","author":"almeshekah","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/IAW.2005.1495930"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.11.004"},{"key":"ref1","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-25133-2","author":"heckman","year":"2015","journal-title":"Cyber Denial Deception and Counter Deception"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.21236\/ADA235785"}],"event":{"name":"2018 IEEE Symposium on Visual Languages and Human-Centric Computing (VL\/HCC)","start":{"date-parts":[[2018,10,1]]},"location":"Lisbon","end":{"date-parts":[[2018,10,4]]}},"container-title":["2018 IEEE Symposium on Visual Languages and Human-Centric Computing (VL\/HCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8488603\/8506479\/08506515.pdf?arnumber=8506515","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T20:59:47Z","timestamp":1643230787000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8506515\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/vlhcc.2018.8506515","relation":{},"subject":[],"published":{"date-parts":[[2018,10]]}}}