{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T14:30:38Z","timestamp":1774449038210,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2004,10,28]],"date-time":"2004-10-28T00:00:00Z","timestamp":1098921600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2004,10,28]]},"DOI":"10.1145\/1029533.1029540","type":"proceedings-article","created":{"date-parts":[[2005,1,30]],"date-time":"2005-01-30T17:55:16Z","timestamp":1107107716000},"page":"24-28","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Honeynets"],"prefix":"10.1145","author":[{"given":"Jeremiah K.","family":"Jones","sequence":"first","affiliation":[{"name":"Brigham Young University, Provo, UT"}]},{"given":"Gordon W.","family":"Romney","sequence":"additional","affiliation":[{"name":"Brigham Young University, Provo, UT"}]}],"member":"320","published-online":{"date-parts":[[2004,10,28]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Brer Rabbit and the Tar-Baby","author":"Harris J.","year":"1879","unstructured":"J. Harris , Brer Rabbit and the Tar-Baby 1879 , Creation Books , 2000. J. Harris, Brer Rabbit and the Tar-Baby 1879, Creation Books, 2000."},{"key":"e_1_3_2_1_2_1","first-page":"231","volume-title":"Honeypot: a Supplemented Active Defense System for Network Security,\" Parallel & Distributed Computing Applications and Technologies","author":"Zhang F.","year":"2003","unstructured":"F. Zhang , , \" Honeypot: a Supplemented Active Defense System for Network Security,\" Parallel & Distributed Computing Applications and Technologies , pp 231 -- 235 , 2003 . F. Zhang, et al., \"Honeypot: a Supplemented Active Defense System for Network Security,\" Parallel & Distributed Computing Applications and Technologies, pp 231--235, 2003."},{"key":"e_1_3_2_1_3_1","volume-title":"IEEE ITHET 2004 Conference in Istanbul","author":"Romney G.","year":"2004","unstructured":"G. Romney , A Teaching Prototype for Educating IT Security Engineers in Emerging Environments ,\" Presented at the IEEE ITHET 2004 Conference in Istanbul , Turkey , June 2, 2004 . Published in IEEE Xplore. G. Romney, et al., \"A Teaching Prototype for Educating IT Security Engineers in Emerging Environments,\" Presented at the IEEE ITHET 2004 Conference in Istanbul, Turkey, June 2, 2004. Published in IEEE Xplore."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/611892.611982"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/971300.971439"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/947121.947178"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/971300.971440"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/378613.378722"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/364447.364533"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1193207"},{"key":"e_1_3_2_1_11_1","volume-title":"May","author":"Spitzner L.","year":"2002","unstructured":"L. Spitzner , \"Honeypot : Definitions and values.\" http:\/\/www.spitzner.net , May 2002 . L. Spitzner, \"Honeypot: Definitions and values.\" http:\/\/www.spitzner.net, May 2002."},{"key":"e_1_3_2_1_12_1","unstructured":"Honeynet Project: Know Your Enemy:Honeynets - What a Honeynet is its value how it works and risk\/issues involved. http:\/\/www.honeynet.org Last Modified: 07 January 2003.  Honeynet Project: Know Your Enemy:Honeynets - What a Honeynet is its value how it works and risk\/issues involved. http:\/\/www.honeynet.org Last Modified: 07 January 2003."},{"key":"e_1_3_2_1_13_1","first-page":"92","volume-title":"Proceedings of the 2003 IEEE Workshop on Information Assurance","author":"Levine J.","year":"2003","unstructured":"J. Levine , The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks ,\" Proceedings of the 2003 IEEE Workshop on Information Assurance , pp 92 -- 99 , June 2003 . J. Levine, et al., \"The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks,\" Proceedings of the 2003 IEEE Workshop on Information Assurance, pp 92--99, June 2003."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1236244"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1219079"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2004.1281253"},{"key":"e_1_3_2_1_17_1","first-page":"41","volume-title":"International Conference on Machine Learning and Cybernetics","volume":"1","author":"Yin J.","year":"2003","unstructured":"J. Yin , Intrusion Discovery with Data Mining on Honeynet ,\" International Conference on Machine Learning and Cybernetics , Volume 1 , pp 41 -- 45 , 2003 . J. Yin, et al., \"Intrusion Discovery with Data Mining on Honeynet,\" International Conference on Machine Learning and Cybernetics, Volume 1, pp 41--45, 2003."},{"key":"e_1_3_2_1_18_1","volume-title":"2004 IEEE Information Assurance Conference, June 10-11","author":"Raynal F.","unstructured":"F. Raynal , et. Al., \" Honeypot Forensics ,\" 2004 IEEE Information Assurance Conference, June 10-11 , US Military Academy, West Point, New York F. Raynal, et. Al., \"Honeypot Forensics,\" 2004 IEEE Information Assurance Conference, June 10-11, US Military Academy, West Point, New York"}],"event":{"name":"SIGITE04: ACM Special Interest Group for Information Technology Education Conference 2004","location":"Salt Lake City UT USA","acronym":"SIGITE04","sponsor":["ACM Association for Computing Machinery","SIGITE ACM Special Interest Group on Information Technology Education"]},"container-title":["Proceedings of the 5th conference on Information technology education"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1029533.1029540","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1029533.1029540","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:30:59Z","timestamp":1750264259000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1029533.1029540"}},"subtitle":["an educational resource for IT security"],"short-title":[],"issued":{"date-parts":[[2004,10,28]]},"references-count":18,"alternative-id":["10.1145\/1029533.1029540","10.1145\/1029533"],"URL":"https:\/\/doi.org\/10.1145\/1029533.1029540","relation":{},"subject":[],"published":{"date-parts":[[2004,10,28]]},"assertion":[{"value":"2004-10-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}