{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:09:24Z","timestamp":1750306164464,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,10,24]],"date-time":"2016-10-24T00:00:00Z","timestamp":1477267200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Bundesministerium f\u00fcr Bildung und Forschung","award":["16KIS0254"],"award-info":[{"award-number":["16KIS0254"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,10,24]]},"DOI":"10.1145\/2976749.2989063","type":"proceedings-article","created":{"date-parts":[[2016,10,25]],"date-time":"2016-10-25T12:46:35Z","timestamp":1477399595000},"page":"1823-1825","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":19,"title":["POSTER"],"prefix":"10.1145","author":[{"given":"Stephan","family":"Lau","sequence":"first","affiliation":[{"name":"Freie Universit\u00e4t Berlin, Berlin, Germany"}]},{"given":"Johannes","family":"Klick","sequence":"additional","affiliation":[{"name":"Freie Universit\u00e4t Berlin, Berlin, Germany"}]},{"given":"Stephan","family":"Arndt","sequence":"additional","affiliation":[{"name":"Freie Universit\u00e4t Berlin, Berlin, Germany"}]},{"given":"Volker","family":"Roth","sequence":"additional","affiliation":[{"name":"Freie Universit\u00e4t Berlin, Berlin, Germany"}]}],"member":"320","published-online":{"date-parts":[[2016,10,24]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10329-7_12"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813703"},{"key":"e_1_3_2_1_3_1","unstructured":"ICS Security Workspace. ICS\/SCADA Honeypot Log. http:\/\/plcscan.org\/blog\/dataanalysis\/icsscada-honeypot-log\/.  ICS Security Workspace. ICS\/SCADA Honeypot Log. http:\/\/plcscan.org\/blog\/dataanalysis\/icsscada-honeypot-log\/."},{"key":"e_1_3_2_1_4_1","unstructured":"ICS Security Workspace. Security Analysis from Siemens S7 PLC CPU Buffer {chinese}. http:\/\/plcscan.org\/blog\/2016\/03\/security-analysis-from-siemens-s7-plc-cpubuffer\/.  ICS Security Workspace. Security Analysis from Siemens S7 PLC CPU Buffer {chinese}. http:\/\/plcscan.org\/blog\/2016\/03\/security-analysis-from-siemens-s7-plc-cpubuffer\/."},{"key":"e_1_3_2_1_5_1","volume-title":"Programmable controllers. Part 3: Programming Languages.","author":"IEC.","year":"2003","unstructured":"IEC. IEC 61131--3 International Standard , Programmable controllers. Part 3: Programming Languages. 2003 . IEC. IEC 61131--3 International Standard, Programmable controllers. Part 3: Programming Languages. 2003."},{"key":"e_1_3_2_1_6_1","volume-title":"Proc. of the Informing Science and IT Education Conference","author":"L\u00f3pez M. H.","year":"2008","unstructured":"M. H. L\u00f3pez and C. F. L. Res\u00e9ndez . Honeypots : Basic Concepts, Classification and Educational Use as Resources in Information Security Education and Courses . In Proc. of the Informing Science and IT Education Conference , 2008 . M. H. L\u00f3pez and C. F. L. Res\u00e9ndez. Honeypots: Basic Concepts, Classification and Educational Use as Resources in Information Security Education and Courses. In Proc. of the Informing Science and IT Education Conference, 2008."},{"key":"e_1_3_2_1_7_1","unstructured":"J. Matherly. Shodan. https:\/\/www.shodan.io\/.  J. Matherly. Shodan. https:\/\/www.shodan.io\/."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1233341.1233399"},{"key":"e_1_3_2_1_9_1","unstructured":"D. Nardella. Snap7. http:\/\/snap7.sourceforge.net\/.  D. Nardella. Snap7. http:\/\/snap7.sourceforge.net\/."},{"key":"e_1_3_2_1_10_1","unstructured":"L. Rist etal Conpot. http:\/\/conpot.org\/.  L. Rist et al. Conpot. http:\/\/conpot.org\/."},{"key":"e_1_3_2_1_11_1","volume-title":"Taxonomy of Honeypots","author":"Seifert C.","year":"2006","unstructured":"C. Seifert , I. Welch , and P. Komisarczuk . Taxonomy of Honeypots , 2006 . C. Seifert, I. Welch, and P. Komisarczuk. Taxonomy of Honeypots, 2006."}],"event":{"name":"CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Vienna Austria","acronym":"CCS'16"},"container-title":["Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2976749.2989063","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2976749.2989063","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:39:57Z","timestamp":1750217997000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2976749.2989063"}},"subtitle":["Towards Highly Interactive Honeypots for Industrial Control Systems"],"short-title":[],"issued":{"date-parts":[[2016,10,24]]},"references-count":11,"alternative-id":["10.1145\/2976749.2989063","10.1145\/2976749"],"URL":"https:\/\/doi.org\/10.1145\/2976749.2989063","relation":{},"subject":[],"published":{"date-parts":[[2016,10,24]]},"assertion":[{"value":"2016-10-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}