{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:47:30Z","timestamp":1762004850787,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,10,24]],"date-time":"2016-10-24T00:00:00Z","timestamp":1477267200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,10,24]]},"DOI":"10.1145\/2994475.2994481","type":"proceedings-article","created":{"date-parts":[[2016,10,25]],"date-time":"2016-10-25T12:46:35Z","timestamp":1477399595000},"page":"11-16","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":23,"title":["AHEAD"],"prefix":"10.1145","author":[{"given":"Fabio","family":"De Gaspari","sequence":"first","affiliation":[{"name":"Sapienza Universita' di Roma, Roma, Italy"}]},{"given":"Sushil","family":"Jajodia","sequence":"additional","affiliation":[{"name":"George Mason University, Fairfax, VA, USA"}]},{"given":"Luigi V.","family":"Mancini","sequence":"additional","affiliation":[{"name":"Sapienza Universita' di Roma, Roma, Italy"}]},{"given":"Agostino","family":"Panico","sequence":"additional","affiliation":[{"name":"Sapienza Universita' di Roma, Roma, Italy"}]}],"member":"320","published-online":{"date-parts":[[2016,10,24]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Artillery. https:\/\/github.com\/shoreditch-ops\/artillery.  Artillery. https:\/\/github.com\/shoreditch-ops\/artillery."},{"key":"e_1_3_2_1_2_1","unstructured":"Conpot. https:\/\/github.com\/mushorg\/conpot.  Conpot. https:\/\/github.com\/mushorg\/conpot."},{"key":"e_1_3_2_1_3_1","unstructured":"Decloak. https:\/\/github.com\/cmlh\/decloak.  Decloak. https:\/\/github.com\/cmlh\/decloak."},{"key":"e_1_3_2_1_4_1","unstructured":"Dionaea. https:\/\/github.com\/rep\/dionaea.  Dionaea. https:\/\/github.com\/rep\/dionaea."},{"key":"e_1_3_2_1_5_1","unstructured":"Docker platform. https:\/\/www.docker.com\/.  Docker platform. https:\/\/www.docker.com\/."},{"key":"e_1_3_2_1_6_1","unstructured":"Harbinger distribution. http:\/\/www.blackhillsinfosec.com\/?page_id=4419.  Harbinger distribution. http:\/\/www.blackhillsinfosec.com\/?page_id=4419."},{"key":"e_1_3_2_1_7_1","unstructured":"Honeybadger. http:\/\/github.com\/honeybadger-io\/honeybadger-ruby.  Honeybadger. http:\/\/github.com\/honeybadger-io\/honeybadger-ruby."},{"key":"e_1_3_2_1_8_1","unstructured":"Kippo. https:\/\/github.com\/desaster\/kippo.  Kippo. https:\/\/github.com\/desaster\/kippo."},{"key":"e_1_3_2_1_9_1","unstructured":"Portspoof. https:\/\/github.com\/drk1wi\/portspoof.  Portspoof. https:\/\/github.com\/drk1wi\/portspoof."},{"key":"e_1_3_2_1_10_1","unstructured":"Rubberglue. https:\/\/github.com\/adhdproject\/adhdproject.github.io\/blob\/master\/Tools\/Rubberglue.md.  Rubberglue. https:\/\/github.com\/adhdproject\/adhdproject.github.io\/blob\/master\/Tools\/Rubberglue.md."},{"key":"e_1_3_2_1_11_1","unstructured":"Webbugserver. https:\/\/github.com\/adhdproject\/adhdproject.github.io\/blob\/master\/Tools\/WebBugServer.md.  Webbugserver. https:\/\/github.com\/adhdproject\/adhdproject.github.io\/blob\/master\/Tools\/WebBugServer.md."},{"key":"e_1_3_2_1_12_1","unstructured":"Weblabyrinth. https:\/\/github.com\/mayhemiclabs\/weblabyrinth.  Weblabyrinth. https:\/\/github.com\/mayhemiclabs\/weblabyrinth."},{"key":"e_1_3_2_1_13_1","first-page":"9","volume-title":"Proceedings of the 14th Conference on USENIX Security Symposium -","volume":"14","author":"Anagnostakis K. G.","year":"2005","unstructured":"K. G. Anagnostakis , S. Sidiroglou , P. Akritidis , K. Xinidis , E. Markatos , and A. D. Keromytis . Detecting targeted attacks using shadow honeypots . In Proceedings of the 14th Conference on USENIX Security Symposium - Volume 14 , SSYM'05, pages 9 -- 9 , 2005 . K. G. Anagnostakis, S. Sidiroglou, P. Akritidis, K. Xinidis, E. Markatos, and A. D. Keromytis. Detecting targeted attacks using shadow honeypots. In Proceedings of the 14th Conference on USENIX Security Symposium - Volume 14, SSYM'05, pages 9--9, 2005."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660329"},{"key":"e_1_3_2_1_15_1","author":"Bringer M. L.","year":"2012","unstructured":"M. L. Bringer , C. A. Chelmecki , and H. Fujinoki . A survey: Recent advances and future trends in honeypot research. In International Journal of Computer Network and Information Security, IJCNIS , 2012 . M. L. Bringer, C. A. Chelmecki, and H. Fujinoki. A survey: Recent advances and future trends in honeypot research. In International Journal of Computer Network and Information Security, IJCNIS, 2012.","journal-title":"In International Journal of Computer Network and Information Security, IJCNIS"},{"key":"e_1_3_2_1_16_1","series-title":"Advances in Information Security","volume-title":"Intrusion Detection Systems","author":"Di Pietro R.","year":"2008","unstructured":"R. Di Pietro and L. V. Mancini . Intrusion Detection Systems , volume 38 of Advances in Information Security . Springer , 2008 . R. Di Pietro and L. V. Mancini. Intrusion Detection Systems, volume 38 of Advances in Information Security. Springer, 2008."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/2432145"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/2038041"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/2774946"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/2738462"},{"key":"e_1_3_2_1_21_1","volume-title":"Detecting Honeypots","author":"Provos N.","year":"2007","unstructured":"N. Provos and T. Holz . Detecting Honeypots , chapter in book: Virtual Honeypots: From Botnet Tracking to Intrusion Detection. Addison-Wesley Professional , 2007 . N. Provos and T. Holz. Detecting Honeypots, chapter in book: Virtual Honeypots: From Botnet Tracking to Intrusion Detection. Addison-Wesley Professional, 2007."},{"volume-title":"Honeypots: Tracking Hackers","year":"2002","key":"e_1_3_2_1_22_1","unstructured":"Spitzner. Honeypots: Tracking Hackers . Addison-Wesley Longman , 2002 . Spitzner. Honeypots: Tracking Hackers. Addison-Wesley Longman, 2002."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-014-1797-9"}],"event":{"name":"CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Vienna Austria","acronym":"CCS'16"},"container-title":["Proceedings of the 2016 ACM Workshop on Automated Decision Making for Active Cyber Defense"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2994475.2994481","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2994475.2994481","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:39:41Z","timestamp":1750217981000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2994475.2994481"}},"subtitle":["A New Architecture for Active Defense"],"short-title":[],"issued":{"date-parts":[[2016,10,24]]},"references-count":23,"alternative-id":["10.1145\/2994475.2994481","10.1145\/2994475"],"URL":"https:\/\/doi.org\/10.1145\/2994475.2994481","relation":{},"subject":[],"published":{"date-parts":[[2016,10,24]]},"assertion":[{"value":"2016-10-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}