{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T15:52:54Z","timestamp":1774367574301,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":8,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,8,7]],"date-time":"2019-08-07T00:00:00Z","timestamp":1565136000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,8,7]]},"DOI":"10.1145\/3341188.3341190","type":"proceedings-article","created":{"date-parts":[[2019,7,29]],"date-time":"2019-07-29T20:51:45Z","timestamp":1564433505000},"page":"1-4","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Probing Firewalls of Malware-Infected Networks with Honeypot"],"prefix":"10.1145","author":[{"given":"Hyuga","family":"Kobayashi","sequence":"first","affiliation":[{"name":"The University of Tokyo"}]},{"given":"Zhiqing","family":"Zhang","sequence":"additional","affiliation":[{"name":"The University of Tokyo"}]},{"given":"Hideya","family":"Ochiai","sequence":"additional","affiliation":[{"name":"The University of Tokyo"}]},{"given":"Hiroshi","family":"Esaki","sequence":"additional","affiliation":[{"name":"The University of Tokyo"}]}],"member":"320","published-online":{"date-parts":[[2019,8,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2296874"},{"key":"e_1_3_2_1_2_1","first-page":"203","article-title":"A survey on potential applications of honeypot technology in intrusion detection systems","volume":"2","author":"Baykara Muhammet","year":"2015","unstructured":"Muhammet Baykara and Resul Da\u015f . 2015 . A survey on potential applications of honeypot technology in intrusion detection systems . International Journal of Computer Networks and Applications (IJCNA) 2 , 5 (2015), 203 -- 208 . Muhammet Baykara and Resul Da\u015f. 2015. A survey on potential applications of honeypot technology in intrusion detection systems. International Journal of Computer Networks and Applications (IJCNA) 2, 5 (2015), 203--208.","journal-title":"International Journal of Computer Networks and Applications (IJCNA)"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.102913.00020"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"M. Cotton and L. Vegoda. 2010. Special Use IPv4 Addresses. RFC 5735. RFC Editor.  M. Cotton and L. Vegoda. 2010. Special Use IPv4 Addresses. RFC 5735. RFC Editor.","DOI":"10.17487\/rfc5735"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSCS.2013.94"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/IAdCC.2013.6514213"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2007.4375860"},{"key":"e_1_3_2_1_8_1","volume-title":"2014 IEEE workshop on advanced research and technology in industry applications (WARTIA). IEEE, 1030--1032","author":"Suo Xiangfeng","year":"2014","unstructured":"Xiangfeng Suo , Xue Han , and Yunhui Gao . 2014 . Research on the application of honeypot technology in intrusion detection system . In 2014 IEEE workshop on advanced research and technology in industry applications (WARTIA). IEEE, 1030--1032 . Xiangfeng Suo, Xue Han, and Yunhui Gao. 2014. Research on the application of honeypot technology in intrusion detection system. In 2014 IEEE workshop on advanced research and technology in industry applications (WARTIA). IEEE, 1030--1032."}],"event":{"name":"CFI'19: The 14th International Conference on Future Internet Technologies","location":"Phuket Thailand","acronym":"CFI'19","sponsor":["FIF Future Internet Forum"]},"container-title":["Proceedings of the 14th International Conference on Future Internet Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3341188.3341190","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3341188.3341190","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:13:15Z","timestamp":1750201995000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3341188.3341190"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,7]]},"references-count":8,"alternative-id":["10.1145\/3341188.3341190","10.1145\/3341188"],"URL":"https:\/\/doi.org\/10.1145\/3341188.3341190","relation":{},"subject":[],"published":{"date-parts":[[2019,8,7]]},"assertion":[{"value":"2019-08-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}