{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T02:43:50Z","timestamp":1775097830930,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,26]],"date-time":"2023-11-26T00:00:00Z","timestamp":1700956800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,26]]},"DOI":"10.1145\/3605758.3623495","type":"proceedings-article","created":{"date-parts":[[2023,11,23]],"date-time":"2023-11-23T01:52:11Z","timestamp":1700704331000},"page":"75-81","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["SweetCam: an IP Camera Honeypot"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5772-8615","authenticated-orcid":false,"given":"Zetong","family":"Zhao","sequence":"first","affiliation":[{"name":"Technical University of Denmark, Kongens Lyngby, Denmark"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5720-5504","authenticated-orcid":false,"given":"Shreyas","family":"Srinivasa","sequence":"additional","affiliation":[{"name":"Aalborg University, Copenhagen, Denmark"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5068-9158","authenticated-orcid":false,"given":"Emmanouil","family":"Vasilomanolakis","sequence":"additional","affiliation":[{"name":"Technical University of Denmark, Kongens Lyngby, Denmark"}]}],"member":"320","published-online":{"date-parts":[[2023,11,26]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Manos Antonakakis Tim April Michael Bailey Matt Bernhard Elie Bursztein Jaime Cochran Zakir Durumeric J Alex Halderman Luca Invernizzi Michalis Kallitsis et al. 2017. Understanding the mirai botnet. In 26th $$USENIX$$ security symposium ($$USENIX$$ Security 17). 1093--1110."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSCI49370.2019.00035"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNS56114.2022.9947265"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3055186.3055192"},{"key":"e_1_3_2_1_5_1","unstructured":"Dan Gunter. 2017. Threat Hunting With Python Part 2: Detecting Nmap Behavior with Bro HTTP Logs. https:\/\/www.dragos.com\/blog\/industry-news\/threat-hunting-with-python-part-2-detecting-nmap-behavior-with-bro-http-logs\/"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/PCCC.2018.8711321"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-2511-0"},{"key":"e_1_3_2_1_8_1","first-page":"1","article-title":"Iotcandyjar: Towards an intelligent-interaction honeypot for iot devices","volume":"2017","author":"Luo Tongbo","year":"2017","unstructured":"Tongbo Luo, Zhaoyan Xu, Xing Jin, Yanhui Jia, and Xin Ouyang. 2017. Iotcandyjar: Towards an intelligent-interaction honeypot for iot devices. Black Hat , Vol. 2017 (2017), 1--11.","journal-title":"Black Hat"},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of the International Conference on Security and Management (SAM). The Steering Committee of The World Congress in Computer Science, Computer ?, 104","author":"Mphago Banyatsang","year":"2015","unstructured":"Banyatsang Mphago, Ontiretse Bagwasi, B Phofuetsile, and H Hlomani. 2015. Deception in dynamic web application honeypots: Case of glastopf. In Proceedings of the International Conference on Security and Management (SAM). The Steering Committee of The World Congress in Computer Science, Computer ?, 104."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.17781\/P002304"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2910750"},{"key":"e_1_3_2_1_12_1","unstructured":"Lindsey O'Donnell-Welch. 2022. Linux Botnet Targets Weak SSH Server Credentials. https:\/\/duo.com\/decipher\/linux-iot-botnet-targets-weak-ssh-server-credentials"},{"key":"e_1_3_2_1_13_1","volume-title":"Emu","volume":"9","author":"Pa Pa Yin Minn","year":"2015","unstructured":"Yin Minn Pa Pa, Shogo Suzuki, Katsunari Yoshioka, Tsutomu Matsumoto, Takahiro Kasama, and Christian Rossow. 2015. IoTPOT: Analysing the rise of IoT compromises. Emu, Vol. 9, 1 (2015)."},{"key":"e_1_3_2_1_14_1","unstructured":"Deutsche Telekom AG Honeypot Project. [n. d.]. T-Pot: A Multi-Honeypot Platform."},{"key":"e_1_3_2_1_15_1","unstructured":"The Honeynet Project. 2021. The Honeynet Project."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-05366-6_33"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3487552.3487833"},{"key":"e_1_3_2_1_18_1","volume-title":"26th European Symposium on Research in Computer Security (ESORICS)","author":"Srinivasa Shreyas","year":"2021","unstructured":"Shreyas Srinivasa, Jens Myrup Pedersen, and Emmanouil Vasilomanolakis. 2021b. RIoTPot: a modular hybrid-interaction IoT\/OT honeypot. In 26th European Symposium on Research in Computer Security (ESORICS) 2021. Springer, Springer, Darmstadt, Germany."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW55150.2022.00052"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3564625.3564645"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/1134782.1134792"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2016.7502992"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/eCrime47957.2019.9037501"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICOEI.2019.8862720"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC40277.2020.9149314"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3420023"}],"event":{"name":"CCS '23: ACM SIGSAC Conference on Computer and Communications Security","location":"Copenhagen Denmark","acronym":"CCS '23","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 5th Workshop on CPS&amp;IoT Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3605758.3623495","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3605758.3623495","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:46:10Z","timestamp":1750178770000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3605758.3623495"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,26]]},"references-count":26,"alternative-id":["10.1145\/3605758.3623495","10.1145\/3605758"],"URL":"https:\/\/doi.org\/10.1145\/3605758.3623495","relation":{},"subject":[],"published":{"date-parts":[[2023,11,26]]},"assertion":[{"value":"2023-11-26","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}