{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T23:00:35Z","timestamp":1773615635212,"version":"3.50.1"},"reference-count":8,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2021,12]]},"DOI":"10.3103\/s0146411621080460","type":"journal-article","created":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T03:03:08Z","timestamp":1646103788000},"page":"1194-1200","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Implementation of Honeypot Systems Based on the Potential Attack Graph"],"prefix":"10.3103","volume":"55","author":[{"given":"E. V.","family":"Zavadskii","sequence":"first","affiliation":[]},{"given":"D. V.","family":"Ivanov","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2022,3,1]]},"reference":[{"key":"7455_CR1","unstructured":"Zavadskii, E.V. and Ivanov, D.V., Countering information threats using Honeypot systems based on a graph of potential attacks, Probl. Inf. Bezop. Komp\u2019yut. Sist., 2021, no. 1, pp. 79\u201385."},{"key":"7455_CR2","unstructured":"Libvirt application development guide using python. https:\/\/libvirt.org\/docs\/libvirt-appdev-guide-python\/en-US\/ pdf\/Version-1.1-Libvirt_Application_Development_Guide_Using_Python-en-US.pdf. Cited September 21, 2020."},{"key":"7455_CR3","unstructured":"Tool documentation Fibratus. https:\/\/www.fibratus.io\/#\/overview\/what-is-fibratus. Cited December 21, 2020."},{"key":"7455_CR4","unstructured":"Framework FastAPI. https:\/\/fastapi.tiangolo.com. Cited December 10, 2020."},{"key":"7455_CR5","unstructured":"Asynchronous server Uvicorn parameters. https:\/\/www.uvicorn.org\/settings\/. Cited December 10, 2020."},{"key":"7455_CR6","unstructured":"Repository HoneyD. https:\/\/github.com\/DataSoft\/Honeyd. Cited December 11, 2020."},{"key":"7455_CR7","unstructured":"Fingeprint database Nmap. https:\/\/github.com\/nmap\/nmap\/blob\/master\/nmap-os-db. Cited December 11, 2020."},{"key":"7455_CR8","doi-asserted-by":"publisher","unstructured":"Ovasapyan, T. and Moskvin, D., Security provision in WSN on the basis of the adaptive behavior of nodes, Fourth World Conf. on Smart Trends in Systems, Security and Sustainability (WorldS4), London, 2020, IEEE, 2020, pp. 81\u201385. \u00a0https:\/\/doi.org\/10.1109\/WorldS450073.2020.9210421","DOI":"10.1109\/WorldS450073.2020.9210421"}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411621080460.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411621080460","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411621080460.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:02:35Z","timestamp":1773612155000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411621080460"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12]]},"references-count":8,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2021,12]]}},"alternative-id":["7455"],"URL":"https:\/\/doi.org\/10.3103\/s0146411621080460","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,12]]},"assertion":[{"value":"22 April 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 April 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 April 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 March 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}