{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:58:35Z","timestamp":1773615515363,"version":"3.50.1"},"reference-count":9,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.3103\/s0146411622080260","type":"journal-article","created":{"date-parts":[[2023,2,28]],"date-time":"2023-02-28T14:03:23Z","timestamp":1677593003000},"page":"964-969","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Counteracting Information Threats Using Honeypot Systems Based on a Graph of\u00a0Potential Attacks"],"prefix":"10.3103","volume":"56","author":[{"given":"E. V.","family":"Zavadskii","sequence":"first","affiliation":[]},{"given":"D. V.","family":"Ivanov","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2023,2,28]]},"reference":[{"key":"7553_CR1","unstructured":"NIST National Vulnerability Database Statistics Results. https:\/\/nvd.nist.gov\/vuln\/search\/statistics?form_ type=Basic&results_type=statistics&search_type=all. Cited January 15, 2021."},{"key":"7553_CR2","unstructured":"External pentests. 2020. https:\/\/www.ptsecurity.com\/ru-ru\/research\/analytics\/external-pentests-2020\/. Cited September 11, 2020."},{"key":"7553_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.2306\/scienceasia1513-1874.2013.39S.001","volume":"39S","author":"W. Zakaria","year":"2013","unstructured":"Zakaria, W. and Kiah, L., A review of dynamic and intelligent honeypots, ScienceAsia, 2013, vol. 39S, pp. 1\u20135. https:\/\/doi.org\/10.2306\/scienceasia1513-1874.2013.39S.001","journal-title":"ScienceAsia"},{"key":"7553_CR4","doi-asserted-by":"publisher","first-page":"3906","DOI":"10.1109\/JSYST.2017.2762161","volume":"12","author":"W. Fan","year":"2017","unstructured":"Fan, W., Du, Zh., Fern\u00e1ndez, D., and Villagr\u00e1, V.A., Enabling an anatomic view to investigate honeypot systems: A survey, IEEE Syst. J., 2017, vol. 12, no. 4, pp. 3906\u20133919. https:\/\/doi.org\/10.1109\/JSYST.2017.2762161","journal-title":"IEEE Syst. J."},{"key":"7553_CR5","unstructured":"Honeypot Argos. htps:\/\/www.few.vu.nl\/argos\/. Cited September 20, 2020."},{"key":"7553_CR6","volume-title":"Honeynets: A honeynet definition","author":"R. Talabis","year":"2005","unstructured":"Talabis, R., Honeynets: A honeynet definition, The Philippine Honeypot Project, 2005, pp.\u00a01\u20134."},{"key":"7553_CR7","first-page":"3332","volume":"3","author":"N. Sharma","year":"2011","unstructured":"Sharma, N. and Sran, S.S., Detection of threats in honeynet using honeywall, Int. J.\u00a0Comput. Sci. Eng., 2011, vol. 3, no. 10, pp. 3332\u20133336.","journal-title":"Int. J.\u00a0Comput. Sci. Eng."},{"key":"7553_CR8","doi-asserted-by":"publisher","first-page":"4123","DOI":"10.3390\/en15114123","volume":"15","author":"M. Kalinin","year":"2022","unstructured":"Kalinin, M., Zegzhda, D., and Zavadskii, E., Protection of energy network infrastructures applying a dynamic topology virtualization, Energies, 2022, vol. 15, no. 11, p. 4123. https:\/\/doi.org\/10.3390\/en15114123","journal-title":"Energies"},{"key":"7553_CR9","unstructured":"MITRE ATT&KE Lateral Movement. https:\/\/attack.mitre.org\/tactics\/TA0008\/. Cited December 11, 2020."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411622080260.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411622080260","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411622080260.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:00:59Z","timestamp":1773612059000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411622080260"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12]]},"references-count":9,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2022,12]]}},"alternative-id":["7553"],"URL":"https:\/\/doi.org\/10.3103\/s0146411622080260","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,12]]},"assertion":[{"value":"22 April 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 April 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 April 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 February 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}