{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T04:07:37Z","timestamp":1725595657966},"reference-count":18,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1109\/msn48538.2019.00086","type":"proceedings-article","created":{"date-parts":[[2020,4,17]],"date-time":"2020-04-17T04:41:58Z","timestamp":1587098518000},"page":"422-427","source":"Crossref","is-referenced-by-count":2,"title":["A Deception Defense and Active Defense Based Three-Dimensional Defense Architecture: DA-3DD Design and Implementation Plan"],"prefix":"10.1109","author":[{"given":"Yizhen","family":"Sun","sequence":"first","affiliation":[]},{"given":"Xiaotao","family":"Peng","sequence":"additional","affiliation":[]},{"given":"Zheng","family":"Tian","sequence":"additional","affiliation":[]},{"given":"Shaoming","family":"Guo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2018.1700193"},{"journal-title":"Honeypot adaptive security system","year":"2019","author":"myron","key":"ref11"},{"key":"ref12","first-page":"179","article-title":"A scalable honeynet architecture for industrial control systems","author":"serbanescu","year":"2015","journal-title":"International Conference on E-Business and Telecommunications"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10329-7_12"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2008.ECP.101"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27287-5_84"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICITEED.2015.7409013"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1978672.1978676"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2897133"},{"key":"ref4","first-page":"1","article-title":"To-wards secure network computing services for lightweight clients using blockchain","author":"xu","year":"2018","journal-title":"Wireless Communications and Mobile Computing"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.09.042"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2010.03.009"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCNT.2014.6963102"},{"journal-title":"Techniques for sharing network security event information","year":"2018","author":"reybok","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2006.1687561"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SOCA.2014.58"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2732209.2732216"},{"journal-title":"Network appliance for protecting network endpoints against computer security threats","year":"2018","author":"andrei","key":"ref9"}],"event":{"name":"2019 15th International Conference on Mobile Ad-Hoc and Sensor Networks (MSN)","start":{"date-parts":[[2019,12,11]]},"location":"Shenzhen, China","end":{"date-parts":[[2019,12,13]]}},"container-title":["2019 15th International Conference on Mobile Ad-Hoc and Sensor Networks (MSN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9050568\/9065996\/09066110.pdf?arnumber=9066110","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T15:22:17Z","timestamp":1658157737000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9066110\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/msn48538.2019.00086","relation":{},"subject":[],"published":{"date-parts":[[2019,12]]}}}