{"id":"https://openalex.org/W3111011032","doi":"https://doi.org/10.1109/csnet50428.2020.9265528","title":"On Darknet HoneyBots","display_name":"On Darknet HoneyBots","publication_year":2020,"publication_date":"2020-10-21","ids":{"openalex":"https://openalex.org/W3111011032","doi":"https://doi.org/10.1109/csnet50428.2020.9265528","mag":"3111011032"},"language":"en","primary_location":{"id":"doi:10.1109/csnet50428.2020.9265528","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csnet50428.2020.9265528","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 4th Cyber Security in Networking Conference (CSNet)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5058471570","display_name":"Joanna Moubarak","orcid":"https://orcid.org/0000-0001-5605-6095"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Joanna Moubarak","raw_affiliation_strings":["P.O.TECH,Potech Labs,Beirut,Lebanon"],"affiliations":[{"raw_affiliation_string":"P.O.TECH,Potech Labs,Beirut,Lebanon","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5024522221","display_name":"Carole Bassil","orcid":"https://orcid.org/0000-0002-7628-5191"},"institutions":[{"id":"https://openalex.org/I160368002","display_name":"Lebanese University","ror":"https://ror.org/05x6qnc69","country_code":"LB","type":"education","lineage":["https://openalex.org/I160368002"]}],"countries":["LB"],"is_corresponding":false,"raw_author_name":"Carole Bassil","raw_affiliation_strings":["Lebanese University,Faculty of Sciences,LaRRIS,Fanar,Lebanon"],"affiliations":[{"raw_affiliation_string":"Lebanese University,Faculty of Sciences,LaRRIS,Fanar,Lebanon","institution_ids":["https://openalex.org/I160368002"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5058471570"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.6061,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.68025016,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"3"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/chatbot","display_name":"Chatbot","score":0.8984308242797852},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.777006208896637},{"id":"https://openalex.org/keywords/honeypot","display_name":"Honeypot","score":0.7128197550773621},{"id":"https://openalex.org/keywords/work","display_name":"Work (physics)","score":0.5835130214691162},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.49359452724456787},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.43830710649490356},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.42549869418144226},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.08097687363624573}],"concepts":[{"id":"https://openalex.org/C2779041454","wikidata":"https://www.wikidata.org/wiki/Q870780","display_name":"Chatbot","level":2,"score":0.8984308242797852},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.777006208896637},{"id":"https://openalex.org/C191267431","wikidata":"https://www.wikidata.org/wiki/Q911932","display_name":"Honeypot","level":2,"score":0.7128197550773621},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.5835130214691162},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.49359452724456787},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.43830710649490356},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.42549869418144226},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.08097687363624573},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/csnet50428.2020.9265528","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csnet50428.2020.9265528","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 4th Cyber Security in Networking Conference (CSNet)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W1591801644","https://openalex.org/W2056524697","https://openalex.org/W2142252754","https://openalex.org/W2165415611","https://openalex.org/W2184265472","https://openalex.org/W2599027056","https://openalex.org/W2741026990","https://openalex.org/W2743945814","https://openalex.org/W2781537322","https://openalex.org/W2946794439","https://openalex.org/W2962814079","https://openalex.org/W2963403868","https://openalex.org/W2964116568","https://openalex.org/W3007097112","https://openalex.org/W3045753350","https://openalex.org/W4299838440","https://openalex.org/W4299883470","https://openalex.org/W4385245566","https://openalex.org/W6635446068","https://openalex.org/W6739901393","https://openalex.org/W6742632731"],"related_works":["https://openalex.org/W178168142","https://openalex.org/W2254955413","https://openalex.org/W2182300180","https://openalex.org/W4316658914","https://openalex.org/W2956011222","https://openalex.org/W2352475565","https://openalex.org/W4385187164","https://openalex.org/W2742579858","https://openalex.org/W4313484479","https://openalex.org/W2070407907"],"abstract_inverted_index":{"In":[0],"this":[1],"new":[2],"technological":[3],"era,":[4],"illegal":[5],"activities":[6],"shifted":[7],"into":[8],"the":[9,29,33,47,68,91,111],"Darknet":[10],"where":[11],"anonymization":[12],"allow":[13],"free":[14],"communication.":[15],"Thus":[16,110],"concerns":[17],"from":[18],"unsolicited":[19],"movements":[20],"are":[21,116],"risen.":[22],"A":[23,55],"few":[24],"research":[25,53,58],"is":[26,39],"ongoing":[27],"with":[28,74],"purpose":[30],"of":[31,51,57,70],"investigating":[32],"TOR":[34],"network.":[35],"The":[36],"current":[37],"work":[38,59,92],"focused":[40],"around":[41],"integrating":[42],"an":[43],"advanced":[44],"chatbot":[45],"on":[46,99],"darknet":[48,75,108],"as":[49],"part":[50],"a":[52,100,107],"honeypot.":[54],"lot":[56],"tackled":[60],"bots":[61],"development,":[62],"but":[63],"none":[64],"till":[65],"now":[66],"covered":[67],"creation":[69],"chatbots":[71],"dealing":[72],"specifically":[73],"activities.":[76],"Several":[77],"techniques":[78],"contribute":[79],"in":[80,95,106],"building":[81],"chatbots,":[82],"mainly":[83],"Natural":[84],"Language":[85],"Processing":[86],"(NLP).":[87],"This":[88],"paper":[89],"consolidate":[90],"done":[93],"previously":[94],"[1]":[96],"to":[97],"elaborate":[98],"solution":[101],"that":[102],"can":[103],"be":[104],"integrated":[105],"chatroom.":[109],"algorithmic":[112],"used":[113],"for":[114],"honeybots":[115],"described.":[117]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
