{"id":"https://openalex.org/W2014027888","doi":"https://doi.org/10.1145/1029533.1029540","title":"Honeynets","display_name":"Honeynets","publication_year":2004,"publication_date":"2004-10-28","ids":{"openalex":"https://openalex.org/W2014027888","doi":"https://doi.org/10.1145/1029533.1029540","mag":"2014027888"},"language":"en","primary_location":{"id":"doi:10.1145/1029533.1029540","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1029533.1029540","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 5th conference on Information technology education","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5062969096","display_name":"Jeremiah K. Jones","orcid":null},"institutions":[{"id":"https://openalex.org/I100005738","display_name":"Brigham Young University","ror":"https://ror.org/047rhhm47","country_code":"US","type":"education","lineage":["https://openalex.org/I100005738"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Jeremiah K. Jones","raw_affiliation_strings":["Brigham Young University, Provo, UT"],"affiliations":[{"raw_affiliation_string":"Brigham Young University, Provo, UT","institution_ids":["https://openalex.org/I100005738"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5016784958","display_name":"Gordon W. Romney","orcid":"https://orcid.org/0009-0005-1361-7725"},"institutions":[{"id":"https://openalex.org/I100005738","display_name":"Brigham Young University","ror":"https://ror.org/047rhhm47","country_code":"US","type":"education","lineage":["https://openalex.org/I100005738"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Gordon W. Romney","raw_affiliation_strings":["Brigham Young University, Provo, UT"],"affiliations":[{"raw_affiliation_string":"Brigham Young University, Provo, UT","institution_ids":["https://openalex.org/I100005738"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5062969096"],"corresponding_institution_ids":["https://openalex.org/I100005738"],"apc_list":null,"apc_paid":null,"fwci":1.4021,"has_fulltext":false,"cited_by_count":21,"citation_normalized_percentile":{"value":0.81296516,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"24","last_page":"28"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14067","display_name":"Cloud Computing and Remote Desktop Technologies","score":0.995199978351593,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9943000078201294,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.7478657960891724},{"id":"https://openalex.org/keywords/honeypot","display_name":"Honeypot","score":0.7309023141860962},{"id":"https://openalex.org/keywords/security-awareness","display_name":"Security awareness","score":0.5723546743392944},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.5501851439476013},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5187435746192932},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5012478828430176},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4543142318725586},{"id":"https://openalex.org/keywords/resource","display_name":"Resource (disambiguation)","score":0.43315938115119934},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.42631995677948},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.39148545265197754},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.2943863272666931}],"concepts":[{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.7478657960891724},{"id":"https://openalex.org/C191267431","wikidata":"https://www.wikidata.org/wiki/Q911932","display_name":"Honeypot","level":2,"score":0.7309023141860962},{"id":"https://openalex.org/C2778652015","wikidata":"https://www.wikidata.org/wiki/Q7445019","display_name":"Security awareness","level":3,"score":0.5723546743392944},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.5501851439476013},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5187435746192932},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5012478828430176},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4543142318725586},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.43315938115119934},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.42631995677948},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.39148545265197754},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2943863272666931},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1029533.1029540","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1029533.1029540","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 5th conference on Information technology education","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6800000071525574,"display_name":"Quality Education","id":"https://metadata.un.org/sdg/4"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320309309","display_name":"Brigham Young University","ror":"https://ror.org/047rhhm47"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W1523165607","https://openalex.org/W1538412636","https://openalex.org/W1979807069","https://openalex.org/W2028231881","https://openalex.org/W2050498734","https://openalex.org/W2064855200","https://openalex.org/W2067394485","https://openalex.org/W2109041149","https://openalex.org/W2131257377","https://openalex.org/W2141135224","https://openalex.org/W2147767253","https://openalex.org/W2149235666","https://openalex.org/W2169663372","https://openalex.org/W2207449944","https://openalex.org/W2294488712","https://openalex.org/W4206509225","https://openalex.org/W4231207892","https://openalex.org/W4245378764","https://openalex.org/W4300317961","https://openalex.org/W6696788356"],"related_works":["https://openalex.org/W2362574935","https://openalex.org/W1926248","https://openalex.org/W3118687971","https://openalex.org/W2363507101","https://openalex.org/W3159372857","https://openalex.org/W4320401378","https://openalex.org/W1517527854","https://openalex.org/W776729438","https://openalex.org/W2147767253","https://openalex.org/W1560502410"],"abstract_inverted_index":{"Similar":[0],"to":[1,15,33,63,101,124,143,160,164,219],"the":[2,21,28,35,40,111,132,141,148,168,188,222],"\"Tar":[3],"Baby\"":[4],"from":[5,115],"Uncle":[6],"Remus":[7],"[1],":[8],"a":[9,12,25,95,135,157,193],"Honeynet":[10,183],"is":[11,52,185,207],"system":[13],"designed":[14],"attract":[16],"troublemakers":[17],"lurking":[18],"about":[19],"on":[20,74,105,198],"Internet.":[22],"Honeynets":[23,54,70,86,116,209],"are":[24],"creation":[26],"of":[27,37,98,192,204],"IT":[29,90,121,145,161,176,189,200],"security":[30,68,76,122,130,227],"world":[31],"intended":[32],"draw":[34],"attention":[36],"hackers,":[38],"identify":[39],"tools":[41,151],"in":[42,59,94,170,174,187,226],"their":[43,47],"toolkit,":[44],"and":[45,80,107,128,152,167,217],"learn":[46],"modus":[48],"operandi.":[49],"Our":[50],"thesis":[51],"that":[53,113,208],"can":[55,87,117,154,210],"be":[56,118,212],"deployed":[57],"safely":[58],"an":[60,213],"educational":[61,215],"environment":[62],"provide":[64,71,89,144],"students":[65,91,146,177],"with":[66,92,120,147],"real-time":[67],"education.":[69,162,228],"vital":[72],"information":[73,108,153],"current":[75,150,173,205],"threats,":[77],"attacker":[78,81],"tools,":[79],"mentality.":[82],"When":[83],"implemented":[84],"properly,":[85],"also":[88],"experience":[93],"wide":[96],"range":[97],"skills,":[99],"helping":[100],"focus":[102],"those":[103],"skills":[104],"network":[106],"security.":[109],"Furthermore,":[110],"research":[112,206],"comes":[114],"shared":[119],"professionals":[123],"help":[125,220],"raise":[126],"awareness":[127],"increase":[129],"throughout":[131],"world.":[133],"In":[134],"society":[136],"where":[137],"technology":[138],"changes":[139],"rapidly,":[140],"inability":[142],"most":[149],"quickly":[155],"become":[156],"major":[158],"detriment":[159],"Due":[163],"communication":[165],"delays":[166],"difficulty":[169],"keeping":[171],"educators":[172],"technology,":[175],"often":[178],"receive":[179],"outdated":[180],"information.":[181],"A":[182],"experiment":[184],"underway":[186],"Security":[190],"Lab":[191],"higher":[194],"education":[195],"institution":[196],"focused":[197],"educating":[199],"engineers.":[201],"The":[202],"conclusion":[203],"indeed":[211],"effective":[214],"resource":[216],"tool":[218],"solve":[221],"dynamically":[223],"changing":[224],"challenges":[225]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2017,"cited_by_count":4},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":2},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2016-06-24T00:00:00"}
