{“id”:“https://openalex.org/W2619895314“,”doi“:”https://doi.org/10.1007/978-3-319-59767-6_10“,”title“:“使用蜜罐对受感染系统中的Bot活动进行行为分析”,”display_name“:”使用蜜罐的受感染系统的Bot行为分析“,”publication_year“:2017,”publiction_date“:”2017-01-01“,”ids“:{”openalex“:”https://openalex.org/W2619895314“,”doi“:”https://doi.org/10.1007/978-3-319-59767-6_10“,”mag“:”2619895314“},”language“:”en“,”primary_location“:{”is_oa“:false,”landing_page_url“:”https://doi.org/10.1007/978-3-319-59767-6_10“,”pdf_url“:空,”源“:{”id“:”https://openalex.org/S2764900261“,”display_name“:”计算机与信息科学中的通信“,”issn_l“:”1865-0929“,”isn“:[”1865-0.929“,“1865-0937”],”is_oa“:false,”is_in_doaj“:false,”host_organization“:”https://openalex.org/P4310318900“,”“host_organization_name”:“Springer Science+Business Media”,“host_organization_lineage”:[“https://openalex.org/P431031965","https://openalex.org/P4310318900“],”host_organization_lineage_names“:[”Springer Nature“,”Springer-Science+Business Media“],“type”:“book-series”},“license”:null,“licence_id”:nul,“version”:null,“is_accepted”:false,“is_published”:false},”type“:”book-chapter“,”type_crossref“:“book-chapter”,”indexed_in“:[“crossref”],”open_access“:{”is_oa“:false”“,”oa_url“:空,”any_repository_has_fulltext“:false},”作者身份“:[{”作者位置“:”第一个“,”作者“:{”id“:”https://openalex.org/A5002739979“,”display_name“:”Matej Zuz\u010d\u00e1k“,”orcid“:null},”institutions“:[{”id“:”https://openalex.org/I187293425“,”display_name“:”俄斯特拉发大学“,”ror“:”https://ror.org/00pyqav47“,”country_code“:”CZ“,”type“:“教育”,”世系“:[”https://openalex.org/I187293425“]}],”国家“:[”CZ“],”is_corresponding“:false,”raw_author_name“:”Matej Zuzcak“,”raw _ afiliation_strings“:[“捷克共和国俄斯特拉瓦大学”],”affiliations“:[{”raw _affiliation_string“:”捷克共和国奥斯特拉瓦大学”,“institution_ids”:[“https://openalex.org/I187293425“]}]},{”author_position“:”last“,”author“:{”id“:”https://openalex.org/A5017006244“,”display_name“:”Tom\u00e1\u0161 Sochor“,”orcid“:”https://orcid.org/0000-0002-1704-1883},“机构”:[{“id”:https://openalex.org/I187293425“,”display_name“:”俄斯特拉发大学“,”ror“:”https://ror.org/00pyqav47“,”country_code“:”CZ“,”type“:“教育”,”世系“:[”https://openalex.org/I187293425“]}],”国家“:[”CZ“],”is_corresponding“:false,”raw_author_name“:”Tomas Sochor“,”raw _ afiliation_strings“:[“捷克共和国俄斯特拉瓦大学”],”affiliations“:[{”raw _affiliation_strong“:”捷克共和国奥斯特拉瓦大学”,“institution_ids”:[“https://openalex.org/I187293425“]}]}],”countries_distinct_count“:1,”institutions_disting_count”:1,“corresponding_author_ids”:[],”correspounding_institution_ids“:[]”,“apc_list”:null,”apc_payed“:null”,“has_fulltext”:false,“cited_by_count”:13,“cited_by_percentile_year”:{“min”:89,“max”:90},”biblio“:{”volume“:nul”,“issue”:null,“first_page”:“118”,“last_page”:“133”},“is_retracted”:falseis_paratext“:false,”primary_topic“:{”id“:”https://openalex.org/T11241“,”display_name“:”Android恶意软件的表征和检测“,”score“:1.0,”subfield“:{”id“:”https://openalex.org/subfields/1711“,”display_name“:”信号处理“},”字段“:{”id“:”https://openalex.org/fields/17“,”display_name“:”Computer Science“},”domain“:{”id“:”https://openalex.org/domains/3“,”display_name“:”物理科学“}},”主题“:[{”id“:”https://openalex.org/T11241“,”display_name“:”Android恶意软件的特征描述和检测“,”score“:1.0,”subfield“:{”id“:”https://openalex.org/subfields/1711“,”display_name“:”信号处理“},”字段“:{”id“:”https://openalex.org/fields/17“,”display_name“:”Computer Science“},”domain“:{”id“:”https://openalex.org/domains/3“,”display_name“:”物理科学“}},{”id“:”https://openalex.org/T10400“,”display_name“:”网络入侵检测和防御机制“,”score“:0.9998,”subfield“:{”id“:”https://openalex.org/subfields/1705“,”display_name“:”计算机网络和通信“},”字段“:{”id“:”https://openalex.org/fields/17“,”display_name“:”Computer Science“},”domain“:{”id“:”https://openalex.org/domains/3“,”display_name“:”物理科学“}},{”id“:”https://openalex.org/T11017“,”“display_name”:“基于混沌的图像加密技术”,“score”:0.9979,“subfield”:{“id”:“https://openalex.org/subfields/1707“,”display_name“:”计算机视觉和模式识别“},”field“:{”id“:”https://openalex.org/fields/17“,”display_name“:”Computer Science“},”domain“:{”id“:”https://openalex.org/domains/3“,”display_name“:”物理科学“}}],”关键词“:[{”id“:”https://openalex.org/keywords/botnet检测“,”display_name“:”僵尸网络检测“,”score“:0.57652},{”id“:”https://openalex.org/keywords/security-analysis网站“,”display_name“:”安全分析“,”score“:0.561572},{”id“:”https://openalex.org/keywords/行为分析“,”display_name“:”行为分析“,”score“:0.545077},{”id“:”https://openalex.org/keywords/intrusion-detection网站“,”display_name“:”入侵检测“,”score“:0.52739},{”id“:”https://openalex.org/keywords/ddos-attacks网站“,”display_name“:”DDoS攻击“,”score“:0.502666}],”concepts“:[{”id“:”https://openalex.org/C191267431,“wikidata”:https://www.wikidata.org/wiki/Q911932“,”display_name“:”Honeypot“,”level“:2,”score“:0.9860637},{”id“:”https://openalex.org/C41008148,“wikidata”:https://www.wikidata.org/wiki/Q21198(网址:https://www.wikidata.org/wiki/Q21198)“,”display_name“:”计算机科学“,”level“:0,”score“:0.5854963},{”id“:”https://openalex.org/C38652104,“wikidata”:https://www.wikidata.org/wiki/Q3510521“,”display_name“:”计算机安全“,”level“:1,”score“:0.58199763},{”id“:”https://openalex.org/C110875604,“wikidata”:https://www.wikidata.org/wiki/Q75“,”display_name“:”The Internet“,”level“:2,”score“:0.4907616},{”id“:”https://openalex.org/C136764020,“wikidata”:https://www.wikidata.org/wiki/Q466“,”display_name“:”万维网“,”level“:1,”score“:0.24624345}],”mesh“:[],”locations_count“:1.”locations“:[{”is_oa“:false,”landing_page_url“:”https://doi.org/10.1007/978-3-319-5767-6_10“,”pdf_url“:空,”源“:{”id“:”https://openalex.org/S2764900261“,”display_name“:”计算机与信息科学中的通信“,”issn_l“:”1865-0929“,”isn“:[”1865-0.929“,“1865-0937”],”is_oa“:false,”is_in_doaj“:false,”host_organization“:”https://openalex.org/P4310318900“,”“host_organization_name”:“Springer Science+Business Media”,“host_organization_lineage”:[“https://openalex.org/P431031965","https://openalex.org/P4310318900“],”host_organization_lineage_names“:[”Springer Nature“,”Springer-Science+Business Media“],“type”:“book-series”},“license”:null,“licence_id”:null.“version”:null,“is_accepted”:false,“is_published”:false}],“best_oa_location”:nul,“sustainable_development_goals”:[{“id”:”https://metadata.un.org/sdg/16“,”display_name“:”和平、正义和强大的机构“,”score“:0.43}],”grants“:[],”datasets“:[],”versions“:[】,”referenced_works_count“:13,”referrenced_works“:]”https://openalex.org/W128915459","https://openalex.org/W1517527854","https://openalex.org/W1851403712","https://openalex.org/W1993359168","https://openalex.org/W2099581008","https://openalex.org/W2106339675","https://openalex.org/W2140538566","https://openalex.org/W2217950233","https://openalex.org/W2252366552","https://openalex.org/W2484435318","https://openalex.org/W2518176355","https://openalex.org/W44025674","https://openalex.org/W763571039“],”related_works“:[”https://openalex.org/W4385187164","https://openalex.org/W4316658914","https://openalex.org/W4313484479","https://openalex.org/W4232715385","https://openalex.org/W2956011222","https://openalex.org/W2742579858","https://openalex.org/W2352475565","https://openalex.org/W2254955413","https://openalex.org/W2182300180","https://openalex.org/W178168142“],”ngrams_url“:”https://api.openalex.org/works/W2619895314/ngrams“,”abstract_inverted_index“:{”New“:[0],”Internet“:[1],”威胁“:[2],”涌现“:[3],”on“:[4,25],”daily“:[5],”basis“:[6],”and“:[7,52,65],”honeypot“:[8],”have“:[9],”become“:[10],”wide“:[11],”used“:[12],”for“:[13,70],”capturing“:[14],”them“:[15],“in”:[16],“命令”:[17],“到”:[18,44],“调查”:[19],“他们的”:[20],“活动。”:[21],“The”:[22,39],“论文“:[23],”焦点“:[24],”a“:[26],”详细“:[27],”分析“:[28],”的“:[29,32,54,59,79],”the“:[30,45,55],”behavior“:[31],”各种“:[33],”攻击“:[34,40],”agains“:[35],”7“:[36],”Linux\u2013based“:[37],”蜜罐。“:[38],”were“:[41,62,82],”analysed“:[42],”according“:[43],”threat“:[46,80],”type,“:[47],”session“:[48],”duration“,”:[49],”AS“:[50],”country“:[51],”RIR“:[53],”attack“:[56,68],”origin“。“:[57],“簇”:[58],“相似”:[60],“对象”:[61],“形成”:[63],“相应”:[64],“确定”:[66],“典型”:[67],“模式”:[69],“潜在”:[71],“检测”:[72],“自动化”:[73],“as”:[74,76],“well”:[75],“some”:[77],“方面”:[78],“传播”:[81],“已识别”。“:[83]},”cited_by_api_url“:”https://api.openalex.org/works?filter=cites:W2619895314“,”counts_by_year“:[{“年份”:2024,”cited_by_count“:1},{“年”:2021,”ciped_by_cunt“:1},”{“年度”:2020,“cited_by_count”:3},“年份”:2019,”cited_by_count“创建日期”:“2017-06-05”}