{"record_type":"pith_number_record","schema_url":"https://pith.science/schemas/pith-number/v1.json","pith_number":"pith:2018:L6JOYYLG7KDAMRQ7E5MPHEUDKO","short_pith_number":"pith:L6JOYYLG","schema_version":"1.0","canonical_sha256":"5f92ec6166fa8606461f2758f3928353905005916297664aadfa6ba8e46f4f33","source":{"kind":"arxiv","id":"1804.06196","version":1},"attestation_state":"computed","paper":{"title":"Demystifying Deception Technology:A Survey","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.CR","authors_text":"Christoph Lipps, Daniel Fraunholz, Daniel Krohmer, Daniel Reti, Frederic Pohl, Hans Dieter Schotten, Matthias Tammen, Simon Duque Anton","submitted_at":"2018-04-17T12:25:39Z","abstract_excerpt":"Deception boosts security for systems and components by denial, deceit, misinformation, camouflage and obfuscation. In this work an extensive overview of the deception technology environment is presented. Taxonomies, theoretical backgrounds, psychological aspects as well as concepts, implementations, legal aspects and ethics are discussed and compared."},"verification_status":{"content_addressed":true,"pith_receipt":true,"author_attested":false,"weak_author_claims":0,"strong_author_claims":0,"externally_anchored":false,"storage_verified":false,"citation_signatures":0,"replication_records":0,"graph_snapshot":true,"references_resolved":false,"formal_links_present":false},"canonical_record":{"source":{"id":"1804.06196","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2018-04-17T12:25:39Z","cross_cats_sorted":[],"title_canon_sha256":"7024803875e1831022c5d66bf6155f8e4f467795140c7c47169648ef6b30b082","abstract_canon_sha256":"09260985d88d44a8ccded62bf6fe4af6d631778f83b5378fa6ecff6afda3e96d"},"schema_version":"1.0"},"receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T00:18:21.405587Z","signature_b64":"NQKDoO10ovRFCK2mHCDltc79jJAzwvSay2h2Yde4VZNgbqwnMrQEaw94w93fVYCGCqoOjnlx47ZzmWk+yltJDw==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"5f92ec6166fa8606461f2758f3928353905005916297664aadfa6ba8e46f4f33","last_reissued_at":"2026-05-18T00:18:21.404848Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T00:18:21.404848Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"graph_snapshot":{"paper":{"title":"Demystifying Deception Technology:A Survey","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.CR","authors_text":"Christoph Lipps, Daniel Fraunholz, Daniel Krohmer, Daniel Reti, Frederic Pohl, Hans Dieter Schotten, Matthias Tammen, Simon Duque Anton","submitted_at":"2018-04-17T12:25:39Z","abstract_excerpt":"Deception boosts security for systems and components by denial, deceit, misinformation, camouflage and obfuscation. In this work an extensive overview of the deception technology environment is presented. Taxonomies, theoretical backgrounds, psychological aspects as well as concepts, implementations, legal aspects and ethics are discussed and compared."},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1804.06196","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"aliases":[{"alias_kind":"arxiv","alias_value":"1804.06196","created_at":"2026-05-18T00:18:21.404962+00:00"},{"alias_kind":"arxiv_version","alias_value":"1804.06196v1","created_at":"2026-05-18T00:18:21.404962+00:00"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1804.06196","created_at":"2026-05-18T00:18:21.404962+00:00"},{"alias_kind":"pith_short_12","alias_value":"L6JOYYLG7KDA","created_at":"2026-05-18T12:32:33.847187+00:00"},{"alias_kind":"pith_short_16","alias_value":"L6JOYYLG7KDAMRQ7","created_at":"2026-05-18T12:32:33.847187+00:00"},{"alias_kind":"pith_short_8","alias_value":"L6JOYYLG","created_at":"2026-05-18T12:32:33.847187+00:00"}],"events":[],"event_summary":{},"paper_claims":[],"inbound_citations":{"count":1,"internal_anchor_count":1,"sample":[{"citing_arxiv_id":"2510.15063","citing_title":"Physical Layer Deception as a Stackelberg Game: Strategy Regimes, Equilibrium, and Robust Design","ref_index":38,"is_internal_anchor":true}]},"formal_canon":{"evidence_count":0,"sample":[],"anchors":[]},"links":{"html":"https://pith.science/pith/L6JOYYLG7KDAMRQ7E5MPHEUDKO","json":"https://pith.science/pith/L6JOYYLG7KDAMRQ7E5MPHEUDKO.json","graph_json":"https://pith.science/api/pith-number/L6JOYYLG7KDAMRQ7E5MPHEUDKO/graph.json","events_json":"https://pith.science/api/pith-number/L6JOYYLG7KDAMRQ7E5MPHEUDKO/events.json","paper":"https://pith.science/paper/L6JOYYLG"},"agent_actions":{"view_html":"https://pith.science/pith/L6JOYYLG7KDAMRQ7E5MPHEUDKO","download_json":"https://pith.science/pith/L6JOYYLG7KDAMRQ7E5MPHEUDKO.json","view_paper":"https://pith.science/paper/L6JOYYLG","resolve_alias":"https://pith.science/api/pith-number/resolve?arxiv=1804.06196&json=true","fetch_graph":"https://pith.science/api/pith-number/L6JOYYLG7KDAMRQ7E5MPHEUDKO/graph.json","fetch_events":"https://pith.science/api/pith-number/L6JOYYLG7KDAMRQ7E5MPHEUDKO/events.json","actions":{"anchor_timestamp":"https://pith.science/pith/L6JOYYLG7KDAMRQ7E5MPHEUDKO/action/timestamp_anchor","attest_storage":"https://pith.science/pith/L6JOYYLG7KDAMRQ7E5MPHEUDKO/action/storage_attestation","attest_author":"https://pith.science/pith/L6JOYYLG7KDAMRQ7E5MPHEUDKO/action/author_attestation","sign_citation":"https://pith.science/pith/L6JOYYLG7KDAMRQ7E5MPHEUDKO/action/citation_signature","submit_replication":"https://pith.science/pith/L6JOYYLG7KDAMRQ7E5MPHEUDKO/action/replication_record"}},"created_at":"2026-05-18T00:18:21.404962+00:00","updated_at":"2026-05-18T00:18:21.404962+00:00"}