{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T11:58:41Z","timestamp":1742385521252},"publisher-location":"Berlin, Heidelberg","reference-count":33,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540344780"},{"type":"electronic","value":"9783540344797"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11760146_25","type":"book-chapter","created":{"date-parts":[[2006,5,9]],"date-time":"2006-05-09T11:29:38Z","timestamp":1147174178000},"page":"285-296","source":"Crossref","is-referenced-by-count":4,"title":["Attacking Confidentiality: An Agent Based Approach"],"prefix":"10.1007","author":[{"given":"Kapil Kumar","family":"Gupta","sequence":"first","affiliation":[]},{"given":"Baikunth","family":"Nath","sequence":"additional","affiliation":[]},{"given":"Kotagiri","family":"Ramamohanarao","sequence":"additional","affiliation":[]},{"given":"Ashraf U.","family":"Kazi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"25_CR1","unstructured":"Cert advisory ca-2001-22 w32\/sircam malicious code, august (2001), http:\/\/www.cert.org\/advisories\/CA-2001-22.html"},{"key":"25_CR2","unstructured":"Computer worm. Wikipedia, the free encyclopedia, http:\/\/en.wikipedia.org\/wiki\/Computer_worm"},{"key":"25_CR3","unstructured":"Overview of attack trends (2002), http:\/\/www.cert.org\/archive\/pdf\/attack_trends.pdf"},{"key":"25_CR4","unstructured":"Social engineering. Wikipedia, the free encyclopedia, http:\/\/en.wikipedia.org\/wiki\/Social_engineering_computer_security"},{"key":"25_CR5","unstructured":"Software agent. Wikipedia, the free encyclopedia, http:\/\/en.wikipedia.org\/wiki\/Software_agent"},{"key":"25_CR6","unstructured":"Spyware. Wikipedia, the free encyclopedia, http:\/\/en.wikipedia.org\/wiki\/Spyware"},{"key":"25_CR7","unstructured":"Report on Privacy and Security, The Federal Trade Commission Advisory Committee on Online Access and Security (May 2000)"},{"key":"25_CR8","unstructured":"The G8 Internet Security Conference, Paris, France (May 2000)"},{"key":"25_CR9","unstructured":"Oracle http server vulnerability (2005), http:\/\/www.kb.cert.org\/vuls\/id\/890940"},{"key":"25_CR10","doi-asserted-by":"publisher","first-page":"1093","DOI":"10.2307\/797247","volume":"105","author":"M. Adler","year":"1996","unstructured":"Adler, M.: Cyberspace, General Searches and Digial Conraband: the Fourth Amendment and the Net-Wite Search. Yale Law Journal\u00a0105, 1093\u20131120 (1996)","journal-title":"Yale Law Journal"},{"key":"25_CR11","doi-asserted-by":"crossref","unstructured":"Agarwal, R., Kiernan, J., Srikant, R., Xu, Y.: Hippocratic databases. In: Proceedings of the 28th International Conference on Very Large Databases (2002)","DOI":"10.1016\/B978-155860869-6\/50021-4"},{"key":"25_CR12","unstructured":"Allen, J., Christie, A., Fithen, W., McHugh, J., Pickel, J., Stoner, E.: State of practice of intrusion detection technologies. Technical Report CMU\/SEI-99-TR-028 ESC-99-028 (1999), http:\/\/www.sei.cmu.edu\/pub\/documents\/99.reports\/pdf\/99tr028.pdf"},{"issue":"5","key":"25_CR13","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1109\/MITP.2004.71","volume":"6","author":"W. Ames","year":"2004","unstructured":"Ames, W.: Understanding spyware: risk and response. IT Professional\u00a06(5), 25\u201329 (2004)","journal-title":"IT Professional"},{"key":"25_CR14","doi-asserted-by":"crossref","unstructured":"Bace, R., Mell, P.: Intrusion Detection Systems. Gaithersburg, MD: Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology (2001)","DOI":"10.6028\/NIST.SP.800-31"},{"key":"25_CR15","first-page":"144","volume":"20","author":"S. Bronitt","year":"1996","unstructured":"Bronitt, S.: Complementary Comment: electronic Surveillance and Informers: Infringing the Right to Silence and Privacy. Criminal Law Journal\u00a020, 144\u2013152 (1996)","journal-title":"Criminal Law Journal"},{"key":"25_CR16","first-page":"183","volume":"3","author":"S. Bronitt","year":"1997","unstructured":"Bronitt, S.: Electronic Surveillance, Human Rights and Criminal Justice. Australian Journal of Human Rights\u00a03, 183\u2013207 (1997)","journal-title":"Australian Journal of Human Rights"},{"issue":"2","key":"25_CR17","first-page":"185","volume":"32","author":"M. Carroll","year":"1995","unstructured":"Carroll, M., Schrader, R.: Computer Related Crimes (Tenth Survey of White Collar Crime). American Criminal Law Review\u00a032(2), 185\u2013211 (1995)","journal-title":"American Criminal Law Review"},{"key":"25_CR18","volume-title":"Database Security","author":"S. Castano","year":"1994","unstructured":"Castano, S., Fugini, M., Martella, G., Samarati, P.: Database Security. Addison Wesley, Reading (1994)"},{"key":"25_CR19","doi-asserted-by":"crossref","unstructured":"Crocker, S.D.: Protecting the internet from distributed denial-of-service attacks: a proposal. In: Proceedings of the IEEE, September 2004, vol.\u00a092(9) (2004)","DOI":"10.1109\/JPROC.2004.832971"},{"key":"25_CR20","unstructured":"Dearing, M.C.: Personal Jurisdiction and the Internet: Can the Traditional Principles and Landmark Cases Guide the Legal System Into the 21st Centuary? Journal of Technology, Law and Policy\u00a04(1) (1999)"},{"key":"25_CR21","unstructured":"Ferrie, P., Szor, P.: W32.sircam.worm@mm, http:\/\/www.symantec.com\/avcenter\/venc\/data\/w32.sircam.wormmm.html"},{"key":"25_CR22","unstructured":"Hackworth, A.: Spyware. CERT Coordination Center Report (2005), http:\/\/www.cert.org\/archive\/pdf\/spyware2005.pdf"},{"key":"25_CR23","unstructured":"Hochberg, L.: E-Avesdropping. Online News (January 2000), http:\/\/www.pbs.org\/newshour\/bb\/cyberspace\/jan-june00\/email_1-7.html"},{"key":"25_CR24","unstructured":"Longstaff, T.A., Ellis, J.T., Hernan, S.V., Lipson, H.F., Mcmillan, R.D., Pesante, L.H., Simmel, D.: Security of the internet. The Froehlich\/Kent Encyclopedia of Telecommunications, Marcel Dekker, New York. CERT Coordination Center Report, vol. 15, pp. 231\u2013255 (1997), http:\/\/www.cert.org\/encyc_article\/tocencyc.html"},{"key":"25_CR25","unstructured":"Marlowe, B.: You are Being Watched. ZDNet Magazine (December 1999)"},{"key":"25_CR26","unstructured":"Murch, Johnson: Intelligent software agents (1999)"},{"key":"25_CR27","unstructured":"Nwana, H.S.: Software agents: An overview, http:\/\/www.sce.carleton.ca\/netmanage\/docs\/AgentsOverview\/ao.html"},{"key":"25_CR28","doi-asserted-by":"crossref","unstructured":"Paulson, L.D.: Spike in phishing and malware a danger to it. IT Professional\u00a07(3) (May\/June 2005)","DOI":"10.1109\/MITP.2005.65"},{"key":"25_CR29","unstructured":"Shannon, C., Moore, D.: The spread of the witty worm. CAIDA analysis for the spread of Witty worm, http:\/\/www.caida.org\/analysis\/security\/witty\/"},{"key":"25_CR30","doi-asserted-by":"crossref","unstructured":"Sommers, J., Yegneswaran, V., Barford, P.: A framework for malicious workload generation. In: Internet Measurement Conference, Taormina, Sicily, Italy, October 25 - 27 (2004), http:\/\/www.cs.wisc.edu\/~pb\/mace_final.pdf","DOI":"10.1145\/1028788.1028799"},{"key":"25_CR31","unstructured":"Spafford, E.: The internet worm program: An analysis. Technical Report CSD-TR-823, Purdue University (November 1988)"},{"key":"25_CR32","unstructured":"Staniford, S., Paxson, V., Weaver, N.: How to own the internet in your spare time. In: 11th Usenix Security Symposium, San Francisco (August 2002)"},{"key":"25_CR33","unstructured":"Weaver, N., Paxson, V., Staniford, S., Cunningham, R.: A taxonomy of internet worms, http:\/\/www.cs.berkeley.edu\/~nweaver\/papers\/taxonomy.pdf"}],"container-title":["Lecture Notes in Computer Science","Intelligence and Security Informatics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11760146_25.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T03:08:08Z","timestamp":1619492888000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11760146_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540344780","9783540344797"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/11760146_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}