{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T06:48:46Z","timestamp":1726037326126},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030249069"},{"type":"electronic","value":"9783030249076"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-24907-6_27","type":"book-chapter","created":{"date-parts":[[2019,7,10]],"date-time":"2019-07-10T15:02:46Z","timestamp":1562770966000},"page":"354-367","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Cyber Weapons Storage Mechanisms"],"prefix":"10.1007","author":[{"given":"Muhammd Mudassar","family":"Yamin","sequence":"first","affiliation":[]},{"given":"Basel","family":"Katt","sequence":"additional","affiliation":[]},{"given":"Mazaher","family":"Kianpour","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,11]]},"reference":[{"key":"27_CR1","doi-asserted-by":"publisher","DOI":"10.1017\/9781316822524","volume-title":"Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations","author":"MN Schmitt","year":"2017","unstructured":"Schmitt, M.N.: Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations. Cambridge University Press, Cambridge (2017)"},{"key":"27_CR2","volume-title":"Doing Your Literature Review: Traditional and Systematic Techniques","author":"J Jesson","year":"2011","unstructured":"Jesson, J., Matheson, L., Lacey, F.M.: Doing Your Literature Review: Traditional and Systematic Techniques. Sage, London (2011)"},{"key":"27_CR3","doi-asserted-by":"crossref","unstructured":"Zschoch, M.A.: Configurational comparative methods: qualitative comparative analysis (QCA) and related techniques. Edited by Rihoux, B., Ragin, C., pp. xxv. Sage Publications, Thousand Oaks (2009). Canadian Journal of Political Science\/Revue canadienne de science politique, 44(3), 743\u2013746, 2011","DOI":"10.1017\/S0008423911000709"},{"key":"27_CR4","unstructured":"Kowalski, S.: It insecurity: a multi-disciplinary inquiry (1996)"},{"issue":"1","key":"27_CR5","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1080\/01402390.2012.742014","volume":"36","author":"D Peterson","year":"2013","unstructured":"Peterson, D.: Offensive cyber weapons: construction, development, and employment. J. Strateg. Stud. 36(1), 120\u2013124 (2013)","journal-title":"J. Strateg. Stud."},{"key":"27_CR6","unstructured":"Schwartz, A., Knake, R.: Belfer Center for Science, and International Affairs. Government\u2019s Role in Vulnerability Disclosure: Creating a Permanent and Accountable Vulnerability Equities Process. Harvard Kennedy School, Belfer Center for Science and International Affairs (2016)"},{"key":"27_CR7","unstructured":"Tripathi, A., Singh, U.K.: Taxonomic analysis of classification schemes in vulnerability databases. In: 6th International Conference on Computer Sciences and Convergence Information Technology (ICCIT), pp. 686\u2013691. IEEE (2011)"},{"key":"27_CR8","doi-asserted-by":"crossref","unstructured":"Baram, G., Cohen, D., Shapira, Z., Wechsler, O., Hight, N., Ben-Israel, I.: 2017 strategic trends in the global cyber conflict (2018)","DOI":"10.2139\/ssrn.3194844"},{"key":"27_CR9","unstructured":"Shane, S., Perlroth, N., Sanger, D.E.: Security breach and spilled secrets have shaken the NSA to its core. New York Times, 12 November 2017"},{"key":"27_CR10","doi-asserted-by":"crossref","unstructured":"Nurse, J.R.C., et al: Understanding insider threat: A framework for characterising attacks. In: IEEE Security and Privacy Workshops, pp. 214\u2013228. IEEE (2014)","DOI":"10.1109\/SPW.2014.38"},{"issue":"1","key":"27_CR11","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1016\/j.bushor.2016.09.002","volume":"60","author":"PE Chaudhry","year":"2017","unstructured":"Chaudhry, P.E.: The looming shadow of illicit trade on the internet. Bus. Horiz. 60(1), 77\u201389 (2017)","journal-title":"Bus. Horiz."},{"key":"27_CR12","unstructured":"Yamin, M.M., Katt, B.: Inefficiencies in cyber-security exercises life-cycle: a position paper. In: CEUR Workshop Proceedings, vol. 2269, pp. 41\u201343 (2018)"}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Anonymity in Computation, Communication, and Storage"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-24907-6_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,10]],"date-time":"2019-07-10T15:07:14Z","timestamp":1562771234000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-24907-6_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030249069","9783030249076"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-24907-6_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"11 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SpaCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Atlanta, GA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"spaccs2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/cse.stfx.ca\/~cybermatics\/2019\/spaccs\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}