{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T04:55:24Z","timestamp":1743137724997,"version":"3.40.3"},"publisher-location":"Cham","reference-count":78,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030494421"},{"type":"electronic","value":"9783030494438"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-49443-8_2","type":"book-chapter","created":{"date-parts":[[2020,6,27]],"date-time":"2020-06-27T12:02:48Z","timestamp":1593259368000},"page":"24-47","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Next Generation Information Warfare: Rationales, Scenarios, Threats, and Open Issues"],"prefix":"10.1007","author":[{"given":"Roberto","family":"Di Pietro","sequence":"first","affiliation":[]},{"given":"Maurantonio","family":"Caprolu","sequence":"additional","affiliation":[]},{"given":"Simone","family":"Raponi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,6,28]]},"reference":[{"key":"2_CR1","unstructured":"The best bitcoin mining pools. https:\/\/www.bitcoinmining.com\/bitcoin-mining-pools\/ . Accessed June 2020"},{"key":"2_CR2","unstructured":"The deep web is the 99% of the internet you can\u2019t google. https:\/\/curiosity.com\/topics\/the-deep-web-is-the-99-of-the-internet-you-cant-google-curiosity\/ . Accessed June 2020"},{"key":"2_CR3","unstructured":"Google\u2019s search knows about over 130 trillion pages. https:\/\/searchengineland.com\/googles-search-indexes-hits-130-trillion-pages-documents-263378 . Accessed June 2020"},{"key":"2_CR4","unstructured":"How to escape your political bubble for a clearer view. https:\/\/www.nytimes.com\/2017\/03\/03\/arts\/the-battle-over-your-political-bubble.html . Accessed June 2020"},{"key":"2_CR5","unstructured":"Internet growth statistics. https:\/\/www.internetworldstats.com\/emarketing.htm . Accessed June 2020"},{"key":"2_CR6","unstructured":"Breaking through censorship barriers, even when tor is blocked. https:\/\/blog.torproject.org\/breaking-through-censorship-barriers-even-when-tor-blocked . Accessed June 2020"},{"key":"2_CR7","unstructured":"Eu vs disinfo website. https:\/\/euvsdisinfo.eu\/about\/ . Accessed June 2020"},{"key":"2_CR8","unstructured":"How trolls are ruining the internet. http:\/\/time.com\/4457110\/internet-trolls\/ . Accessed June 2020"},{"key":"2_CR9","unstructured":"A new study suggests fake news might have won donald trump the 2016 election. https:\/\/www.washingtonpost.com\/news\/the-fix\/wp\/2018\/04\/03\/a-new-study-suggests-fake-news-might-have-won-donald-trump-the-2016-election\/?noredirect=on&utm_term=.d6e63f61fa06 . Accessed June 2020"},{"key":"2_CR10","unstructured":"Presidential policy directive - critical infrastructure security and resilience. https:\/\/obamawhitehouse.archives.gov\/the-press-office\/2013\/02\/12\/presidential-policy-directive-critical-infrastructure-security-and-resil . Accessed June 2020"},{"key":"2_CR11","unstructured":"Social media and censorship in china: how is it different to the west? http:\/\/www.bbc.co.uk\/newsbeat\/article\/41398423\/social-media-and-censorship-in-china-how-is-it-different-to-the-west . Accessed June 2020"},{"key":"2_CR12","unstructured":"What is scada? https:\/\/inductiveautomation.com\/what-is-scada . Accessed June 2020"},{"key":"2_CR13","doi-asserted-by":"crossref","unstructured":"Apostolaki, M., Zohar, A., Vanbever, L.: Hijacking bitcoin: routing attacks on cryptocurrencies. In: 2017 IEEE Symposium on Security and Privacy (SP), pp. 375\u2013392. IEEE (2017)","DOI":"10.1109\/SP.2017.29"},{"issue":"3","key":"2_CR14","doi-asserted-by":"publisher","first-page":"3","DOI":"10.5210\/fm.v17i3.3943","volume":"17","author":"D Bamman","year":"2012","unstructured":"Bamman, D., O\u2019Connor, B., Smith, N.: Censorship and deletion practices in Chinese social media. First Monday 17(3), 3\u20135 (2012)","journal-title":"First Monday"},{"key":"2_CR15","doi-asserted-by":"crossref","unstructured":"Bauer, K., McCoy, D., Grunwald, D., Kohno, T., Sicker, D.: Low-resource routing attacks against tor. In: Proceedings of the 2007 ACM Workshop on Privacy in Electronic Society, pp. 11\u201320. ACM (2007)","DOI":"10.1145\/1314333.1314336"},{"key":"2_CR16","unstructured":"Blockgeeks: What is cryptocurrency game theory: A basic introduction. https:\/\/blockgeeks.com\/guides\/cryptocurrency-game-theory\/ . Accessed June 2020"},{"key":"2_CR17","doi-asserted-by":"crossref","unstructured":"Boldyreva, A., Lychev, R.: Provable security of S-BGP and other path vector protocols: model, analysis and extensions. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, pp. 541\u2013552. ACM (2012)","DOI":"10.1145\/2382196.2382254"},{"key":"2_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1007\/BFb0055720","volume-title":"Advances in Cryptology \u2014 CRYPTO 1998","author":"F Chabaud","year":"1998","unstructured":"Chabaud, F., Joux, A.: Differential collisions in SHA-0. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 56\u201371. Springer, Heidelberg (1998). https:\/\/doi.org\/10.1007\/BFb0055720"},{"issue":"6","key":"2_CR19","doi-asserted-by":"publisher","first-page":"811","DOI":"10.1109\/TDSC.2012.75","volume":"9","author":"Z Chu","year":"2012","unstructured":"Chu, Z., Gianvecchio, S., Wang, H., Jajodia, S.: Detecting automation of twitter accounts: are you a human, bot, or cyborg? IEEE Trans. Dependable Sec. Comput. 9(6), 811\u2013824 (2012)","journal-title":"IEEE Trans. Dependable Sec. Comput."},{"key":"2_CR20","unstructured":"Dan Shea, A.E., Husch, B.: Drones and critical infrastructure. National Conference of States Legislatures (NCSL). http:\/\/www.ncsl.org\/research\/energy\/drones-and-critical-infrastructure.aspx . December 2016. Accessed June 2020"},{"issue":"4","key":"2_CR21","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1086\/453309","volume":"4","author":"J Dewey","year":"1903","unstructured":"Dewey, J.: Democracy in education. Elementary School Teacher 4(4), 193\u2013204 (1903)","journal-title":"Elementary School Teacher"},{"issue":"3","key":"2_CR22","doi-asserted-by":"publisher","first-page":"9:1","DOI":"10.1145\/2699906","volume":"17","author":"R Di Pietro","year":"2015","unstructured":"Di Pietro, R., Oligeri, G.: Silence is golden: exploiting jamming and radio silence to communicate. ACM Trans. Inf. Syst. Secur. 17(3), 9:1\u20139:24 (2015). https:\/\/doi.org\/10.1145\/2699906 . http:\/\/doi.acm.org\/10.1145\/2699906","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"2_CR23","doi-asserted-by":"crossref","unstructured":"Ding, F., Yang, Z., Chen, X., Guo, J.: Effective methods to avoid the internet censorship. In: 2011 Fourth International Symposium on Parallel Architectures, Algorithms and Programming. pp. 67\u201371. IEEE (2011)","DOI":"10.1109\/PAAP.2011.54"},{"key":"2_CR24","doi-asserted-by":"publisher","DOI":"10.21236\/ADA465464","volume-title":"Tor: The second-generation onion router","author":"R Dingledine","year":"2004","unstructured":"Dingledine, R., Mathewson, N., Syverson, P.: Tor: The second-generation onion router. Tech. rep, Naval Research Lab Washington DC (2004)"},{"key":"2_CR25","doi-asserted-by":"crossref","unstructured":"Dobbertin, H.: Cryptanalysis of md4. In: International Workshop on Fast Software Encryption. pp. 53\u201369. Springer (1996)","DOI":"10.1007\/3-540-60865-6_43"},{"key":"2_CR26","unstructured":"Dobbertin, H.: Cryptanalysis of md5 compress. Technical report, Presented at the Rump Session of EuroCrypt (1996)"},{"key":"2_CR27","unstructured":"Dobbertin, H.: The status of md5 after a recent attack. Crypto-Bytes The technical newsletter of RSA Laboratories, a division of RSA Data Security, Inc. vol. 2, no. (2) (1996)"},{"issue":"1","key":"2_CR28","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/s001459900019","volume":"10","author":"H Dobbertin","year":"1997","unstructured":"Dobbertin, H.: Ripemd with two-round compress function is not collision-free. J. Cryptol. 10(1), 51\u201369 (1997)","journal-title":"J. Cryptol."},{"key":"2_CR29","doi-asserted-by":"crossref","unstructured":"Elyashar, A., Bendahan, J., Puzis, R.: Has the online discussion been manipulated? quantifying online discussion authenticity within online social media. arXiv preprint arXiv:1708.02763 (2017)","DOI":"10.1145\/3110025.3110115"},{"key":"2_CR30","unstructured":"Eperiesi-Beck, E.: The threat quantum computers pose to modern security. https:\/\/www.scmagazineuk.com\/the-threat-quantum-computers-pose-to-modern-security\/article\/709472\/ . Accessed June 2020"},{"key":"2_CR31","doi-asserted-by":"crossref","unstructured":"Ferrara, E.: Disinformation and social bot operations in the run up to the 2017 french presidential election (2017)","DOI":"10.2139\/ssrn.2995809"},{"key":"2_CR32","unstructured":"Fokin, A., et al.: Internet trolling as a tool of hybrid warfare: the case of latvia. Technical report, NATO Strategic Communications Centre of Excellence (1996)"},{"key":"2_CR33","doi-asserted-by":"crossref","unstructured":"Forelle, M., Howard, P., Monroy-Hern\u00e1ndez, A., Savage, S.: Political bots and the manipulation of public opinion in venezuela. arXiv preprint arXiv:1507.07109 (2015)","DOI":"10.2139\/ssrn.2635800"},{"issue":"4","key":"2_CR34","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1016\/j.ijcip.2009.10.001","volume":"2","author":"IN Fovino","year":"2009","unstructured":"Fovino, I.N., Carcano, A., Masera, M., Trombetta, A.: An experimental investigation of malware attacks on scada systems. Int. J. Critical Infrastruct. Protect. 2(4), 139\u2013145 (2009)","journal-title":"Int. J. Critical Infrastruct. Protect."},{"key":"2_CR35","volume-title":"Censorship, Propaganda, and the Production of \u2018Shell Shock\u2019 in World War I","author":"N Gertz","year":"2009","unstructured":"Gertz, N.: Censorship, Propaganda, and the Production of \u2018Shell Shock\u2019 in World War I. Disciplinary Press, Oxford (2009)"},{"issue":"3","key":"2_CR36","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/MSP.2014.49","volume":"12","author":"A Gervais","year":"2014","unstructured":"Gervais, A., Karame, G., Capkun, S., Capkun, V.: Is bitcoin a decentralized currency? IEEE Secur. Privacy 12(3), 54\u201360 (2014)","journal-title":"IEEE Secur. Privacy"},{"key":"2_CR37","doi-asserted-by":"crossref","unstructured":"Gill, P., Schapira, M., Goldberg, S.: Let the market drive deployment: a strategy for transitioning to BGP security. In: ACM SIGCOMM Computer Communication Review. vol. 41, pp. 14\u201325. ACM (2011)","DOI":"10.1145\/2043164.2018439"},{"key":"2_CR38","doi-asserted-by":"crossref","unstructured":"Guriev, S.M., Treisman, D.: How modern dictators survive: cooptation, censorship, propaganda, and repression. CEPR Discussion Paper No. DP10454 (2015)","DOI":"10.2139\/ssrn.2571905"},{"key":"2_CR39","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1007\/3-540-45353-9_7","volume-title":"Topics in Cryptology \u2014 CT-RSA 2001","author":"H Handschuh","year":"2001","unstructured":"Handschuh, H., Knudsen, L.R., Robshaw, M.J.: Analysis of SHA-1 in encryption mode. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol. 2020, pp. 70\u201383. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-45353-9_7"},{"key":"2_CR40","unstructured":"Hegelich, S., Janetzko, D.: Are social bots on twitter political actors? empirical evidence from a ukrainian social botnet. In: Tenth International AAAI Conference on Web and Social Media (2016)"},{"key":"2_CR41","unstructured":"Heilman, E., Kendler, A., Zohar, A., Goldberg, S.: Eclipse attacks on bitcoin\u2019s peer-to-peer network. In: USENIX Security Symposium, pp. 129\u2013144 (2015)"},{"key":"2_CR42","first-page":"325","volume":"127","author":"M Heins","year":"2013","unstructured":"Heins, M.: The brave new world of social media censorship. Harv. L. Rev. F. 127, 325 (2013)","journal-title":"Harv. L. Rev. F."},{"key":"2_CR43","volume-title":"Blue Pencil Warriors: Censorship and Propaganda in World War II","author":"J Hilvert","year":"1984","unstructured":"Hilvert, J.: Blue Pencil Warriors: Censorship and Propaganda in World War II. University of Queensland Press, Manchester (1984)"},{"key":"2_CR44","unstructured":"Hintz, A.: Social media censorship, privatized regulation, and new restrictions to protest and dissent. Rowman & Littlefield (2015)"},{"key":"2_CR45","doi-asserted-by":"crossref","unstructured":"Howard, P.N., Kollanyi, B.: Bots, #strongerin, and #brexit: computational propaganda during the uk-eu referendum. SSRN 2798311 (2016)","DOI":"10.2139\/ssrn.2798311"},{"issue":"4","key":"2_CR46","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1145\/1030194.1015488","volume":"34","author":"YC Hu","year":"2004","unstructured":"Hu, Y.C., Perrig, A., Sirbu, M.: SPV: Secure path vector routing for securing BGP. ACM SIGCOMM Comput. Commun. Rev. 34(4), 179\u2013192 (2004)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"2_CR47","unstructured":"Ismail, N.: New malware represents biggest threat to critical infrastructure. https:\/\/www.information-age.com\/new-malware-represents-biggest-threat-critical-infrastructure-123466733\/ June 2017. Accessed June 2020"},{"key":"2_CR48","volume-title":"Propaganda and censorship during Canada\u2019s Great War","author":"J Keshen","year":"1996","unstructured":"Keshen, J.: Propaganda and censorship during Canada\u2019s Great War. University of Alberta, Edmonton (1996)"},{"key":"2_CR49","unstructured":"Knapp, E.D., Langill, J.T.: Industrial Network Security: Securing critical infrastructure networks for smart grid, SCADA, and other Industrial Control Systems. Syngress (2014)"},{"key":"2_CR50","doi-asserted-by":"crossref","unstructured":"Kumar, S., Cheng, J., Leskovec, J., Subrahmanian, V.: An army of me: sockpuppets in online discussion communities. In: Proceedings of the 26th International Conference on World Wide Web. pp. 857\u2013866. International World Wide Web Conferences Steering Committee (2017)","DOI":"10.1145\/3038912.3052677"},{"key":"2_CR51","doi-asserted-by":"crossref","unstructured":"La Morgia, M., Mei, A., Raponi, S., Stefa, J.: Time-zone geolocation of crowds in the dark web. In: 2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS), pp. 445\u2013455. IEEE (2018)","DOI":"10.1109\/ICDCS.2018.00051"},{"key":"2_CR52","volume-title":"Second Front: Censorship and Propaganda in the 1991 Gulf War","author":"JR MacArthur","year":"2004","unstructured":"MacArthur, J.R.: Second Front: Censorship and Propaganda in the 1991 Gulf War. University of California Press, California (2004)"},{"key":"2_CR53","unstructured":"Mason, A.: CCSP Self-Study: Cisco Secure Virtual Private Networks (CSVPN). Pearson Higher Education (2004)"},{"key":"2_CR54","doi-asserted-by":"crossref","unstructured":"Mihaylov, T., Georgiev, G., Nakov, P.: Finding opinion manipulation trolls in news community forums. In: Proceedings of the Nineteenth Conference on Computational Natural Language Learning, pp. 310\u2013314 (2015)","DOI":"10.18653\/v1\/K15-1032"},{"key":"2_CR55","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1145\/2380790.2380805","volume":"12","author":"B Miller","year":"2012","unstructured":"Miller, B., Rowe, D.C.: A survey scada of and critical infrastructure incidents. RIIT 12, 51\u201356 (2012)","journal-title":"RIIT"},{"issue":"4","key":"2_CR56","doi-asserted-by":"publisher","first-page":"418","DOI":"10.1016\/j.cose.2012.02.009","volume":"31","author":"A Nicholson","year":"2012","unstructured":"Nicholson, A., Webber, S., Dyer, S., Patel, T., Janicke, H.: Scada security in the light of cyber-warfare. Comput. Secur. 31(4), 418\u2013436 (2012)","journal-title":"Comput. Secur."},{"key":"2_CR57","unstructured":"Nobori, D., Shinjo, Y.: $$\\{$$VPN$$\\}$$ gate: a volunteer-organized public $$\\{$$VPN$$\\}$$ relay system with blocking resistance for bypassing government censorship firewalls. In: Proceedings of the 11th $$\\{$$USENIX$$\\}$$ Symposium on Networked Systems Design and Implementation ($$\\{$$NSDI$$\\}$$ 14). pp. 229\u2013241 (2014)"},{"issue":"3","key":"2_CR58","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1145\/1266977.1266980","volume":"10","author":"PC van Oorschot","year":"2007","unstructured":"van Oorschot, P.C., Wan, T., Kranakis, E.: On interdomain routing security and pretty secure BGP (PSBGP). ACM Trans. Inf. Syst. Secur. (TISSEC) 10(3), 11 (2007)","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"},{"key":"2_CR59","unstructured":"Peacock, M., Johnstone, M.N.: Towards detection and control of civilian unmanned aerial vehicles. SRI Security Research Institute, Edith Cowan University, Perth, Western (2013)"},{"key":"2_CR60","doi-asserted-by":"crossref","unstructured":"Preneel, B., Govaerts, R., Vandewalle, J.: Differential cryptanalysis of hash functions based on block ciphers. In: Proceedings of the 1st ACM Conference on Computer and Communications Security, pp. 183\u2013188. ACM (1993)","DOI":"10.1145\/168588.168611"},{"key":"2_CR61","unstructured":"Ratkiewicz, J., Conover, M.D., Meiss, M., Gon\u00e7alves, B., Flammini, A., Menczer, F.M.: Detecting and tracking political abuse in social media. In: Fifth International AAAI Conference on Weblogs and Social Media (2011)"},{"key":"2_CR62","unstructured":"Roberts, A.: Documents on the Laws of War. HeinOnline (2000)"},{"key":"2_CR63","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/978-3-540-39887-5_4","volume-title":"Fast Software Encryption","author":"M-JO Saarinen","year":"2003","unstructured":"Saarinen, M.-J.O.: Cryptanalysis of block ciphers based on SHA-1 and MD5. In: Johansson, T. (ed.) FSE 2003. LNCS, vol. 2887, pp. 36\u201344. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/978-3-540-39887-5_4"},{"key":"2_CR64","unstructured":"Security, U.H.: Unmanned aircraft systems (UAS) - critical infrastructure. https:\/\/www.dhs.gov\/uas-ci . Accessed June 2020"},{"issue":"2","key":"2_CR65","first-page":"280","volume":"7","author":"M Shadmehr","year":"2015","unstructured":"Shadmehr, M., Bernhardt, D.: State censorship. Am. Econ. J.: Microecon. 7(2), 280\u2013307 (2015)","journal-title":"Am. Econ. J.: Microecon."},{"key":"2_CR66","doi-asserted-by":"crossref","unstructured":"Shi, X., Xiang, Y., Wang, Z., Yin, X., Wu, J.: Detecting prefix hijackings in the internet with argus. In: Proceedings of the 2012 Internet Measurement Conference, pp. 15\u201328. ACM (2012)","DOI":"10.1145\/2398776.2398779"},{"key":"2_CR67","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/11863908_2","volume-title":"Computer Security \u2013 ESORICS 2006","author":"V Shmatikov","year":"2006","unstructured":"Shmatikov, V., Wang, M.-H.: Timing analysis in low-latency mix networks: attacks and defenses. In: Gollmann, D., Meier, J., Sabelfeld, A. (eds.) ESORICS 2006. LNCS, vol. 4189, pp. 18\u201333. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11863908_2"},{"key":"2_CR68","unstructured":"Shor, P.W.: Algorithms for quantum computation: discrete logarithms and factoring. In: 35th Annual Symposium on Foundations of Computer Science, 1994 Proceedings., pp. 124\u2013134. IEEE (1994)"},{"key":"2_CR69","first-page":"i","volume":"5","author":"KW Smith","year":"2015","unstructured":"Smith, K.W.: Drone technology: benefits, risks, and legal considerations. Seattle J. Envtl. L. 5, i (2015)","journal-title":"Seattle J. Envtl. L."},{"key":"2_CR70","doi-asserted-by":"crossref","unstructured":"Starbird, K.: Examining the alternative media ecosystem through the production of alternative narratives of mass shooting events on twitter. In: Eleventh International AAAI Conference on Web and Social Media (2017)","DOI":"10.1609\/icwsm.v11i1.14878"},{"key":"2_CR71","unstructured":"Sun, Y., et al.: $$\\{$$RAPTOR$$\\}$$: routing attacks on privacy in tor. In: 24th $$\\{$$USENIX$$\\}$$ Security Symposium ($$\\{$$USENIX$$\\}$$ Security 2015), pp. 271\u2013286 (2015)"},{"key":"2_CR72","volume-title":"Censorship and Propaganda in Post-Genocide Rwanda","author":"L Waldorf","year":"2007","unstructured":"Waldorf, L.: Censorship and Propaganda in Post-Genocide Rwanda. Pluto Press, London (2007)"},{"key":"2_CR73","doi-asserted-by":"crossref","unstructured":"Wang, Y., Ji, P., Ye, B., Wang, P., Luo, R., Yang, H.: Gohop: personal vpn to defend from censorship. In: 16th International Conference on Advanced Communication Technology, pp. 27\u201333. IEEE (2014)","DOI":"10.1109\/ICACT.2014.6778916"},{"key":"2_CR74","unstructured":"Winter, P., Lindskog, S.: How the great firewall of china is blocking tor. USENIX-The Advanced Computing Systems Association (2012)"},{"key":"2_CR75","unstructured":"Yardley, T.: Scada: issues, vulnerabilities and future directions.; login: the magazine of USENIX & SAGE 33(6), 14\u201320 (2008)"},{"key":"2_CR76","doi-asserted-by":"crossref","unstructured":"Zannettou, S., Caulfield, T., De Cristofaro, E., Sirivianos, M., Stringhini, G., Blackburn, J.: Disinformation warfare: Understanding state-sponsored trolls on twitter and their influence on the web. arXiv preprint arXiv:1801.09288 (2018)","DOI":"10.1145\/3308560.3316495"},{"key":"2_CR77","doi-asserted-by":"crossref","unstructured":"Zhang, Z., Zhang, Y., Hu, Y.C., Mao, Z.M.: Practical defenses against BGP prefix hijacking. In: Proceedings of the 2007 ACM CoNEXT Conference, p. 3. ACM (2007)","DOI":"10.1145\/1364654.1364658"},{"issue":"6","key":"2_CR78","doi-asserted-by":"publisher","first-page":"1815","DOI":"10.1109\/TNET.2010.2066284","volume":"18","author":"Z Zhang","year":"2010","unstructured":"Zhang, Z., Zhang, Y., Hu, Y.C., Mao, Z.M., Bush, R.: ispy: detecting ip prefix hijacking on my own. IEEE\/ACM Trans. Network. (TON) 18(6), 1815\u20131828 (2010)","journal-title":"IEEE\/ACM Trans. Network. (TON)"}],"container-title":["Communications in Computer and Information Science","Information Systems Security and Privacy"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-49443-8_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,3]],"date-time":"2023-10-03T01:14:49Z","timestamp":1696295689000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-49443-8_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030494421","9783030494438"],"references-count":78,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-49443-8_2","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"28 June 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICISSP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Systems Security and Privacy","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Prague","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Czech Republic","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 February 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 February 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icissp2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icissp.org\/?y=2019","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"PRIMORIS","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"100","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"19","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"19% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}