{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T05:12:53Z","timestamp":1743052373667,"version":"3.40.3"},"publisher-location":"Cham","reference-count":9,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319123998"},{"type":"electronic","value":"9783319124001"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-12400-1_7","type":"book-chapter","created":{"date-parts":[[2014,10,28]],"date-time":"2014-10-28T15:15:00Z","timestamp":1414509300000},"page":"55-61","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Red Queen\u2019s Race: APT Win-Win Game"],"prefix":"10.1007","author":[{"given":"Vit","family":"Bukac","sequence":"first","affiliation":[]},{"given":"Vaclav","family":"Lorenc","sequence":"additional","affiliation":[]},{"given":"Vashek","family":"Maty\u00e1\u0161","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,10,29]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Bhatt, P., Yano. E.T.: Analyzing targeted attacks using hadoop applied to forensic investigation. In: Proceedings of the Eighth International Conference on Forensic Computer Science (2013)","key":"7_CR1","DOI":"10.5769\/C2013004"},{"unstructured":"Frei, S., Artes, F.: Cybercrime Kill Chain vs. Defense Effectiveness (2012). https:\/\/www.nsslabs.com\/reports\/cybercrime-kill-chain-vs-defense-effectiveness. Available 29 May 2014","key":"7_CR2"},{"unstructured":"Hutchins, E.M., Cloppert, M.J., Amin, R.M.: Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains. Leading Issues in Information Warfare & Security Research, vol. 1 (2011)","key":"7_CR3"},{"unstructured":"Harris, B., Konikoff, E., Petersen, P.: Breaking the DDoS attack chain. Technical report, August 2013","key":"7_CR4"},{"unstructured":"Hewlett-Packard. HP attack life cycle use case methodology, Technical white paper, November 2013. http:\/\/h20195.www2.hp.com\/v2\/GetPDF.aspx. Available 29 May 2014","key":"7_CR5"},{"unstructured":"Ioannou, G., Louvieris, P., Clewley, N., Powell, G.: A Markov multi-phase transferable belief model: an application for predicting data exfiltration APTs. In: 2013 16th International Conference on Information Fusion (FUSION), pp. 842\u2013849. IEEE (2013)","key":"7_CR6"},{"unstructured":"Mandiant. M-Trends 2010: The Advanced Persistent Threat, Report (2010). https:\/\/www.mandiant.com\/resources\/m-trends. Available 29 May 2014","key":"7_CR7"},{"unstructured":"RSA. Stalking The Kill Chain, Research note (2012). http:\/\/www.emc.com\/collateral\/hardware\/solution-overview\/h11154-stalking-the-kill-chain-so.pdf. Available 29 May 2014","key":"7_CR8"},{"unstructured":"Dell SecureWorks. Advanced Threat Protection with Dell SecureWorks Security Services (2013). http:\/\/www.secureworks.com\/assets\/pdf-store\/white-papers\/wp-advanced-threat-protection.pdf. Available 29 May 2014","key":"7_CR9"}],"container-title":["Lecture Notes in Computer Science","Security Protocols XXII"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-12400-1_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,8]],"date-time":"2023-02-08T04:15:59Z","timestamp":1675829759000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-12400-1_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319123998","9783319124001"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-12400-1_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"29 October 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}