{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:50:29Z","timestamp":1740099029805,"version":"3.37.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319756493"},{"type":"electronic","value":"9783319756509"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-75650-9_17","type":"book-chapter","created":{"date-parts":[[2018,2,16]],"date-time":"2018-02-16T10:14:32Z","timestamp":1518776072000},"page":"259-274","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Deception in Information Security: Legal\u00a0Considerations in the Context of\u00a0German and European Law"],"prefix":"10.1007","author":[{"given":"Daniel","family":"Fraunholz","sequence":"first","affiliation":[]},{"given":"Christoph","family":"Lipps","sequence":"additional","affiliation":[]},{"given":"Marc","family":"Zimmermann","sequence":"additional","affiliation":[]},{"given":"Simon","family":"Duque Ant\u00f3n","sequence":"additional","affiliation":[]},{"given":"Johannes Karl Martin","family":"Mueller","sequence":"additional","affiliation":[]},{"given":"Hans Dieter","family":"Schotten","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,2,17]]},"reference":[{"key":"17_CR1","doi-asserted-by":"crossref","unstructured":"Andriesse, D., Rossow, C., Stone-Gross, B., Plohmann, D., Bos, H.: Highly resilient peer-to-peer botnets are here: An analysis of Gameover Zeus. In: International Conference on Malicious and Unwanted Software, vol. 8, pp. 116\u2013123 (2013)","DOI":"10.1109\/MALWARE.2013.6703693"},{"key":"17_CR2","unstructured":"Bundesgerichtshof: Bundesgerichtshof zur zul\u00e4ssigkeit der speicherung von dynamischen ip-adressen (2017)"},{"key":"17_CR3","unstructured":"Edwards, S., Profetis, I.: Hajime: Analysis of a decentralized worm for IoT devices"},{"key":"17_CR4","unstructured":"Fraunholz, D., Pohl, F.: Towards basic design principles for high- and medium-interaction honeypots. In: European Conference on Cyber Warfare and Security, vol. 16 (2017)"},{"key":"17_CR5","doi-asserted-by":"crossref","unstructured":"Fraunholz, D., Zimmermann, M., Duque Anton, S., Schneider, J., Schotten, H.D.: Distributed and highly-scalable WAN network attack sensing and sophisticated analysing framework based on honeypot technology. In: International Conference on Cloud Computing, Data Science & Engineering, vol. 7 (2017)","DOI":"10.1109\/CONFLUENCE.2017.7943186"},{"key":"17_CR6","unstructured":"Gerichtshof der Europ\u00e4ischen Union: Urteil in der rechtssache c-582\/14 (2016)"},{"key":"17_CR7","unstructured":"Google Inc.: Google analytics (2017). \nhttps:\/\/analytics.google.com\/"},{"key":"17_CR8","unstructured":"Koch, A.: Die rechtlichen rahmenbedingungen von hackback (2008)"},{"key":"17_CR9","doi-asserted-by":"crossref","unstructured":"Mokube, I., Adams, M.: Honeypots: Concepts, approaches, and challenges. In: Proceedings of the 45th Annual Southeast Regional Conference (2007)","DOI":"10.1145\/1233341.1233399"},{"key":"17_CR10","unstructured":"Norse Corp.: Norse attack map (2017). \nhttp:\/\/map.norsecorp.com\/#\/"},{"key":"17_CR11","unstructured":"Radcliffe, J.: Cyberlaw 101: A primer on us laws related to honeypot deployments. In: Information Security Reading Room (2007)"},{"key":"17_CR12","doi-asserted-by":"crossref","unstructured":"Scottberg, B., Yurcik, W., Doss, D.: Internet honeypots: Protection or entrapment? In: International Symposium on Technology and Society (2002)","DOI":"10.1109\/ISTAS.2002.1013842"},{"key":"17_CR13","doi-asserted-by":"crossref","unstructured":"Sokol, P., Misek, J., Husak, M.: Honeypots and honeynets: Issues of privacy. EURASIP J. Inform. Secur. (2017)","DOI":"10.1186\/s13635-017-0057-4"},{"key":"17_CR14","unstructured":"Telekom DTAG: Fruhwarnsystem, sicherheitstacho (2017). \nhttp:\/\/www.sicherheitstacho.eu\/"},{"key":"17_CR15","unstructured":"ZERODIUM: Zerodium exploit acquisition program (2017). \nhttps:\/\/zerodium.com\/"}],"container-title":["Lecture Notes in Computer Science","Foundations and Practice of Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-75650-9_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,2,16]],"date-time":"2018-02-16T10:22:29Z","timestamp":1518776549000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-75650-9_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319756493","9783319756509"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-75650-9_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]}}}