{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:56:34Z","timestamp":1725558994039},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540245483"},{"type":"electronic","value":"9783540305873"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/978-3-540-30587-3_26","type":"book-chapter","created":{"date-parts":[[2010,7,7]],"date-time":"2010-07-07T19:12:10Z","timestamp":1278529930000},"page":"157-167","source":"Crossref","is-referenced-by-count":0,"title":["Addressing Malicious Code in COTS: A Protection Framework"],"prefix":"10.1007","author":[{"given":"Donald J.","family":"Reifer","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Pranjali","family":"Baxi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Fabio","family":"Hirata","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jonathan","family":"Schifman","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ricky","family":"Tsao","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"26_CR1","volume-title":"Software Engineering Risk Analysis and Management","author":"R. Charette","year":"1989","unstructured":"Charette, R.: Software Engineering Risk Analysis and Management. McGraw-Hill, New York (1989)"},{"key":"26_CR2","unstructured":"Reifer, D.: Final Report, Software Protection Framework. Reifer Consultants, Inc. (2004)"},{"issue":"6","key":"26_CR3","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1109\/MNET.2002.1081761","volume":"16","author":"A. Charkrabarti","year":"2002","unstructured":"Charkrabarti, A., Manimaran, G.: Internet Infrastructure Security: A Taxonomy. IEEE Network\u00a016(6), 13\u201321 (2002)","journal-title":"IEEE Network"},{"issue":"3","key":"26_CR4","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1145\/185403.185412","volume":"26","author":"C. Landwehr","year":"1994","unstructured":"Landwehr, C., Bull, A., McDermott, J., Choi, W.: A Taxonomy of Computer Program Security Flaws. ACM Computing Surveys\u00a026(3), 211\u2013254 (1994)","journal-title":"ACM Computing Surveys"},{"key":"26_CR5","unstructured":"House, L.: ATSIT Technical Report. Battelle National Labs (2004)"},{"key":"26_CR6","unstructured":"Hermann, D.: Using the Common Criteria for Information Technology Security Evaluation. Auerbach Publications (2003)"},{"issue":"8","key":"26_CR7","doi-asserted-by":"publisher","first-page":"805","DOI":"10.1016\/S1389-1286(98)00017-6","volume":"31","author":"H. Debar","year":"1999","unstructured":"Debar, H., Dacier, M., Wespi, A.: Towards a Taxonomy of Intrusion-Detection Systems. Computer Networks\u00a031(8), 805\u2013822 (1999)","journal-title":"Computer Networks"},{"key":"26_CR8","unstructured":"Axelsson, S.: Intrusion Detection Systems: A Survey and Taxonomy. Technical Report 99-15, Department of Computer Engineering, Chalmers University (2000)"},{"key":"26_CR9","unstructured":"Houle, K., Weaver, G.: Trends in Denial of Service Attack Technology. CERT Advisory (2001)"},{"issue":"2","key":"26_CR10","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/997150.997156","volume":"34","author":"M. Mirkovic","year":"2004","unstructured":"Mirkovic, M., Reiher, P.: A Taxonomy of DDoS Attack and DDoS Defense Mechanisms. ACM SIGCOMM Computer Communications Review\u00a034(2), 39\u201354 (2004)","journal-title":"ACM SIGCOMM Computer Communications Review"},{"key":"26_CR11","doi-asserted-by":"crossref","unstructured":"Butler, S.: Security Attribute Evaluation Method: A Cost-Benefit Approach. In: Proceedings of ICSE 2003 (2002)","DOI":"10.1145\/581339.581370"},{"key":"26_CR12","unstructured":"Whittaker, J., Thompson, H.: How to Break Software Security \u2013 Effective Techniques for Security Testing. Addison-Wesley, Reading (2003)"},{"key":"26_CR13","volume-title":"Network and Internetwork Security","author":"W. Stallings","year":"1995","unstructured":"Stallings, W.: Network and Internetwork Security. Prentice-Hall, Englewood Cliffs (1995)"},{"key":"26_CR14","volume-title":"Secure Coding \u2013 Principles and Practices","author":"M. Graff","year":"2003","unstructured":"Graff, M., Van Wyk, K.: Secure Coding \u2013 Principles and Practices. O\u2019Reilly & Associates, Inc. Sebastopol (2003)"},{"key":"26_CR15","doi-asserted-by":"crossref","unstructured":"Young, S., Horwitz, S.: Protecting C Programs from Attacks via Invalid Pointer References. In: Proceedings of ESEC\/FSE 2003 (2003)","DOI":"10.1145\/940112.940113"},{"key":"26_CR16","doi-asserted-by":"crossref","unstructured":"Fawcett, T., Provost, F.: Activity Monitoring: Noticing Interesting Changes in Behavior. In: Proceedings of the 5th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (August 1999)","DOI":"10.1145\/312129.312195"},{"key":"26_CR17","doi-asserted-by":"crossref","unstructured":"Kim, G., Spafoord, E.: The Design and Implementation of Tripwire: A File System Integrity Checker. In: Proceedings of the 2nd ACM Conference on Computer and Communications Security (1994)","DOI":"10.1145\/191177.191183"},{"key":"26_CR18","volume-title":"Exploiting Software \u2013 How to Break Code","author":"G. Hoglund","year":"2004","unstructured":"Hoglund, G., McGraw, G.: Exploiting Software \u2013 How to Break Code. Addison-Wesley, Reading (2004)"}],"container-title":["Lecture Notes in Computer Science","COTS-Based Software Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30587-3_26.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T04:25:51Z","timestamp":1605759951000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30587-3_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540245483","9783540305873"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30587-3_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}