{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:58:30Z","timestamp":1725559110021},"publisher-location":"Berlin, Heidelberg","reference-count":6,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540253389"},{"type":"electronic","value":"9783540319573"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/978-3-540-31957-3_79","type":"book-chapter","created":{"date-parts":[[2010,7,7]],"date-time":"2010-07-07T21:26:19Z","timestamp":1278537979000},"page":"699-706","source":"Crossref","is-referenced-by-count":5,"title":["Securing Layer 2 in Local Area Networks"],"prefix":"10.1007","author":[{"given":"Hayriye","family":"Altunbasak","sequence":"first","affiliation":[]},{"given":"Sven","family":"Krasser","sequence":"additional","affiliation":[]},{"given":"Henry L.","family":"Owen","sequence":"additional","affiliation":[]},{"given":"Jochen","family":"Grimminger","sequence":"additional","affiliation":[]},{"given":"Hans-Peter","family":"Huth","sequence":"additional","affiliation":[]},{"given":"Joachim","family":"Sokol","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"79_CR1","unstructured":"Howard, C.: Layer 2 \u2013 The Weakest Link: Security Considerations at the Data Link Layer. Available at http:\/\/www.cisco.com\/en\/US\/about\/ac123\/ac114\/ac173\/ac222\/about_cisco_packet_feature09186a0080142deb.html"},{"key":"79_CR2","unstructured":"Bashir, M.S.: ARP Cache Poisoning with Ettercap (August 2003), Available at http:\/\/www.giac.org\/practical\/GSEC\/Mohammad_Bashir_GSEC.pdf"},{"key":"79_CR3","doi-asserted-by":"crossref","unstructured":"Plummer, D.C.: Ethernet Address Resolution Protocol: Or converting network protocol addresses to 48.bit Ethernet address for transmission on Ethernet hardware. RFC 826 (November 1982)","DOI":"10.17487\/rfc0826"},{"key":"79_CR4","unstructured":"Rouiller, S.A.: Virtual LAN Security: weaknesses and counter measures. Available at http:\/\/www.sans.org\/rr\/papers\/38\/1090.pdf"},{"key":"79_CR5","unstructured":"Convery, S.: Hacking Layer 2: Fun with Ethernet Switches (Blackh, at (2002), Available at http:\/\/www.blackhat.com\/presentations\/bh-usa-02\/bh-us-02-converyswitches.pdf"},{"key":"79_CR6","unstructured":"IEEE P802.1AE\/D2.0 Draft Standard for Local and Metropolitan Area Networks: Media Access Control (MAC) Security. Available at http:\/\/www.ieee802.org\/1\/files\/private\/ae-drafts\/d2\/802-1ae-d2-01.pdf"}],"container-title":["Lecture Notes in Computer Science","Networking - ICN 2005"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-31957-3_79.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T04:31:37Z","timestamp":1605760297000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-31957-3_79"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540253389","9783540319573"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-31957-3_79","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}