{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:38:52Z","timestamp":1725557932621},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642141706"},{"type":"electronic","value":"9783642141713"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-14171-3_31","type":"book-chapter","created":{"date-parts":[[2010,6,12]],"date-time":"2010-06-12T11:34:46Z","timestamp":1276342486000},"page":"356-366","source":"Crossref","is-referenced-by-count":1,"title":["IT Security Assessment for Interdisciplinary Research"],"prefix":"10.1007","author":[{"given":"Syed M.","family":"Rahman","sequence":"first","affiliation":[]},{"given":"Syed Vickar","family":"Ahamed","sequence":"additional","affiliation":[]},{"given":"Sevki S.","family":"Erdogan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"31_CR1","doi-asserted-by":"crossref","unstructured":"Liu, S., Cheng, B.: Cyberattacks: Why, What, Who, and How. In: IT Pro., IEEE Computer Society, Los Alamitos (May- June 2009)","DOI":"10.1109\/MITP.2009.46"},{"key":"31_CR2","volume-title":"Computer Security: Principles and Practice","author":"W. Stallings","year":"2008","unstructured":"Stallings, W., Brown, L.: Computer Security: Principles and Practice, 1st edn. Pearson Education, Inc., Upper Saddle River (2008)","edition":"1"},{"key":"31_CR3","unstructured":"US-CERT, Cyber Security Trends, Metrics, and Security Indicators\u00a04(1) (June 16, 2009), \n                    \n                      http:\/\/www.us-cert.gov\/press_room\/trendsanalysisQ109.pdf"},{"key":"31_CR4","unstructured":"Barrett, L.: Symantec\u2019s \u2018Unlucky 13\u2019 Security Trends for 2010 (2010), \n                    \n                      http:\/\/www.internetnews.com\/security\/article.php\/3849371\/Symantecs+Unlucky+13+Security+Trends+for+2010.htm\n                    \n                    \n                   (web retrieve on December 8, 2009)"},{"key":"31_CR5","doi-asserted-by":"publisher","DOI":"10.1002\/0470055995","volume-title":"Intelligent Internet Knowledge Networks","author":"S. Ahamed","year":"2006","unstructured":"Ahamed, S.: Intelligent Internet Knowledge Networks. John Wiley and Sons, Hoboken (2006)"},{"key":"31_CR6","unstructured":"Captcha, \n                    \n                      http:\/\/www.captcha.net\/\n                    \n                    \n                   (web retrieve on December 8, 2009)"},{"key":"31_CR7","doi-asserted-by":"crossref","unstructured":"Pak, C., Cannady, J.: Asset priority risk assessment using hidden markov models. In: Proceedings of the 10th ACM conference on SIG-information technology education, Fairfax, Virginia, USA, pp. 65\u201373 (2009)","DOI":"10.1145\/1631728.1631750"},{"key":"31_CR8","unstructured":"Menn, J.: Cyber-criminals breaching trusted websites. Financial Times Ltd, FT.com, London (September 15, 2009)"},{"issue":"4","key":"31_CR9","doi-asserted-by":"publisher","first-page":"478","DOI":"10.1108\/02635570810868344","volume":"108","author":"D.-H. Shih","year":"2008","unstructured":"Shih, D.-H., Lin, B., Chiang, H.-S., Shih, M.-H.: Security aspects of mobile phone virus: a critical survey. Industrial Management + Data Systems\u00a0108(4), 478\u2013494 (2008)","journal-title":"Industrial Management + Data Systems"}],"container-title":["Communications in Computer and Information Science","Recent Trends in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-14171-3_31.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T12:20:49Z","timestamp":1619785249000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-14171-3_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642141706","9783642141713"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-14171-3_31","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2010]]}}}