{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:56:45Z","timestamp":1725562605725},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642149917"},{"type":"electronic","value":"9783642149924"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-14992-4_24","type":"book-chapter","created":{"date-parts":[[2010,8,9]],"date-time":"2010-08-09T12:42:07Z","timestamp":1281357727000},"page":"250-255","source":"Crossref","is-referenced-by-count":1,"title":["Ethical Guidelines for Computer Security Researchers: \u201cBe Reasonable\u201d"],"prefix":"10.1007","author":[{"given":"Len","family":"Sassaman","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"24_CR1","doi-asserted-by":"publisher","first-page":"384","DOI":"10.1145\/322609.322781","volume-title":"CSC 1988: Proceedings of the 1988 ACM Sixteenth Annual Conference on Computer Science","author":"M. Campbell","year":"1988","unstructured":"Campbell, M.: Ethics and Computer Security: Cause and Effect. In: CSC 1988: Proceedings of the 1988 ACM Sixteenth Annual Conference on Computer Science, pp. 384\u2013390. ACM, New York (1988)"},{"key":"24_CR2","unstructured":"Carmack, J.: IU Student, Focus of FBI Probe, Speaks Out (2006)"},{"key":"24_CR3","unstructured":"Stanford\u00a0Cyberlaw Clinic. CyberSecurity, Research and Disclosure (2003)"},{"key":"24_CR4","unstructured":"Hafner, K.: Researchers Yearn to Use AOL Logs, but They Hesitate. The New York Times (2006)"},{"key":"24_CR5","unstructured":"HexXer, H.: CodeGreen Beta Release (September 2001), \n                  \n                    http:\/\/archives.neohapsis.com\/archives\/vuln-dev\/2001-q3\/0575.html"},{"key":"24_CR6","unstructured":"Krebs, B.: Student Unleashes Uproar with Bogus Airline Boarding Passes. The Washington Post (2006)"},{"key":"24_CR7","unstructured":"Leibniz, G.W.: La F\u00e9licit\u00e9. In: Textes In\u00e9dits D\u2019apr\u00e8s les Manuscrits de la Biblioth\u00e8que Provinciale de Hanovre. Presses Universitaires de France (1948)"},{"key":"24_CR8","doi-asserted-by":"crossref","unstructured":"Leibniz, G.W.: Elementa Juris Naturalis. In: Philosophische Schriften. Akademie Verlag GmbH (2006)","DOI":"10.1524\/9783050060750"},{"key":"24_CR9","unstructured":"Moore, D., Shannon, C.: The Spread of the Code Red worm (2008), \n                  \n                    http:\/\/www.caida.org\/research\/security\/code-red\/coderedv2_analysis.xml"},{"key":"24_CR10","unstructured":"Narayanan, A., Shmatikov, V.: How To Break Anonymity of the Netflix Prize Dataset (2006)"},{"key":"24_CR11","unstructured":"Newitz, A.: Techsploitation: Subpoena Me, Too! San Francisco Bay Guardian (October 2003)"},{"key":"24_CR12","unstructured":"Poulsen, K.: Feds say Lamo Inspired Other Hackers. The Register (2004), \n                  \n                    http:\/\/www.theregister.co.uk\/2004\/09\/16\/feds_on_lamo\/"},{"key":"24_CR13","unstructured":"Sassaman, L.: The Faithless Endpoint: How Tor puts certain users at greater risk. Technical Report ESAT-COSIC 2007-003, Katholieke Universiteit Leuven (2007)"},{"issue":"1","key":"24_CR14","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1145\/66093.66095","volume":"19","author":"E.H. Spafford","year":"1989","unstructured":"Spafford, E.H.: The Internet Worm Program: an Analysis. SIGCOMM Computer Communication Review\u00a019(1), 17\u201357 (1989)","journal-title":"SIGCOMM Computer Communication Review"},{"key":"24_CR15","unstructured":"Wolf, J.: Technical Details of Srizbi\u2019s Domain Generation Algorithm (2008), \n                  \n                    http:\/\/blog.fireeye.com\/research\/2008\/11\/technical-details-of-srizbis-domain-generation-algorithm.html"},{"key":"24_CR16","unstructured":"Wolf, J., Sassaman, L.: Unpublished manuscript (December 2008)"},{"key":"24_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"370","DOI":"10.1007\/11564621_43","volume-title":"Distributed and Parallel Computing","author":"D. Wu","year":"2005","unstructured":"Wu, D., Long, D., Wang, C., Guan, Z.: Modeling and Analysis of Worm and Killer-Worm Propagation Using the Divide-and-Conquer Strategy. In: Hobbs, M., Goscinski, A.M., Zhou, W. (eds.) ICA3PP 2005. LNCS, vol.\u00a03719, pp. 370\u2013375. Springer, Heidelberg (2005)"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-14992-4_24.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T12:42:59Z","timestamp":1619786579000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-14992-4_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642149917","9783642149924"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-14992-4_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}