{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:56:32Z","timestamp":1725562592555},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642154782"},{"type":"electronic","value":"9783642154799"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-15479-9_30","type":"book-chapter","created":{"date-parts":[[2010,8,3]],"date-time":"2010-08-03T14:20:34Z","timestamp":1280845234000},"page":"315-325","source":"Crossref","is-referenced-by-count":6,"title":["C-SAW: Critical Information Infrastructure Protection through Simplification"],"prefix":"10.1007","author":[{"given":"Ian","family":"Ellefsen","sequence":"first","affiliation":[]},{"given":"Sebastiaan","family":"von Solms","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"30_CR1","unstructured":"Ahamad, M.: Emerging Cyber Threats Report for 2009. Tech. rep., Georgia Tech Information Security Center (2008), http:\/\/www.gtiscsecuritysummit.com\/pdf\/CyberThreatsReport2009.pdf"},{"key":"30_CR2","doi-asserted-by":"crossref","unstructured":"Brownlee, N., Guttman, E.: RFC2350: Expectations for Computer Security Incident Response. RFC (June 1998), http:\/\/www.ietf.org\/rfc\/rfc2350.txt","DOI":"10.17487\/rfc2350"},{"key":"30_CR3","unstructured":"Drummond, D.: A new approach to China. Electronic (January 2010), http:\/\/googleblog.blogspot.com\/2010\/01\/new-approach-to-china.html"},{"key":"30_CR4","unstructured":"ENISA: Baseline capabilities for national \/ governmental CERTs. Tech. Rep. (December 2009), http:\/\/www.enisa.europa.eu\/act\/cert\/support\/baseline-capabilities"},{"issue":"4","key":"30_CR5","first-page":"13","volume":"4","author":"J. Harrison","year":"2008","unstructured":"Harrison, J., Towsend, K.: An Update on WARPs. ENISA Quarterly Review\u00a04(4), 13\u201314 (2008), http:\/\/www.warp.gov.uk\/Marketing\/enisa_quarterly_12_08.pdf","journal-title":"ENISA Quarterly Review"},{"key":"30_CR6","unstructured":"ICANN: Factsheet: Root server attack on 6 February 2007. Electronic (March 2007), http:\/\/www.icann.org\/announcements\/factsheet-dns-attack-08mar07.pdf"},{"key":"30_CR7","first-page":"60","volume":"38","author":"S. Korns","year":"2008","unstructured":"Korns, S., Kastenberg, J.: Georgia\u2019s Cyber Left Hook. Parameters\u00a038, 60\u201376 (2008), http:\/\/www.carlisle.army.mil\/usawc\/Parameters\/08winter\/korns.pdf","journal-title":"Parameters"},{"key":"30_CR8","unstructured":"Kossakowski, K., Stikvoort, D.: A Trusted CSIRT Introducer in Europe. M&I\/Stelvio, Amersfoort, The Netherlands, 2nd edn. (February 2000), http:\/\/www.kossakowski.de\/ti-v2.pdf"},{"key":"30_CR9","unstructured":"Richards, J.: Denial-of-Service: The Estonian Cyberwar and Its Implications for U.S. National Security. International Affairs Review\u00a018(2) (2009), http:\/\/www.iar-gwu.org\/node\/65"},{"key":"30_CR10","unstructured":"Vixie, P., Sneeringer, G., Schleifer, M.: Events of October 21, 2002. Electronic (November 2002), http:\/\/d.root-servers.org\/october21.txt"},{"key":"30_CR11","doi-asserted-by":"crossref","unstructured":"West-Brown, M., Stikvoort, D., Kossakowski, K., Killcrece, G., Ruefle, R., Zajicek, M.: Handbook for Computer Security Response Teams (CSIRTs), 2nd edn. Carnegie Mellon Software Engineering Institute, Pittsburgh (April 2003), http:\/\/www.cert.org\/archive\/pdf\/csirt-handbook.pdf","DOI":"10.21236\/ADA413778"}],"container-title":["IFIP Advances in Information and Communication Technology","What Kind of Information Society? Governance, Virtuality, Surveillance, Sustainability, Resilience"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-15479-9_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T01:57:31Z","timestamp":1559354251000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-15479-9_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642154782","9783642154799"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-15479-9_30","relation":{},"ISSN":["1868-4238","1861-2288"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1861-2288"}],"subject":[],"published":{"date-parts":[[2010]]}}}