{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T21:11:10Z","timestamp":1725570670755},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642155055"},{"type":"electronic","value":"9783642155062"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-15506-2_4","type":"book-chapter","created":{"date-parts":[[2010,11,26]],"date-time":"2010-11-26T07:20:33Z","timestamp":1290756033000},"page":"49-62","source":"Crossref","is-referenced-by-count":1,"title":["An Analysis of the Green Dam Youth Escort Software"],"prefix":"10.1007","author":[{"given":"Frankie","family":"Li","sequence":"first","affiliation":[]},{"given":"Hilton","family":"Chan","sequence":"additional","affiliation":[]},{"given":"Kam-Pui","family":"Chow","sequence":"additional","affiliation":[]},{"given":"Pierre","family":"Lai","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","unstructured":"Anonymous, A technical analysis of the Green Dam Youth Escort software (docs.google.com\/View?id=afk7vnz54wt_12f8jzj9gw), 2009."},{"key":"4_CR2","unstructured":"Anonymous, Green Dam Youth Escort Testing Report (www.mei rendaddy.com\/blog\/?p=404), 2009."},{"key":"4_CR3","unstructured":"E. Bastuz, Malware Challenge 2008: Behavioral analysis of a malicious Windows executable (www.emre.de\/wiki\/index.php\/MWC 2008), 2008."},{"key":"4_CR4","unstructured":"J. Cui, X. Wang and X. Cui, Plug not pulled on Green Dam, China Daily, Beijing, China (www.chinadaily.com.cn\/china\/2009-07\/02\/content_8344967.htm), July 2, 2009."},{"key":"4_CR5","unstructured":"Dazheng, About Dazheng, Beijing, China (hncit.com\/about_us.html)."},{"key":"4_CR6","unstructured":"R. Faris, H. Roberts and S. Wang, China\u2019s Green Dam: The implications of government control encroaching on the home PC, Bulletin, OpenNet Initiative, Oxford, United Kingdom (opennet.net\/sites\/opennet.net\/files\/GreenDam_bulletin.pdf), 2009."},{"key":"4_CR7","unstructured":"Jin Hui, About Jin Hui, Zhengzhou, China (www.zzjinhui.com\/qyjj.html)."},{"key":"4_CR8","unstructured":"Ministry of Industry and Technology, MITT announcement, Beijing, China (www.miit.gov.cn\/n11293472\/n11293832\/n11293907\/n11368223\/12433840.html), June 30, 2009."},{"key":"4_CR9","unstructured":"H. Wei, J. Ohlund and B. Butterklee, Unraveling the mysteries of writing a WinSock 2 Layered Service Provider, Microsoft Systems Journal (www.microsoft.com\/msj\/0599\/LayeredService\/LayeredService.aspx), 2009."},{"key":"4_CR10","unstructured":"S. Wolchok, R. Yao and J. Halderman, Analysis of the Green Dam censorware system, Revision 2.41, Computer Science and Engineering Division, University of Michigan, Ann Arbor, Michigan (www.cse.umich.edu\/~halderm\/pub\/gd), 2009."},{"key":"4_CR11","unstructured":"S. Young, A. Lai, I. Mao, C. Mok, T. Tsang and F. Li, Dissection of Green Dam, presented to the Professional Internet Security Association, Hong Kong, 2009."}],"container-title":["IFIP Advances in Information and Communication Technology","Advances in Digital Forensics VI"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-15506-2_4.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T08:55:58Z","timestamp":1619772958000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-15506-2_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642155055","9783642155062"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-15506-2_4","relation":{},"ISSN":["1868-4238","1861-2288"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1861-2288"}],"subject":[],"published":{"date-parts":[[2010]]}}}