{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,2]],"date-time":"2026-03-02T16:02:32Z","timestamp":1772467352817,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642168055","type":"print"},{"value":"9783642168062","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-16806-2_3","type":"book-chapter","created":{"date-parts":[[2010,11,26]],"date-time":"2010-11-26T13:00:37Z","timestamp":1290776437000},"page":"29-40","source":"Crossref","is-referenced-by-count":11,"title":["Critical Information Infrastructure Protection in the Developing World"],"prefix":"10.1007","author":[{"given":"Ian","family":"Ellefsen","sequence":"first","affiliation":[]},{"given":"Sebastiaan","family":"von Solms","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","unstructured":"Akamai Technologies, State of the Internet, vol. 2(2), Cambridge, Massachusetts (www.akamai.com\/stateoftheinternet), 2009."},{"key":"3_CR2","unstructured":"Akamai Technologies, State of the Internet, vol. 2(3), Cambridge, Massachusetts (www.akamai.com\/stateoftheinternet), 2009."},{"key":"3_CR3","unstructured":"B. Askwith, WARP case study \u2013 Experience setting up a WARP, Center for the Protection of the National Infrastructure, London, United Kingdom (www.warp.gov.uk\/Index\/indexarticles.htm), 2006."},{"key":"3_CR4","unstructured":"S. Baker, S. Waterman and G. Ivanov, In the Crossfire: Critical Infrastructure in the Age of Cyber War, Technical Report, McAfee, Santa Clara, California, 2010."},{"key":"3_CR5","unstructured":"BBC News, The cyber raiders hitting Estonia, London, United Kingdom (news.bbc.co.uk\/2\/hi\/europe\/6665195.stm), May 17, 2007."},{"key":"3_CR6","unstructured":"BBC News, Estonia fines man for \u201ccyber war,\u201d London, United Kingdom (news.bbc.co.uk\/2\/hi\/technology\/7208511.stm), January 25, 2008."},{"key":"3_CR7","unstructured":"BBC News, What makes a cyber criminal? London, United Kingdom (news.bbc.co.uk\/2\/hi\/americas\/7403472.stm), May 19, 2008."},{"key":"3_CR8","unstructured":"Cisco Systems, Cisco 2009 Annual Security Report, San Jose, California (www.cisco.com\/en\/US\/prod\/collateral\/vpndevc\/cisco_2009_asr.pdf), 2009."},{"key":"3_CR9","unstructured":"R. Dacey, Critical Infrastructure Protection: Challenges and Efforts to Secure Control Systems, Testimony before the Subcommittee on Technology Information Policy, Intergovernmental Relations and the Census, House Committee on Government Reform, GAO-04-628T, General Accounting Office, Washington, DC (www.gao.gov\/new.items\/d04628t.pdf), 2004."},{"key":"3_CR10","unstructured":"D. Danchev, Coordinated Russia vs Georgia cyber attack in progress, ZDNet, San Francisco, California (blogs.zdnet.com\/security\/?p=1670), August 11, 2008."},{"key":"3_CR11","unstructured":"J. Fick, Cyber Crime in South Africa: Investigating and Prosecuting Cyber Crime and the Benefits of Public-Private Partnerships, Technical Report, PriceWaterhouseCoopers, Sunninghill, South Africa (www.coe .int\/t\/dghl\/cooperation\/economiccrime\/cybercrime\/Documents\/Reports-Presentations\/2079if09pres_JaquiFick_report.pdf), 2009."},{"key":"3_CR12","unstructured":"Georgia Tech Information Security Center, Emerging Cyber Threats Report for 2009, Georgia Institute of Technology, Atlanta, Georgia (www .gtisc.gatech.edu\/pdf\/CyberThreatsReport2009.pdf), 2008."},{"key":"3_CR13","doi-asserted-by":"crossref","unstructured":"M. Handley and E. Rescorla, Internet Denial-of-Service Considerations, RFC 4732, Internet Engineering Task Force, Fremont, California (www.ietf.org\/rfc\/rfc4732.txt), 2006.","DOI":"10.17487\/rfc4732"},{"issue":"4","key":"3_CR14","first-page":"13","volume":"4","author":"J. Harrison","year":"2008","unstructured":"J. Harrison and K. Townsend, An update on WARPs, ENISA Quarterly Review, vol. 4(4), pp. 13\u201315, 2008.","journal-title":"ENISA Quarterly Review"},{"key":"3_CR15","unstructured":"R. Heacock, Internet filtering in Sub-Saharan Africa, Technical Report, OpenNet Initiative, Harvard University, Cambridge, Massachusetts (opennet.net\/sites\/opennet.net\/files\/ONI_SSAfrica_2009.pdf), 2009."},{"key":"3_CR16","unstructured":"ICANN, Factsheet: Root server attack on 6 February 2007, Marina del Rey, California (www.icann.org\/announcements\/factsheet-dns-attack-08mar 07.pdf), 2007."},{"key":"3_CR17","unstructured":"G. Killcrece, Steps for Creating National CSIRTs, CERT Coordination Center, Carnegie Mellon University, Pittsburgh, Pennsylvania (www.cert .org\/archive\/pdf\/NationalCSIRTs.pdf), 2004."},{"key":"3_CR18","volume-title":"Survey on Certain European CSIRT Teams\u2019 Administration","author":"E. Koivunen","year":"2009","unstructured":"E. Koivunen, Survey on Certain European CSIRT Teams\u2019 Administration, Operations, Cooperation and Communications, Technical Report, CERT-FI, Helsinki, Finland, 2009."},{"key":"3_CR19","doi-asserted-by":"crossref","unstructured":"S. Korns and J. Kastenberg, Georgia\u2019s cyber left hook, Parameters, vol. XXXVIII, pp. 60\u201376, 2008.","DOI":"10.55540\/0031-1723.2455"},{"key":"3_CR20","unstructured":"J. Moteff, C. Copeland and J. Fischer, Critical Infrastructures: What Makes an Infrastructure Critical? Report for Congress RL31556, Congressional Research Service, Library of Congress, Washington, DC (www.fas .org\/irp\/crs\/RL31556.pdf), 2003."},{"key":"3_CR21","unstructured":"MTN Group, MTN reaches the 100 million subscriber milestone, Press Release, Johannesburg, South Africa (www.mtn.com\/media\/overviewdetail.aspx?pk=381), May 2009."},{"key":"3_CR22","unstructured":"J. Nazario, Estonian DDoS attacks \u2013 A summary to date, Arbor Networks, Chelmsford, Massachusetts (asert.arbornetworks.com\/2007\/05\/estonian-ddos-attacks-a-summary-to-date), May 17, 2007."},{"key":"3_CR23","unstructured":"J. Richards, Denial-of-service: The Estonian cyberwar and its implications for U.S. national security, International Affairs Review, vol. XVIII(1) (www.iar-gwu.org\/node\/65), 2009."},{"key":"3_CR24","unstructured":"S. Song, African undersea cables, Many Possibilities, Durbanville, South Africa (manypossibilities.net\/african-undersea-cables), 2010."},{"key":"3_CR25","unstructured":"South African Department of Communications, Draft Cybersecurity Policy of South Africa, Government Gazette No. 32963, Pretoria, South Africa, 2010."},{"key":"3_CR26","unstructured":"P. Vixie, G. Sneeringer and M. Schleifer, Events of 21-Oct-2002 (c.root-servers.org\/october21.txt), November 24, 2002."},{"key":"3_CR27","doi-asserted-by":"crossref","DOI":"10.21236\/ADA413778","volume-title":"Handbook for Computer Security Response Teams (CSIRTs)","author":"M. West-Brown","year":"2003","unstructured":"M. West-Brown, D. Stikvoort, K. Kossakowski, G. Killcrece, R. Ruefle and M. Zajicek, Handbook for Computer Security Response Teams (CSIRTs), Handbook CMU\/SEI-2003-HB-002, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, Pennsylvania, 2003."},{"key":"3_CR28","first-page":"253","volume-title":"Information Systems in Developing Countries: Theory and Practice","author":"P. Wolcott","year":"2005","unstructured":"P. Wolcott, The provision of Internet services in India, in Information Systems in Developing Countries: Theory and Practice, R. Davison, R. Harris, S. Qureshi, D. Vogel and G. de Vreede (Eds.), City University of Hong Kong Press, Hong Kong, China, pp. 253\u2013267, 2005."}],"container-title":["IFIP Advances in Information and Communication Technology","Critical Infrastructure Protection IV"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-16806-2_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,4]],"date-time":"2023-06-04T08:56:18Z","timestamp":1685868978000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-16806-2_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642168055","9783642168062"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-16806-2_3","relation":{},"ISSN":["1868-4238","1861-2288"],"issn-type":[{"value":"1868-4238","type":"print"},{"value":"1861-2288","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010]]}}}