{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T11:23:29Z","timestamp":1725621809909},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642248634"},{"type":"electronic","value":"9783642248641"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-24864-1_2","type":"book-chapter","created":{"date-parts":[[2011,10,17]],"date-time":"2011-10-17T12:34:47Z","timestamp":1318854887000},"page":"19-28","source":"Crossref","is-referenced-by-count":0,"title":["Botnets as an Instrument of Warfare"],"prefix":"10.1007","author":[{"given":"Eric","family":"Koziel","sequence":"first","affiliation":[]},{"given":"David","family":"Robinson","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1109\/CATCH.2009.40","volume-title":"Proceedings of the Cybersecurity Applications and Technology Conference for Homeland Security","author":"M. Bailey","year":"2009","unstructured":"M. Bailey, E. Cooke, F. Jahanian, Y. Xu and M. Karir, A survey of botnet technology and defenses, Proceedings of the Cybersecurity Applications and Technology Conference for Homeland Security, pp. 299\u2013304, 2009."},{"key":"2_CR2","unstructured":"L. Brooks, Botnets: A Threat to National Security, M.S. Thesis, Department of Computer Science, Florida State University, Tallahassee, Florida, 2008."},{"key":"2_CR3","volume-title":"Proceedings of the Sixth Annual Security Conference","author":"A. Cole","year":"2007","unstructured":"A. Cole, M. Mellor and D. Noyes, Botnets: The rise of the machines, Proceedings of the Sixth Annual Security Conference, 2007."},{"key":"2_CR4","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1109\/SECURWARE.2009.48","volume-title":"Proceedings of the Third International Conference on Emerging Security Information, Systems and Technologies","author":"M. Feily","year":"2009","unstructured":"M. Feily, A. Shahrestani and S. Ramadass, A survey of botnet and botnet detection, Proceedings of the Third International Conference on Emerging Security Information, Systems and Technologies, pp. 268\u2013273, 2009."},{"key":"2_CR5","unstructured":"International Committee of the Red Cross, Protocol Additional to the Geneva Conventions of 12 August 1949, and relating to the Protection of Victims of International Armed Conflicts (Protocol I), International Humanitarian Law \u2013 Treaties and Documents, Geneva, Switzerland (www.icrc.org\/ihl.nsf\/full\/470?opendocument), June 8, 1977."},{"key":"2_CR6","unstructured":"D. Kaplan, Coreflood-style takedowns may lead to trouble, SC Magazine, April 15, 2011."},{"key":"2_CR7","doi-asserted-by":"publisher","first-page":"917","DOI":"10.1109\/ARES.2009.65","volume-title":"Proceedings of the Fourth International Conference on Availability, Reliability and Security","author":"J. Leonard","year":"2009","unstructured":"J. Leonard, S. Xu and R. Sandhu, A framework for understanding botnets, Proceedings of the Fourth International Conference on Availability, Reliability and Security, pp. 917\u2013922, 2009."},{"issue":"5","key":"2_CR8","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1109\/MITP.2009.109","volume":"11","author":"S. Liu","year":"2009","unstructured":"S. Liu, Surviving distributed denial-of-service attacks, IT Professional, vol. 11(5), pp. 51\u201353, 2009.","journal-title":"IT Professional"},{"key":"2_CR9","unstructured":"E. Mills, Microsoft legal punch may change botnet battles forever, CNET News (news.cnet.com\/8301-27080_3-20015912-245.html), September 9, 2010."},{"key":"2_CR10","unstructured":"Pew Research Center for the People and the Press, More young people cite Internet than TV \u2013 Internet gains on television as public\u2019s main news source, Washington, DC (people-press.org\/reports\/pdf\/689.pdf), January 4, 2011."},{"key":"2_CR11","unstructured":"B. Prince, Botnet for sale business going strong, security researchers say, eWeek.com (www.eweek.com\/c\/a\/Security\/BotnetBotnet-for-Sale-Bu siness-Going-Strong-Security-Researchers-Say848696), October 25, 2010."},{"key":"2_CR12","unstructured":"C. Smith, Egypt\u2019s Facebook revolution: Wael Ghonim thanks the social network, Huffington Post, February 11, 2011."},{"key":"2_CR13","first-page":"635","volume-title":"Proceedings of the Sixteenth ACM Conference on Computer and Communications Security","author":"B. Stone-Gross","year":"2009","unstructured":"B. Stone-Gross, M. Cova, L. Cavallaro, B. Gilbert, M. Szydlowski, R. Kemmerer, C. Kruegel and G. Vigna, Your botnet is my botnet: Analysis of a botnet takeover, Proceedings of the Sixteenth ACM Conference on Computer and Communications Security, pp. 635\u2013647, 2009."},{"key":"2_CR14","volume-title":"Proceedings of the Eighteenth International Conference on Computer Communications and Networks","author":"P. Wang","year":"2009","unstructured":"P. Wang, L. Wu, B. Aslam and C. Zou, A systematic study of peer-to-peer botnets, Proceedings of the Eighteenth International Conference on Computer Communications and Networks, 2009."},{"key":"2_CR15","unstructured":"C. Wilson, Botnets, Cybercrime and Cyberterrorism: Vulnerabilities and Policy Issues for Congress, CRS Report for Congress, RL32114, Congressional Research Service, Washington, DC, 2008."}],"container-title":["IFIP Advances in Information and Communication Technology","Critical Infrastructure Protection V"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-24864-1_2.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T07:40:38Z","timestamp":1620027638000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-24864-1_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642248634","9783642248641"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-24864-1_2","relation":{},"ISSN":["1868-4238","1861-2288"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1861-2288"}],"subject":[],"published":{"date-parts":[[2011]]}}}