{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,8]],"date-time":"2025-05-08T15:02:59Z","timestamp":1746716579508},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642290466"},{"type":"electronic","value":"9783642290473"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-29047-3_5","type":"book-chapter","created":{"date-parts":[[2012,3,20]],"date-time":"2012-03-20T03:05:59Z","timestamp":1332212759000},"page":"35-42","source":"Crossref","is-referenced-by-count":4,"title":["Crowdsourced Cyber Defense: Lessons from a Large-Scale, Game-Based Approach to Threat Identification on a Live Network"],"prefix":"10.1007","author":[{"given":"Barton","family":"Paulhamus","sequence":"first","affiliation":[]},{"given":"Alison","family":"Ebaugh","sequence":"additional","affiliation":[]},{"given":"C. C.","family":"Boylls","sequence":"additional","affiliation":[]},{"given":"Nathan","family":"Bos","sequence":"additional","affiliation":[]},{"given":"Sandy","family":"Hider","sequence":"additional","affiliation":[]},{"given":"Stephen","family":"Giguere","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"volume-title":"Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities","year":"2009","key":"5_CR1","unstructured":"Owens, W.A., Dam, K.W., Lin, H.S. (eds.): Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities. The National Academies Press, Washington, D.C (2009)"},{"key":"5_CR2","unstructured":"Clayton, M.: How pro-WikiLeaks hackers wage cyberwar without hijacking your computer, \n                  \n                    http:\/\/www.csmonitor.com\/USA\/2010\/1209\/How-pro-WikiLeaks-hackers-wage-cyberwar-without-hijacking-your-computer"},{"key":"5_CR3","unstructured":"Military and security developments involving the People\u2019s Republic of China, Office of the Secretary of Defense Annual Report to Congress (2010)"},{"key":"5_CR4","doi-asserted-by":"publisher","first-page":"698","DOI":"10.1126\/science.331.6018.698","volume":"331","author":"J. Carpenter","year":"2011","unstructured":"Carpenter, J.: May the best analyst win. Science\u00a0331, 698\u2013699 (2011)","journal-title":"Science"},{"key":"5_CR5","volume-title":"The Wisdom of Crowds: Why the Many Are Smarter than the Few and How Collective Wisdom Shapes Business, Economies, Societies, and Nations","author":"J. Surowiecki","year":"2004","unstructured":"Surowiecki, J.: The Wisdom of Crowds: Why the Many Are Smarter than the Few and How Collective Wisdom Shapes Business, Economies, Societies, and Nations. Doubleday Books, New York (2004)"},{"key":"5_CR6","unstructured":"Honeynet Project, Know Your Enemy: Fast-Flux Service Networks, \n                  \n                    http:\/\/www.honeynet.org\/papers\/ff\/"},{"key":"5_CR7","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1109\/MC.2006.196","volume":"39","author":"L. Ahn von","year":"2006","unstructured":"von Ahn, L.: Games with a purpose. Computer\u00a039, 92\u201394 (2006)","journal-title":"Computer"},{"key":"5_CR8","unstructured":"Khatib, F., Cooper, S., Tyka, M.D., Xu, K., Makedon, I., Popovic, Z., Baker, D., Players, F.: Algorithm discovery by protein folding game players. PNAS (2011), \n                  \n                    http:\/\/www.pnas.org\/content\/early\/2011\/11\/02\/1115898108"},{"key":"5_CR9","unstructured":"Fink, E., Sharifi, M., Carbonell, J.G.: Application of machine learning and crowdsourcing to detection of cybersecurity threats, white paper. Carnegie-Mellon University (2011), \n                  \n                    http:\/\/www.cs.cmu.edu\/afs\/.cs.cmu.edu\/Web\/People\/eugene\/research\/full\/ml-detection.pdf"},{"key":"5_CR10","first-page":"16","volume":"148","author":"D. Hollis","year":"2011","unstructured":"Hollis, D., Hollis, K.: Cyber defense: U.S. cybersecurity must-do\u2019s. Armed Forces J.\u00a0148, 16\u201319 (2011)","journal-title":"Armed Forces J."},{"key":"5_CR11","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1023\/A:1022041805438","volume":"5","author":"K.Y. Chen","year":"2003","unstructured":"Chen, K.Y., Fine, L.R., Huberman, B.A.: Predicting the future. Inform. Sys. Frontiers\u00a05, 47\u201361 (2003)","journal-title":"Inform. Sys. Frontiers"}],"container-title":["Lecture Notes in Computer Science","Social Computing, Behavioral - Cultural Modeling and Prediction"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-29047-3_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T00:53:13Z","timestamp":1558313593000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-29047-3_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642290466","9783642290473"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-29047-3_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}