{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,12]],"date-time":"2025-09-12T19:41:29Z","timestamp":1757706089926},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642311277"},{"type":"electronic","value":"9783642311284"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-31128-4_48","type":"book-chapter","created":{"date-parts":[[2012,6,18]],"date-time":"2012-06-18T09:23:33Z","timestamp":1340011413000},"page":"646-653","source":"Crossref","is-referenced-by-count":2,"title":["ShadowNet: An Active Defense Infrastructure for Insider Cyber Attack Prevention"],"prefix":"10.1007","author":[{"given":"Xiaohui","family":"Cui","sequence":"first","affiliation":[]},{"given":"Wade","family":"Gasior","sequence":"additional","affiliation":[]},{"given":"Justin","family":"Beaver","sequence":"additional","affiliation":[]},{"given":"Jim","family":"Treadwell","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"48_CR1","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/978-0-387-77322-3_5","volume":"39","author":"M.B. Salem","year":"2008","unstructured":"Salem, M.B., Hershkop, S., Stolfo, S.J.: A Survey of Insider Attack Detection Research. Advances in Information Security\u00a039, 69\u201390 (2008)","journal-title":"Advances in Information Security"},{"key":"48_CR2","unstructured":"The eighth annual CSI\/FBI 2003 report: Computer Crime and Security Survey (2003)"},{"key":"48_CR3","unstructured":"Stone, C.: Information Sharing in the Era of WikiLeaks: Balancing Security and Collaboration, Office of The Director of National Intelligence, Washington, DC (March 2011)"},{"key":"48_CR4","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/978-0-387-77322-3_1","volume":"39","author":"S. Bellovin","year":"2008","unstructured":"Bellovin, S.: The Insider Attack Problem Nature and Scope. Advances in Information Security\u00a039, 69\u201390 (2008)","journal-title":"Advances in Information Security"},{"key":"48_CR5","doi-asserted-by":"crossref","unstructured":"Braz, F.A., Fernandez, E.B., VanHilst, M.: Eliciting Security Requirements through Misuse Activities. In: Proceedings of the 2008 19th International Conference on Database and Expert Systems Application (DEXA), pp. 328\u2013333 (2008)","DOI":"10.1109\/DEXA.2008.101"},{"key":"48_CR6","unstructured":"Bellovin, S.: There Be Dragons. In: Proc. of the Third Usenix Security Symposium, Baltimore MD (September 1992)"},{"key":"48_CR7","doi-asserted-by":"crossref","unstructured":"Bellovin, S.M.: Packets Found on an Internet. Computer Communications Review\u00a023(3), 26\u201331 (July)","DOI":"10.1145\/174194.174199"},{"key":"48_CR8","unstructured":"Spitzner, L.: Honeypots: Catching the Insider Threat. In: 19th Annual Computer Security Applications Conference (ACSAC 2003), p. 170 (2003)"},{"key":"48_CR9","volume-title":"Honeypots: Tracking Hackers","author":"L. Spitzner","year":"2002","unstructured":"Spitzner, L.: Honeypots: Tracking Hackers. Addison-Wesley Longman Publishing Co., Inc., Boston (2002)"},{"key":"48_CR10","volume-title":"Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security","author":"G. Lyon","year":"2009","unstructured":"Lyon, G.: Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security. Insecure Publisher, USA (2009) ISBN 9780979958717"},{"key":"48_CR11","doi-asserted-by":"crossref","unstructured":"Sun, Y., Luo, Y., Wang, X., Wang, Z., Zhang, B., Chen, H., Li, X.: Fast Live Cloning of Virtual Machine Based on Xen. In: 2009 11th IEEE International Conference on High Performance Computing and Communications, HPCC 2009, pp. 392\u2013399 (2009)","DOI":"10.1109\/HPCC.2009.97"},{"key":"48_CR12","doi-asserted-by":"crossref","unstructured":"Barham, P., Dragovic, B., Fraser, K., Hand, S., Harris, T., Ho, A., Neugebauer, R., Pratt, I., Warfield, A.: Xen and the art of virtualization. In: Proceedings of the ACM Symposium on Operating Systems Principles (October 2003)","DOI":"10.1145\/945445.945462"},{"key":"48_CR13","unstructured":"Clark, C., Fraser, K., Hand, S., Hansen, J.G., Jul, E., Limpach, C., Pratt, I., Warfield, A.: Live migration of virtual machines. In: Proceedings of the 2nd ACM\/USENIX Symposium on Networked Systems Design and Implementation (NSDI), Boston, MA, pp. 273\u2013286 (May 2005)"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2012"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-31128-4_48.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T11:46:51Z","timestamp":1620128811000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-31128-4_48"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642311277","9783642311284"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-31128-4_48","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}