{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T12:37:10Z","timestamp":1743079030118,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642333316"},{"type":"electronic","value":"9783642333323"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33332-3_21","type":"book-chapter","created":{"date-parts":[[2012,9,21]],"date-time":"2012-09-21T06:43:55Z","timestamp":1348209835000},"page":"226-236","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Mapping the Most Significant Computer Hacking Events to a Temporal Computer Attack Model"],"prefix":"10.1007","author":[{"given":"Renier","family":"van Heerden","sequence":"first","affiliation":[]},{"given":"Heloise","family":"Pieterse","sequence":"additional","affiliation":[]},{"given":"Barry","family":"Irwin","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"21_CR1","unstructured":"Heater, B.: Male: A Brief Timeline (2011), \n                      http:\/\/www.pcmag.com\/slideshow\/story\/261678\/malware-a-brief-timeline\/"},{"key":"21_CR2","unstructured":"Hall, K.: The 7 worstcyberattacks in history (that we know about) (2012), \n                      http:\/\/dvice.com\/archives\/2010\/09\/7-of-the-most-d.php"},{"key":"21_CR3","unstructured":"Julian: 10 Most Costly Cyber Attacks in History (2011), \n                      http:\/\/www.businesspundit.com\/10-most-costly-cyber-attacks-in-history\/"},{"key":"21_CR4","unstructured":"van Heerden, R.P., Irwin, B., Burke, I.D.: Classifying Network Attack Scenarios using an Ontology. In: Proceedings of the 7th International Conference on Information Warfare and Security, pp. 331\u2013324 (2012)"},{"key":"21_CR5","unstructured":"Desai, P.: Towards an undetectable computer virus. Master\u2019s thesis, San Jose State University (2008), \n                      http:\/\/www.cs.sjsu.edu\/faculty\/stamp\/students\/Desai_Priti.pdf"},{"issue":"4","key":"21_CR6","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/45.969588","volume":"20","author":"S.R. Subramanya","year":"2001","unstructured":"Subramanya, S.R., Lakshminarasimhan, N.: Computer viruses. IEEE Potential\u00a020(4), 16\u201319 (2001)","journal-title":"IEEE Potential"},{"key":"21_CR7","unstructured":"Bl\u00fcmler, P.: I-LOVE-YOU: Viruses. Trojan Horses and Worms, \n                      http:\/\/www.econmr.org\/datapool\/page\/30\/virus.pdf"},{"issue":"5","key":"21_CR8","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1109\/MSECP.2003.1236233","volume":"1","author":"H. Orman","year":"2003","unstructured":"Orman, H.: The Morris worm: a fifteen-year perspective. IEEE Security & Privacy\u00a01(5), 35\u201343 (2003)","journal-title":"IEEE Security & Privacy"},{"issue":"6","key":"21_CR9","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1109\/MC.2004.36","volume":"37","author":"T.M. Chen","year":"2004","unstructured":"Chen, T.M., Robert, J.M.: Worm epidemics in high-speed networks. Computer\u00a037(6), 48\u201353 (2004)","journal-title":"Computer"},{"issue":"11","key":"21_CR10","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/6.963235","volume":"38","author":"S. Cass","year":"2004","unstructured":"Cass, S.: Anatomy of malice (computer viruses). IEEE Spectrum\u00a038(11), 56\u201360 (2004)","journal-title":"IEEE Spectrum"},{"key":"21_CR11","volume-title":"Computer security handbook","author":"S. Bosworth","year":"2002","unstructured":"Bosworth, S., Kabay, M.E.: Computer security handbook. John Wiley & Sons Inc., New York (2002)"},{"key":"21_CR12","unstructured":"Bishop, M.: Analysis of the I LOVE YOU Worm (2000), \n                      http:\/\/nob.cs.ucdavis.edu\/classes\/ecs155-2005-04\/handouts\/iloveyou.pdf"},{"key":"21_CR13","doi-asserted-by":"crossref","unstructured":"Moore, D., Shannon, C.: Code-Red: a case study on the spread and victims of an Internet worm. In: Proceedings of the 2nd ACMSIGCOMM Workshop on Internet Measurement, pp. 273\u2013284. ACM (2002)","DOI":"10.1145\/637201.637244"},{"key":"21_CR14","doi-asserted-by":"crossref","unstructured":"Zou, C.C., Gong, W., Towsley, D.: Code red worm propagation modeling and analysis. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 138\u2013147. ACM (2002)","DOI":"10.1145\/586110.586130"},{"key":"21_CR15","unstructured":"Sarwar, U., Ramadass, S., Budiarto, R.: Dawn Of The Mobile Malware: Reviewing Mobile Worms. In: Proceedings of the 4th International Conference on Sciences of Electronic, Technologies of Information and Telecommunications (SETIT 2007), pp. 35\u201339 (2007)"},{"issue":"1","key":"21_CR16","doi-asserted-by":"publisher","first-page":"24","DOI":"10.4018\/ijcwt.2011010103","volume":"1","author":"C. Czosseck","year":"2011","unstructured":"Czosseck, C., Ottis, R., Taliharm, A.M.: Estonia after the 2007 Cyber Attacks: Legal, Strategic and Organisational Changes in Cyber Security. International Journal of Cyber Warfare and Terrorism (IJCWT)\u00a01(1), 24\u201334 (2011)","journal-title":"International Journal of Cyber Warfare and Terrorism (IJCWT)"},{"key":"21_CR17","unstructured":"Davis, J.: Hackers Take Down the Most Wired Country in Europe. Wired Magazine\u00a09(15) (2007)"},{"issue":"11","key":"21_CR18","first-page":"99","volume":"11","author":"V. Sharma","year":"2011","unstructured":"Sharma, V.: An Analytical Survey of Recent Worm Attacks. IJCSNS\u00a011(11), 99\u2013103 (2011)","journal-title":"IJCSNS"},{"key":"21_CR19","unstructured":"Falliere, N., Murchu, L.O., Chien, E.: W32.stuxnet dossier: version 1.4, White paper, Symantec Corp. Security Response (2011), \n                      http:\/\/www.wired.com\/images_blogs\/threatlevel\/2011\/02\/Symantec-Stuxnet-Update-Feb-2011.pdf"},{"issue":"2","key":"21_CR20","first-page":"4","volume":"7","author":"F. Bradley","year":"2003","unstructured":"Bradley, F.: Critical infrastructure protection. Electric Energy T and D\u00a07(2), 4\u20136 (2003)","journal-title":"Electric Energy T and D"},{"key":"21_CR21","unstructured":"Tsang, S.: Cyberthreats, Vulnerabilities and Attacks on SCADA Networks (2009), \n                      http:\/\/gspp.berkeley.edu\/iths\/TsangSCADA20Attacks.pdf"}],"container-title":["IFIP Advances in Information and Communication Technology","ICT Critical Infrastructures and Society"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33332-3_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,11]],"date-time":"2021-05-11T05:21:56Z","timestamp":1620710516000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-33332-3_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642333316","9783642333323"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33332-3_21","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2012]]},"assertion":[{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}