{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T21:17:32Z","timestamp":1725657452830},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540518211"},{"type":"electronic","value":"9783642751776"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1989]]},"DOI":"10.1007\/978-3-642-75177-6_43","type":"book-chapter","created":{"date-parts":[[2012,2,8]],"date-time":"2012-02-08T07:28:40Z","timestamp":1328686120000},"page":"538-551","source":"Crossref","is-referenced-by-count":0,"title":["Computer-W\u00fcrmer, eine Bedrohung f\u00fcr vernetzte Systeme - Ans\u00e4tze zur Erkennung und Abwehr -"],"prefix":"10.1007","author":[{"given":"Gerhard","family":"Hoffmann","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"43_CR1","unstructured":"BG88] Beutelspacher, Gundlach, M\u00fcller Siemens AG, M\u00fcnchen: \u201cSichere PCs und ihre Rolle in B\u00fcrokommunikationssystemen\u201d Tagungsband GI\/ITG-Workshop 88: Offene Mulitfunktionale Arbeitspl\u00e4tze"},{"key":"43_CR2","volume-title":"The Shockwave Rider","author":"J Brunner","year":"1975","unstructured":"Brunner, John: \u201cThe Shockwave Rider\u201d Ballantine, New York, 1975"},{"key":"43_CR3","volume-title":"University of Southern California: Computer Viruses \u2014 Theory and Experiments","author":"F Cohen","year":"1984","unstructured":"Cohen, Fred, University of Southern California: \u201cComputer Viruses \u2014 Theory and Experiments\u201d Proceedings of the 7th National Computer Security Conference, 1984"},{"key":"43_CR4","unstructured":"Datenschutz-Berater: \u201cSchneeballprogramm in Kommunikationsnetzen \u2014 Exemplarischer Benutzerleichtsinn\u201d Datenschutz-Berater 1\/88"},{"key":"43_CR5","volume-title":"Trusted Computer System Evaluation Criteria","author":"Department of Defense, National Computer Security Center","year":"1985","unstructured":"Department of Defense, National Computer Security Center: \u201cTrusted Computer System Evaluation Criteria\u201d DOD 5200.28-STD, 1985"},{"key":"43_CR6","volume-title":"National Computer Security Center: Trusted Network Interpretation of the Trusted Computer System Evaluation Criteria NCSC-TG-005","author":"Department of Defense","year":"1987","unstructured":"Department of Defense, National Computer Security Center: \u201cTrusted Network Interpretation of the Trusted Computer System Evaluation Criteria\u201d NCSC-TG-005, Juli 1987"},{"key":"43_CR7","unstructured":"Gundlach, Hoffmann, Ledere, Siemens AG, M\u00fcnchen: \u201cVertrauensw\u00fcrdige Netze \u2014 die Trusted Network Interpretation\u201d Datenschutz und Datensicherheit, 07\/88"},{"key":"43_CR8","unstructured":"Hoffmann, G. Siemens AG, M\u00fcnchen: \u201cWurm im INTERNET, Eine Analyse des im November 1988 aufgetretenen selbstreproduzierenden Wurm-Programmes\u201d Datenschutz und Datensicherheit, 02\/89"},{"key":"43_CR9","doi-asserted-by":"crossref","unstructured":"Shoch, John F. and Hupp, Jon A., Xerox Palo Alto Research Center: \u201cThe \u2018Worm\u2019 Programs \u2014 Early Experience with a Distributed Computation\u201d Communications of the ACM, Volume 25, Number 3, 1982","DOI":"10.1145\/358453.358455"},{"key":"43_CR10","volume-title":"Bundesanzeiger, ISBN 3-88784-192-1","author":"Zentralstelle f\u00fcr Sicherheit in der Informationstechnik ZSI","year":"1989","unstructured":"Zentralstelle f\u00fcr Sicherheit in der Informationstechnik ZSI: \u201cIT-Sicherheitskriterien \u2014 Kriterien f\u00fcr die Bewertung der Sicherheit von Systemen der Informationstechnik (IT)\u201d Bundesanzeiger, ISBN 3-88784-192-1, 1989"}],"container-title":["Informatik-Fachberichte","GI \u2014 19. Jahrestagung I"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-75177-6_43.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,25]],"date-time":"2020-11-25T02:36:05Z","timestamp":1606271765000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-75177-6_43"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1989]]},"ISBN":["9783540518211","9783642751776"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-75177-6_43","relation":{},"ISSN":["0343-3005"],"issn-type":[{"type":"print","value":"0343-3005"}],"subject":[],"published":{"date-parts":[[1989]]}}}