{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T11:52:13Z","timestamp":1743076333955,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":12,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811366208"},{"type":"electronic","value":"9789811366215"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-981-13-6621-5_12","type":"book-chapter","created":{"date-parts":[[2019,2,19]],"date-time":"2019-02-19T13:04:38Z","timestamp":1550581478000},"page":"145-152","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Security Against Network Attacks on Web Application System"],"prefix":"10.1007","author":[{"given":"Yashu","family":"Liu","sequence":"first","affiliation":[]},{"given":"Zhihai","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Shu","family":"Tian","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,2,20]]},"reference":[{"key":"12_CR1","unstructured":"Cryptojacking news. \n                    http:\/\/www.sohu.com\/a\/219580006_609556\n                    \n                  . Accessed 29 Jan 2018"},{"key":"12_CR2","unstructured":"2018 global risk report. \n                    http:\/\/www.sohu.com\/a\/218458499_781333\n                    \n                  . Accessed 23 Jan 2018"},{"key":"12_CR3","unstructured":"Webgoat. \n                    https:\/\/sourceforge.net\/projects\/metasploitable\n                    \n                  . Accessed 22 Jan 2018"},{"key":"12_CR4","unstructured":"Damn Vulnerable Web App (DVWA). \n                    http:\/\/www.dvwa.co.uk\n                    \n                  . Accessed 25 Jan 2018"},{"key":"12_CR5","unstructured":"Metasploitable. \n                    https:\/\/www.owasp.org\/index.php\/Category:OWASP_WebGoat_Project\n                    \n                  . Accessed 1 Aug 2018"},{"key":"12_CR6","first-page":"87","volume":"3","author":"C Kang","year":"2013","unstructured":"Kang, C., Zhu, Z.: Network attack and defense experimental platform based on cloud computing technology. J. Xi\u2019an Univ. Posts Telecommun. 3, 87\u201388 (2013)","journal-title":"J. Xi\u2019an Univ. Posts Telecommun."},{"key":"12_CR7","unstructured":"Zhang, L., Zhou, H.: Design of network security attack and defense experimental platform based on cloud computing technology. In: Software Guide, vol. 9, pp. 188\u2013191 (2015)"},{"key":"12_CR8","first-page":"73","volume":"5","author":"X Huang","year":"2017","unstructured":"Huang, X.: Development and implementation of network attack and defense experimental platform. Exp. Technol. Manag. 5, 73\u201376 (2017)","journal-title":"Exp. Technol. Manag."},{"key":"12_CR9","first-page":"88","volume":"8","author":"Y Liu","year":"2017","unstructured":"Liu, Y.: Brief discussion of the deployment and design of field exercises on Internet security. Cyberspace Secur. 8, 88\u201390 (2017)","journal-title":"Cyberspace Secur."},{"key":"12_CR10","first-page":"170","volume":"10","author":"J Huang","year":"2016","unstructured":"Huang, J., Zhang, H., Pei, J.: Design of virtual simulation experimental teaching system for network security. Res. Explor. Lab. 10, 170\u2013174 (2016)","journal-title":"Res. Explor. Lab."},{"key":"12_CR11","first-page":"75","volume":"22","author":"L Ma","year":"2017","unstructured":"Ma, L.: Design and implementation of network security attack and defense training platform. Wirel. Internet Technol. 22, 75\u201377 (2017)","journal-title":"Wirel. Internet Technol."},{"key":"12_CR12","first-page":"86","volume":"3","author":"J Ye","year":"2016","unstructured":"Ye, J., Zhang, P., Gao, Y.: Design and construction of a network attack and defense combat training platform based on Openstack. Exp. Technol. Manag. 3, 86\u201389 (2016)","journal-title":"Exp. Technol. Manag."}],"container-title":["Communications in Computer and Information Science","Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-13-6621-5_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T00:00:06Z","timestamp":1558396806000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-13-6621-5_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9789811366208","9789811366215"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-981-13-6621-5_12","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"20 February 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CNCERT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China Cyber Security Annual Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Beijing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 August 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 August 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cncert2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/conf.cert.org.cn\/English","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}