{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,29]],"date-time":"2022-03-29T22:45:47Z","timestamp":1648593947515},"reference-count":9,"publisher":"Springer Science and Business Media LLC","issue":"1-2","license":[{"start":{"date-parts":[[2005,10,29]],"date-time":"2005-10-29T00:00:00Z","timestamp":1130544000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Comput Virol"],"published-print":{"date-parts":[[2005,11]]},"DOI":"10.1007\/s11416-005-0006-5","type":"journal-article","created":{"date-parts":[[2005,10,28]],"date-time":"2005-10-28T07:33:40Z","timestamp":1130484820000},"page":"24-31","source":"Crossref","is-referenced-by-count":2,"title":["Introduction to Network Self-defense: technical and judicial issues"],"prefix":"10.1007","volume":"1","author":[{"given":"David","family":"B\u00e9nichou","sequence":"first","affiliation":[]},{"given":"Serge","family":"Lefranc","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,10,29]]},"reference":[{"key":"6_CR1","unstructured":"Aggressive Network Self-Defense (2005) Syngress Publishing"},{"key":"6_CR2","unstructured":"Dressler J. (1995). Understanding criminal law, 18.02, In: Garland N (ed.) 2nd ed. Fontana, London, pp. 199\u2013200"},{"key":"6_CR3","unstructured":"M\u00e9thode, INRA \u00e9ds. Paris 1997. Comment l\u2019ordinateur transforme les sciences, les cahiers de Science et Vie, num\u00e9ro 53, Octobre 1999"},{"key":"6_CR4","unstructured":"Information Operations, Lieutenant Colonel Jordan, US Marine Corps, Active defense (source: scholar.google.com), pp. 50\u201357"},{"key":"6_CR5","unstructured":"Karnow CEA. (2004\u20132005). Launch on warning: aggressive defense of computer systems, Yale J law Technol 7:87"},{"key":"6_CR6","unstructured":"Model Penal Code 3.04(2)(b)(ii)"},{"key":"6_CR7","unstructured":"NMAP software: www.insecure.org 2005"},{"key":"6_CR8","unstructured":"www.legifrance.gouv.fr translasted with the participation of John Rason SPENCER, Professor of Law, University of Cambridge, Fellow at Selwyn College, UK"},{"key":"6_CR9","unstructured":"Ossir mailing list, www.ossir.org, 2005"}],"container-title":["Journal in Computer Virology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-005-0006-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11416-005-0006-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-005-0006-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T10:45:40Z","timestamp":1559385940000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11416-005-0006-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,10,29]]},"references-count":9,"journal-issue":{"issue":"1-2","published-print":{"date-parts":[[2005,11]]}},"alternative-id":["6"],"URL":"https:\/\/doi.org\/10.1007\/s11416-005-0006-5","relation":{},"ISSN":["1772-9890","1772-9904"],"issn-type":[{"value":"1772-9890","type":"print"},{"value":"1772-9904","type":"electronic"}],"subject":[],"published":{"date-parts":[[2005,10,29]]}}}