{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T03:46:02Z","timestamp":1648784762322},"reference-count":7,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2011,4,1]],"date-time":"2011-04-01T00:00:00Z","timestamp":1301616000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["DuD"],"published-print":{"date-parts":[[2011,4]]},"DOI":"10.1007\/s11623-011-0062-6","type":"journal-article","created":{"date-parts":[[2011,4,5]],"date-time":"2011-04-05T17:58:35Z","timestamp":1302026315000},"source":"Crossref","is-referenced-by-count":0,"title":["Forschungsans\u00e4tze zur Effizienzsteigerung heutiger IT-Fr\u00fchwarnsysteme"],"prefix":"10.1007","volume":"35","author":[{"given":"Martin","family":"Brunner","sequence":"first","affiliation":[]},{"given":"Peter","family":"Schoo","sequence":"additional","affiliation":[]},{"given":"Hans","family":"Hofinger","sequence":"additional","affiliation":[]},{"given":"Christopher","family":"Roblee","sequence":"additional","affiliation":[]},{"given":"Sascha","family":"Todt","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,4,6]]},"reference":[{"key":"62_CR1","doi-asserted-by":"crossref","unstructured":"Eytan Adar. Guess: A language and interface for graph exploration. In CHI\u2019 06: Proceedings of the SIGCHI conference on Human Factors in computing systems, pages 791\u2013800, New York, NY, USA, 2006. ACM.","DOI":"10.1145\/1124772.1124889"},{"key":"62_CR2","unstructured":"Martin Brunner, Michael Epah, Hans Hofinger, Christopher Roblee, Peter Schoo, and Sascha Todt. The fraunhofer sit malware analysis laboratory \u2014 establishing a secured, honeynetbased cyber threat analysis and research environment. Technical report, Fraunhofer-Institute for Secure Information Technology SIT, 2010, http:\/\/publica.fraunhofer.de\/documents\/N-141410.html ."},{"key":"62_CR3","unstructured":"Martin Brunner, Hans Hofinger, Christopher Roblee, Peter Schoo, and Sascha Todt. Anonymity and privacy in distributed early warning systems. To appear in CRITIS 2010: Proceedings of the 5th International Conference on Critical Information Infrastructures Security, pages 82\u201393. LNCS, 2010."},{"key":"62_CR4","doi-asserted-by":"crossref","unstructured":"H. Debar, D. Curry, and B. Feinstein. The Intrusion Detection Message Exchange Format (IDMEF). RFC 4765 (Experimental), March 2007.","DOI":"10.17487\/rfc4765"},{"key":"62_CR5","doi-asserted-by":"crossref","unstructured":"Artem Dinaburg, Paul Royal, Monirul Sharif, and Wenke Lee. Ether: malware analysis via hardware virtualization extensions. In CCS\u2019 08: Proceedings of the 15th ACM conference on Computer and communications security, pages 51\u201362, New York, NY, USA, 2008. ACM.","DOI":"10.1145\/1455770.1455779"},{"key":"62_CR6","doi-asserted-by":"crossref","unstructured":"Sascha M\u00fchlbach, Martin Brunner, Christopher Roblee and Andreas Koch. Malcobox: Designing a 10 gb\/s malware collection honeypot using reconfigurable technology. In 20th International Conference on Field Programmable Logic and Applications (FPL 2010), 2010.","DOI":"10.1109\/FPL.2010.116"},{"key":"62_CR7","unstructured":"Konrad Rieck, Philipp Trinius, Carsten Willems, and Thorsten Holz. Automatic analysis of malware behavior using machine learning. Technical Report 18, Berlin Institute of Technology, 2009."}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-011-0062-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-011-0062-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-011-0062-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-011-0062-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,9]],"date-time":"2019-06-09T18:32:27Z","timestamp":1560105147000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-011-0062-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,4]]},"references-count":7,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2011,4]]}},"alternative-id":["62"],"URL":"https:\/\/doi.org\/10.1007\/s11623-011-0062-6","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,4]]},"article-number":"253"}}