{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,31]],"date-time":"2022-03-31T22:15:17Z","timestamp":1648764917149},"reference-count":9,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2011,4,1]],"date-time":"2011-04-01T00:00:00Z","timestamp":1301616000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["DuD"],"published-print":{"date-parts":[[2011,4]]},"DOI":"10.1007\/s11623-011-0063-5","type":"journal-article","created":{"date-parts":[[2011,4,5]],"date-time":"2011-04-05T17:58:35Z","timestamp":1302026315000},"page":"258-261","source":"Crossref","is-referenced-by-count":0,"title":["Unternehmens\u00fcbergreifender Austausch von sicherheitsrelevantem Wissen"],"prefix":"10.1007","volume":"35","author":[{"given":"Henk","family":"Birkholz","sequence":"first","affiliation":[]},{"given":"Carsten","family":"Elfers","sequence":"additional","affiliation":[]},{"given":"Bernd","family":"Samjeske","sequence":"additional","affiliation":[]},{"given":"Karsten","family":"Sohr","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,4,6]]},"reference":[{"issue":"2","key":"63_CR1","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/997150.997156","volume":"34","author":"Jelena Mirkovic","year":"2004","unstructured":"Mirkovic, J.; Reiher, P. (2004). A Taxonomy of DDoS Attack and DDoS Defense Mechanisms. ACM SIGCOMM Computer Communication Review.","journal-title":"ACM SIGCOMM Computer Communication Review"},{"key":"63_CR2","doi-asserted-by":"crossref","unstructured":"Lee, W.; Wang, C. & Dragon, D. (2008). Botnet Detection: Countering the Largest Security Threat.","DOI":"10.1007\/978-0-387-68768-1"},{"key":"63_CR3","unstructured":"FIDeS. http:\/\/www.fides-security.org\/"},{"key":"63_CR4","unstructured":"OWL Web Ontology Language. http:\/\/www.w3.org\/TR\/2004\/REC-owl-features-20040210\/"},{"key":"63_CR5","unstructured":"Resource Description Framework (RDF). http:\/\/www.w3.org\/RDF\/"},{"key":"63_CR6","unstructured":"Stoddard, M; Bodeau, D.; Carlson, R; et al. (2005). Process Control System Security Metrics \u2014 State of Practice."},{"key":"63_CR7","unstructured":"SPARQL Query Language for RDF. http:\/\/www.w3.org\/TR\/rdf-sparql-query\/"},{"key":"63_CR8","unstructured":"Pellet: OWL 2 Reasoner for Java. http:\/\/clarkparsia.com\/pellet"},{"key":"63_CR9","doi-asserted-by":"crossref","unstructured":"Sweeny, L. (2002). k-ANONYMITY: A Model for Protecting Privacy. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems.","DOI":"10.1142\/S0218488502001648"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-011-0063-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-011-0063-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-011-0063-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-011-0063-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,9]],"date-time":"2019-06-09T18:32:27Z","timestamp":1560105147000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-011-0063-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,4]]},"references-count":9,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2011,4]]}},"alternative-id":["63"],"URL":"https:\/\/doi.org\/10.1007\/s11623-011-0063-5","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,4]]}}}