{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T04:13:08Z","timestamp":1759032788769},"reference-count":9,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2014,3,30]],"date-time":"2014-03-30T00:00:00Z","timestamp":1396137600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2014,4]]},"DOI":"10.1007\/s11623-014-0101-1","type":"journal-article","created":{"date-parts":[[2014,3,29]],"date-time":"2014-03-29T21:11:27Z","timestamp":1396127487000},"page":"251-256","source":"Crossref","is-referenced-by-count":3,"title":["Cyber Attack Information Sharing"],"prefix":"10.1007","volume":"38","author":[{"given":"Florian","family":"Skopik","sequence":"first","affiliation":[]},{"given":"Roman","family":"Fiedler","sequence":"additional","affiliation":[]},{"given":"Otmar","family":"Lendl","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,3,30]]},"reference":[{"key":"101_CR1","unstructured":"IMC-AESOP (EU FP7): \n                    http:\/\/www.imc-aesop.eu\n                    \n                  , Jan 2013"},{"key":"101_CR2","unstructured":"Eric, Byres at al; How Stuxnet Spreads \u2014 A Study of Infection Paths in Best Practice Systems; Tofino Security; Abterra Technologies; SCADAHacker. com; White Paper; 22.2.2011"},{"key":"101_CR3","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/978-3-642-28920-0","volume-title":"Overview of Critical Information Infrastructure Protection","author":"J Lopez","year":"2012","unstructured":"Javier Lopez et.al, Overview of Critical Information Infrastructure Protection, LNCS 7130, Springer Verlag Berlin Heidelberg 2012, pp1\u201314"},{"key":"101_CR4","unstructured":"Commission Proposal for a Directive concerning measures to ensure a high common level of network and information security across the Union; \n                    http:\/\/ec.europa.eu\/digital-agenda\/en\/news\/commission-proposaldirective-concerning-measures-ensure-high-common-level-networkand\n                    \n                   Feb 2013"},{"key":"101_CR5","volume-title":"Intrusion Detection in Distributed Systems using Fingerprinting and Massive Event Correlation","author":"F Skopik","year":"2013","unstructured":"Skopik F., Fiedler R. (2013): Intrusion Detection in Distributed Systems using Fingerprinting and Massive Event Correlation. GI INFORMATIK 2013."},{"key":"101_CR6","unstructured":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik: BSI IT-Grundschutzkataloge \n                    https:\/\/www.bsi.bund.de\/DE\/Themen\/ITGrundschutz\/ITGrundschutzKataloge\/itgrundschutzkataloge_node.html"},{"key":"101_CR7","unstructured":"MASTERPLAN: \u00d6sterreichisches Programm zum Schutz Kritischer Infrastruktur (APCIP) \n                    https:\/\/www.onlinesicherheit.gv.at\/nationale_sicherheitsinitiativen\/schutz_strategischer_infrastrukturen\/71359.html"},{"key":"101_CR8","unstructured":"\u00d6sterreichische Strategie f\u00fcr Cyber-Sicherheit (\u00d6SCS): \n                    http:\/\/www.bka.gv.at\/DocView.axd?CobId=50748"},{"key":"101_CR9","unstructured":"Bundeskanzleramt, Digitales \u00d6sterreich: Nationale IKT-Sicherheitsstrategie \u00d6sterreich: \n                    http:\/\/www.digitales.oester-reich.gv.at\/DocView.axd?CobId=47986"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-014-0101-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-014-0101-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-014-0101-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-014-0101-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T18:22:41Z","timestamp":1559413361000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-014-0101-1"}},"subtitle":["Pilotstudie eines \u00d6sterreichischen Cyber Lagezentrums"],"short-title":[],"issued":{"date-parts":[[2014,3,30]]},"references-count":9,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2014,4]]}},"alternative-id":["101"],"URL":"https:\/\/doi.org\/10.1007\/s11623-014-0101-1","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,3,30]]}}}