{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T10:38:12Z","timestamp":1764931092679,"version":"3.46.0"},"reference-count":14,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2025,11]]},"DOI":"10.1007\/s11623-025-2173-5","type":"journal-article","created":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T10:35:27Z","timestamp":1764930927000},"page":"731-736","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Attribution im IT-Grundschutz des BSI"],"prefix":"10.1007","volume":"49","author":[{"given":"Michael","family":"Pilgermann","sequence":"first","affiliation":[]},{"given":"Claus","family":"Vielhauer","sequence":"additional","affiliation":[]},{"given":"Denis","family":"Petrov","sequence":"additional","affiliation":[]},{"given":"Jana","family":"Dittmann","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Kr\u00e4tzer","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,12,5]]},"reference":[{"key":"2173_CR1","series-title":"Proceedings of the 19 th International Conference on Availability, Reliability and Security","first-page":"1","volume-title":"A Comprehensive Pattern-based Overview of Stegomalware","author":"F Strachanski","year":"2024","unstructured":"F. Strachanski, D. Petrov, T. Schmidbauer, S. Wendzel, \u201eA Comprehensive Pattern-based Overview of Stegomalware\u201c, in Proceedings of the 19\n        th\n         International Conference on Availability, Reliability and Security, Vienna: ACM, Juli 2024, S. 1\u201310."},{"key":"2173_CR2","unstructured":"J. Dittmann u.\u00a0a., \u201eAttribution von verdeckten (Informations-)Kan\u00e4len im Bereich kritischer Infrastrukturen und Potentiale f\u00fcr Pr\u00e4vention und Reaktion (ATTRIBUT)\u201c, 2024."},{"key":"2173_CR3","series-title":"Proceedings of the 2024 ACM Workshop on Information Hiding and Multimedia Security","first-page":"101","volume-title":"Forensic Trace Analysis for MP3 based Stego-Malware: Exemplary Study for Stego-Algorithm and Capacity Attribution to derive YARA Rules for Malware Identification","author":"J Dittmann","year":"2024","unstructured":"J. Dittmann, C. Kraetzer, J. Alemann, B. Birnbaum, \u201eForensic Trace Analysis for MP3 based Stego-Malware: Exemplary Study for Stego-Algorithm and Capacity Attribution to derive YARA Rules for Malware Identification\u201c, in Proceedings of the 2024 ACM Workshop on Information Hiding and Multimedia Security, Baiona: ACM, Juni 2024, S. 101\u2013112."},{"key":"2173_CR4","series-title":"Proceedings of the ACM Workshop on Information Hiding and Multimedia Security","first-page":"46","volume-title":"Traces Left by the Originator: Forensic Fingerprinting Hidden Malware in Images to Enable Attribution on the Example of SteganoAmor","author":"J Dittmann","year":"2025","unstructured":"J. Dittmann, S. Kiltz, R. Altschaffel, J. Antal, \u201eTraces Left by the Originator: Forensic Fingerprinting Hidden Malware in Images to Enable Attribution on the Example of SteganoAmor\u201c, in Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, San Jose: ACM, Juni 2025, S. 46\u201351."},{"key":"2173_CR5","series-title":"Proceedings of the 16th International Conference on Availability, Reliability and Security","first-page":"1","volume-title":"A Revised Taxonomy of Steganography Embedding Patterns","author":"S Wendzel","year":"2021","unstructured":"S. Wendzel u.\u00a0a., \u201eA Revised Taxonomy of Steganography Embedding Patterns\u201c, in Proceedings of the 16th International Conference on Availability, Reliability and Security, Vienna: ACM, Aug. 2021, S. 1\u201312."},{"key":"2173_CR6","series-title":"Proceedings of the ACM Workshop on Information Hiding and Multimedia Security","first-page":"52","volume-title":"Towards Modeling Hidden & Steganographic Malware Communication based on Images","author":"C Vielhauer","year":"2025","unstructured":"C. Vielhauer, F. Loewe, M. Pilgermann, \u201eTowards Modeling Hidden & Steganographic Malware Communication based on Images\u201c, in Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, San Jose: ACM, Juni 2025, S. 52\u201363."},{"issue":"7","key":"2173_CR7","doi-asserted-by":"publisher","first-page":"410","DOI":"10.1007\/s11623-023-1788-7","volume":"47","author":"R Frankenstein","year":"2023","unstructured":"R. Frankenstein, \u201eBSI IT-Grundschutz \u2013 Arbeitswerkzeug f\u00fcr ganzheitliche Informationssicherheit\u201c, Datenschutz und Datensicherheit, Bd.\u00a047, Nr.\u00a07\/2023, S. 410\u2013415.","journal-title":"Datenschutz und Datensicherheit"},{"key":"2173_CR8","unstructured":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik, \u201eBSI-Standard 200-1: Managementsysteme f\u00fcr Informationssicherheit (ISMS)\u201c. 15.11.2017."},{"key":"2173_CR9","unstructured":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik, \u201eBSI-Standard 200-2 IT-Grundschutz-Methodik\u201c. 15.11.2017."},{"key":"2173_CR10","unstructured":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik, \u201eBSI-Standard 200-3 Risikomanagement\u201c. 15.11.2017."},{"key":"2173_CR11","volume-title":"IT-Grundschutz-Kompendium","year":"2023","unstructured":"Deutschland, Hrsg., IT-Grundschutz-Kompendium, 6.\u00a0Edition. K\u00f6ln: Reguvis, 2023.","edition":"6"},{"key":"2173_CR12","unstructured":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik, \u201eDER.1 Detektion von sicherheitsrelevanten Ereignissen (IT-Grundschutz-Baustein)\u201c. Edition 2023."},{"key":"2173_CR13","unstructured":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik, \u201eDER.2.2 Vorsorge f\u00fcr die IT- Forensik\u201c. Edition 2023."},{"key":"2173_CR14","doi-asserted-by":"crossref","unstructured":"D. Petrov, P. Ruffing, S. Zillien, S. Wendzel, \u201eDomainator: Detecting and Identifying DNS-Tunneling Malware Using Metadata Sequences\u201c, 2025, arXiv.","DOI":"10.1007\/978-3-032-00624-0_6"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-025-2173-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11623-025-2173-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-025-2173-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T10:35:30Z","timestamp":1764930930000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11623-025-2173-5"}},"subtitle":["Ausweitung der Detektion von Cyberangriffen im IT-Sicherheitsprozess"],"short-title":[],"issued":{"date-parts":[[2025,11]]},"references-count":14,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2025,11]]}},"alternative-id":["2173"],"URL":"https:\/\/doi.org\/10.1007\/s11623-025-2173-5","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11]]},"assertion":[{"value":"5 December 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}