{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T17:20:21Z","timestamp":1729617621135,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1109\/glocomw.2013.6825037","type":"proceedings-article","created":{"date-parts":[[2014,6,16]],"date-time":"2014-06-16T21:53:24Z","timestamp":1402955604000},"page":"500-505","source":"Crossref","is-referenced-by-count":5,"title":["Security testing in the cloud by means of ethical worm"],"prefix":"10.1109","author":[{"given":"Elhadj","family":"Benkhelifa","sequence":"first","affiliation":[]},{"given":"Thomas","family":"Welsh","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/1029618.1029631"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/IUCS.2010.5666772"},{"journal-title":"NMap","year":"2013","author":"lyon","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/CIT.2012.227"},{"key":"12","first-page":"219","article-title":"Secure logging-as-A-service for cloud forensics","author":"zawoad","year":"2013","journal-title":"Proceedings Ofthe 8th ACM SIGSAC Symposium on Information Computer and Communications Security"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2007.159"},{"key":"2","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1109\/MSECP.2003.1176998","article-title":"What is computer security?","volume":"1","author":"bishop","year":"2003","journal-title":"Security Privacy IEEE"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2012.91"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/1968587.1968601"},{"journal-title":"Friendly Welchia Worm Wreaking Havoc","year":"2003","author":"naraine","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/IWAST.2012.6228986"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/ICCEET.2012.6203873"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1029618.1029631"},{"key":"9","first-page":"149","article-title":"How to own the internet in your spare time","author":"staniford","year":"2002","journal-title":"Proceedings of the 11th USENIX Security Symposium"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2012.6459946"}],"event":{"name":"2013 IEEE Globecom Workshops (GC Wkshps)","start":{"date-parts":[[2013,12,9]]},"location":"Atlanta, GA","end":{"date-parts":[[2013,12,13]]}},"container-title":["2013 IEEE Globecom Workshops (GC Wkshps)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6820092\/6824917\/06825037.pdf?arnumber=6825037","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T10:59:20Z","timestamp":1498129160000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6825037\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/glocomw.2013.6825037","relation":{},"subject":[],"published":{"date-parts":[[2013,12]]}}}