{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,12,19]],"date-time":"2024-12-19T05:17:47Z","timestamp":1734585467860,"version":"3.30.2"},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T00:00:00Z","timestamp":1729123200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T00:00:00Z","timestamp":1729123200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,10,17]]},"DOI":"10.1109\/iccp63557.2024.10793019","type":"proceedings-article","created":{"date-parts":[[2024,12,17]],"date-time":"2024-12-17T19:09:09Z","timestamp":1734462549000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["MEPHISTO: a Red Team Tool for Offensive Security"],"prefix":"10.1109","author":[{"given":"Alexandru Alin","family":"J\u00eercan","sequence":"first","affiliation":[{"name":"Technical University of Cluj-Napoca,Computer Science Department,Cluj-Napoca,Romania"}]},{"given":"Ciprian","family":"Opri\u115fa","sequence":"additional","affiliation":[{"name":"Technical University of Cluj-Napoca,Computer Science Department,Cluj-Napoca,Romania"}]}],"member":"263","reference":[{"volume-title":"Cybersecurity-attack and defense strategies: Infrastructure security with red team and blue team tactics","year":"2018","author":"Diogenes","key":"ref1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2017.2702586"},{"key":"ref3","article-title":"O\u2019Reilly Media, Inc","author":"Burns","year":"2022","journal-title":"Kubernetes: up and running"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-22915-7_40"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2020.820"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3160792"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ITNAC59571.2023.10368559"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3651991"},{"volume-title":"Kinsing mal-ware exploits novel openfire vulnerability","year":"2023","author":"Assaf","key":"ref9"},{"volume-title":"The Go programming language","year":"2015","author":"Donovan","key":"ref10"},{"key":"ref11","article-title":"Rochester Institute of Technology","author":"Praveen","year":"2023","journal-title":"A Comparative Analysis of Malware Written in the C and Rust Programming Languages"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/RMKMATE59243.2023.10369251"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-6684-6247-8.ch005"},{"volume-title":"Docker in action","year":"2019","author":"Nickoloff","key":"ref14"},{"volume-title":"CVE-2023\u201332315","year":"2023","key":"ref15"},{"volume-title":"Imgur","key":"ref16"},{"key":"ref17","first-page":"1","article-title":"The rsa algorithm","author":"Milanov","year":"2009","journal-title":"RSA laboratories"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-23483-7_358"},{"issue":"2","key":"ref19","first-page":"1","article-title":"An overview of image steganography","volume":"1","author":"Morkel","year":"2005","journal-title":"ISSA"},{"volume-title":"Minikube","key":"ref20"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICITAET47105.2019.9170208"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CCGE50943.2021.9776450"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3355369.3355585"},{"volume-title":"hybrid-analysis","key":"ref24"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-9293-5_17"},{"issue":"93","key":"ref26","doi-asserted-by":"crossref","first-page":"5982","DOI":"10.21105\/joss.05982","volume":"9","author":"Lerch-Hostalot","year":"2024","journal-title":"Journal of Open Source Software"},{"volume-title":"Aperi\u2019solve","key":"ref27"}],"event":{"name":"2024 IEEE 20th International Conference on Intelligent Computer Communication and Processing (ICCP)","start":{"date-parts":[[2024,10,17]]},"location":"Cluj-Napoca, Romania","end":{"date-parts":[[2024,10,19]]}},"container-title":["2024 IEEE 20th International Conference on Intelligent Computer Communication and Processing (ICCP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10792975\/10792923\/10793019.pdf?arnumber=10793019","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,18]],"date-time":"2024-12-18T08:11:05Z","timestamp":1734509465000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10793019\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,17]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/iccp63557.2024.10793019","relation":{},"subject":[],"published":{"date-parts":[[2024,10,17]]}}}