{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T02:45:29Z","timestamp":1769741129310,"version":"3.49.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1109\/iscc.2013.6754951","type":"proceedings-article","created":{"date-parts":[[2014,3,7]],"date-time":"2014-03-07T22:14:57Z","timestamp":1394230497000},"page":"000233-000239","source":"Crossref","is-referenced-by-count":3,"title":["Trustworthy incident information sharing in social cyber defense alliances"],"prefix":"10.1109","author":[{"given":"Florian","family":"Skopik","sequence":"first","affiliation":[]},{"family":"Qin Li","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","first-page":"241","article-title":"Bootstrapping trust evaluations through stereotypes","author":"burnett","year":"2010","journal-title":"Proc 1st Int Joint Conf on Autonomous Agents and Multi-Agent Systems (AAMAS)"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1103\/RevModPhys.74.47"},{"key":"15","year":"0"},{"key":"16","author":"danyliw","year":"0","journal-title":"RFC 5070 Incident Object Description Exchange Format (IODEF)"},{"key":"13","first-page":"116","article-title":"Trusted information sharing using soa-based social overlay networks","volume":"9","author":"skopik","year":"2012","journal-title":"Interna-tional Journal of Computer Science and Applications"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1016\/j.jaccpubpol.2003.09.001"},{"key":"11","year":"0","journal-title":"Arbor Networks"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2005.05.019"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(11)70086-1"},{"key":"2","year":"2011","journal-title":"Cybercrime Trends Report The Current State of Cybercrime and What to Expect in 2011"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(08)70135-0"},{"key":"10","year":"0"},{"key":"7","author":"jajodia","year":"2009","journal-title":"Cyber Situational Awareness Issues and Research"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2010.03.001"},{"key":"5","year":"0"},{"key":"4","first-page":"1","article-title":"The legitimate vulnerability market: The secretive world of 0-day exploit sales","author":"miller","year":"2007","journal-title":"Workshop on the Economics of Information Security"},{"key":"9","year":"0","journal-title":"Practical Guide\/roadmap for A Suitable Channel for Secure Communication secure Communication with the CERTs & Other Stakeholders"},{"key":"8","year":"2009","journal-title":"A Roadmap for Cybersecurity Research"}],"event":{"name":"2013 IEEE Symposium on Computers and Communications (ISCC)","location":"Split, Croatia","start":{"date-parts":[[2013,7,7]]},"end":{"date-parts":[[2013,7,10]]}},"container-title":["2013 IEEE Symposium on Computers and Communications (ISCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6746555\/6754912\/06754951.pdf?arnumber=6754951","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T21:54:12Z","timestamp":1490306052000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6754951\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/iscc.2013.6754951","relation":{},"subject":[],"published":{"date-parts":[[2013,7]]}}}