{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T10:01:54Z","timestamp":1769076114064,"version":"3.49.0"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,12]]},"DOI":"10.1109\/isias.2011.6122781","type":"proceedings-article","created":{"date-parts":[[2012,1,11]],"date-time":"2012-01-11T22:01:11Z","timestamp":1326319271000},"page":"366-371","source":"Crossref","is-referenced-by-count":24,"title":["What is Green Security?"],"prefix":"10.1109","author":[{"given":"Luca","family":"Caviglione","sequence":"first","affiliation":[]},{"given":"Alessio","family":"Merlo","sequence":"additional","affiliation":[]},{"given":"Mauro","family":"Migliardi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/ANTS.2009.5409881"},{"key":"2","year":"0","journal-title":"Working Party on the Information Economy Towards Green ICT Strategies Assessing Policies and Programmes on ICTs and the Environment"},{"key":"10","article-title":"The Intrusion Detection Message Exchange Format (IDMEF)","volume":"4765","author":"debar","year":"2007","journal-title":"RFC"},{"key":"1","article-title":"A Survey of botnet Technology and Detection","volume":"10","author":"naseem","year":"0","journal-title":"Int Journal of Video and Image Processing and Network Security"},{"key":"7","article-title":"Energy Logic: A Road Map to Reducing Energy Consumption in Telecommunications Networks","author":"roy","year":"0","journal-title":"30th Int Telecommunications Energy Conference (INTELEC08) San Diego CA USA September 2008"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/863955.863959"},{"key":"5","article-title":"Energy Consumption of the Internet","author":"baliga","year":"0","journal-title":"Joint Int Conference on Optical Internet and the 32nd Australian Conference on Optical Fibre Technology (COINACOFT07) Melbourne Australia June 2007"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.113010.00106"},{"key":"9","author":"casewell","year":"2004","journal-title":"Snort 2 1 Intrusion Detection"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1002\/nem.565"},{"key":"11","article-title":"Travelling Information for Intrusion Prevention Systems","author":"migliardi","year":"0","journal-title":"Proc of the 2010 Int Conference on Security and Management Las Vegas Nevada USA July 12-15 2010"},{"key":"12","article-title":"Modeling the Energy Consumption of an IDS: A step towards Green Security","author":"migliardi","year":"0","journal-title":"Proc of the 34th Int Convention on Information and Communication Technology Electronics and Microelectronics 23rd - 27th of May 2011 Opatija (Croatia)"}],"event":{"name":"2011 7th International Conference on Information Assurance and Security (IAS)","location":"Melacca, Malaysia","start":{"date-parts":[[2011,12,5]]},"end":{"date-parts":[[2011,12,8]]}},"container-title":["2011 7th International Conference on Information Assurance and Security (IAS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6112288\/6122777\/06122781.pdf?arnumber=6122781","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T15:50:29Z","timestamp":1490111429000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6122781\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,12]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/isias.2011.6122781","relation":{},"subject":[],"published":{"date-parts":[[2011,12]]}}}