{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,4,11]],"date-time":"2023-04-11T13:28:40Z","timestamp":1681219720250},"reference-count":22,"publisher":"Springer Fachmedien Wiesbaden GmbH","issue":"3","license":[{"start":{"date-parts":[[2022,4,7]],"date-time":"2022-04-07T00:00:00Z","timestamp":1649289600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,4,7]],"date-time":"2022-04-07T00:00:00Z","timestamp":1649289600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wirtsch Inform Manag"],"published-print":{"date-parts":[[2022,6]]},"DOI":"10.1365\/s35764-022-00401-x","type":"journal-article","created":{"date-parts":[[2022,4,7]],"date-time":"2022-04-07T16:02:43Z","timestamp":1649347363000},"page":"204-211","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Identifikation der Urheber von Cyberattacken mithilfe k\u00fcnstlicher Intelligenz"],"prefix":"10.1365","volume":"14","author":[{"given":"Marco","family":"Barenkamp","sequence":"first","affiliation":[]},{"given":"Marcus","family":"Kr\u00fcger","sequence":"additional","affiliation":[]}],"member":"93","published-online":{"date-parts":[[2022,4,7]]},"reference":[{"key":"401_CR1","first-page":"109","volume-title":"Survey of artificial intelligence in cybersecurity","author":"K Morovat","year":"2020","unstructured":"Morovat, K., & Panda, B. (2020). Survey of artificial intelligence in cybersecurity. 2020 International Conference on Computational Science and Computational Intelligence. (S. 109\u2013115)."},{"key":"401_CR2","doi-asserted-by":"publisher","first-page":"146.598","DOI":"10.1109\/ACCESS.2020.3013145","volume":"8","author":"I Wiafe","year":"2020","unstructured":"Wiafe, I., Koranteng, F.\u202fN., Obeng, E.\u202fN., Assyne, N., Wiafe, A., & Guilliver, S.\u202fR. (2020). Artificial intelligence for cybersecurity: a systematic mapping of literature. IEEE Access, 8, 146.598\u2013146.612.","journal-title":"IEEE Access"},{"key":"401_CR3","first-page":"73","volume-title":"Machine learning for cyber defense and attack","author":"M Rege","year":"2018","unstructured":"Rege, M., & Mbah, R.\u202fB.\u202fK. (2018). Machine learning for cyber defense and attack. The Seventh International Conference on Data Analytics. (S. 73\u201378)."},{"key":"401_CR4","unstructured":"Zierer, M., & Tanriverdi, H. (2021). Mehr als 100 Beh\u00f6rden erpresst. https:\/\/www.tagesschau.de\/investigativ\/br-recherche\/ransomware-103.html. Zugegriffen: 17. Jan. 2022."},{"key":"401_CR5","volume-title":"Cybercrime im Mittelstand. Studienserie \u201eErfolgsfaktoren der Unternehmensf\u00fchrung\u201c","author":"P Ulrich","year":"2020","unstructured":"Ulrich, P., Frank, V., & Timmermann, A. (2020). Cybercrime im Mittelstand. Studienserie \u201eErfolgsfaktoren der Unternehmensf\u00fchrung\u201c. Bd. 5. Aalen: Hochschule Aalen."},{"key":"401_CR6","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1007\/978-3-658-25652-4_13","volume-title":"Attribution of cyber attacks. Information technology for peace and security","author":"K-K Saalbach","year":"2019","unstructured":"Saalbach, K.-K. (2019). Attribution of cyber attacks. Information technology for peace and security (S. 279\u2013303). Wiesbaden: Springer."},{"issue":"4","key":"401_CR7","first-page":"1","volume":"201","author":"P Parrend","year":"2018","unstructured":"Parrend, P., Navarro, J., Guigou, F., Deruyver, A., & Collet, P. (2018). Foundations and applications of artificial intelligence for zero-day and multi-step attack detection. Journal on Information Security, 201(4), 1\u201321.","journal-title":"Journal on Information Security"},{"key":"401_CR8","unstructured":"Kaspersky (2022). Indicator of Compromise (IoC). https:\/\/encyclopedia.kaspersky.com\/glossary\/indicator-of-compromise-ioc\/. Zugegriffen: 9. Jan. 2022."},{"key":"401_CR9","unstructured":"Dunham, K., & Lucas, C. (2017). TTPs within cyber threat intelligence. https:\/\/www.optiv.com\/explore-optiv-insights\/blog\/tactics-techniques-and-procedures-ttps-within-cyber-threat-intelligence. Zugegriffen: 10. Jan. 2022."},{"key":"401_CR10","unstructured":"Baikalov, I., & Schmitz, P. (2019). Attribution von Cyberangriffen \u2013 Die Urheber von Cyberangriffen erkennen. https:\/\/www.security-insider.de\/die-urheber-von-cyberangriffen-erkennen-a-826615\/. Zugegriffen: 7. Jan. 2022."},{"key":"401_CR11","unstructured":"Schick, U. (2018). Was ist k\u00fcnstliche Intelligenz? https:\/\/news.sap.com\/germany\/2018\/03\/was-ist-kuenstliche-intelligenz\/. Zugegriffen: 9. Jan. 2022."},{"key":"401_CR12","volume-title":"Artificial intelligence and cybersecurity\u2014technology, governance, and policy challenges","author":"L Pupillo","year":"2021","unstructured":"Pupillo, L., Fantin, S., Ferreira, A., & Polito, C. (2021). Artificial intelligence and cybersecurity\u2014technology, governance, and policy challenges. Bruessels: Centre for European Policy Studies."},{"issue":"3","key":"401_CR13","first-page":"159","volume":"3","author":"A Mathew","year":"2021","unstructured":"Mathew, A. (2021). Artificial intelligence for offence and defense\u2014the future of cybersecurity. International Journal of Multidisciplinary and Current Educational Research, 3(3), 159\u2013163.","journal-title":"International Journal of Multidisciplinary and Current Educational Research"},{"issue":"28","key":"401_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4108\/eai.7-7-2021.170285","volume":"8","author":"F Tao","year":"2021","unstructured":"Tao, F., Akhtar, M.\u202fS., & Jiayuan, Z. (2021). The future of artificial intelligence in cybersecurity: a comprehensive survey. EAI Endorsed Transactions on Creative Technologies, 8(28), 1\u201315.","journal-title":"EAI Endorsed Transactions on Creative Technologies"},{"issue":"5","key":"401_CR15","first-page":"448","volume":"8","author":"A Hebbar","year":"2021","unstructured":"Hebbar, A., & Kumar, S.\u202fA. (2021). Artificial intelligence in cyber security. Journal of Emerging Technologies and Innovative Research, 8(5), 448\u2013452.","journal-title":"Journal of Emerging Technologies and Innovative Research"},{"key":"401_CR16","first-page":"371","volume-title":"The effectiveness of machine and deep learning for cyber security","author":"A Apruzzese","year":"2018","unstructured":"Apruzzese, A., Colajanni, M., Ferretti, L., Guido, A., & Marchetti, M. (2018). The effectiveness of machine and deep learning for cyber security. 10th International Conference on Cyber Conflict. (S. 371\u2013390)."},{"key":"401_CR17","doi-asserted-by":"publisher","DOI":"10.51593\/2020CA004","volume-title":"Machine learning and cybersecurity\u2014reality and hype","author":"A Musser","year":"2021","unstructured":"Musser, A., & Garriott, A. (2021). Machine learning and cybersecurity\u2014reality and hype. : Center for Security and Emerging Technology."},{"issue":"1","key":"401_CR18","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1016\/j.future.2019.02.013","volume":"96","author":"U Noor","year":"2019","unstructured":"Noor, U., Amjad, T., Anwar, Z., & Choo, K.-K.\u202fR. (2019). A machine learning-based fintech cyber threat attribution framework using high-level indicators of compromise. Future Generation Computer Systems, 96(1), 227\u2013242.","journal-title":"Future Generation Computer Systems"},{"key":"401_CR19","unstructured":"Soman, B. (2019). From unstructured data to actionable intelligence: using machine learning for threat intelligence. https:\/\/www.microsoft.com\/security\/blog\/2019\/08\/08\/from-unstructured-data-to-actionable-intelligence-using-machine-learning-for-threat-intelligence\/. Zugegriffen: 16. Jan. 2022."},{"key":"401_CR20","unstructured":"Matsakis, L. (2018). Even anonymous coders leave fingerprints. https:\/\/www.wired.com\/story\/machine-learning-identify-anonymous-code\/. Zugegriffen: 14. Jan. 2022."},{"key":"401_CR21","volume-title":"Deep learning based authorship identification","author":"C Qian","year":"2017","unstructured":"Qian, C., He, T., & Zhang, R. (2017). Deep learning based authorship identification. : Stanford University."},{"key":"401_CR22","doi-asserted-by":"publisher","first-page":"140","DOI":"10.3390\/jcp1010008","volume":"1","author":"D Preuveneers","year":"2021","unstructured":"Preuveneers, D., & Joosen, W. (2021). Sharing machine learning models as indicators of compromise for cyber threat intelligence. Journal of Cybersecurity and Privacy, 1, 140\u2013163.","journal-title":"Journal of Cybersecurity and Privacy"}],"container-title":["Wirtschaftsinformatik &amp; Management"],"original-title":[],"language":"de","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1365\/s35764-022-00401-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1365\/s35764-022-00401-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1365\/s35764-022-00401-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,30]],"date-time":"2022-06-30T15:07:42Z","timestamp":1656601662000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1365\/s35764-022-00401-x"}},"subtitle":["Bedrohungen durch Cyberangriffe"],"short-title":[],"issued":{"date-parts":[[2022,4,7]]},"references-count":22,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2022,6]]}},"alternative-id":["401"],"URL":"https:\/\/doi.org\/10.1365\/s35764-022-00401-x","relation":{},"ISSN":["1867-5905","1867-5913"],"issn-type":[{"value":"1867-5905","type":"print"},{"value":"1867-5913","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,4,7]]},"assertion":[{"value":"24 February 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 April 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}