{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,4,11]],"date-time":"2023-04-11T13:43:33Z","timestamp":1681220613387},"reference-count":13,"publisher":"Springer Fachmedien Wiesbaden GmbH","issue":"1","license":[{"start":{"date-parts":[[2023,1,19]],"date-time":"2023-01-19T00:00:00Z","timestamp":1674086400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,1,19]],"date-time":"2023-01-19T00:00:00Z","timestamp":1674086400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wirtsch Inform Manag"],"published-print":{"date-parts":[[2023,2]]},"DOI":"10.1365\/s35764-022-00446-y","type":"journal-article","created":{"date-parts":[[2023,1,19]],"date-time":"2023-01-19T13:05:42Z","timestamp":1674133542000},"page":"82-88","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["KI-basierte Anomalieerkennung als Abwehrmechanismus bei Cyberangriffen"],"prefix":"10.1365","volume":"15","author":[{"given":"Marco","family":"Barenkamp","sequence":"first","affiliation":[]}],"member":"93","published-online":{"date-parts":[[2023,1,19]]},"reference":[{"key":"446_CR1","unstructured":"DarkTrace (2020). Darktrace open architecture. https:\/\/assets-global.website-files.com\/626ff4d25aca2edf4325ff97\/62a29a83be42aa5a61b49c95_ds-open-architecture.pdf. Zugegriffen: 18. Juli 2022."},{"key":"446_CR2","unstructured":"ForeNova (2022). ForeNova\u2019s attack surface blueprint. https:\/\/www.forenova.com\/de\/blueprint-ebook?hsLang=de. Zugegriffen: 18.07."},{"key":"446_CR3","unstructured":"Bromiley, M. (2021). Your network, under control. https:\/\/www.forenova.com\/hubfs\/20210819_ForeNova_FINAL.pdf?hsLang=de. Zugegriffen: 18. Juli 2022."},{"key":"446_CR4","unstructured":"Staudacher, M. (2021). Forenova launcht NDR-L\u00f6sung. https:\/\/www.it-business.de\/forenova-launcht-ndr-loesung-a-1047719\/. Zugegriffen: 18. Juli 2022."},{"key":"446_CR5","unstructured":"Smit, P. (2022). K\u00fcnstliche Intelligenz macht Netzwerksicherheit handhabbar. https:\/\/www.security-insider.de\/kuenstliche-intelligenz-macht-netzwerksicherheit-handhabbar-a-b34691618f7c1729b5d5b3fa08ea0ec5\/?cflt=rdt. Zugegriffen: 18. Juli 2022."},{"key":"446_CR6","unstructured":"Smit, P. (2022). Wie eine KI lernt, Cyberangriffe zu erkennen. https:\/\/www.security-insider.de\/wie-eine-ki-lernt-cyberangriffe-zu-erkennen-a-0de9fb69acd44869d454ad3f2b49d2ed\/. Zugegriffen: 18. Juli 2022."},{"key":"446_CR7","unstructured":"DarkTrace (2021). Industrial immune system. https:\/\/assets-global.website-files.com\/626ff4d25aca2edf4325ff97\/62a2996dd3dee0a0e845667c_ds-iis.pdf. Zugegriffen: 18. Juli 2022."},{"key":"446_CR8","unstructured":"DarkTrace (2021). Darktrace immune system\u2014self-learning detection & response. https:\/\/assets-global.website-files.com\/626ff4d25aca2edf4325ff97\/62a292f3c2e289429058f074_wp-platform.pdf. Zugegriffen: 18. Juli 2022."},{"key":"446_CR9","unstructured":"Luber, S., & Schmitz, P. (2018). Was ist ein Brute-Force-Angriff? https:\/\/www.security-insider.de\/was-ist-ein-brute-force-angriff-a-677192\/. Zugegriffen: 27. Juli 2022."},{"key":"446_CR10","unstructured":"Trieu, K., & Yang, Y. (2018). Artificial intelligence-based password brute force attacks. https:\/\/aisel.aisnet.org\/mwais2018\/39"},{"key":"446_CR11","unstructured":"Luber, S., & Schmitz, P. (2018). Was ist ein Command-and-Control Server? https:\/\/www.security-insider.de\/was-ist-ein-command-and-control-server-a-1064742\/. Zugegriffen: 27. Juli 2022."},{"key":"446_CR12","unstructured":"Luber, S., & Schmitz, P. (2018). Was ist Ransomware und Ransomware-Schutz? https:\/\/www.security-insider.de\/was-ist-ransomware-a-781385\/. Zugegriffen: 27. Juli 2022."},{"key":"446_CR13","doi-asserted-by":"publisher","DOI":"10.1365\/s35764-022-00401-x","author":"M Barenkamp","year":"2022","unstructured":"Barenkamp, M., & Kr\u00fcger, M. (2022). Identifikation der Urheber von Cyberattacken mithilfe k\u00fcnstlicher Intelligenz. Wirtschaftsinformatik & Management. https:\/\/doi.org\/10.1365\/s35764-022-00401-x.","journal-title":"Wirtschaftsinformatik & Management"}],"container-title":["Wirtschaftsinformatik &amp; Management"],"original-title":[],"language":"de","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1365\/s35764-022-00446-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1365\/s35764-022-00446-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1365\/s35764-022-00446-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,11]],"date-time":"2023-04-11T13:03:12Z","timestamp":1681218192000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1365\/s35764-022-00446-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,19]]},"references-count":13,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2023,2]]}},"alternative-id":["446"],"URL":"https:\/\/doi.org\/10.1365\/s35764-022-00446-y","relation":{},"ISSN":["1867-5905","1867-5913"],"issn-type":[{"value":"1867-5905","type":"print"},{"value":"1867-5913","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,1,19]]},"assertion":[{"value":"30 October 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 January 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}