{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,7]],"date-time":"2025-04-07T15:45:53Z","timestamp":1744040753460,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.23919\/softcom.2017.8115550","type":"proceedings-article","created":{"date-parts":[[2017,11,23]],"date-time":"2017-11-23T17:04:53Z","timestamp":1511456693000},"page":"1-6","source":"Crossref","is-referenced-by-count":11,"title":["Introducing GAMfIS: A generic attacker model for information security"],"prefix":"10.23919","author":[{"given":"Daniel","family":"Fraunholz","sequence":"first","affiliation":[]},{"given":"Simon Duque","family":"Anton","sequence":"additional","affiliation":[]},{"given":"Hans Dieter","family":"Schotten","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"678685","article-title":"Taxonomie und Modellbildung in der Informationssicher-heit it","volume":"11","author":"hartmut","year":"2004","journal-title":"Datenschutz und Datensicherheit"},{"key":"ref11","article-title":"Introduction to Embedded Security","author":"joe","year":"2004","journal-title":"Black Hat USA"},{"key":"ref12","first-page":"6","author":"matt","year":"2003","journal-title":"Cyber Adversary Characterization Syngress"},{"key":"ref13","first-page":"25","author":"marcus","year":"2003","journal-title":"Cyber Adversary Characterization Syngress"},{"journal-title":"Classifying Network Attack Scenarios Using An Ontology","year":"2012","author":"van heerden","key":"ref14"},{"journal-title":"Security in Computing","year":"1997","author":"pfleeger","key":"ref15"},{"journal-title":"Die lage der it-sicherheit in deutschland 2014","article-title":"BSI","year":"2014","key":"ref16"},{"journal-title":"Insider Theft of Intellectual Property for Business Advantage A Preliminary Model","year":"2009","author":"trzeciak","key":"ref17"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"408","DOI":"10.1016\/j.clsr.2005.07.001","article-title":"Criminal profiling and insider cyber crime","volume":"21","author":"nykodym","year":"2005","journal-title":"Computer Law & Security Report"},{"key":"ref19","article-title":"Reflections on the Insider Threat","author":"pfleeger","year":"2007","journal-title":"Insider Attack and Cyber Security"},{"key":"ref4","article-title":"Carnegie Mellon University","author":"john","year":"1995","journal-title":"An Analysis of Security Incidents on the Internet"},{"journal-title":"Towards Practical Attacker Classification for Risk Analysis in Anonymous Communication","year":"2009","author":"andriy","key":"ref3"},{"key":"ref6","first-page":"2838","article-title":"Dimensions of Cyber-Attacks","volume":"30","author":"robin","year":"2011","journal-title":"Cultural Social Economic and Political IEEE Technol Soc Mag"},{"journal-title":"Criminology of Computer Crime","year":"2010","author":"sarah","key":"ref5"},{"journal-title":"A Taxonomy for Denial-of-Service Attacks in Wireless Sensor Networks","year":"2004","author":"john","key":"ref8"},{"key":"ref7","first-page":"319323","article-title":"Norman Diversity in Network Attacker Motivation: A Literature Review","author":"mark","year":"2009","journal-title":"International Conference on Computational Science and Engineering"},{"journal-title":"Unlocking the potential of the internet of things","article-title":"McKinsey Global Institute","year":"2015","key":"ref2"},{"key":"ref9","first-page":"31","article-title":"Collaring the cybercrook: an investigator's view","author":"david","year":"1997","journal-title":"IEEE Spectrum"},{"journal-title":"Data Growth Report 2014","article-title":"International Data Corporation","year":"2014","key":"ref1"},{"journal-title":"Attacker Classification to Aid Targeting Critical Systems for Threat Modelling and Security Review","year":"2005","author":"rocky","key":"ref20"},{"journal-title":"Taxonomies of Attackers","year":"2003","author":"franzi","key":"ref22"},{"key":"ref21","article-title":"Towards Threat, Attack, and Vulnerability Taxonomies","author":"dennis","year":"2002","journal-title":"Network Associates Laboratories Report"},{"journal-title":"Cay Greenpeace hatte offenbar Helfer mit Hausausweis","year":"2009","author":"dobberke","key":"ref24"},{"journal-title":"Annual Report 2015","article-title":"Federal Office for the Protection of the German Constitution","year":"2015","key":"ref23"},{"journal-title":"Mandiant Trend Report","article-title":"Fire Eye Inc","year":"2016","key":"ref25"}],"event":{"name":"2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","start":{"date-parts":[[2017,9,21]]},"location":"Split","end":{"date-parts":[[2017,9,23]]}},"container-title":["2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8106909\/8115491\/08115550.pdf?arnumber=8115550","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,6]],"date-time":"2019-10-06T14:32:09Z","timestamp":1570372329000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8115550\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9]]},"references-count":25,"URL":"https:\/\/doi.org\/10.23919\/softcom.2017.8115550","relation":{},"subject":[],"published":{"date-parts":[[2017,9]]}}}