{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,12,4]],"date-time":"2024-12-04T05:29:50Z","timestamp":1733290190662,"version":"3.30.1"},"reference-count":20,"publisher":"Breda Publishing Press","issue":"7","license":[{"start":{"date-parts":[[2013,7,1]],"date-time":"2013-07-01T00:00:00Z","timestamp":1372636800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Network Security"],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1016\/s1353-4858(13)70081-3","type":"journal-article","created":{"date-parts":[[2013,7,17]],"date-time":"2013-07-17T19:17:55Z","timestamp":1374088675000},"page":"9-12","source":"Crossref","is-referenced-by-count":1,"title":["Offensive defence"],"prefix":"10.70985","volume":"2013","author":[{"given":"Danny","family":"Bradbury","sequence":"first","affiliation":[]}],"member":"51855","reference":[{"key":"10.1016\/S1353-4858(13)70081-3_bib1","unstructured":"\u2018Active Defense Harbinger Distribution\u2019. Last updated 13 Mar 2013. Accessed Jun 2013. http:\/\/sourceforge.net\/projects\/adhd\/."},{"key":"10.1016\/S1353-4858(13)70081-3_bib2","unstructured":"William Allan Wulf. \u2018Cyber-security: Beyond the Maginot Line\u2019. Testimony before the US House of Representatives House Science Committee, 10 Oct 2001. Accessed Jun 2013. www.nae.edu\/news\/speechesandremarks\/cybersecuritybeyondthemaginotline.aspx."},{"key":"10.1016\/S1353-4858(13)70081-3_bib3","unstructured":"Pia Landergren. \u2018Hacker vigilantes strike back\u2019. 28 Jun 2001. Accessed Jun 2013. www.itworldcanada.com\/news\/hacker-vigilantes-strike-back\/130320."},{"key":"10.1016\/S1353-4858(13)70081-3_bib4","unstructured":"Matt Hines. \u2018Lycos Europe: Make love not spam\u2019. CNet, 30 Nov 2004. Accessed Jun 2013. http:\/\/news.cnet.com\/Lycos-Europe-Make-love-not-spam\/2100-7349_3-5471207.html."},{"key":"10.1016\/S1353-4858(13)70081-3_bib5","unstructured":"M Edwards. \u2018Code Red Turns CodeGreen\u2019. Windows IT Pro, 3 Sept 2001. Accessed Jun 2013. http:\/\/windowsitpro.com\/security\/code-red-turns-codegreen."},{"key":"10.1016\/S1353-4858(13)70081-3_bib6","unstructured":"Munir Kotadia. \u2018Symbiot launches DDoS counter-strike tool\u2019. ZDNet, 10 Mar 2004. Accessed Jun 2013. www.zdnet.com\/symbiot-launches-ddos-counter-strike-tool-3039148215\/."},{"key":"10.1016\/S1353-4858(13)70081-3_bib7","unstructured":"Chaotic Moon. \u2018All Your Mobile Security Are Belong To Us\u2019. Accessed April 2013. www.chaoticmoon.com\/security\/."},{"key":"10.1016\/S1353-4858(13)70081-3_bib8","unstructured":"Paco X Nathan, Mike W Erwin. \u2018On the Rules of Engagement for Information Warfare\u2019. Symbiot, 2004. Accessed Jun 2013. http:\/\/web.archive.org\/web\/20040427063627\/http:\/\/www.symbiot.com\/media\/iwROE.pdf."},{"author":"Jarrett","key":"10.1016\/S1353-4858(13)70081-3_bib9"},{"key":"10.1016\/S1353-4858(13)70081-3_bib10","unstructured":"\u2018Tracking GhostNet: Investigating a Cyber-espionage Network\u2019. Information Warfare Monitor, 29 Mar 2009. Accessed Jun 2013. www.scribd.com\/doc\/13731776\/Tracking-GhostNet-Investigating-a-Cyber-Espionage-Network."},{"author":"Denbow","key":"10.1016\/S1353-4858(13)70081-3_bib11"},{"key":"10.1016\/S1353-4858(13)70081-3_bib12","unstructured":"\u2018Study shows how spammers cash in\u2019. BBC News, 10 Nov 2008. Accessed Jun 2013. http:\/\/news.bbc.co.uk\/2\/hi\/7719281.stm."},{"key":"10.1016\/S1353-4858(13)70081-3_bib13","unstructured":"Anonymous. \u2018Internet Census 2012: Port scanning\/0 using insecure embedded devices\u2019. Accessed Jun 2013. http:\/\/Internetcensus2012.bitbucket.org\/paper.html."},{"key":"10.1016\/S1353-4858(13)70081-3_bib14","unstructured":"\u2018The Belmont Report: Ethical Principles and Guidelines for the Protection of Human Subjects of Research\u2019. The National Commission for the Protection of Human Subjects of Biomedical and Behavioral Research, April 1979."},{"author":"Kenneally","key":"10.1016\/S1353-4858(13)70081-3_bib15"},{"key":"10.1016\/S1353-4858(13)70081-3_bib16","unstructured":"\u2018The Menlo Report: Ethical Principles Guiding Information and Communication Technology Research\u2019. US Department of Homeland Security, 15 Sept 2011. Accessed Jun 2013. www.cyber.st.dhs.gov\/wp-content\/uploads\/2011\/12\/MenloPrinciplesCORE-20110915-r560.pdf."},{"author":"Nakashima","key":"10.1016\/S1353-4858(13)70081-3_bib17"},{"author":"Schmitt","key":"10.1016\/S1353-4858(13)70081-3_bib18"},{"year":"1945","series-title":"Charter of the United Nations and Statute of the International Court of Justice","author":"United Nations (UN)","key":"10.1016\/S1353-4858(13)70081-3_bib19"},{"author":"Foltz","key":"10.1016\/S1353-4858(13)70081-3_bib20"}],"container-title":["Network Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1353485813700813?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1353485813700813?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1353485813700813?httpAccept=text\/plain","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,3]],"date-time":"2024-12-03T22:20:43Z","timestamp":1733264443000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1353485813700813"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":20,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2013,7]]}},"alternative-id":["S1353485813700813"],"URL":"https:\/\/doi.org\/10.1016\/s1353-4858(13)70081-3","relation":{},"ISSN":["1353-4858"],"issn-type":[{"type":"print","value":"1353-4858"}],"subject":[],"published":{"date-parts":[[2013,7]]}}}