{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,12,4]],"date-time":"2024-12-04T05:29:56Z","timestamp":1733290196378,"version":"3.30.1"},"reference-count":12,"publisher":"Breda Publishing Press","issue":"6","license":[{"start":{"date-parts":[[2014,6,1]],"date-time":"2014-06-01T00:00:00Z","timestamp":1401580800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Network Security"],"published-print":{"date-parts":[[2014,6]]},"DOI":"10.1016\/s1353-4858(14)70059-5","type":"journal-article","created":{"date-parts":[[2014,6,26]],"date-time":"2014-06-26T09:48:17Z","timestamp":1403776097000},"page":"8-12","source":"Crossref","is-referenced-by-count":5,"title":["Testing the defences of bulletproof hosting companies"],"prefix":"10.70985","volume":"2014","author":[{"given":"Danny","family":"Bradbury","sequence":"first","affiliation":[]}],"member":"51855","reference":[{"author":"Hawkinson","key":"10.1016\/S1353-4858(14)70059-5_bib1"},{"author":"Ryan","key":"10.1016\/S1353-4858(14)70059-5_bib2"},{"author":"Bizeul","key":"10.1016\/S1353-4858(14)70059-5_bib3"},{"author":"Krebs","key":"10.1016\/S1353-4858(14)70059-5_bib5"},{"author":"Krebs","key":"10.1016\/S1353-4858(14)70059-5_bib6"},{"author":"Markowitz","key":"10.1016\/S1353-4858(14)70059-5_bib7"},{"author":"Markowitz","key":"10.1016\/S1353-4858(14)70059-5_bib8"},{"key":"10.1016\/S1353-4858(14)70059-5_bib10","unstructured":"\u2018Host of Internet Spam Groups Is Cut Off\u2019. Washington Post: Breaking News, World, US, DC News & Analysis. Washington Post, 12 Nov 2008."},{"key":"10.1016\/S1353-4858(14)70059-5_bib11","article-title":"\u2018Botnet masters hide C&C server inside Tor network\u2019","author":"Constantin","year":"2012","journal-title":"Techworld"},{"author":"Howell O'Neill","key":"10.1016\/S1353-4858(14)70059-5_bib12"},{"key":"10.1016\/S1353-4858(14)70059-5_bib13","article-title":"\u2018Security Fix \u2014 Taking on the Russian Business Network\u2019","author":"Krebs","year":"2007","journal-title":"Blogs & Columns, Blog Directory \u2014 The Washington Post"},{"key":"10.1016\/S1353-4858(14)70059-5_bib14","unstructured":"\u2018Cloudmark 3Q13 Global Messaging Threat Report\u2019. Cloudmark."}],"container-title":["Network Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1353485814700595?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1353485814700595?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1353485814700595?httpAccept=text\/plain","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,3]],"date-time":"2024-12-03T22:21:27Z","timestamp":1733264487000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1353485814700595"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6]]},"references-count":12,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2014,6]]}},"alternative-id":["S1353485814700595"],"URL":"https:\/\/doi.org\/10.1016\/s1353-4858(14)70059-5","relation":{},"ISSN":["1353-4858"],"issn-type":[{"type":"print","value":"1353-4858"}],"subject":[],"published":{"date-parts":[[2014,6]]}}}