{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,18]],"date-time":"2025-01-18T05:26:08Z","timestamp":1737177968232,"version":"3.33.0"},"reference-count":17,"publisher":"Informa UK Limited","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information Systems Security"],"published-print":{"date-parts":[[2004,3]]},"DOI":"10.1201\/1086\/44119.13.1.20040301\/80431.4","type":"journal-article","created":{"date-parts":[[2007,6,25]],"date-time":"2007-06-25T23:17:38Z","timestamp":1182813458000},"page":"18-33","source":"Crossref","is-referenced-by-count":0,"title":["The Nature of Cyber-attacks in the Future: A Position Paper"],"prefix":"10.1080","volume":"13","author":[{"given":"Sumit","family":"Ghosh","sequence":"first","affiliation":[]}],"member":"301","reference":[{"key":"CIT0001","unstructured":"The Learning Channel. 2001. Hackers: Computer Outlaws.Cable Television, July 25"},{"key":"CIT0002","doi-asserted-by":"crossref","unstructured":"Pillalamarri, Seshasayi and Ghosh, Sumit. 2001. The Impact of Source Traffic Distribution on Quality of Service (QoS) in ATM Networks. Proceedings of the IEEE International Conference on Communications. June11\u2013152001. pp.2855\u20132859.","DOI":"10.1109\/ICC.2001.936671"},{"volume-title":"The Future of Ideas: The Fate of the Commons in the Connected World","year":"2001","author":"Lessig Walter","key":"CIT0003"},{"key":"CIT0004","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4613-0029-8"},{"key":"CIT0006","first-page":"16","volume":"1","author":"Ghosh Sumit","year":"2002","journal-title":"A Bi-Annual Technology Publication of the Wall Street Technology Association"},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.1145\/356909.356913"},{"key":"CIT0014","doi-asserted-by":"publisher","DOI":"10.1109\/6.738323"},{"key":"CIT0015","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1109\/MC.1999.738299","volume":"32","author":"Charles John","year":"1999","journal-title":"IEEE Computer"},{"key":"CIT0016","doi-asserted-by":"publisher","DOI":"10.1023\/A:1019190124953"},{"key":"CIT0021","doi-asserted-by":"publisher","DOI":"10.1109\/90.330414"},{"key":"CIT0022","first-page":"25","volume":"45","author":"Harold Lawson W.","year":"2002","journal-title":"Communications of the ACM"},{"volume-title":"Algorithm Design for Networked Information Technology Systems: Principles and Applications","year":"2003","author":"Ghosh Sumit","key":"CIT0023"},{"key":"CIT0024","doi-asserted-by":"publisher","DOI":"10.1109\/9780470545300"},{"key":"CIT0025","doi-asserted-by":"publisher","DOI":"10.1109\/49.265711"},{"volume-title":"BRG Symposium on Command and Control Research","year":"1993","author":"Oettinger Anthony","key":"CIT0026"},{"volume-title":"Reporter Jamie McIntyre","year":"1994","key":"CIT0029"},{"key":"CIT0031","doi-asserted-by":"publisher","DOI":"10.1109\/6.898799"}],"container-title":["Information Systems Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.tandfonline.com\/doi\/pdf\/10.1201\/1086\/44119.13.1.20040301\/80431.4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,17]],"date-time":"2025-01-17T21:22:01Z","timestamp":1737148921000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.tandfonline.com\/doi\/abs\/10.1201\/1086\/44119.13.1.20040301\/80431.4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,3]]},"references-count":17,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2004,3]]}},"alternative-id":["10.1201\/1086\/44119.13.1.20040301\/80431.4"],"URL":"https:\/\/doi.org\/10.1201\/1086\/44119.13.1.20040301\/80431.4","relation":{},"ISSN":["1065-898X","1934-869X"],"issn-type":[{"type":"print","value":"1065-898X"},{"type":"electronic","value":"1934-869X"}],"subject":[],"published":{"date-parts":[[2004,3]]}}}