{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,3]],"date-time":"2024-08-03T01:35:45Z","timestamp":1722648945421},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2017,2,28]],"date-time":"2017-02-28T00:00:00Z","timestamp":1488240000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"Slovak APVV project","award":["APVV-14-0598"]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["EURASIP J. on Info. Security"],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1186\/s13635-017-0057-4","type":"journal-article","created":{"date-parts":[[2017,2,28]],"date-time":"2017-02-28T01:46:36Z","timestamp":1488246396000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["Honeypots and honeynets: issues of privacy"],"prefix":"10.1186","volume":"2017","author":[{"given":"Pavol","family":"Sokol","sequence":"first","affiliation":[]},{"given":"Jakub","family":"M\u00ed\u0161ek","sequence":"additional","affiliation":[]},{"given":"Martin","family":"Hus\u00e1k","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,2,28]]},"reference":[{"key":"57_CR1","volume-title":"Honeypots: tracking hackers","author":"L Spitzner","year":"2003","unstructured":"L Spitzner, Honeypots: tracking hackers (Addison-Wesley Reading, Boston, 2003)."},{"issue":"2","key":"57_CR2","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1109\/MSECP.2003.1193207","volume":"1","author":"L Spitzner","year":"2003","unstructured":"L Spitzner, The honeynet project: trapping the hackers. IEEE Security and Privacy. 1(2), 15\u201323 (2003).","journal-title":"IEEE Security and Privacy"},{"key":"57_CR3","unstructured":"Dionaea Project. \n https:\/\/github.com\/rep\/dionaea\n \n . Accessed 20 Aug 2016."},{"key":"57_CR4","unstructured":"Glastopf Project. \n http:\/\/mushmush.org\/\n \n . Accessed 20 Aug 2016."},{"key":"57_CR5","unstructured":"Sebek Project. \n https:\/\/projects.honeynet.org\/sebek\/\n \n . Accessed 20 Aug 2016."},{"key":"57_CR6","unstructured":"HonSSH Project. \n https:\/\/github.com\/tnich\/honssh\/wiki\n \n . Accessed 20 Aug 2016."},{"key":"57_CR7","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1145\/1947940.1948065","volume-title":"Proceedings of the 2011 International Conference on Communication, Computing & Security. ICCCS \u201911","author":"A Mairh","year":"2011","unstructured":"A Mairh, D Barik, K Verma, D Jena, in Proceedings of the 2011 International Conference on Communication, Computing & Security. ICCCS \u201911. Honeypot in network security: a survey (ACMNew York, 2011), pp. 600\u2013605."},{"key":"57_CR8","first-page":"1","volume-title":"USENIX Security Symposium","author":"N Provos","year":"2004","unstructured":"N Provos, et al, in USENIX Security Symposium, 173. A virtual honeypot framework (The USENIX AssociationBerkeley, 2004), pp. 1\u201314."},{"key":"57_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/ATNAC.2009.5464785","volume-title":"Telecommunication Networks and Applications Conference (ATNAC), 2009 Australasian","author":"FH Abbasi","year":"2009","unstructured":"FH Abbasi, R Harris, in Telecommunication Networks and Applications Conference (ATNAC), 2009 Australasian. Experiences with a generation III virtual honeynet (IEEEPiscataway, 2009), pp. 1\u20136."},{"key":"57_CR10","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1109\/CSAC.2003.1254322","volume-title":"Computer Security Applications Conference, 2003. Proceedings. 19th Annual","author":"L Spitzner","year":"2003","unstructured":"L Spitzner, in Computer Security Applications Conference, 2003. Proceedings. 19th Annual. Honeypots: Catching the insider threat (IEEEPiscataway, 2003), pp. 170\u2013179."},{"key":"57_CR11","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1145\/1233341.1233399","volume-title":"Proceedings of the 45th Annual Southeast Regional Conference. ACM-SE 45","author":"I Mokube","year":"2007","unstructured":"I Mokube, M Adams, in Proceedings of the 45th Annual Southeast Regional Conference. ACM-SE 45. Honeypots: concepts, approaches, and challenges (ACMNew York, 2007), pp. 321\u2013326."},{"key":"57_CR12","first-page":"387","volume-title":"Technology and Society, 2002.(ISTAS\u201902). 2002 International Symposium On","author":"B Scottberg","year":"2002","unstructured":"B Scottberg, W Yurcik, D Doss, in Technology and Society, 2002.(ISTAS\u201902). 2002 International Symposium On. Internet honeypots: Protection or entrapment?, (IEEEPiscataway, 2002), pp. 387\u2013391."},{"key":"57_CR13","volume-title":"Know your enemy: learning about security Threats","author":"The Honeynet Project","year":"2004","unstructured":"The Honeynet Project, Know your enemy: learning about security Threats (Addison-Wesley Reading, Boston, 2004)."},{"issue":"4","key":"57_CR14","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1515\/PIKO.2004.195","volume":"27","author":"M Dornseif","year":"2004","unstructured":"M Dornseif, FC G\u00e4rtner, T Holz, Vulnerability assessment using honeypots. Praxis der Informationsverarbeitung und Kommunikation. 27(4), 195\u2013201 (2004).","journal-title":"Praxis der Informationsverarbeitung und Kommunikation"},{"key":"57_CR15","first-page":"63","volume-title":"Electronics, Computers and Artificial Intelligence (ECAI), 2014 6th International Conference On","author":"P Sokol","year":"2014","unstructured":"P Sokol, in Electronics, Computers and Artificial Intelligence (ECAI), 2014 6th International Conference On. Legal issues of honeynet\u2019s generations (IEEEPiscataway, 2014), pp. 63\u201369."},{"key":"57_CR16","first-page":"1","volume-title":"System Sciences (HICSS), 2011 44th Hawaii International Conference On","author":"K Nance","year":"2011","unstructured":"K Nance, DJ Ryan, in System Sciences (HICSS), 2011 44th Hawaii International Conference On. Legal aspects of digital forensics: a research agenda (IEEEPiscataway, 2011), pp. 1\u20136."},{"key":"57_CR17","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1109\/WDFIA.2007.4299368","volume-title":"IEEE Second International Workshop on Digital Forensics and Incident Analysis (WDFIA 2007)","author":"M Karyda","year":"2007","unstructured":"M Karyda, L Mitrou, in IEEE Second International Workshop on Digital Forensics and Incident Analysis (WDFIA 2007). Internet forensics: legal and technical issues (IEEEPiscataway, 2007), pp. 3\u201312."},{"key":"57_CR18","first-page":"1","volume":"8","author":"AJ Burstein","year":"2008","unstructured":"AJ Burstein, Conducting cybersecurity research legally and ethically. LEET. 8, 1\u20138 (2008).","journal-title":"LEET"},{"key":"57_CR19","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1145\/1298306.1298307","volume-title":"Proceedings of the 7th ACM SIGCOMM Conference on Internet Measurement","author":"DC Sicker","year":"2007","unstructured":"DC Sicker, P Ohm, D Grunwald, in Proceedings of the 7th ACM SIGCOMM Conference on Internet Measurement. Legal issues surrounding monitoring during network research (ACMNew York, 2007), pp. 141\u2013148."},{"issue":"11","key":"57_CR20","first-page":"3","volume":"18","author":"R Gellert","year":"2015","unstructured":"R Gellert, Understanding data protection as risk regulation. J. Int. Law. 18(11), 3\u201316 (2015).","journal-title":"J. Int. Law"},{"key":"57_CR21","unstructured":"Article 29 data protection working party: opinion no. 4\/2007 on the concept of personal data, from 20th June 2007. 01248\/07\/EN. WP 136. Brussels, Belgium (2007). Article 29 Data Protection Working Party."},{"key":"57_CR22","unstructured":"Article 29 data protection working party: opinion no. 15\/2011 on the definition of consent, from 13th July 2011. 01197\/11\/EN. WP187. Brussels, Belgium (2011). Article 29 Data Protection Working Party."},{"issue":"1","key":"57_CR23","first-page":"69","volume":"8","author":"J M\u00ed\u0161ek","year":"2014","unstructured":"J M\u00ed\u0161ek, Consent to personal data processing\u2014the Panacea or the dead end?Masaryk Univ J Law Tech. 8(1), 69\u201383 (2014).","journal-title":"Masaryk Univ J Law Tech"},{"key":"57_CR24","unstructured":"Article 29 data protection working party: opinion no. 6\/2014 on the notion of legitimate interests of the data controller under Article 7 of Directive 95\/46\/EC, from 9th April 2014. 844\/14\/EN. WP217. Brussels, Belgium (2014). Article 29 Data Protection Working Party."},{"issue":"3","key":"57_CR25","first-page":"895","volume":"60","author":"JJ McIntyre","year":"2011","unstructured":"JJ McIntyre, Balancing expectations of online privacy: why internet protocol (IP) addresses should be protected as personally identifiable information. DePaul Law Review. 60(3), 895\u2013948 (2011).","journal-title":"DePaul Law Review"},{"key":"57_CR26","first-page":"579","volume":"45","author":"AV Litvinov","year":"2013","unstructured":"AV Litvinov, Data protective directive as applied to internet protocol (IP) addresses: uniting the perspective of the European Commission with the jurisprudence of Member States. Geo. Wash. Int\u2019l L. Rev.45, 579\u2013610 (2013).","journal-title":"Geo. Wash. Int\u2019l L. Rev."},{"key":"57_CR27","unstructured":"Advocate general: paragraph 78 of the opinion of advocate general Campos S\u00e1nchez-Bordona Delivered on 12 May 2016 on the case C582\/14 Patrick Breyer V Bundesrepublik Deutschland. Luxembourg (2016). Advocate General."},{"key":"57_CR28","unstructured":"Case C-582\/14 - Judgment of the court (second chamber) of 19 October 2016 (request for a Preliminary Ruling from the Bundesgerichtshof \u2013 Germany) \u2013 Patrick Breyer V Bundesrepublik Deutschland (2016)."},{"issue":"12","key":"57_CR29","first-page":"21","volume":"6","author":"M\u00eds, J\u030c,ek","year":"2015","unstructured":"M\u00eds, J\u030c,ek, Haras, J\u030c,ta, IP adresy v kybernetick\u00e9 bezpe\u010dnosti. Revue pro pr\u00e1vo a technologie. 6(12), 21\u201342 (2015).","journal-title":"Revue pro pr\u00e1vo a technologie"},{"issue":"30","key":"57_CR30","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1016\/j.clsr.2013.12.003","volume":"1","author":"M Zalnieriute","year":"2014","unstructured":"M Zalnieriute, Transborder data flows and data privacy law. Comput Law Secur Rev Int J Tech Law Pract. 1(30), 104\u2013108 (2014).","journal-title":"Comput Law Secur Rev Int J Tech Law Pract"},{"key":"57_CR31","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1007\/978-3-642-11842-5_11","volume-title":"High Performance Computing and Applications: Second International Conference, HPCA 2009, Shanghai, China, August 10-12, 2009, Revised Selected Papers","author":"J Che","year":"2010","unstructured":"J Che, Q He, K Ye, D Huang, in High Performance Computing and Applications: Second International Conference, HPCA 2009, Shanghai, China, August 10-12, 2009, Revised Selected Papers, ed. by W Zhang, Z Chen, CC Douglas, and W Tong. Performance combinative evaluation of typical virtual machine monitors (SpringerBerlin, Heidelberg, 2010), pp. 96\u2013101."},{"key":"57_CR32","doi-asserted-by":"publisher","unstructured":"P Defibaugh-Chavez, R Veeraghattam, M Kannappa, S Mukkamala, A Sung, in 2006 IEEE Information Assurance Workshop. Network based detection of virtual environments and low interaction honeypots (IEEE, 2006), pp. 283\u2013289.","DOI":"10.1109\/IAW.2006.1652107"},{"key":"57_CR33","unstructured":"R Sira, Network forensics analysis tools: an overview of an emerging technology. GSEC, version 1, 1\u201310 (2003)."},{"key":"57_CR34","volume-title":"Computer evidence: collection and preservation","author":"CL Brown","year":"2010","unstructured":"CL Brown, Computer evidence: collection and preservation (Nelson Education, Toronto, 2010)."}],"container-title":["EURASIP Journal on Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13635-017-0057-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13635-017-0057-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13635-017-0057-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,4,30]],"date-time":"2017-04-30T21:04:32Z","timestamp":1493586272000},"score":1,"resource":{"primary":{"URL":"https:\/\/jis-eurasipjournals.springeropen.com\/articles\/10.1186\/s13635-017-0057-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,2,28]]},"references-count":34,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2017,12]]}},"alternative-id":["57"],"URL":"http:\/\/dx.doi.org\/10.1186\/s13635-017-0057-4","relation":{},"ISSN":["1687-417X"],"issn-type":[{"value":"1687-417X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,2,28]]},"article-number":"4"}}