{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:37:49Z","timestamp":1725496669794},"publisher-location":"Berlin, Heidelberg","reference-count":3,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540401896"},{"type":"electronic","value":"9783540448532"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-44853-5_40","type":"book-chapter","created":{"date-parts":[[2007,12,1]],"date-time":"2007-12-01T04:01:31Z","timestamp":1196481691000},"page":"390-390","source":"Crossref","is-referenced-by-count":2,"title":["Semantic Hacking and Intelligence and Security Informatics"],"prefix":"10.1007","author":[{"given":"Paul","family":"Thompson","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,5,27]]},"reference":[{"key":"40_CR1","doi-asserted-by":"crossref","unstructured":"Libicki, M.: The mesh and the net: Speculations on armed conflict in an age of free silicon National Defense University McNair Paper 28 (1994)","DOI":"10.21236\/ADA277584"},{"issue":"8","key":"40_CR2","first-page":"50","volume":"35","author":"G. Cybenko","year":"2002","unstructured":"Cybenko, G., Giani, A., Thompson, P.: Cognitive Hacking: A Battle for the Mind IEEE Computer. Vol. 35, No. 8. (2002) 50\u201356","journal-title":"Cognitive Hacking: A Battle for the Mind IEEE Computer"},{"key":"40_CR3","unstructured":"Fawcett, T., Provost, F.: FraudDetection. In: Kloesgen, W., Zytkow, J. (eds.) Handbook of Data Mining and Knowledge Discovery, Oxford University Press (2002)"}],"container-title":["Lecture Notes in Computer Science","Intelligence and Security Informatics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44853-5_40","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,5]],"date-time":"2019-05-05T11:09:10Z","timestamp":1557054550000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44853-5_40"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540401896","9783540448532"],"references-count":3,"URL":"https:\/\/doi.org\/10.1007\/3-540-44853-5_40","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2003]]}}}