{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T09:13:26Z","timestamp":1766049206898},"publisher-location":"Cham","reference-count":6,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030322571"},{"type":"electronic","value":"9783030322588"}],"license":[{"start":{"date-parts":[[2019,10,2]],"date-time":"2019-10-02T00:00:00Z","timestamp":1569974400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-32258-8_31","type":"book-chapter","created":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T09:31:35Z","timestamp":1569922295000},"page":"266-271","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Formation of the System of Signs of Potentially Harmful Multimedia Objects"],"prefix":"10.1007","author":[{"given":"Sergey","family":"Pilkevich","sequence":"first","affiliation":[]},{"given":"Konstantin","family":"Gnidko","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,10,2]]},"reference":[{"key":"31_CR1","unstructured":"Etkind, A.M.: Tsvetovoy test otnosheniy: Metodicheskiye rekomendatsii (Relationship color test: Methodical recommendations). L.: Leningradskiy nauchno-issledovatel\u2019skiy psikhonevrologicheskiy institut im. V.M. Bekhtereva (1983). (in Russ.)"},{"key":"31_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2018\/7497243","volume":"2018","author":"S-W Jang","year":"2018","unstructured":"Jang, S.-W., Lee, S.-H.: Harmful content detection based on cascaded adaptive boosting. J. Sens. 2018, 1\u201312 (2018). \n                    https:\/\/doi.org\/10.1155\/2018\/7497243","journal-title":"J. Sens."},{"key":"31_CR3","unstructured":"Melnitskaya, T.B.: Informatsionno-psikhologicheskaya bezopasnost\u2019 naseleniya v usloviyakh riska radiatsionnogo vozdeystviya: kontseptsiya, model\u2019, tekhnologii (Information and psychological safety of the population under the risk of radiation exposure: concept, model, technology). Extended abstract of Doctor\u2019s thesis. Saint Petersburg (2009). (in Russ.)"},{"key":"31_CR4","series-title":"Lecture Notes in Computer Science","volume-title":"Computational Collective Intelligence. Technologies and Applications. ICCCI 2010","author":"N Park","year":"2010","unstructured":"Park, N., Kim, Y.: Harmful adult multimedia contents filtering method in mobile RFID service environment. In: Pan, J.S., Chen, S.M., Nguyen, N.T. (eds.) Computational Collective Intelligence. Technologies and Applications. ICCCI 2010. Lecture Notes in Computer Science, vol. 6422. Springer, Heidelberg (2010)"},{"key":"31_CR5","unstructured":"Carlsson, U. (ed.): Regulation, Awareness, Empowerment. Young People and Harmful Media Content in the Digital Age. The International Clearinghouse on Children, Youth and Media, at Nordicom. - G\u00f6teborg University (2006)"},{"key":"31_CR6","unstructured":"The center for the study of emotion and attention. Site of The University of Florida. \n                    https:\/\/csea.phhp.ufl.edu"}],"container-title":["Studies in Computational Intelligence","Intelligent Distributed Computing XIII"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-32258-8_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T09:35:16Z","timestamp":1569922516000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-32258-8_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,2]]},"ISBN":["9783030322571","9783030322588"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-32258-8_31","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[],"published":{"date-parts":[[2019,10,2]]},"assertion":[{"value":"2 October 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IDC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Intelligent and Distributed Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Petersburg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Russia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 October 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 October 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"idc2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/idc2019.ru\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}