{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T04:21:44Z","timestamp":1751516504100,"version":"3.41.0"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030773915"},{"type":"electronic","value":"9783030773922"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-77392-2_3","type":"book-chapter","created":{"date-parts":[[2021,7,2]],"date-time":"2021-07-02T23:06:05Z","timestamp":1625267165000},"page":"41-49","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Development of a Novice-Friendly Representation of Camouflaged Boolean Networks"],"prefix":"10.1007","author":[{"given":"Salsabil","family":"Hamadache","sequence":"first","affiliation":[]},{"given":"Malte","family":"Elson","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,7,3]]},"reference":[{"key":"3_CR1","doi-asserted-by":"crossref","unstructured":"Ott, N., et al.: Multiple symbolic representations: the combination of formula and text supports problem solving in the mathematical field of propositional logic. Learn. Instr. 58, 88\u2013105 (2018)","DOI":"10.1016\/j.learninstruc.2018.04.010"},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"Herman, G.L., et al.: Describing the what and why of students\u2019 difficulties in Boolean logic. ACM Trans. Comput. Educ. (TOCE) 12(1), 1\u201328 (2012)","DOI":"10.1145\/2133797.2133800"},{"issue":"3","key":"3_CR3","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1016\/j.learninstruc.2006.03.001","volume":"16","author":"S Ainsworth","year":"2006","unstructured":"Ainsworth, S.: DeFT: a conceptual framework for considering learning with multiple representations. Learn. Instr. 16(3), 183\u2013198 (2006)","journal-title":"Learn. Instr."},{"key":"3_CR4","unstructured":"Csap\u00f3, B., Funke, J.: The nature of problem solving. OECD (2017). Author, F., Author, S.: Title of a proceedings paper. In: Editor, F., Editor, S. (eds.) CONFERENCE\u00a02016, LNCS, vol. 9999, pp.\u00a01\u201313. Springer, Heidelberg (2016)"},{"key":"3_CR5","doi-asserted-by":"publisher","first-page":"1153","DOI":"10.3389\/fpsyg.2017.01153","volume":"8","author":"D D\u00f6rner","year":"2017","unstructured":"D\u00f6rner, D., Funke, J.: Complex problem solving: what it is and what it is not. Front. Psychol. 8, 1153 (2017)","journal-title":"Front. Psychol."},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Dee-Lucas, D., Larkin, J.H.: Equations in scientific Proofs: Effects on comprehension (1991)","DOI":"10.2307\/1163153"},{"issue":"4","key":"3_CR7","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1046\/j.0266-4909.2001.00197.x","volume":"17","author":"L ChanLin","year":"2001","unstructured":"ChanLin, L.: Formats and prior knowledge on learning in a computer-based lesson. J. Comput. Assisted Learn. 17(4), 409\u2013419 (2001)","journal-title":"J. Comput. Assisted Learn."},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"Fyrbiak, M., et al.: Hardware reverse engineering: overview and open challenges. In: 2017 IEEE 2nd International Verification and Security Workshop (IVSW). IEEE (2017)","DOI":"10.1109\/IVSW.2017.8031550"},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"Lee, N.Y.L., Johnson-Laird, P.N.: A theory of reverse engineering and its application to Boolean systems. J. Cogn. Psychol. 25(4), 365\u2013389 (2013)","DOI":"10.1080\/20445911.2013.782033"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Forte, D., Bhunia, S., Tehranipoor, M.M. (eds.): Hardware Protection Through Obfuscation. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-49019-9","DOI":"10.1007\/978-3-319-49019-9"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Wiesen, C., et al.: Towards cognitive obfuscation: impeding hardware reverse engineering based on psychological insights. In: Proceedings of the 24th Asia and South Pacific Design Automation Conference (2019)","DOI":"10.1145\/3287624.3288741"},{"key":"3_CR12","unstructured":"Becker, S., et al.: An exploratory study of hardware reverse engineering\u2014technical and cognitive processes. In: Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020) (2020)"},{"key":"3_CR13","doi-asserted-by":"crossref","unstructured":"Wiesen, C., et al.: Teaching hardware reverse engineering: educational guidelines and practical insights. In: 2018 IEEE International Conference on Teaching, Assessment, and Learning for Engineering (TALE). IEEE (2018)","DOI":"10.1109\/TALE.2018.8615270"}],"container-title":["Lecture Notes in Computer Science","HCI for Cybersecurity, Privacy and Trust"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-77392-2_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T22:12:02Z","timestamp":1751494322000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-77392-2_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030773915","9783030773922"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-77392-2_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"3 July 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 July 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 July 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2021.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}