{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T21:26:52Z","timestamp":1743110812802,"version":"3.40.3"},"publisher-location":"Cham","reference-count":5,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319125732"},{"type":"electronic","value":"9783319125749"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-12574-9_14","type":"book-chapter","created":{"date-parts":[[2014,11,21]],"date-time":"2014-11-21T13:38:31Z","timestamp":1416577111000},"page":"159-170","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An Empirical Study of the Technology Transfer Potential of EU Security and Trust R&amp;D Projects"],"prefix":"10.1007","author":[{"given":"Martina","family":"de Gramatica","sequence":"first","affiliation":[]},{"given":"Fabio","family":"Massacci","sequence":"additional","affiliation":[]},{"given":"Olga","family":"Gadyatskaya","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,11,18]]},"reference":[{"unstructured":"Effects+ Project: D2.2 The Innovation Potential of FP7 Security & Trust Projects (2013)","key":"14_CR1"},{"unstructured":"Ernst & Young: Into the cloud, out of the fog. global information security survey (2011)","key":"14_CR2"},{"issue":"1","key":"14_CR3","first-page":"20","volume":"6","author":"E Lerner","year":"2000","unstructured":"Lerner, E.: Biometric identification. Ind. Physicist 6(1), 20\u201323 (2000)","journal-title":"Ind. Physicist"},{"unstructured":"Rasmussen, M., McClean, C.: Trends in governance, risk and compliance. forrester research (2007). http:\/\/mthink.com\/sites\/default\/files\/legacy\/cfoproject\/content\/pdf\/cfo3_3_86_wp_forrester_rasmussen.pdf","key":"14_CR4"},{"unstructured":"Frost & Sullivan: Demand for geographically dispersed scada in oil and gas sector poised to drive growth in world scada market (2010). http:\/\/www.frost.com\/prod\/servlet\/press-release.pag?docid=218949720","key":"14_CR5"}],"container-title":["Communications in Computer and Information Science","Cyber Security and Privacy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-12574-9_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,21]],"date-time":"2023-01-21T05:05:04Z","timestamp":1674277504000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-12574-9_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319125732","9783319125749"],"references-count":5,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-12574-9_14","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"18 November 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}