{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T23:40:37Z","timestamp":1725838837053},"publisher-location":"Cham","reference-count":9,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319260952"},{"type":"electronic","value":"9783319260969"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-26096-9_27","type":"book-chapter","created":{"date-parts":[[2015,11,24]],"date-time":"2015-11-24T11:18:35Z","timestamp":1448363915000},"page":"261-275","source":"Crossref","is-referenced-by-count":0,"title":["On the Use of Security and Privacy Technology as a Plot Device"],"prefix":"10.1007","author":[{"given":"Joan","family":"Feigenbaum","sequence":"first","affiliation":[]},{"given":"Brad","family":"Rosen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,25]]},"reference":[{"key":"27_CR1","unstructured":"Royals and Loyals: NCIS, Season 8, Episode 4. Oct. 12, (2010)"},{"key":"27_CR2","unstructured":"Berlin, NCIS, Season 10, Episode 21, 23 April 2013"},{"key":"27_CR3","unstructured":"Let\u2019s Get to Scooping, How to Get Away With Murder, Season 1, Episode 4, 16 October 2014"},{"key":"27_CR4","unstructured":"http:\/\/tvtropes.org\/pmwiki\/pmwiki.php\/Main\/PhoneTraceRace"},{"key":"27_CR5","unstructured":"911, Law and Order SVU: Season 7, Episode 3, 4 October 2005"},{"key":"27_CR6","unstructured":"Broken Hearts, Homeland, Season 2, Episode 10, 2 December 2012"},{"key":"27_CR7","doi-asserted-by":"crossref","unstructured":"Halperin, D., Heydt-Benjamin, T.S., Ransford, B., Clark, S.S., Defend, B., Morgan, W., Fu, K., Kohno, T., Maisel, W.H.: Pacemakers and implantable cardiac defibrillators: software radio attacks and zero-power defenses. In: 29th Symposium on Security and Privacy, pp. 129\u2013142. IEEE, Piscataway (2008)","DOI":"10.1109\/SP.2008.31"},{"key":"27_CR8","doi-asserted-by":"crossref","unstructured":"Denning, T., Borning, A., Friedman, B., Gill, B.T., Kohno, T., Maisel, W.H.: Patients, pacemakers, and implantable defibrillators: human values and security for wireless implantable medical devices. In: 28th SIGCHI Conference on Human Factors in Computing Systems, pp. 917\u2013926. ACM Press, New York (2010)","DOI":"10.1145\/1753326.1753462"},{"key":"27_CR9","unstructured":"Valasek, C., Miller, C.: A Survey of Remote Automotive Attack Surfaces (2014). \n                    http:\/\/illmatics.com\/remote%20attack%20surfaces.pdf"}],"container-title":["Lecture Notes in Computer Science","Security Protocols XXIII"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-26096-9_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T13:20:08Z","timestamp":1559308808000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-26096-9_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319260952","9783319260969"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-26096-9_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}