{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,15]],"date-time":"2024-09-15T14:10:31Z","timestamp":1726409431314},"publisher-location":"Cham","reference-count":61,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319430041"},{"type":"electronic","value":"9783319430058"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-43005-8_3","type":"book-chapter","created":{"date-parts":[[2016,8,13]],"date-time":"2016-08-13T11:40:59Z","timestamp":1471088459000},"page":"87-138","source":"Crossref","is-referenced-by-count":0,"title":["From Zoos to Safaris\u2014From Closed-World Enforcement to Open-World Assessment of Privacy"],"prefix":"10.1007","author":[{"given":"Michael","family":"Backes","sequence":"first","affiliation":[]},{"given":"Pascal","family":"Berrang","sequence":"additional","affiliation":[]},{"given":"Praveen","family":"Manoharan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,8,14]]},"reference":[{"key":"3_CR1","unstructured":"The online social network reddit. http:\/\/www.reddit.com . Accessed Sept 2015"},{"key":"3_CR2","unstructured":"Directive 95\/46\/EC of the European Parliament and of the Council on the Protection of Individuals with Regard to the Processing of Personal Data and on the Free Movement of Such Data (1996)"},{"issue":"2","key":"3_CR3","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1344411.1344413","volume":"26","author":"A Abbasi","year":"2008","unstructured":"Abbasi, A., Chen, H.: Writeprints: a stylometric approach to identity-level identification and similarity detection in cyberspace. ACM Trans. Inf. Syst. (TOIS) 26(2), 1\u201329 (2008)","journal-title":"ACM Trans. Inf. Syst. (TOIS)"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Afroz, S., Brennan, M., Greenstadt, R.: Detecting hoaxes, frauds, and deception in writing style online. In: Proceedings of the 33rd IEEE Symposium on Security and Privacy (S&P), pp. 461\u2013475 (2012)","DOI":"10.1109\/SP.2012.34"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Afroz, S., Islam, A.C., Stolerman, A., Greenstadt, R., McCoy, D.: Doppelg\u00e4nger finder: taking stylometry to the underground. In: Proceedings of the 35th IEEE Symposium on Security and Privacy(S&P), pp. 212\u2013226 (2014)","DOI":"10.1109\/SP.2014.21"},{"key":"3_CR6","unstructured":"Anonymouth. https:\/\/www.cs.drexel.edu\/~pv42\/thebiz\/"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Backes, M., Kate, A., Manoharan, P., Meiser, S., Mohammadi, E.: AnoA: a framework for analyzing anonymous communication protocols. In: Proceedings of the 26th IEEE Computer Security Foundations Symposium (CSF), pp. 163\u2013178 (2013)","DOI":"10.1109\/CSF.2013.18"},{"key":"3_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"422","DOI":"10.1007\/978-3-642-15512-3_22","volume-title":"Recent Advances in Intrusion Detection","author":"M Balduzzi","year":"2010","unstructured":"Balduzzi, M., Platzer, C., Holz, T., Kirda, E., Balzarotti, D., Kruegel, C.: Abusing social networks for automated user profiling. In: Jha, S., Sommer, R., Kreibich, C. (eds.) RAID 2010. LNCS, vol. 6307, pp. 422\u2013441. Springer, Heidelberg (2010)"},{"issue":"4","key":"3_CR9","first-page":"701","volume":"16","author":"J Bambauer","year":"2014","unstructured":"Bambauer, J., Muralidhar, K., Sarathy, R.: Fool\u2019s gold! An illustrated critique of differential privacy. Vanderbilt J. Entertainment Technol. Law 16(4), 701\u2013755 (2014)","journal-title":"Vanderbilt J. Entertainment Technol. Law"},{"issue":"3","key":"3_CR10","doi-asserted-by":"crossref","first-page":"12:1","DOI":"10.1145\/2382448.2382450","volume":"15","author":"MR Brennan","year":"2012","unstructured":"Brennan, M.R., Afroz, S., Greenstadt, R., Stylometry, A.: Circumventing authorship recognition to preserve privacy and anonymity. ACM Trans. Inf. Syst. Secur. (TISSEC) 15(3), 12:1\u201312:22 (2012)","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"},{"key":"3_CR11","unstructured":"Brennan, M.R., Greenstadt, R.: Practical attacks against authorship recognition techniques. In: Proceedings of the 21st Annual Conference on Innovative Applications of Artificial Intelligence (IAAI) (2009)"},{"issue":"1\u20132","key":"3_CR12","first-page":"1","volume":"20","author":"M Bromby","year":"2007","unstructured":"Bromby, M.: Security against crime: technologies for detecting and preventing crime. Int. Rev. Law 20(1\u20132), 1\u20136 (2007)","journal-title":"Int. Rev. Law"},{"key":"3_CR13","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1007\/978-3-540-30134-9_27","volume-title":"Knowledge-Based Intelligent Information and Engineering Systems","author":"A Cal\u00ec","year":"2004","unstructured":"Cal\u00ec, A., Calvanese, D., Colucci, S., Di Noia, T., Donini, F.M.: A logic-based approach for matching user profiles. In: Negoita, M.G., Howlett, R.J., Jain, L.C. (eds.) KES 2004. LNCS (LNAI), vol. 3215, pp. 187\u2013195. Springer, Heidelberg (2004)"},{"issue":"1","key":"3_CR14","first-page":"1","volume":"4","author":"CE Chaski","year":"2005","unstructured":"Chaski, C.E.: Who\u2019s at the keyboard? Authorship attribution in digital evidence investigations. Int. J. Digit. Evid. 4(1), 1\u201313 (2005)","journal-title":"Int. J. Digit. Evid."},{"key":"3_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1007\/978-3-642-39077-7_5","volume-title":"Privacy Enhancing Technologies","author":"K Chatzikokolakis","year":"2013","unstructured":"Chatzikokolakis, K., Andr\u00e9s, M.E., Bordenabe, N.E., Palamidessi, C.: Broadening the scope of differential privacy using metrics. In: De Cristofaro, E., Wright, M. (eds.) PETS 2013. LNCS, vol. 7981, pp. 82\u2013102. Springer, Heidelberg (2013)"},{"issue":"4","key":"3_CR16","doi-asserted-by":"crossref","first-page":"653","DOI":"10.1007\/s00778-013-0344-8","volume":"23","author":"R Chen","year":"2014","unstructured":"Chen, R., Fung, B.C.M., Philip, S.Y., Desai, B.C.: Correlated network data publication via differential privacy. VLDB J. 23(4), 653\u2013676 (2014)","journal-title":"VLDB J."},{"key":"3_CR17","doi-asserted-by":"crossref","unstructured":"Chen, T., Kaafar, M.A., Friedman, A., Boreli, R.: Is more always merrier? A deep dive into online social footprints. In: Proceedings of the 2012 ACM Workshop on Online Social Networks (WOSN), pp. 67\u201372 (2012)","DOI":"10.1145\/2342549.2342565"},{"key":"3_CR18","unstructured":"The cmu pronouncing dictionary (version 0.7b). http:\/\/www.speech.cs.cmu.edu\/cgi-bin\/cmudict . Accessed Feb 2015"},{"key":"3_CR19","unstructured":"Cortis, K., Scerri, S., Rivera, I., Handschuh, S.: Discovering semantic equivalence of people behind online profiles. In: Proceedings of the 5th International Workshop on Resource Discovery (RED), pp. 104\u2013118 (2012)"},{"key":"3_CR20","unstructured":"Derczynski, L., Ritter, A., Clark, S., Bontcheva, K.: Twitter part-of-speech tagging for all: overcoming sparse and noisy data. In: Proceedings of RANLP, pp. 198\u2013206 (2013)"},{"key":"3_CR21","doi-asserted-by":"crossref","unstructured":"Dinur, I., Nissim, K.: Revealing information while preserving privacy. In: Proceedings of the 22nd ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems (PODS), pp. 202\u2013210 (2003)","DOI":"10.1145\/773153.773173"},{"key":"3_CR22","doi-asserted-by":"crossref","unstructured":"Dwork, C.: Differential privacy: a survey of results. In: Proceedings of the 5th International Conference on Theory and Applications of Models of Computation, pp. 1\u201319 (2008)","DOI":"10.1007\/978-3-540-79228-4_1"},{"key":"3_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"486","DOI":"10.1007\/11761679_29","volume-title":"Advances in Cryptology - EUROCRYPT 2006","author":"C Dwork","year":"2006","unstructured":"Dwork, C., Kenthapadi, K., McSherry, F., Mironov, I., Naor, M.: Our data, ourselves: privacy via distributed noise generation. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 486\u2013503. Springer, Heidelberg (2006)"},{"issue":"1","key":"3_CR24","first-page":"8","volume":"2","author":"C Dwork","year":"2008","unstructured":"Dwork, C., Naor, M.: On the difficulties of disclosure prevention in statistical databases or the case for differential privacy. J. Priv. Confidentiality 2(1), 8 (2008)","journal-title":"J. Priv. Confidentiality"},{"issue":"7","key":"3_CR25","doi-asserted-by":"crossref","first-page":"1858","DOI":"10.1109\/TIT.2003.813506","volume":"49","author":"DM Endres","year":"2003","unstructured":"Endres, D.M., Schindelin, J.E.: A new metric for probability distributions. IEEE Trans. Inf. Theor. 49(7), 1858\u20131860 (2003)","journal-title":"IEEE Trans. Inf. Theor."},{"key":"3_CR26","unstructured":"Fast, G.: Syllable counter. http:\/\/search.cpan.org\/~gregfast\/Lingua-EN-Syllable-0.251\/Syllable.pm . Accessed Feb 2015"},{"key":"3_CR27","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/7287.001.0001","volume-title":"WordNet: An Electronic Lexical Database","author":"C Fellbaum","year":"1998","unstructured":"Fellbaum, C.: WordNet: An Electronic Lexical Database. MIT Press, Massachusetts (1998)"},{"key":"3_CR28","doi-asserted-by":"crossref","unstructured":"Goga, O., Lei, H., Parthasarathi, S.H.K., Friedland, G., Sommer, R., Teixeira, R.: Exploiting innocuous activity for correlating users across sites. In: WWW (2013)","DOI":"10.1145\/2488388.2488428"},{"issue":"1\u20133","key":"3_CR29","doi-asserted-by":"crossref","first-page":"389","DOI":"10.1023\/A:1012487302797","volume":"46","author":"I Guyon","year":"2002","unstructured":"Guyon, I., Weston, J., Barnhill, S., Vapnik, V.: Gene selection for cancer classification using support vector machines. Mach. Learn. 46(1\u20133), 389\u2013422 (2002)","journal-title":"Mach. Learn."},{"issue":"8","key":"3_CR30","doi-asserted-by":"crossref","first-page":"1849","DOI":"10.1109\/TKDE.2012.120","volume":"25","author":"R Heatherly","year":"2013","unstructured":"Heatherly, R., Kantarcioglu, M., Thuraisingham, B.: Preventing private information inference attacks on social networks. IEEE Trans. Knowl. Data Eng. 25(8), 1849\u20131862 (2013)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"3","key":"3_CR31","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1093\/llc\/13.3.111","volume":"13","author":"DI Holmes","year":"1998","unstructured":"Holmes, D.I.: The evolution of stylometry in humanities scholarship. Literary Linguist. Comput. 13(3), 111\u2013117 (1998)","journal-title":"Literary Linguist. Comput."},{"key":"3_CR32","unstructured":"Languagetool spell checker. https:\/\/languagetool.org . Accessed Feb 2015"},{"key":"3_CR33","unstructured":"Juola, P.: Detecting stylistic deception. In: Proceedings of the 2012 EACL Workshop on Computational Approaches to Deception Detection, pp. 91\u201396 (2012)"},{"issue":"1","key":"3_CR34","first-page":"1","volume":"6","author":"SP Kasivisiwanathan","year":"2014","unstructured":"Kasivisiwanathan, S.P., Smith, A.: On the \u2018Semantics\u2019 of differential privacy: a Bayesian formulation. J. Priv. Confidentiality 6(1), 1\u201316 (2014)","journal-title":"J. Priv. Confidentiality"},{"key":"3_CR35","doi-asserted-by":"crossref","unstructured":"Kifer, D., Machanavajjhala, A.: No free lunch in data privacy. In: Proceedings of the 2011 ACM SIGMOD International Conference on Management of Data, pp. 193\u2013204 (2011)","DOI":"10.1145\/1989323.1989345"},{"issue":"1","key":"3_CR36","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1002\/asi.20961","volume":"60","author":"M Koppel","year":"2009","unstructured":"Koppel, M., Schler, J., Argamon, S.: Computational methods in authorship attribution. J. Am. Soc. Inf. Sci. Technol. 60(1), 9\u201326 (2009)","journal-title":"J. Am. Soc. Inf. Sci. Technol."},{"issue":"3","key":"3_CR37","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1007\/s10994-013-5415-y","volume":"95","author":"M Kosinski","year":"2014","unstructured":"Kosinski, M., Bachrach, Y., Kohli, P., Stillwell, D., Graepel, T.: Manifestations of user personality in website choice and behaviour on online social networks. Mach. Learn. 95(3), 357\u2013380 (2014)","journal-title":"Mach. Learn."},{"key":"3_CR38","doi-asserted-by":"crossref","unstructured":"Krishnamurthy, B., Wills, C.E.: On the leakage of personally identifiable information via online social networks. In: Proceedings of the 2nd ACM Workshop on Online Social Networks (WSON), pp. 7\u201312 (2009)","DOI":"10.1145\/1592665.1592668"},{"key":"3_CR39","doi-asserted-by":"crossref","unstructured":"Li, N., Li, T.: t-closeness: privacy beyond k-anonymity and l-diversity. In: Proceedings of the 23rd International Conference on Data Engineering (ICDE) 2007","DOI":"10.1109\/ICDE.2007.367856"},{"issue":"1","key":"3_CR40","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1145\/1217299.1217302","volume":"1","author":"A Machanavajjhala","year":"2007","unstructured":"Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: l-diversity: privacy beyond k-anonymity. ACM Trans. Knowl. Discov. Data 1(1), 3 (2007)","journal-title":"ACM Trans. Knowl. Discov. Data"},{"key":"3_CR41","doi-asserted-by":"crossref","unstructured":"McCallister, E., Grance, T., Scarfone, K.A.: Sp 800\u2013122. Guide to Protecting the Confidentiality of Personally Identifiable Information (PII). Technical report (2010)","DOI":"10.6028\/NIST.SP.800-122"},{"key":"3_CR42","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"299","DOI":"10.1007\/978-3-642-31680-7_16","volume-title":"Privacy Enhancing Technologies","author":"AWE McDonald","year":"2012","unstructured":"McDonald, A.W.E., Afroz, S., Caliskan, A., Stolerman, A., Greenstadt, R.: Use fewer instances of the letter \u201ci\u201d: toward writing style anonymization. In: Fischer-H\u00fcbner, S., Wright, M. (eds.) PETS 2012. LNCS, vol. 7384, pp. 299\u2013318. Springer, Heidelberg (2012)"},{"key":"3_CR43","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1126\/science.ns-9.214S.237","volume":"9","author":"TC Mendenhall","year":"1887","unstructured":"Mendenhall, T.C.: The characteristic curves of composition. Science 9, 237\u2013249 (1887)","journal-title":"Science"},{"issue":"11","key":"3_CR44","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1145\/219717.219748","volume":"38","author":"GA Miller","year":"1995","unstructured":"Miller, G.A.: WordNet: a lexical database for english. Commun. ACM 38(11), 39\u201341 (1995)","journal-title":"Commun. ACM"},{"key":"3_CR45","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1007\/978-3-642-33167-1_18","volume-title":"Computer Security\u2013ESORICS 2012","author":"M Almishari","year":"2012","unstructured":"Almishari, M., Tsudik, G.: Exploring linkability of user reviews. In: Foresti, S., Yung, M., Martinelli, F. (eds.) ESORICS 2012. LNCS, vol. 7459, pp. 307\u2013324. Springer, Heidelberg (2012)"},{"key":"3_CR46","doi-asserted-by":"crossref","unstructured":"Narayanan, A., Paskov, H., Gong, N.Z., Bethencourt, J., Stefanov, E., Shin, E.C.R., Song, D.: On the feasibility of internet-scale author identification. In: Proceedings of the 33rd IEEE Symposium on Security and Privacy (S&P), pp. 300\u2013314 (2012)","DOI":"10.1109\/SP.2012.46"},{"issue":"6","key":"3_CR47","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1145\/1743546.1743558","volume":"53","author":"A Narayanan","year":"2010","unstructured":"Narayanan, A., Shmatikov, V.: Myths, fallacies of \u201cPersonally Identifiable Information\u201d. Commun. ACM 53(6), 24\u201326 (2010)","journal-title":"Commun. ACM"},{"key":"3_CR48","doi-asserted-by":"crossref","unstructured":"Narayanan, A., Shmatikov, V.: De-anonymizing social networks. In: Proceedings of the 30th IEEE Symposium on Security and Privacy (S&P), pp. 173\u2013187 (2009)","DOI":"10.1109\/SP.2009.22"},{"key":"3_CR49","unstructured":"Oakes, M.P.: Ant colony optimisation for stylometry: the federalist papers. In: Proceedings of the 5th International Conference on Recent Advances in Soft Computing, pp. 86\u201391 (2004)"},{"issue":"2","key":"3_CR50","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1093\/llc\/fqs003","volume":"27","author":"L Pearl","year":"2012","unstructured":"Pearl, L., Steyvers, M.: Detecting authorship deception: a supervised machine learning approach using author writeprints. Literary Linguist. Comput. 27(2), 183\u2013196 (2012)","journal-title":"Literary Linguist. Comput."},{"key":"3_CR51","unstructured":"Scerri, S., Cortis, K., Rivera, I., Handschuh, S.: Knowledge discovery in distributed social web sharing activities. In: Proceedings of the 3rd International Workshop on Modeling Social Media: Collective Intelligence in Social Media (MSM) (2012)"},{"key":"3_CR52","unstructured":"Scerri, S., Gimenez, R., Herman, F., Bourimi, M., Thiel, S.: digital.me-towards an integrated Personal Information Sphere. In: Federated Social Web Summit Europe (2011)"},{"key":"3_CR53","doi-asserted-by":"crossref","unstructured":"Sharma, N.K., Ghosh, S., Benevenuto, F., Ganguly, N., Gummadi, K.: Inferring who-is-who in the twitter social network. In: Proceedings of the 2012 ACM Workshop on Workshop on Online Social Networks (WSON), pp. 55\u201360 (2012)","DOI":"10.1145\/2342549.2342563"},{"issue":"5","key":"3_CR54","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 10(5), 557\u2013570 (2002)","journal-title":"Int. J. Uncertain. Fuzziness Knowl. Based Syst."},{"key":"3_CR55","doi-asserted-by":"crossref","unstructured":"Toutanova, K., Klein, D., Manning, C.D., Singer, Y.: Feature-rich part-of-speech tagging with a cyclic dependency network. In: Proceedings of the 2003 Conference of the North American Chapter of the Association for Computational Linguistics on Human Language Technology, pp. 173\u2013180 (2003)","DOI":"10.3115\/1073445.1073478"},{"key":"3_CR56","doi-asserted-by":"crossref","unstructured":"Toutanova, K., Manning, C.D.: Enriching the knowledge sources used in a maximum entropy part-of-speech tagger. In: Proceedings of the 2000 Joint SIGDAT conference on Empirical Methods in Natural Language Processing and Very Large Corpora, pp. 63\u201370 (2000)","DOI":"10.3115\/1117794.1117802"},{"key":"3_CR57","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"crossref","first-page":"969","DOI":"10.1007\/11562214_84","volume-title":"Natural Language Processing\u2013IJCNLP 2005","author":"\u00d6 Uzuner","year":"2005","unstructured":"Uzuner, \u00d6., Katz, B.: A comparative study of language models for book and author recognition. In: Dale, R., Wong, K.-F., Su, J., Kwong, O.Y. (eds.) IJCNLP 2005. LNCS (LNAI), vol. 3651, pp. 969\u2013980. Springer, Heidelberg (2005)"},{"key":"3_CR58","unstructured":"Wikipedia. Lists of common misspellings\/for machines. http:\/\/en.wikipedia.org\/w\/index.php?title=Wikipedia:Lists_of_common_misspellings\/For_machines&oldid=640791958 . Accessed Feb 2015"},{"key":"3_CR59","doi-asserted-by":"crossref","unstructured":"Zheleva, E., Getoor, L.: To join or not to join: the illusion of privacy in social networks with mixed public and private user profiles. In: Proceedings of the 18th International Conference on World Wide Web (WWW), pp. 531\u2013540 (2009)","DOI":"10.1145\/1526709.1526781"},{"key":"3_CR60","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1007\/978-1-4419-8462-3_10","volume-title":"Social Network Data Analytics","author":"E Zheleva","year":"2011","unstructured":"Zheleva, E., Getoor, L.: Privacy in social networks: a survey. In: Aggarwal, C.C. (ed.) Social Network Data Analytics, pp. 277\u2013306. Springer, New York (2011)"},{"issue":"1","key":"3_CR61","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1007\/s10115-010-0311-2","volume":"28","author":"B Zhou","year":"2011","unstructured":"Zhou, B., Pei, J.: The k-anonymity and l-diversity approaches for privacy preservation in social networks against neighborhood attacks. Knowl. Inf. Syst. 28(1), 47\u201377 (2011)","journal-title":"Knowl. Inf. Syst."}],"container-title":["Lecture Notes in Computer Science","Foundations of Security Analysis and Design VIII"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-43005-8_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,12]],"date-time":"2019-09-12T10:47:37Z","timestamp":1568285257000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-43005-8_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319430041","9783319430058"],"references-count":61,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-43005-8_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}