{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T17:29:05Z","timestamp":1725902945311},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319615417"},{"type":"electronic","value":"9783319615424"}],"license":[{"start":{"date-parts":[[2017,7,5]],"date-time":"2017-07-05T00:00:00Z","timestamp":1499212800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-61542-4_55","type":"book-chapter","created":{"date-parts":[[2017,7,4]],"date-time":"2017-07-04T04:02:27Z","timestamp":1499140947000},"page":"563-570","source":"Crossref","is-referenced-by-count":0,"title":["A New Collaborative Knowledge Integration Scheme"],"prefix":"10.1007","author":[{"given":"Shian-Shyong","family":"Tseng","sequence":"first","affiliation":[]},{"given":"Yuh-Jye","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,5]]},"reference":[{"unstructured":"Advanced persistent threat Wikipedia. https:\/\/en.wikipedia.org\/wiki\/Advanced_persistent_threat","key":"55_CR1"},{"unstructured":"Tseng, S.S., Ku, C.H., Lee, T.J., Geng, G.G., Wang, Y.J.: Building a frame-based anti-phishing model based on phishing ontology. In: Proceedings of the AIT2013 (2013)","key":"55_CR2"},{"unstructured":"Lee, T.-J., et al.: Game-based Anti-Phishing Training. In: Proceedings of the TWELF (2010)","key":"55_CR3"},{"unstructured":"Tung, Y.-H., et al.: Building a frame-based content generation approach for APT prevention education. In: Proceedings of the International Conference on e-Learning, e-Business, Enterprise Information Systems, and e-Government (EEE), p. 1. The Steering Committee of the World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp), January 2014","key":"55_CR4"},{"unstructured":"Tseng, S.-S., et al.: Building a game-based internet security learning system by ontology crystallization approach. In: Proceedings of the International Conference on e-Learning, e-Business, Enterprise Information Systems, and e-Government (EEE), p. 98. The Steering Committee of the World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp), January 2015","key":"55_CR5"},{"issue":"8","key":"55_CR6","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1016\/S1353-4858(11)70086-1","volume":"2011","author":"C Tankard","year":"2011","unstructured":"Tankard, C.: Advanced persistent threats and how to monitor and deter them. Netw. Secur. 2011(8), 16\u201319 (2011)","journal-title":"Netw. Secur."},{"doi-asserted-by":"crossref","unstructured":"Qi, M., Zou, C.-Y.: A study of anti-phishing strategies based on TRIZ. In: International Conference on Networks Security, Wireless Communications and Trusted Computing, NSWCTC 2009, vol. 2, pp. 536\u2013538. IEEE (2009)","key":"55_CR7","DOI":"10.1109\/NSWCTC.2009.154"},{"key":"55_CR8","volume-title":"Piaget\u2019s theory of intellectual development","author":"HP Ginsburg","year":"1988","unstructured":"Ginsburg, H.P., Opper, S.: Piaget\u2019s theory of intellectual development. Prentice-Hall Inc., New Jersey (1988)"},{"unstructured":"Escobar, C.R.: Understanding our cognitive processes. Int. Educ. Res. J. 3(3) (2017)","key":"55_CR9"},{"doi-asserted-by":"crossref","unstructured":"Haopu, Y.: Method for behavior-prediction of APT attack based on dynamic Bayesian game. In: 2016 IEEE International Conference on Cloud Computing and Big Data Analysis (ICCCBDA), pp. 177\u2013182. IEEE, July 2016","key":"55_CR10","DOI":"10.1109\/ICCCBDA.2016.7529554"},{"doi-asserted-by":"crossref","unstructured":"Tseng, S.S., Ku, C.H., Lu, A.C., Wang, Y.J., Geng, G.G.: Building a self-organizing phishing model based upon dynamic EMCUD. In: 2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 509\u2013512. IEEE, October 2013","key":"55_CR11","DOI":"10.1109\/IIH-MSP.2013.132"},{"key":"55_CR12","doi-asserted-by":"crossref","first-page":"158","DOI":"10.1016\/j.cie.2016.11.010","volume":"103","author":"J Wang","year":"2017","unstructured":"Wang, J., Wei, W., Ding, L., Li, J.: Method for analyzing the knowledge collaboration effect of R&D project teams based on bloom\u2019s taxonomy. Comput. Ind. Eng. 103, 158\u2013167 (2017)","journal-title":"Comput. Ind. Eng."},{"issue":"1","key":"55_CR13","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1515\/jisys-2015-0046","volume":"26","author":"G Yu","year":"2017","unstructured":"Yu, G., Yang, Y., Qingsong, X.: An ontology-based approach for knowledge integration in product collaborative development. J. Intell. Syst. 26(1), 35\u201346 (2017)","journal-title":"J. Intell. Syst."},{"doi-asserted-by":"crossref","unstructured":"Suominen, A., M\u00e4enp\u00e4\u00e4, S., Breite, R.: Expert knowledge integration\u2014a systematic approach for multi-stakeholder innovation. In: Practices for Network Management, pp. 113\u2013129. Springer International Publishing, Cham (2017)","key":"55_CR14","DOI":"10.1007\/978-3-319-49649-8_9"},{"unstructured":"Weng, J.-F.: A self-organizing behavior modeling on programming e-learning. Ph. D. Dissertation, Department of Computer Science, National Chiao Tung University, Hsinchu, Taiwan, R.O.C., December (2010)","key":"55_CR15"}],"container-title":["Advances in Intelligent Systems and Computing","Innovative Mobile and Internet Services in Ubiquitous Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-61542-4_55","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,11]],"date-time":"2020-10-11T09:52:23Z","timestamp":1602409943000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-61542-4_55"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7,5]]},"ISBN":["9783319615417","9783319615424"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-61542-4_55","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2017,7,5]]}}}