{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:31:51Z","timestamp":1725517911184},"publisher-location":"Berlin, Heidelberg","reference-count":6,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540855668"},{"type":"electronic","value":"9783540855675"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-85567-5_80","type":"book-chapter","created":{"date-parts":[[2008,8,31]],"date-time":"2008-08-31T21:37:43Z","timestamp":1220218663000},"page":"650-657","source":"Crossref","is-referenced-by-count":1,"title":["About the Buildings\u2019 Danger Control Systems Vulnerabilities"],"prefix":"10.1007","author":[{"given":"Daniela E.","family":"Popescu","sequence":"first","affiliation":[]},{"given":"Marcela F.","family":"Prada","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"80_CR1","volume-title":"Security Engineering \u2013 A Guide to Building Dependable Distributed Systems","author":"R. Anderson","year":"2008","unstructured":"Anderson, R.: Security Engineering \u2013 A Guide to Building Dependable Distributed Systems, 2nd edn. Wiley Computer Publishing, Chichester (2008)","edition":"2"},{"key":"80_CR2","unstructured":"Cerberus, A.G.: Danger Management System, Switzerland, white Papers, pp. III.3-III.25 (2004)"},{"key":"80_CR3","unstructured":"Napco Security Systems, Inc., Gem-P3200, Control Panel \u2013 Programming Instructions, New York (2000)"},{"key":"80_CR4","unstructured":"Digital Security Controls Ltd., Panel Control PC5010 \u2013 Installation Manual, Canada (2002)"},{"key":"80_CR5","unstructured":"Digital Security Controls Ltd, Panel Control PC5010 \u2013 Programming Worksheets, Canada (2001)"},{"key":"80_CR6","unstructured":"Digital Security Controls Ltd., Panel Control PC5020 \u2013 Installation Manual, Canada (2000)"}],"container-title":["Lecture Notes in Computer Science","Knowledge-Based Intelligent Information and Engineering Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-85567-5_80.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:41:55Z","timestamp":1619509315000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-85567-5_80"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540855668","9783540855675"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-85567-5_80","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}