{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T03:30:09Z","timestamp":1761708609652},"publisher-location":"Berlin, Heidelberg","reference-count":7,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642176098"},{"type":"electronic","value":"9783642176104"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-17610-4_19","type":"book-chapter","created":{"date-parts":[[2010,11,24]],"date-time":"2010-11-24T12:57:18Z","timestamp":1290603438000},"page":"171-178","source":"Crossref","is-referenced-by-count":2,"title":["Optimal Intelligent Supervisory Control System in Cyber-Physical Intelligence"],"prefix":"10.1007","author":[{"given":"Hoon","family":"Ko","sequence":"first","affiliation":[]},{"given":"Zita","family":"Vale","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"19_CR1","doi-asserted-by":"crossref","unstructured":"Lai, C.-F., Ma, Y.-W., Chang, S.-Y., Chao, H.-C., Huang, Y.-M.: OSGi-based services architecture for Cyber-Physical Home Control Systems. Computer Communications, 1\u20138, in Press, Corrected Proof, Available online April 2, 2010 (2010)","DOI":"10.1016\/j.comcom.2010.03.034"},{"issue":"6","key":"19_CR2","first-page":"473","volume":"6","author":"G.A. Cagalaban","year":"2008","unstructured":"Cagalaban, G.A., So, Y., Kim, S.: SCADA Network Insecurity: Securing Critical Infrastructures through SCADA Security Exploitation. Journal of Security Engineering\u00a06(6), 473\u2013482 (2008)","journal-title":"Journal of Security Engineering"},{"issue":"4","key":"19_CR3","doi-asserted-by":"publisher","first-page":"68","DOI":"10.4156\/jcit.vol4.issue4.11","volume":"4","author":"H. Ko","year":"2009","unstructured":"Ko, H., Freitas, C., Goreti, M., Ramos, C.: A study on Users Authentication Methods for Safety Group Decision System in Dybanic Small Group. Journal of Convergence Information Technology\u00a04(4), 68\u201376 (2009)","journal-title":"Journal of Convergence Information Technology"},{"key":"19_CR4","doi-asserted-by":"crossref","first-page":"391","DOI":"10.1007\/s00779-008-0212-5","volume":"13","author":"J. Krumm","year":"2009","unstructured":"Krumm, J.: A survey of computational location privacy. Pervasive Ubiquitous Computing\u00a0(13), 391\u2013399 (2009)","journal-title":"Pervasive Ubiquitous Computing"},{"key":"19_CR5","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1207\/s15327051hci2004_2","volume":"20","author":"N.A. Bradley","year":"2005","unstructured":"Bradley, N.A., Dunlop, M.D.: Toward a Multidisciplinary Model of Context to Support Context-Aware Computing. Human-Computer Interaction\u00a020, 403\u2013446 (2005)","journal-title":"Human-Computer Interaction"},{"key":"19_CR6","doi-asserted-by":"crossref","unstructured":"Pipattansaomporn, M., Feroze, H., Rahman, S.: Multi-Agent Systems in a Distributed Smart Grid: Design and Implementation. In: IEEE PES2009 Power Systems Conference and Exposition (PSCE 2009), Seattle, Washington, USA, pp. 1\u20137 (March 2009)","DOI":"10.1109\/PSCE.2009.4840087"},{"issue":"17","key":"19_CR7","doi-asserted-by":"publisher","first-page":"2888","DOI":"10.1016\/j.comnet.2009.06.008","volume":"53","author":"T. Mukherjee","year":"2009","unstructured":"Mukherjee, T., Banerjee, A., Varsamopoulos, G., Gupta, S.K.S., Rungta, S.: Spatio-temporal thermal-aware job scheduling to minimize energy consumption in virtualized heterogeneous data centers. Computer Networks\u00a053(17), 2888\u20132904 (2009)","journal-title":"Computer Networks"}],"container-title":["Communications in Computer and Information Science","Security Technology, Disaster Recovery and Business Continuity"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-17610-4_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,6]],"date-time":"2019-06-06T14:14:32Z","timestamp":1559830472000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-17610-4_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642176098","9783642176104"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-17610-4_19","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2010]]}}}