{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T19:15:39Z","timestamp":1743016539755,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":4,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642198526"},{"type":"electronic","value":"9783642198533"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-19853-3_98","type":"book-chapter","created":{"date-parts":[[2011,4,18]],"date-time":"2011-04-18T00:31:37Z","timestamp":1303086697000},"page":"664-669","source":"Crossref","is-referenced-by-count":1,"title":["Research on Detection of Instant Messaging Software"],"prefix":"10.1007","author":[{"given":"Hao","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Guangli","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Jianmin","family":"Li","sequence":"additional","affiliation":[]},{"given":"Lili","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"98_CR1","doi-asserted-by":"crossref","unstructured":"Joe, L.: Best practices for instant messaging in business. Network Security (2005)","DOI":"10.1016\/S1353-4858(05)70233-6"},{"key":"98_CR2","unstructured":"Harlan, C.: Instant messaging investigations on a live Windows XP system. Digital Investigation (2004)"},{"key":"98_CR3","volume-title":"Special edition using TCP\/IP","author":"R.W. Stevens","year":"2003","unstructured":"Stevens, R.W.: Special edition using TCP\/IP, 2nd edn. Que Publishing, American (2003)","edition":"2"},{"key":"98_CR4","doi-asserted-by":"crossref","unstructured":"Yu, W., Chellappan, S., Wang, X., et al.: Peer-to-Peer system-based active worm attacks: modeling, analysis and defense. Computer Communications (2008)","DOI":"10.1016\/j.comcom.2008.08.008"}],"container-title":["Communications in Computer and Information Science","Information and Automation"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-19853-3_98","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,23]],"date-time":"2019-05-23T00:07:50Z","timestamp":1558570070000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-19853-3_98"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642198526","9783642198533"],"references-count":4,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-19853-3_98","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2011]]}}}