{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T05:35:03Z","timestamp":1725600903792},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642232992"},{"type":"electronic","value":"9783642233005"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-23300-5_29","type":"book-chapter","created":{"date-parts":[[2011,8,17]],"date-time":"2011-08-17T12:34:23Z","timestamp":1313584463000},"page":"374-385","source":"Crossref","is-referenced-by-count":2,"title":["IT Issues on Homeland Security and Defense"],"prefix":"10.1007","author":[{"given":"Kangbin","family":"Yim","sequence":"first","affiliation":[]},{"given":"Ilsun","family":"You","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"10","key":"29_CR1","first-page":"9","volume":"2","author":"T.M. Moseley","year":"2006","unstructured":"Moseley, T.M.: Homeland Operations. Air Force Doctrine Document\u00a02(10), 9\u201310 (2006)","journal-title":"Air Force Doctrine Document"},{"key":"29_CR2","doi-asserted-by":"crossref","unstructured":"Sharp, W.L.: Homeland Security. JP 3-27 (2007), http:\/\/www.fas.org\/irp\/doddir\/dod\/jp3_27.pdf","DOI":"10.1057\/9780230605114_2"},{"key":"29_CR3","unstructured":"Martyn, A.: The Right of Self-Defence under International Law-the Response to the Terrorist Attacks of September 11. Australian Law and Bills Digest Group (2002)"},{"key":"29_CR4","doi-asserted-by":"crossref","unstructured":"Ruby, C.L.: The Definition of Terrorism. In: Analyses of Social Issues and Public Policy, pp. 9\u201314 (2002)","DOI":"10.1111\/j.1530-2415.2002.00021.x"},{"key":"29_CR5","unstructured":"Department of Homeland Security, http:\/\/www.dhs.gov\/index.shtm"},{"key":"29_CR6","unstructured":"The Best Source for Digital Video and Network (IP) Security Products, http:\/\/www.cctvsentry.com\/"},{"key":"29_CR7","unstructured":"Network camera developments enable live web imaging. White paper, Axis (1999)"},{"key":"29_CR8","doi-asserted-by":"crossref","unstructured":"IKebe, Oqawa, Hatayanma: Network camera system using new home network architure with flexible scalability. In: International Conference on ICCE 2005, pp. 151\u2013152 (2005)","DOI":"10.1109\/ICCE.2005.1429762"},{"key":"29_CR9","unstructured":"Lee, K., Yim, K., Mikki, M.: A secure framework of the surveillance video network integrating heterogeneous video formats and protocols. Submitted to be Published on the Journal of Computers and Mathematics with Applications"},{"issue":"1","key":"29_CR10","first-page":"46","volume":"1","author":"K. Lee","year":"2010","unstructured":"Lee, K., Yim, K.: Safe Authentication Protocol for Secure USB Memories. Journal of Wireless Mobile Networks, Ubiquitous Computing and Dependable Applications (JoWUA)\u00a01(1), 46\u201355 (2010)","journal-title":"Journal of Wireless Mobile Networks, Ubiquitous Computing and Dependable Applications (JoWUA)"}],"container-title":["Lecture Notes in Computer Science","Availability, Reliability and Security for Business, Enterprise and Health Information Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-23300-5_29.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T03:12:29Z","timestamp":1606187549000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-23300-5_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642232992","9783642233005"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-23300-5_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}