{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T09:50:24Z","timestamp":1725702624439},"publisher-location":"Berlin, Heidelberg","reference-count":3,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642331602"},{"type":"electronic","value":"9783642331619"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33161-9_63","type":"book-chapter","created":{"date-parts":[[2012,9,20]],"date-time":"2012-09-20T09:57:47Z","timestamp":1348135067000},"page":"448-453","source":"Crossref","is-referenced-by-count":0,"title":["Vulnerability Assessment in the Food Chain \u2013 A Way to Do It"],"prefix":"10.1007","author":[{"given":"Anja","family":"Buschulte","sequence":"first","affiliation":[]},{"given":"Britta","family":"M\u00fcller-Wahl","sequence":"additional","affiliation":[]},{"given":"Annemarie","family":"K\u00e4sbohrer","sequence":"additional","affiliation":[]},{"given":"Bernd","family":"Appel","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"63_CR1","unstructured":"World Health Organization 2008. Terrorist threats to food: guidance for establish-ing and strengthening prevention and response systems (2008), \n                    \n                      http:\/\/www.who.int\/foodsafety\/publications\/general\/en\/terrorist.pdf\n                    \n                    \n                   (revision May 2008)"},{"key":"63_CR2","unstructured":"Regulation (EC) No 178\/2002 of the European Parliament and of the Council of 28 January 2002 laying down the general principles and requirements of food law, establishing the European Food Safety Authority and laying down procedures in matters of food safety. OJ L 31, pp. 1\u201324 (February 1, 2002)"},{"key":"63_CR3","unstructured":"http:\/\/www.fda.gov\/Food\/FoodDefense\/ToolsResources\/ucm295900.htm"}],"container-title":["Communications in Computer and Information Science","Future Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33161-9_63.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T07:57:29Z","timestamp":1620115049000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-33161-9_63"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642331602","9783642331619"],"references-count":3,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33161-9_63","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2012]]}}}