{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T13:21:42Z","timestamp":1725888102209},"publisher-location":"Singapore","reference-count":4,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811050404"},{"type":"electronic","value":"9789811050411"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-981-10-5041-1_42","type":"book-chapter","created":{"date-parts":[[2017,5,13]],"date-time":"2017-05-13T03:14:39Z","timestamp":1494645279000},"page":"247-251","source":"Crossref","is-referenced-by-count":0,"title":["A Study on the Management Structure of Vulnerability Information in IoT Environment"],"prefix":"10.1007","author":[{"given":"Eunhye","family":"Ko","sequence":"first","affiliation":[]},{"given":"Taeeun","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Hwankuk","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,14]]},"reference":[{"key":"42_CR1","unstructured":"Symantec, IoT devices being increasingly used for DDoS attacks. http:\/\/www.symantec.com\/connect\/blogs\/iot-devices-being-increasingly-used-ddos-attacks"},{"key":"42_CR2","doi-asserted-by":"crossref","unstructured":"Durumeric, Z., Adrian, D., Mirian, A., Bailey, M., Halderman, J.A.: A search engine backed by internet-wide scanning. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 542\u2013553. ACM (2015)","DOI":"10.1145\/2810103.2813703"},{"key":"42_CR3","unstructured":"Barnum, S.: Standardizing cyber threat intelligence information with the Structured Threat Information eXpression (STIX\u2122). MITRE Corporation 11 (2012)"},{"key":"42_CR4","doi-asserted-by":"crossref","unstructured":"Na, S., Kim, T., Kim, H.: A study on the classification of common vulnerabilities and exposures using na\u00efve bayes. In: Proceedings of the 11th International Conference on Broad-Band Wireless Computing, Communication and Applications. BWCCA (2016)","DOI":"10.1007\/978-3-319-49106-6_65"}],"container-title":["Lecture Notes in Electrical Engineering","Advanced Multimedia and Ubiquitous Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-5041-1_42","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,24]],"date-time":"2019-09-24T12:08:49Z","timestamp":1569326929000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-5041-1_42"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9789811050404","9789811050411"],"references-count":4,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-5041-1_42","relation":{},"ISSN":["1876-1100","1876-1119"],"issn-type":[{"type":"print","value":"1876-1100"},{"type":"electronic","value":"1876-1119"}],"subject":[],"published":{"date-parts":[[2017]]}}}