{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T13:50:46Z","timestamp":1770040246384,"version":"3.49.0"},"reference-count":15,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2016,8,19]],"date-time":"2016-08-19T00:00:00Z","timestamp":1471564800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2016,9]]},"DOI":"10.1007\/s10586-016-0617-2","type":"journal-article","created":{"date-parts":[[2016,8,19]],"date-time":"2016-08-19T09:38:15Z","timestamp":1471599495000},"page":"1607-1617","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["A study on smart door lock control system"],"prefix":"10.1007","volume":"19","author":[{"given":"Jeong-ile","family":"Jeong","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,8,19]]},"reference":[{"key":"617_CR1","unstructured":"http:\/\/www.kcc.go.kr\/tsi\/etc\/search\/search\/ASC_integrationsearch.jsp?page=A1001000"},{"issue":"8","key":"617_CR2","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1016\/S1353-4858(11)70086-1","volume":"2011","author":"C Tankard","year":"2011","unstructured":"Tankard, C.: Persistent threats and how to monitor and deter them. Netw. Secur. 2011(8), 16\u201319 (2011)","journal-title":"Netw. Secur."},{"key":"617_CR3","unstructured":"Symantec, \u201cSymantec Internet Security Threat Report,\u201d Symantec, vol. 17 (2011)"},{"key":"617_CR4","unstructured":"Coviello, A.W.: Open letter to RSA customers, www.rsa.com\/node.aspx?id=3872 (2011)"},{"issue":"1","key":"617_CR5","first-page":"44","volume":"23","author":"SB Han","year":"2013","unstructured":"Han, S.B., Hong, S.K.: A study on responses against in the financial sector for APT attack. Korea Inst. Inf. Secur. Cryptol. 23(1), 44\u201353 (2013)","journal-title":"Korea Inst. Inf. Secur. Cryptol."},{"key":"617_CR6","unstructured":"http:\/\/www.hauri.co.kr\/customer\/security\/colum_view.html?intSeq=93&page=1"},{"key":"617_CR7","doi-asserted-by":"crossref","unstructured":"Sung, A., Zu, J., Chavez, P., Mukkamala, S.: Static Analyzer for Vicious Executavles (SAVE). In: 20th Annual Computer Security Applications Conference, pp. 326\u2013334 (2004)","DOI":"10.1109\/CSAC.2004.37"},{"key":"617_CR8","unstructured":"Bergeron, J., Debbabi, M., Desharnais, J., Erhioui, M.M., Lavoie, Y., Tawbi, N.: Static Detection of Malicious Code in Executable Programs, SREIS \u201901 (2001)"},{"key":"617_CR9","unstructured":"Masood, S.G.: Malware analysis for administrators, http:\/\/www.securityfocus.com\/infocus\/1780 (2004)"},{"key":"617_CR10","doi-asserted-by":"crossref","unstructured":"Chaang, C.-W., Tsai, D.-R., Tsai, J.-M.: A cross-site patch management model and architecture design for large scale heterogeneous environment. In: Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology (CCST \u201905), pp. 41\u201346. IEEE (2005)","DOI":"10.1109\/CCST.2005.1594837"},{"key":"617_CR11","unstructured":"Shon, T., Moon, J., Lee, C., Im, E.G., Seo, J.T.: Safe patch distribution architecture in intranet environments. In: Proceedings of the International Conference on Security and Management (SAM\u201903), pp. 455\u2013460 (2003)"},{"key":"617_CR12","unstructured":"Tak, B.C., Chung, Y.D., Kim, M.H.: Improving fault tolerance for high-capacity shared distrbuted file systems using the rotational lease under network partitioning. Korea Inst. Inf. Sci. Eng. 32(6), 616\u2013628 (2005)"},{"key":"617_CR13","unstructured":"Curtis, PW.: Using SANs and NAS. O\u2019Reilly, Cambridge (2002)"},{"issue":"11","key":"617_CR14","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1145\/353360.353362","volume":"43","author":"GA Gibson","year":"2000","unstructured":"Gibson, G.A., Meter, R.V.: Network attached storage architecture. Commun ACM 43(11), 37\u201345 (2000)","journal-title":"Commun ACM"},{"issue":"2","key":"617_CR15","first-page":"9","volume":"16","author":"WB Lee","year":"2007","unstructured":"Lee, W.B., Park, J.W.: Application of group master Cachefor the integrated environment of SAN and NAS. Korea Soc. Simul. 16(2), 9\u201315 (2007)","journal-title":"Korea Soc. Simul."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-016-0617-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10586-016-0617-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-016-0617-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T21:00:32Z","timestamp":1498338032000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10586-016-0617-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8,19]]},"references-count":15,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2016,9]]}},"alternative-id":["617"],"URL":"https:\/\/doi.org\/10.1007\/s10586-016-0617-2","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,8,19]]}}}