{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,5]],"date-time":"2022-04-05T04:10:17Z","timestamp":1649131817721},"reference-count":11,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2014,11,1]],"date-time":"2014-11-01T00:00:00Z","timestamp":1414800000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2014,11]]},"DOI":"10.1007\/s11623-014-0299-y","type":"journal-article","created":{"date-parts":[[2014,11,14]],"date-time":"2014-11-14T13:20:33Z","timestamp":1415971233000},"page":"752-756","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Aufbau eines neuronalen Netzes zur Schwachstellenaggregation"],"prefix":"10.1007","volume":"38","author":[{"given":"Alexander","family":"Beck","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,11,6]]},"reference":[{"key":"299_CR1","first-page":"9","volume-title":"Computer Security Division \u2014 U.S. Department of Commerce, National Institute of Standards and Technology","author":"W Jansen","year":"2009","unstructured":"Wayne Jansen: Directions in Security Metrics Research. In: Computer Security Division \u2014 U.S. Department of Commerce, National Institute of Standards and Technology (2009) 9\u201314"},{"key":"299_CR2","unstructured":"syssec: D.A.CH Security 2013, Frechen, 2013."},{"key":"299_CR3","volume-title":"Begriff e der Informationstechnik","author":"R Dierstein","year":"2001","unstructured":"R\u00fcdiger Dierstein: Begriff e der Informationstechnik. Technische Universit\u00e4t M\u00fcnchen (2001) 5ff."},{"key":"299_CR4","first-page":"9","volume":"3\u20135","author":"P Mell","year":"2007","unstructured":"Peter Mell, Karen Scarfone, Sasha Romanosky: A Complete Guide to the Common Vulnerability Scoring System Version 2.0. In: Forum of Incident Response and Security Teams (2007) 3\u20135, 9\u201312","journal-title":"Forum of Incident Response and Security Teams"},{"key":"299_CR5","first-page":"3","volume-title":"ERNW Newsletter","author":"D-J R\u00f6cher","year":"2007","unstructured":"Dror-John R\u00f6cher: Metrikbasiertes Patchen mit CVSS 2.0 Konzept mit Methode. In: ERNW Newsletter (2007) 3"},{"key":"299_CR6","volume-title":"Ein kleiner \u00fcberblick \u00fcber Neuronale Netze","author":"D Kriesel","year":"2007","unstructured":"D. Kriesel: Ein kleiner \u00fcberblick \u00fcber Neuronale Netze, 2007. \n                    http:\/\/www.dkriesel.com\/science\/neural_networks\n                    \n                  . [Zugriff im M\u00e4rz 2014]."},{"key":"299_CR7","volume-title":"CVSS-Guide","author":"FIRST","year":"2014","unstructured":"FIRST: CVSS-Guide, 2014. \n                    http:\/\/www.first.org\/cvss\/cvss-guide.html\n                    \n                  . [Zugriff im Januar 2014]."},{"key":"299_CR8","volume-title":"Introduction to Neural Networks for C#","author":"J Heaton","year":"2008","unstructured":"J. Heaton: Introduction to Neural Networks for C#, 2nd Edition, Heaton Research, Inc., 2008.","edition":"2nd Edition"},{"key":"299_CR9","volume-title":"Programming Neural Networks with Encog2 in C#","author":"J Heaton","year":"2010","unstructured":"J. Heaton, Programming Neural Networks with Encog2 in C#, Heaton Research, Inc., 2010."},{"key":"299_CR10","volume-title":"Introduction to the Math of Neural Networks","author":"J Heaton","year":"2012","unstructured":"J. Heaton: Introduction to the Math of Neural Networks, Heaton Research, 2012."},{"key":"299_CR11","volume-title":"Information-Theoretic Aspects of Neural Networks","author":"P S Neelakanta","year":"1999","unstructured":"P. S. Neelakanta, Information-Theoretic Aspects of Neural Networks, CRC Press LLC, 1999."}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-014-0299-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-014-0299-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-014-0299-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-014-0299-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T18:22:44Z","timestamp":1559413364000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-014-0299-y"}},"subtitle":["Automatisierte Sicherheitsbewertung von Systemen"],"short-title":[],"issued":{"date-parts":[[2014,11]]},"references-count":11,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2014,11]]}},"alternative-id":["299"],"URL":"https:\/\/doi.org\/10.1007\/s11623-014-0299-y","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,11]]}}}