{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,31]],"date-time":"2022-03-31T12:54:08Z","timestamp":1648731248263},"reference-count":17,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2018,9,18]],"date-time":"2018-09-18T00:00:00Z","timestamp":1537228800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1007\/s11623-018-1012-3","type":"journal-article","created":{"date-parts":[[2018,9,18]],"date-time":"2018-09-18T03:17:13Z","timestamp":1537240633000},"page":"618-622","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Maschinelles Lernen und k\u00fcnstliche Intelligenz in der Informationssicherheit"],"prefix":"10.1007","volume":"42","author":[{"given":"Thomas","family":"Dullien","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,18]]},"reference":[{"key":"1012_CR1","doi-asserted-by":"crossref","unstructured":"Griewank und Walther: Evaluating derivatives, Society for Industrial and Applied Mathematics (SIAM), 2. Auflage, 2008.","DOI":"10.1137\/1.9780898717761"},{"key":"1012_CR2","unstructured":"Online verf\u00fcgbar unter: \n                    https:\/\/github.com\/uber\/horovod\n                    \n                   (zuletzt abgerufen: 15. Juli 2018)"},{"key":"1012_CR3","unstructured":"Broder: On the Resemblance and Containment of Documents, In Compression and Complexity of Sequences, 1997."},{"key":"1012_CR4","doi-asserted-by":"crossref","unstructured":"Charikar: Similarity Estimation Technique from Rounding Algorithms, Proceedings of the 34th Annual ACM Symposium on Theory of Computing, 2002.","DOI":"10.1145\/509907.509965"},{"key":"1012_CR5","unstructured":"Gionis, Indyk und Motwani: Similarity Search in High Dimensions via Hashing. Proceedings of the 25th Very Large Database (VLDB) Conference, 1999."},{"key":"1012_CR6","unstructured":"Online verf\u00fcgbar unter: \n                    https:\/\/github.com\/spotify\/annoy\n                    \n                   (zuletzt abgerufen: 15. Juli 2018)"},{"key":"1012_CR7","unstructured":"Online verf\u00fcgbar unter: \n                    https:\/\/github.com\/facebookresearch\/faiss\n                    \n                   (zuletzt abgerufen: 15. Juli 2018)"},{"key":"1012_CR8","doi-asserted-by":"crossref","unstructured":"Auer, Peter; Cesa-Bianchi, Nicol\u00f2; Fischer, Paul: Finite-time Analysis of the Multiarmed Bandit Problem. Journal Machine Learning, Volume 47, Issue 2\u20133, May-June 2002.","DOI":"10.1023\/A:1013689704352"},{"key":"1012_CR9","unstructured":"Coulom, Remi: Efficient Selectivity and Backup Operators in Monte-Carlo Tree Search, 2006, Online verf\u00fcgbar unter \n                    https:\/\/www.remi-coulom.fr\/CG2006\/CG2006.pdf\n                    \n                   (zuletzt abgerufen: 15. Juli 2018)"},{"key":"1012_CR10","doi-asserted-by":"crossref","unstructured":"Biggio, Battista; Roli, Fabio: Wild patterns\u2013Ten years after the rise of adversarial machine learning, Journal Pattern Recognition, 2018","DOI":"10.1145\/3243734.3264418"},{"key":"1012_CR11","unstructured":"Online verf\u00fcgbar unter: \n                    https:\/\/www.csail.mit.edu\/news\/fooling-neuralnetworks-w3d-printed-objects\n                    \n                   (zuletzt abgerufen: 15. Juli 2018)"},{"key":"1012_CR12","unstructured":"Online verf\u00fcgbar unter: \n                    https:\/\/www.robust-ml.org\/defenses\/\n                    \n                  (zuletzt abgerufen: 15. Juli 2018)"},{"key":"1012_CR13","unstructured":"Francois et al: Machine Learning Techniques for Passive Network Inventory, IEEE Transaction on Network and Service Management, 2011."},{"key":"1012_CR14","unstructured":"Online verf\u00fcgbar unter: \n                    https:\/\/blog.binaryedge.io\/2015\/09\/30\/vncimage-analysis-and-data-science\/\n                    \n                  (zuletzt abgerufen: 15. Juli 2018)"},{"key":"1012_CR15","unstructured":"Yamaguchi et al: Vulnerability extrapolation: Assisted discovery of vulnerabilities using machine learning, Proceedings of the 5th USENIX conference on offensive technologies, WOOT 2011"},{"key":"1012_CR16","unstructured":"Online verf\u00fcgbar unter: \n                    https:\/\/github.com\/AuthEceSoftEng\/rnn2source\n                    \n                   (zuletzt abgerufen: 15. Juli 2018)"},{"key":"1012_CR17","unstructured":"Online verf\u00fcgbar unter: \n                    http:\/\/research.nvidia.com\/publication\/2017-10_Progressive-Growing-of\n                    \n                   (zuletzt abgerufen: 15. Juli 2018)"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-018-1012-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-018-1012-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-018-1012-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,17]],"date-time":"2019-09-17T23:14:11Z","timestamp":1568762051000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-018-1012-3"}},"subtitle":["Fortschritte, Anwendungen und Einschr\u00e4nkungen"],"short-title":[],"issued":{"date-parts":[[2018,9,18]]},"references-count":17,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2018,10]]}},"alternative-id":["1012"],"URL":"https:\/\/doi.org\/10.1007\/s11623-018-1012-3","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,9,18]]},"assertion":[{"value":"18 September 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}