{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,4,6]],"date-time":"2023-04-06T07:36:09Z","timestamp":1680766569783},"reference-count":10,"publisher":"Informa UK Limited","issue":"2","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Computer Mathematics"],"published-print":{"date-parts":[[2016,2]]},"DOI":"10.1080\/00207160.2015.1044784","type":"journal-article","created":{"date-parts":[[2016,2,19]],"date-time":"2016-02-19T03:47:23Z","timestamp":1455853643000},"page":"236-238","update-policy":"http:\/\/dx.doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":2,"title":["Innovative security technologies against insider threats and data leakage"],"prefix":"10.1080","volume":"93","author":[{"given":"Ilsun","family":"You","sequence":"first","affiliation":[]},{"given":"Marek R.","family":"Ogiela","sequence":"additional","affiliation":[]},{"given":"Isaac","family":"Woungang","sequence":"additional","affiliation":[]},{"given":"Kangbin","family":"Yim","sequence":"additional","affiliation":[]}],"member":"301","published-online":{"date-parts":[[2016,2,11]]},"reference":[{"key":"CIT0001","first-page":"aa","volume":"92","author":"Guo N.","year":"2015","journal-title":"Int. J. Comput. Math."},{"key":"CIT0002","first-page":"aa","volume":"92","author":"Hern\u00e1ndez-Ramos J.L.","year":"2015","journal-title":"Int. J. Comput. Math."},{"key":"CIT0003","first-page":"aa","volume":"92","author":"Kim H.","year":"2015","journal-title":"Int. J. Comput. Math."},{"key":"CIT0004","first-page":"aa","volume":"92","author":"Lee H.-T.","year":"2015","journal-title":"Int. J. Comput. Math."},{"key":"CIT0005","first-page":"aa","volume":"92","author":"Liu Z.","year":"2015","journal-title":"Int. J. Comput. Math."},{"key":"CIT0006","first-page":"aa","volume":"92","author":"Seo J.","year":"2015","journal-title":"Int. J. Comput. Math."},{"key":"CIT0007","doi-asserted-by":"crossref","first-page":"aa","DOI":"10.1080\/00207160.2014.902940","volume":"92","author":"Singh K.","year":"2015","journal-title":"Int. J. Comput. Math."},{"key":"CIT0008","first-page":"aa","volume":"92","author":"Sur C.","year":"2015","journal-title":"Int. J. Comput. Math."},{"key":"CIT0009","first-page":"aa","volume":"92","author":"Tsai K.L.","year":"2015","journal-title":"Int. J. Comput. Math."},{"key":"CIT0010","first-page":"aa","volume":"92","author":"Zhou F.","year":"2015","journal-title":"Int. J. Comput. Math."}],"container-title":["International Journal of Computer Mathematics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/00207160.2015.1044784","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T02:16:46Z","timestamp":1498270606000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.tandfonline.com\/doi\/full\/10.1080\/00207160.2015.1044784"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,2]]},"references-count":10,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2014,7,14]]},"published-print":{"date-parts":[[2016,2]]}},"alternative-id":["10.1080\/00207160.2015.1044784"],"URL":"https:\/\/doi.org\/10.1080\/00207160.2015.1044784","relation":{},"ISSN":["0020-7160","1029-0265"],"issn-type":[{"value":"0020-7160","type":"print"},{"value":"1029-0265","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,2]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=gcom20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=gcom20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"}]}}