{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,5,30]],"date-time":"2022-05-30T02:40:11Z","timestamp":1653878411599},"reference-count":10,"publisher":"Computers, Materials and Continua (Tech Science Press)","issue":"3","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Intelligent Automation &amp; Soft Computing"],"published-print":{"date-parts":[[2016,7,2]]},"DOI":"10.1080\/10798587.2015.1118276","type":"journal-article","created":{"date-parts":[[2015,12,21]],"date-time":"2015-12-21T18:22:18Z","timestamp":1450722138000},"page":"379-387","update-policy":"http:\/\/dx.doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":4,"title":["Cyber threats to mobile messenger apps from identity cloning"],"prefix":"10.32604","volume":"22","author":[{"given":"Suwan","family":"Park","sequence":"first","affiliation":[]},{"given":"Changho","family":"Seo","sequence":"additional","affiliation":[]},{"given":"Jeong Hyun","family":"Yi","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2015,12,21]]},"reference":[{"key":"CIT0003","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33167-1_3"},{"key":"CIT0006","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37300-8_4"},{"key":"CIT0007","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-013-1258-x"},{"key":"CIT0008","first-page":"115","volume":"4","author":"Park S. W.","year":"2014","journal-title":"Journal of Internet Services and Information Security (JISIS)"},{"key":"CIT0009","author":"Piao Y.","year":"2014","journal-title":"Security and Communication Networks"},{"key":"CIT0010","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28166-2_11"},{"key":"CIT0011","volume-title":"Code protection in android","author":"Schulz P.","year":"2012"},{"key":"CIT0013","first-page":"1","author":"Zhou W.","year":"2013","journal-title":"Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security"},{"key":"CIT0014","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1145\/2435349.2435377","author":"Zhou W.","year":"2013","journal-title":"Proceedings of the third ACM conference on Data and application security and privacy"},{"key":"CIT0015","doi-asserted-by":"crossref","first-page":"317","DOI":"10.1145\/2133601.2133640","author":"Zhou W.","year":"2012","journal-title":"Proceedings of the second ACM conference on Data and Application Security and Privacy"}],"container-title":["Intelligent Automation &amp; Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/autosoftjournal.net\/viewPaper.php?paper=1118276","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,30]],"date-time":"2022-05-30T02:01:45Z","timestamp":1653876105000},"score":1,"resource":{"primary":{"URL":"http:\/\/autosoftjournal.net\/paperShow.php?paper=1118276"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12,21]]},"references-count":10,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2015,12,21]]},"published-print":{"date-parts":[[2016,7,2]]}},"alternative-id":["10.1080\/10798587.2015.1118276"],"URL":"https:\/\/doi.org\/10.1080\/10798587.2015.1118276","relation":{},"ISSN":["1079-8587","2326-005X"],"issn-type":[{"value":"1079-8587","type":"print"},{"value":"2326-005X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,12,21]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tasj20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tasj20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"}]}}