{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,5,5]],"date-time":"2024-05-05T20:27:41Z","timestamp":1714940861014},"reference-count":1,"publisher":"CRC Press","isbn-type":[{"value":"9781420066203","type":"print"},{"value":"9781420066227","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,12,21]]},"DOI":"10.1081\/e-eia-120046281","type":"book-chapter","created":{"date-parts":[[2016,7,28]],"date-time":"2016-07-28T15:20:59Z","timestamp":1469719259000},"page":"976-990","source":"Crossref","is-referenced-by-count":0,"title":["End Node Security and Network Access Management"],"prefix":"10.1081","author":[{"given":"Franjo","family":"Majstor","sequence":"first","affiliation":[]}],"member":"301","published-online":{"date-parts":[[2010,12,20]]},"reference":[{"key":"R0004","volume-title":"A Tamper-Resistant, Platform-Based, Bilateral Approach to Worm Containment","author":"Durham D."}],"container-title":["Encyclopedia of Information Assurance"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.crcnetbase.com\/doi\/pdf\/10.1081\/E-EIA-120046281","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,9,10]],"date-time":"2016-09-10T10:18:05Z","timestamp":1473502685000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.crcnetbase.com\/doi\/10.1081\/E-EIA-120046281"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,12,20]]},"ISBN":["9781420066203","9781420066227"],"references-count":1,"alternative-id":["10.1081\/E-EIA-120046281","10.1081\/E-EIA"],"URL":"https:\/\/doi.org\/10.1081\/e-eia-120046281","relation":{},"subject":[],"published":{"date-parts":[[2010,12,20]]}}}