{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,5,5]],"date-time":"2024-05-05T20:26:27Z","timestamp":1714940787107},"reference-count":11,"publisher":"CRC Press","isbn-type":[{"value":"9781420066203","type":"print"},{"value":"9781420066227","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,12,21]]},"DOI":"10.1081\/e-eia-120046301","type":"book-chapter","created":{"date-parts":[[2016,7,28]],"date-time":"2016-07-28T15:20:59Z","timestamp":1469719259000},"page":"2131-2148","source":"Crossref","is-referenced-by-count":0,"title":["Passwords and Policy Threat Analysis"],"prefix":"10.1081","author":[{"given":"Daniel D.","family":"Houser","sequence":"first","affiliation":[]}],"member":"301","published-online":{"date-parts":[[2010,12,20]]},"reference":[{"key":"CIT0002","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359172"},{"key":"CIT0004","volume-title":"Information Systems Security: A Practitioner's Reference","author":"Fites K.","year":"1993"},{"key":"CIT0008","unstructured":"Tippett , P. S. Personal interview regarding empirical analysis and overlapping compensating control modeling . Columbus, OH , 2003 June 5 ."},{"key":"CIT0009","unstructured":"Schneier , B. Attack trees . Dr. Dobbs , J. , Ed. 1999 . http:\/\/www.counterpane.com\/attack-treesddj-ft.html ."},{"key":"R0010","author":"CNN","year":"2002","journal-title":"CNN.Com\/Sci-Tech."},{"key":"R0011","doi-asserted-by":"publisher","DOI":"10.1109\/49.223865"},{"key":"R0012","first-page":"5","author":"Malladi A.","year":"2002","journal-title":"Preventing Guessing Attacks Using Fingerprint Biometrics"},{"key":"R0013","volume-title":"Microsoft Knowledge Base","author":"Microsoft"},{"key":"R0014","volume-title":"U.S. Dept. of Commerce\/National Bureau of Standards","author":"NIST","year":"1985"},{"key":"R0015","unstructured":"Schneier , B. Attack Trees, Presented at SANS Network Security 99 Conference . , October, 8, 1999 ; http:\/\/www.counterpane.com\/attacktrees.pdf ."},{"key":"R0016","unstructured":"Tippett , P. S. \u201cThe Impact of the Disappearing Perimeter,\u201d presented at Ibid . TruSecure Seminar : Columbus, OH , 2003 ."}],"container-title":["Encyclopedia of Information Assurance"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.crcnetbase.com\/doi\/pdf\/10.1081\/E-EIA-120046301","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,9,10]],"date-time":"2016-09-10T10:26:25Z","timestamp":1473503185000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.crcnetbase.com\/doi\/10.1081\/E-EIA-120046301"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,12,20]]},"ISBN":["9781420066203","9781420066227"],"references-count":11,"alternative-id":["10.1081\/E-EIA-120046301","10.1081\/E-EIA"],"URL":"https:\/\/doi.org\/10.1081\/e-eia-120046301","relation":{},"subject":[],"published":{"date-parts":[[2010,12,20]]}}}