{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:22:27Z","timestamp":1725495747354},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,5]]},"DOI":"10.1109\/cts.2012.6261056","type":"proceedings-article","created":{"date-parts":[[2012,8,8]],"date-time":"2012-08-08T17:09:50Z","timestamp":1344445790000},"page":"242-250","source":"Crossref","is-referenced-by-count":2,"title":["Connecting Distributed Version Control Systems communities to linked open data"],"prefix":"10.1109","author":[{"given":"Khaled","family":"Aslan","sequence":"first","affiliation":[]},{"given":"Hala","family":"Skaf-Molli","sequence":"additional","affiliation":[]},{"given":"Pascal","family":"Molli","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/1352322.1352222"},{"journal-title":"Cybersecurity Collaboration Report","year":"2009","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/1850795.1850805"},{"journal-title":"Wireshark & Ethereal Network Protocol Analyzer Toolkit","year":"2007","author":"orebaugh","key":"12"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/CTS.2010.5478473"},{"key":"2","first-page":"34","article-title":"Tensions in collaborative cyber security and how they affect incident detection and response","author":"fink","year":"2009","journal-title":"IGI Global"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/2.291294"},{"key":"10","article-title":"Tracking GhostNet: Investigating a cyber espionage network","author":"walton","year":"2009","journal-title":"Information Warfare Monitor"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/VAST.2009.5334462"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2003.1167344"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/963770.963772"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/ITNG.2011.161"},{"journal-title":"The 9-11 Commission Report Final Report of the National Commission on Terrorist Attacks Upon the United States","year":"2004","author":"kean","key":"9"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1178657.1178662"}],"event":{"name":"2012 International Conference on Collaboration Technologies and Systems (CTS)","start":{"date-parts":[[2012,5,21]]},"location":"Denver, CO, USA","end":{"date-parts":[[2012,5,25]]}},"container-title":["2012 International Conference on Collaboration Technologies and Systems (CTS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6247135\/6261004\/06261056.pdf?arnumber=6261056","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T20:26:34Z","timestamp":1490127994000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6261056\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,5]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/cts.2012.6261056","relation":{},"subject":[],"published":{"date-parts":[[2012,5]]}}}