{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T22:57:04Z","timestamp":1725577024937},"reference-count":6,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,9,10]],"date-time":"2021-09-10T00:00:00Z","timestamp":1631232000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,9,10]],"date-time":"2021-09-10T00:00:00Z","timestamp":1631232000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,9,10]],"date-time":"2021-09-10T00:00:00Z","timestamp":1631232000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,9,10]]},"DOI":"10.1109\/ewdts52692.2021.9581049","type":"proceedings-article","created":{"date-parts":[[2021,10,26]],"date-time":"2021-10-26T21:13:28Z","timestamp":1635282808000},"page":"1-4","source":"Crossref","is-referenced-by-count":0,"title":["About the Method of Protecting Information in Financial Portals based on Neural Networks"],"prefix":"10.1109","author":[{"given":"Zurab","family":"Meskhidze","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mikheil","family":"Donadze","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"journal-title":"An Introduction to Neural Networks","year":"2004","author":"gurney","key":"ref4"},{"key":"ref3","first-page":"287","article-title":"Basic concepts of neural networks: Per. from English","author":"callan","year":"2001","journal-title":"Moscow Publishing house Williams"},{"journal-title":"Neural Networks and Learning Machines","year":"2008","author":"haykin","key":"ref6"},{"journal-title":"Neural Networks &#x2013; algorithms and applications","year":"2001","author":"nielsen","key":"ref5"},{"journal-title":"H J Mattord Principles of Information Security","year":"2018","author":"whitman","key":"ref2"},{"journal-title":"An Artificial Neural Networks Primer with Financial Applications Examples in Financial Distress Predictions and Foreign Exchange Hybrid Trading System","year":"0","author":"tan","key":"ref1"}],"event":{"name":"2021 IEEE East-West Design & Test Symposium (EWDTS)","start":{"date-parts":[[2021,9,10]]},"location":"Batumi, Georgia","end":{"date-parts":[[2021,9,13]]}},"container-title":["2021 IEEE East-West Design &amp; Test Symposium (EWDTS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9580973\/9580974\/09581049.pdf?arnumber=9581049","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T16:55:57Z","timestamp":1652201757000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9581049\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,10]]},"references-count":6,"URL":"https:\/\/doi.org\/10.1109\/ewdts52692.2021.9581049","relation":{},"subject":[],"published":{"date-parts":[[2021,9,10]]}}}