{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,5]],"date-time":"2026-01-05T11:14:08Z","timestamp":1767611648750,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,8]]},"DOI":"10.1109\/iccp.2011.6047859","type":"proceedings-article","created":{"date-parts":[[2011,10,21]],"date-time":"2011-10-21T11:05:28Z","timestamp":1319195128000},"page":"145-148","source":"Crossref","is-referenced-by-count":3,"title":["New method of detection and wiping of sensitive information"],"prefix":"10.1109","author":[{"given":"George","family":"Pecherle","sequence":"first","affiliation":[]},{"given":"Cornelia","family":"Gyorodi","sequence":"additional","affiliation":[]},{"given":"Robert","family":"Gyorodi","sequence":"additional","affiliation":[]},{"given":"Bogdan","family":"Andronic","sequence":"additional","affiliation":[]},{"given":"Iosif","family":"Ignat","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"AN ANTI-SPAM SYSTEM USING ARTIFICIAL NEURAL NETWORKS AND GENETIC ALGORITHMS","year":"0","author":"goweder","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01209-9_17"},{"key":"ref10","first-page":"500","article-title":"How to Forget a Secret","author":"di crescenzo","year":"0","journal-title":"Symposium on Theoretical Aspects of Computer Science (STACS '97)"},{"key":"ref6","first-page":"939","article-title":"Data Wiping System with Fully Automated, Hidden and Remote Destruction Capabilities","volume":"9","author":"pecherle","year":"2010","journal-title":"Journal Wseas Transactions on Computers"},{"journal-title":"Ccleaner","year":"0","key":"ref11"},{"journal-title":"National Industrial Security Program Operating Manual (NISPOM)","year":"0","key":"ref5"},{"journal-title":"Webroot Windows Washer","year":"0","key":"ref12"},{"key":"ref8","article-title":"Guidelines for Media Sanitization","author":"kissel","year":"2006","journal-title":"Recommendations of the National Institute of Standards and Technology"},{"journal-title":"Remembrance of Data Passed A Study of Disk Sanitization Practices","year":"2003","author":"garfinke","key":"ref7"},{"year":"0","key":"ref2"},{"key":"ref9","first-page":"23","article-title":"Controlling Your Personal Information Disclosure","author":"ghani","year":"0","journal-title":"Proceedings of the 7th WSEAS International Conference on INFORMATION SECURITY and PRIVACY (ISP '08)"},{"journal-title":"Walkthrough Creating a Windows Service Application in the Component Designer","year":"0","key":"ref1"}],"event":{"name":"2011 IEEE International Conference on Intelligent Computer Communication and Processing (ICCP)","start":{"date-parts":[[2011,8,25]]},"location":"Cluj-Napoca, Romania","end":{"date-parts":[[2011,8,27]]}},"container-title":["2011 IEEE 7th International Conference on Intelligent Computer Communication and Processing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6041100\/6047826\/06047859.pdf?arnumber=6047859","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T15:01:22Z","timestamp":1490108482000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6047859\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,8]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/iccp.2011.6047859","relation":{},"subject":[],"published":{"date-parts":[[2011,8]]}}}