{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T21:02:22Z","timestamp":1730235742898,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,10,6]],"date-time":"2022-10-06T00:00:00Z","timestamp":1665014400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,10,6]],"date-time":"2022-10-06T00:00:00Z","timestamp":1665014400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,10,6]]},"DOI":"10.1109\/iccr56254.2022.9995862","type":"proceedings-article","created":{"date-parts":[[2023,1,3]],"date-time":"2023-01-03T21:53:52Z","timestamp":1672782832000},"page":"1-5","source":"Crossref","is-referenced-by-count":1,"title":["Voice Enabled Website"],"prefix":"10.1109","author":[{"given":"BHAVESH","family":"KUMAR","sequence":"first","affiliation":[{"name":"Chandigarh University,Department of Computer Science,Gharuan,Punjab,India"}]},{"given":"DAMANDEEP","family":"KAUR","sequence":"additional","affiliation":[{"name":"Chandigarh University,Department of Computer Science,Gharuan,Punjab,India"}]},{"given":"Bharti","family":"Ramola","sequence":"additional","affiliation":[{"name":"Uttaranchal University,Dehradun,India,248007"}]}],"member":"263","reference":[{"key":"ref1","first-page":"6","article-title":"Systematic literature review for web access problems at saudi arabian uni and govt websites for masses with disabilities","volume":"8","author":"Akram","journal-title":"Multinational Journal of Advt"},{"issue":"3","key":"ref2","first-page":"181","article-title":"Electronic speech recognition","volume":"6","author":"Anusuya","journal-title":"International Journal of Computer Science and Information Security, JCSIS"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-0324-5_10"},{"key":"ref4","article-title":"Voice controlled wireless communication device system","volume":"2","author":"Burns","year":"2016","journal-title":"Google Patents US"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/354324.354345"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.3390\/s21144749"},{"key":"ref7","article-title":"William Folwell Barton, and Rohit Prasad. Preventing false wake word detections with a voicecontrolled device","volume":"9368","author":"Freed","year":"2014","journal-title":"Google Patents US"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s00530-021-00794-6"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.3390\/sym13081447"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2567948.2578037"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11040510"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.3390\/s22082820"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1201\/9780824746346"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.4108\/eai.13-7-2018.164583"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1134\/S1054661820010071"},{"issue":"1","key":"ref16","first-page":"8","article-title":"A review of intrusion detection system using machine learning approach","volume":"12","author":"Kok","year":"2019","journal-title":"in International Journal of Engineering Research and Technology"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2021.3098011"},{"journal-title":"Critical Points-To Be Analysis: Is It Appropriate","year":"2006","author":"Lhotak","key":"ref18"},{"key":"ref19","article-title":"Detecting security threats in Java applications with Static Analysis","author":"Livshits","year":"2005","journal-title":"USENIX Security"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3421510"},{"key":"ref21","article-title":"Voice controlled surgical suite","volume":"1","author":"McCall","year":"1999","journal-title":"Google Patents US"},{"journal-title":"Web application for voice operated email exchange","author":"Sagar","key":"ref22"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.5120\/21619-4904"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-021-08969-0"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3105600"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1166\/jctn.2019.8240"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.14569\/ijacsa.2019.0100133"}],"event":{"name":"2022 International Conference on Cyber Resilience (ICCR)","start":{"date-parts":[[2022,10,6]]},"location":"Dubai, United Arab Emirates","end":{"date-parts":[[2022,10,7]]}},"container-title":["2022 International Conference on Cyber Resilience (ICCR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9995718\/9995732\/09995862.pdf?arnumber=9995862","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T12:47:50Z","timestamp":1706791670000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9995862\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,6]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/iccr56254.2022.9995862","relation":{},"subject":[],"published":{"date-parts":[[2022,10,6]]}}}