{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T05:00:56Z","timestamp":1725771656079},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1109\/icitst.2016.7856733","type":"proceedings-article","created":{"date-parts":[[2017,2,16]],"date-time":"2017-02-16T22:16:34Z","timestamp":1487283394000},"page":"372-375","source":"Crossref","is-referenced-by-count":1,"title":["Telecommunication traffic through submarine cables: Security and vulnerabilities"],"prefix":"10.1109","author":[{"given":"Aisha Suliaman","family":"Alazri","sequence":"first","affiliation":[]}],"member":"263","reference":[{"journal-title":"Histoty Of The Atlantic Cable & Submarine Telegraphy-Telegraph Island Oman","year":"0","author":"bill","key":"ref4"},{"journal-title":"Histoty Of The Atlantic Cable & Submarine Telegraphy-Wire Rope","year":"0","author":"bill","key":"ref3"},{"journal-title":"Cable Vision","year":"0","author":"burnett","key":"ref10"},{"journal-title":"Fiber Optics technology-principles and advantages","year":"2015","key":"ref6"},{"journal-title":"Department of Homeland Security","article-title":"Characteristics And Common Vulnerabilities Infrastructure Category: Petroleum Refineries","year":"0","key":"ref11"},{"journal-title":"Fiber Optics Basics","year":"2015","key":"ref5"},{"journal-title":"Protection of submarine Cables Through Spatial Separation","year":"0","key":"ref12"},{"journal-title":"About submarine Telecommunications Cables","year":"0","key":"ref8"},{"journal-title":"what are Fiber Optics","year":"0","key":"ref7"},{"journal-title":"Submarine Cables and the Oceans Connecting the World","year":"2009","author":"carter","key":"ref2"},{"journal-title":"The Protection of Undersea Cables A Global Security Threat","year":"0","author":"matis","key":"ref9"},{"key":"ref1","doi-asserted-by":"crossref","DOI":"10.1163\/9789004260337","author":"burnett","year":"2014","journal-title":"Submarine Cables The Handbook of Law and Policy"}],"event":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","start":{"date-parts":[[2016,12,5]]},"location":"Barcelona, Spain","end":{"date-parts":[[2016,12,7]]}},"container-title":["2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7847254\/7856645\/07856733.pdf?arnumber=7856733","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,18]],"date-time":"2019-09-18T19:53:43Z","timestamp":1568836423000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7856733\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/icitst.2016.7856733","relation":{},"subject":[],"published":{"date-parts":[[2016,12]]}}}