{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T22:12:31Z","timestamp":1761862351552},"reference-count":2,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/icre.2003.1232791","type":"proceedings-article","created":{"date-parts":[[2004,4,23]],"date-time":"2004-04-23T14:38:15Z","timestamp":1082731095000},"page":"371-372","source":"Crossref","is-referenced-by-count":50,"title":["Introducing abuse frames for analysing security requirements"],"prefix":"10.1109","author":[{"given":"L.","family":"Lin","sequence":"first","affiliation":[]},{"given":"B.","family":"Nuseibeh","sequence":"additional","affiliation":[]},{"given":"D.","family":"Ince","sequence":"additional","affiliation":[]},{"given":"M.","family":"Jackson","sequence":"additional","affiliation":[]},{"given":"J.","family":"Moffett","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Problem Frames Analyzing and Structuring Software Development Problems","year":"2001","author":"jackson","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICRE.2002.1048527"}],"event":{"name":"11th IEEE International Requirements Engineering Conference","acronym":"ICRE-03","location":"Monterey Bay, CA, USA"},"container-title":["Journal of Lightwave Technology"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8725\/27626\/01232791.pdf?arnumber=1232791","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,13]],"date-time":"2017-03-13T14:53:13Z","timestamp":1489416793000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1232791\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":2,"URL":"https:\/\/doi.org\/10.1109\/icre.2003.1232791","relation":{},"subject":[]}}