{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T06:49:45Z","timestamp":1730270985628,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,9]]},"DOI":"10.1109\/is.2012.6335180","type":"proceedings-article","created":{"date-parts":[[2012,10,24]],"date-time":"2012-10-24T20:32:39Z","timestamp":1351110759000},"page":"481-488","source":"Crossref","is-referenced-by-count":1,"title":["Applications of Puzzle methods for intrusion detection in ATMs"],"prefix":"10.1109","author":[{"given":"Vladimir","family":"Jotsov","sequence":"first","affiliation":[]},{"given":"Vassil","family":"Sgurev","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Ontological Approach Towards Cybersecurity in Cloud Computing","year":"0","key":"19"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/ICSC.2008.15"},{"journal-title":"Security Ontology","year":"0","key":"17"},{"key":"23","first-page":"245","article-title":"Knowledge-driven multimedia information extraction and ontology evolution","volume":"6050","author":"paliouras","year":"2011","journal-title":"Lecture Notes in Computer Science"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.4018\/jisp.2007100101"},{"journal-title":"Protege","year":"0","key":"24"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1023\/A:1006314320276"},{"key":"16","first-page":"1","article-title":"New trends in constraint satisfaction, planning, and scheduling: A survey","author":"bart","year":"2004","journal-title":"The Knowledge Engineering Review"},{"journal-title":"Constraint Resolution Theories","year":"2011","author":"berthier","key":"13"},{"journal-title":"Ntology-based Constraint Recognition for Free-form Service Requests","year":"0","key":"14"},{"journal-title":"Java Constraint Solver (JaCoP)","year":"0","key":"11"},{"journal-title":"Constraint-Based Local Search","year":"2009","author":"van hentenryck","key":"12"},{"key":"21","first-page":"1","article-title":"Towards a new generation of security requirements definition methodology using ontologies","author":"souag","year":"2012","journal-title":"Proc 24th International Conference on Advanced Information Systems Engineering (CAiSE'12)"},{"journal-title":"The Future Now","year":"0","key":"3"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2008.33"},{"year":"0","key":"2"},{"journal-title":"Intelligence Information","year":"0","key":"1"},{"journal-title":"Cassowary","year":"0","key":"10"},{"key":"7","first-page":"5","article-title":"Puzzle solving-based authentication method for enhanced security in spins and its performance evaluatio","author":"dhurandher","year":"2011","journal-title":"Proceedings of the 14th Communications and Networking Symposium"},{"journal-title":"Crossword Puzzles As Constraint Satisfaction Problems","year":"0","key":"6"},{"journal-title":"Constraint-satisfaction problems","year":"0","key":"5"},{"key":"4","first-page":"278","author":"jotsov","year":"2010","journal-title":"Intelligent Information Security Systems"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2002.1006971"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1007\/BF00978711"}],"event":{"name":"2012 6th IEEE International Conference Intelligent Systems (IS)","start":{"date-parts":[[2012,9,6]]},"location":"Sofia, Bulgaria","end":{"date-parts":[[2012,9,8]]}},"container-title":["2012 6th IEEE INTERNATIONAL CONFERENCE INTELLIGENT SYSTEMS"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6320720\/6335103\/06335180.pdf?arnumber=6335180","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T21:52:37Z","timestamp":1490133157000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6335180\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,9]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/is.2012.6335180","relation":{},"subject":[],"published":{"date-parts":[[2012,9]]}}}