{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T12:55:40Z","timestamp":1725800140364},"reference-count":6,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,11,2]],"date-time":"2021-11-02T00:00:00Z","timestamp":1635811200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,11,2]],"date-time":"2021-11-02T00:00:00Z","timestamp":1635811200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,11,2]],"date-time":"2021-11-02T00:00:00Z","timestamp":1635811200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,11,2]]},"DOI":"10.1109\/isi53945.2021.9624681","type":"proceedings-article","created":{"date-parts":[[2021,11,30]],"date-time":"2021-11-30T18:55:42Z","timestamp":1638298542000},"page":"1-3","source":"Crossref","is-referenced-by-count":1,"title":["Exploring Differences Among Darknet and Surface Internet Hacking Communities"],"prefix":"10.1109","author":[{"given":"Zhiyuan","family":"Ding","sequence":"first","affiliation":[]},{"given":"Victor","family":"Benjamin","sequence":"additional","affiliation":[]},{"given":"Weifeng","family":"Li","sequence":"additional","affiliation":[]},{"given":"Xueyan","family":"Yin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ISI49825.2020.9280476"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2015.7165943"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2018.2831899"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2019\/13808"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2016.1267528"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2015.7165944"}],"event":{"name":"2021 IEEE International Conference on Intelligence and Security Informatics (ISI)","start":{"date-parts":[[2021,11,2]]},"location":"San Antonio, TX, USA","end":{"date-parts":[[2021,11,3]]}},"container-title":["2021 IEEE International Conference on Intelligence and Security Informatics (ISI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9624673\/9624675\/09624681.pdf?arnumber=9624681","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T12:53:49Z","timestamp":1652187229000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9624681\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,2]]},"references-count":6,"URL":"https:\/\/doi.org\/10.1109\/isi53945.2021.9624681","relation":{},"subject":[],"published":{"date-parts":[[2021,11,2]]}}}