{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,28]],"date-time":"2025-05-28T10:07:26Z","timestamp":1748426846187,"version":"3.28.0"},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,5]]},"DOI":"10.1109\/mipro.2016.7522335","type":"proceedings-article","created":{"date-parts":[[2016,8,5]],"date-time":"2016-08-05T13:41:29Z","timestamp":1470404489000},"page":"1274-1277","source":"Crossref","is-referenced-by-count":5,"title":["The influence of the CAPTCHA types to its solving times"],"prefix":"10.1109","author":[{"given":"D.","family":"Brodic","sequence":"first","affiliation":[]},{"given":"S.","family":"Petrovska","sequence":"additional","affiliation":[]},{"given":"M.","family":"Jevtic","sequence":"additional","affiliation":[]},{"given":"Z. N.","family":"Milivojevic","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"article-title":"Method for Selectively Restricting Access to Computer Systems","year":"1998","author":"lillibridge","key":"ref4"},{"key":"ref3","first-page":"294","article-title":"CAPTCHA: Using hard Al problems for security","author":"von ahn","year":"2003","journal-title":"Proceedings of EUROCRYPT"},{"key":"ref10","article-title":"R Tutorial with Bayesian Statistics Using OpenBUGS","author":"yau","year":"2015","journal-title":"Kindle E-book"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CyberC.2012.28"},{"key":"ref5","first-page":"714","article-title":"CAPTCHA Problems on AI Based For Protection from Automated Hacking Tool","volume":"4","author":"kukade1","year":"2015","journal-title":"International Journal of Computer Science and Mobile Computing"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ISECS.2010.65"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2012.08.013"},{"year":"0","key":"ref2"},{"journal-title":"The Radical Statistician A Beginners Guide to Unleashing the Power of Applied Statistics in The Real World","year":"2006","author":"higgins","key":"ref9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/966389.966390"}],"event":{"name":"2016 39th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)","start":{"date-parts":[[2016,5,30]]},"location":"Opatija, Croatia","end":{"date-parts":[[2016,6,3]]}},"container-title":["2016 39th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7513176\/7522093\/07522335.pdf?arnumber=7522335","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,9,29]],"date-time":"2016-09-29T19:34:48Z","timestamp":1475177688000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7522335\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/mipro.2016.7522335","relation":{},"subject":[],"published":{"date-parts":[[2016,5]]}}}