{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T12:35:05Z","timestamp":1740141305796,"version":"3.37.3"},"reference-count":12,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2020,3,1]],"date-time":"2020-03-01T00:00:00Z","timestamp":1583020800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,3,1]],"date-time":"2020-03-01T00:00:00Z","timestamp":1583020800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,3,1]],"date-time":"2020-03-01T00:00:00Z","timestamp":1583020800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Secur. Privacy"],"published-print":{"date-parts":[[2020,3]]},"DOI":"10.1109\/msec.2019.2944385","type":"journal-article","created":{"date-parts":[[2020,3,18]],"date-time":"2020-03-18T21:22:20Z","timestamp":1584566540000},"page":"61-66","source":"Crossref","is-referenced-by-count":0,"title":["From Lucky Luke to Lock Bits"],"prefix":"10.1109","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4650-2076","authenticated-orcid":false,"given":"Thomas R.","family":"Souvignet","sequence":"first","affiliation":[{"name":"Criminal Justice, University of Lausanne, Switzerland"}]},{"given":"Thibaut","family":"Heckmann","sequence":"additional","affiliation":[{"name":"Data Extraction, Institut de Recherche Criminelle de la Gendarmerie Nationale, Pontoise, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4170-2749","authenticated-orcid":false,"given":"Timothy","family":"Bolle","sequence":"additional","affiliation":[{"name":"Criminal Justice, University of Lausanne, Switzerland"}]}],"member":"263","reference":[{"journal-title":"Crime Films Investigating the Scene","year":"2007","author":"thompson","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2014.06.004"},{"journal-title":"EAST publishes European fraud update 1-2019","year":"2019","key":"ref10"},{"journal-title":"L&#x2019;enqu&#x00EA;te criminelle et les m&#x00E9;thodes scientifiques","year":"1920","author":"locard","key":"ref6"},{"journal-title":"Terminal fraud definitions & terminology (ATM UPT & POS)","year":"2019","key":"ref11"},{"journal-title":"Police scientifique Le renseignement par la trace Lausanne","year":"2014","author":"ribaux","key":"ref5"},{"journal-title":"Terminal physical attack definitions & terminology (ATM & ATS)","year":"2019","key":"ref12"},{"key":"ref8","article-title":"The heist of the century","author":"daley","year":"1976","journal-title":"New York Times"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48405-1_25"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.forsciint.2013.03.040"},{"journal-title":"Fifth report on card fraud September 2018","year":"2018","key":"ref9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-015-0112-3"}],"container-title":["IEEE Security &amp; Privacy"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8013\/9041676\/09041851.pdf?arnumber=9041851","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,5]],"date-time":"2022-05-05T19:55:47Z","timestamp":1651780547000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9041851\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3]]},"references-count":12,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/msec.2019.2944385","relation":{},"ISSN":["1540-7993","1558-4046"],"issn-type":[{"type":"print","value":"1540-7993"},{"type":"electronic","value":"1558-4046"}],"subject":[],"published":{"date-parts":[[2020,3]]}}}