{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T17:03:37Z","timestamp":1725728617295},"reference-count":0,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1109\/qsic.2003.1319078","type":"proceedings-article","created":{"date-parts":[[2005,4,12]],"date-time":"2005-04-12T14:25:04Z","timestamp":1113315904000},"page":"2","source":"Crossref","is-referenced-by-count":8,"title":["Data mining and cyber security"],"prefix":"10.1109","author":[{"given":"B.","family":"Thuraisingham","sequence":"first","affiliation":[]}],"member":"263","event":{"name":"Third International Conference on Quality Software, 2003. Proceedings.","start":{"date-parts":[[2003,11,7]]},"location":"Dallas, TX, USA","end":{"date-parts":[[2003,11,7]]}},"container-title":["Third International Conference on Quality Software, 2003. Proceedings."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9215\/29226\/01319078.pdf?arnumber=1319078","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,14]],"date-time":"2017-03-14T01:04:52Z","timestamp":1489453492000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1319078\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"references-count":0,"URL":"https:\/\/doi.org\/10.1109\/qsic.2003.1319078","relation":{},"subject":[],"published":{"date-parts":[[2003]]}}}