{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,12]],"date-time":"2025-08-12T22:19:53Z","timestamp":1755037193657},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1109\/ssci.2016.7849910","type":"proceedings-article","created":{"date-parts":[[2017,2,16]],"date-time":"2017-02-16T22:24:33Z","timestamp":1487283873000},"source":"Crossref","is-referenced-by-count":8,"title":["Using a knowledge-based security orchestration tool to reduce the risk of browser compromise"],"prefix":"10.1109","author":[{"given":"Daniel Conte","family":"de Leon","sequence":"first","affiliation":[]},{"given":"Venkata A.","family":"Bhandari","sequence":"additional","affiliation":[]},{"given":"Ananth","family":"Jillepalli","sequence":"additional","affiliation":[]},{"given":"Frederick T.","family":"Sheldon","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Freeipa","year":"2014"},{"key":"ref11","article-title":"Dell kace: Systems management appliance","year":"2016"},{"key":"ref12","article-title":"Browser security comparison &#x2014; a quantitative approach","year":"2011"},{"key":"ref13","author":"kessin","year":"2012","journal-title":"Building Web Applications with Erlang"},{"key":"ref14","author":"hay","year":"2008","journal-title":"OSSEC Host-Based Intrusion Detection Guide"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2016.50"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SSCI.2016.7849914"},{"key":"ref4","article-title":"Managing group policy admx files step-by-step guide","author":"herman","year":"2007"},{"key":"ref3","article-title":"Inside adm and admx templates for group policy","author":"moskowitz","year":"2008"},{"key":"ref6","article-title":"Deploying and securing google chrome in a windows enterprise","year":"2012"},{"key":"ref5","author":"stromberg","year":"2013","journal-title":"Configuring google chrome via group policy"},{"key":"ref8","article-title":"About:config entries","year":"0","journal-title":"MozillaZine Knowledge Base"},{"key":"ref7","article-title":"How to install a firefox add-on","year":"0"},{"key":"ref2","article-title":"Statcounter global web statistics","year":"2014","journal-title":"Web Graphs"},{"key":"ref1","author":"bhandari","year":"2015","journal-title":"Analysis of security policies in major web browsers and development of a multibrowser and multiplatform browser configuration tool Open browser gp"},{"key":"ref9","year":"2016","journal-title":"Red Hat Inc"}],"event":{"name":"2016 IEEE Symposium Series on Computational Intelligence (SSCI)","location":"Athens, Greece","start":{"date-parts":[[2016,12,6]]},"end":{"date-parts":[[2016,12,9]]}},"container-title":["2016 IEEE Symposium Series on Computational Intelligence (SSCI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7840087\/7849361\/07849910.pdf?arnumber=7849910","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,1]],"date-time":"2017-03-01T22:58:46Z","timestamp":1488409126000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7849910\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/ssci.2016.7849910","relation":{},"subject":[],"published":{"date-parts":[[2016,12]]}}}