{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T12:35:38Z","timestamp":1740141338256,"version":"3.37.3"},"reference-count":25,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2016,11,1]],"date-time":"2016-11-01T00:00:00Z","timestamp":1477958400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"name":"Controlled Information Sharing in Support of Emergency Management"},{"DOI":"10.13039\/100015464","name":"European Office of Aerospace Research and Development","doi-asserted-by":"crossref","id":[{"id":"10.13039\/100015464","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/100000181","name":"Air Force Office of Scientific Research","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000181","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2016,11,1]]},"DOI":"10.1109\/tdsc.2015.2427846","type":"journal-article","created":{"date-parts":[[2015,4,29]],"date-time":"2015-04-29T18:39:51Z","timestamp":1430332791000},"page":"630-643","source":"Crossref","is-referenced-by-count":5,"title":["Detection of Unspecified Emergencies for Controlled Information Sharing"],"prefix":"10.1109","volume":"13","author":[{"given":"Barbara","family":"Carminati","sequence":"first","affiliation":[]},{"given":"Elena","family":"Ferrari","sequence":"additional","affiliation":[]},{"given":"Michele","family":"Guglielmi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CBMS.2006.95"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1542207.1542239"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12368-9_18"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2010.07.001"},{"key":"ref14","first-page":"408","article-title":"Secure\n information sharing and analysis for effective emergency management","author":"adam","year":"0","journal-title":"Proc Int Digit Gov Res Conf"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2006.08.028"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1866886.1866890"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.3115\/981732.981751"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1147\/JRD.2011.2163280"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2005.79"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2014.249"},{"journal-title":"Introduction to Emergency Management","year":"2013","author":"coppola","key":"ref3"},{"key":"ref6","first-page":"13","article-title":"Emergency knowledge management and social media technologies: A case study of the 2010 haitian\n earthquake","volume":"31","author":"yates","year":"0","journal-title":"Int J Inf Manage"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2187980.2188180"},{"year":"2004","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/501978.501980"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CRiSIS.2013.6766356"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2009.12"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2013.11"},{"key":"ref20","article-title":"A machine learning approach to foreign key discovery","author":"rostin","year":"0","journal-title":"Proceedings of the 12th International Workshop on the Web and Databases"},{"year":"0","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2007.369032"},{"year":"2013","key":"ref24"},{"year":"2013","author":"keogh","key":"ref23"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-03964-0_18"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8858\/7740116\/07097688.pdf?arnumber=7097688","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,11]],"date-time":"2021-10-11T02:34:36Z","timestamp":1633919676000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7097688\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11,1]]},"references-count":25,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2015.2427846","relation":{},"ISSN":["1545-5971"],"issn-type":[{"type":"print","value":"1545-5971"}],"subject":[],"published":{"date-parts":[[2016,11,1]]}}}