{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:49:40Z","timestamp":1750308580301,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T00:00:00Z","timestamp":1490313600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,3,24]]},"DOI":"10.1145\/3041008.3041015","type":"proceedings-article","created":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T14:54:21Z","timestamp":1490367261000},"page":"23-28","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Identifying Key Cyber-Physical Terrain"],"prefix":"10.1145","author":[{"given":"Brian","family":"Thompson","sequence":"first","affiliation":[{"name":"The MITRE Corporation, McLean, VA, USA"}]},{"given":"Richard","family":"Harang","sequence":"additional","affiliation":[{"name":"U.S. Army Research Lab, Adelphi, MD, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,3,24]]},"reference":[{"key":"e_1_3_2_1_1_1","series-title":"Lecture Notes in Physics","volume-title":"Proceedings of the XVIII Sitges Conference on Statistical Mechanics","author":"Bogun\u00e1 M.","year":"2003","unstructured":"M. Bogun\u00e1 , R. Pastor-Satorras , A. Vespignani , Epidemic spreading in complex networks with degree correlations . In Proceedings of the XVIII Sitges Conference on Statistical Mechanics , Lecture Notes in Physics , Springer , Berlin , 2003 . M. Bogun\u00e1, R. Pastor-Satorras, A. Vespignani, et al. Epidemic spreading in complex networks with degree correlations. In Proceedings of the XVIII Sitges Conference on Statistical Mechanics, Lecture Notes in Physics, Springer, Berlin, 2003."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0169-7552(98)00110-X"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.65.055103"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.2307\/3033543"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/CISS.2016.7460501"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/RISP.1991.130801"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1098\/rspa.1927.0118"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2015.7357414"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1080793.1080806"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/1318474.1318630"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1179542.1179545"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3041008.3041015"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/3015574.3015608"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/2008780.2008807"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.1167053"}],"event":{"name":"CODASPY '17: Seventh ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Scottsdale Arizona USA","acronym":"CODASPY '17"},"container-title":["Proceedings of the 3rd ACM on International Workshop on Security And Privacy Analytics"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3041008.3041015","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3041008.3041015","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T19:04:58Z","timestamp":1750273498000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3041008.3041015"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3,24]]},"references-count":15,"alternative-id":["10.1145\/3041008.3041015","10.1145\/3041008"],"URL":"https:\/\/doi.org\/10.1145\/3041008.3041015","relation":{},"subject":[],"published":{"date-parts":[[2017,3,24]]},"assertion":[{"value":"2017-03-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}