{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:36:03Z","timestamp":1750221363955,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":6,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,2,21]],"date-time":"2018-02-21T00:00:00Z","timestamp":1519171200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1700254"],"award-info":[{"award-number":["1700254"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,2,21]]},"DOI":"10.1145\/3159450.3162339","type":"proceedings-article","created":{"date-parts":[[2018,2,21]],"date-time":"2018-02-21T16:46:16Z","timestamp":1519231576000},"page":"273-273","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Modelling Correct Operation of Webcams for Security Purposes"],"prefix":"10.1145","author":[{"given":"Blaine","family":"Billings","sequence":"first","affiliation":[{"name":"College of Charleston, Charleston, SC, USA"}]},{"given":"Xenia","family":"Mountrouidou","sequence":"additional","affiliation":[{"name":"College of Charleston, Charleston, SC, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,2,21]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Mountrouidou X. & Billings B. & Mej\u00eda-Ricart L. \"An Internet of Things Taxonomy with Data-Driven Verification\". In-Progress.  Mountrouidou X. & Billings B. & Mej\u00eda-Ricart L. \"An Internet of Things Taxonomy with Data-Driven Verification\". In-Progress."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/QEST.2011.34"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/1947337.1947356"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/882495.884433"},{"key":"e_1_3_2_1_5_1","unstructured":"Cheung S & Dutertre Bruno & Fong Martin & Lindqvist Ulf & Skinner Keith & Valdes Alfonso. \"Using Model-based Intrusion Detection for SCADA Networks\". (2017).  Cheung S & Dutertre Bruno & Fong Martin & Lindqvist Ulf & Skinner Keith & Valdes Alfonso. \"Using Model-based Intrusion Detection for SCADA Networks\". (2017)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5120\/3399-4730"}],"event":{"name":"SIGCSE '18: The 49th ACM Technical Symposium on Computer Science Education","sponsor":["SIGCSE ACM Special Interest Group on Computer Science Education"],"location":"Baltimore Maryland USA","acronym":"SIGCSE '18"},"container-title":["Proceedings of the 49th ACM Technical Symposium on Computer Science Education"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3159450.3162339","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3159450.3162339","content-type":"text\/html","content-version":"vor","intended-application":"syndication"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:26:21Z","timestamp":1750213581000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3159450.3162339"}},"subtitle":["(Abstract Only)"],"short-title":[],"issued":{"date-parts":[[2018,2,21]]},"references-count":6,"alternative-id":["10.1145\/3159450.3162339","10.1145\/3159450"],"URL":"https:\/\/doi.org\/10.1145\/3159450.3162339","relation":{},"subject":[],"published":{"date-parts":[[2018,2,21]]},"assertion":[{"value":"2018-02-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}