{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:49:35Z","timestamp":1750308575740,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":8,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,12,20]],"date-time":"2017-12-20T00:00:00Z","timestamp":1513728000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,12,20]]},"DOI":"10.1145\/3175684.3175702","type":"proceedings-article","created":{"date-parts":[[2018,4,9]],"date-time":"2018-04-09T12:47:13Z","timestamp":1523278033000},"page":"134-140","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["General Precautions against Security Threats for Computer Networks in SMEs"],"prefix":"10.1145","author":[{"given":"Yaoyang","family":"Wu","sequence":"first","affiliation":[{"name":"Department of Computer and Information Science, University of Macau, Taipa, Macau SAR"}]},{"given":"Simon","family":"Fong","sequence":"additional","affiliation":[{"name":"Department of Computer and Information Science, University of Macau, Taipa, Macau SAR"}]},{"given":"Yan","family":"Zhuang","sequence":"additional","affiliation":[{"name":"Department of Computer and Information Science, University of Macau, Taipa, Macau SAR"}]}],"member":"320","published-online":{"date-parts":[[2017,12,20]]},"reference":[{"volume-title":"Modeling and Simulation Design","author":"Tavel P.","key":"e_1_3_2_1_1_1","unstructured":"https:\/\/www.avast.com\/c-spyware, Tavel , P. 2007. Modeling and Simulation Design . AK Peters Ltd ., Natick, MA. https:\/\/www.avast.com\/c-spyware, Tavel, P. 2007. Modeling and Simulation Design. AK Peters Ltd., Natick, MA."},{"key":"e_1_3_2_1_2_1","unstructured":"https:\/\/zh.wikipedia.org\/w\/index.php?curid=105938  https:\/\/zh.wikipedia.org\/w\/index.php?curid=105938"},{"key":"e_1_3_2_1_3_1","unstructured":"Image courtesy by https:\/\/commons.wikimedia.org\/w\/index.php?curid=11445422  Image courtesy by https:\/\/commons.wikimedia.org\/w\/index.php?curid=11445422"},{"key":"e_1_3_2_1_4_1","unstructured":"George Ou 2007 The six dumbest ways to secure a wireless LAN http:\/\/www.zdnet.com\/article\/the-six-dumbest-ways-to-secure-a-wireless-lan\/  George Ou 2007 The six dumbest ways to secure a wireless LAN http:\/\/www.zdnet.com\/article\/the-six-dumbest-ways-to-secure-a-wireless-lan\/"},{"key":"e_1_3_2_1_5_1","unstructured":"By Diglinks at English Wikipedia - Transferred from en.wikipedia to Commons by Esquilo Public Domain https:\/\/commons.wikimedia.org\/w\/index.php?curid=18493064  By Diglinks at English Wikipedia - Transferred from en.wikipedia to Commons by Esquilo Public Domain https:\/\/commons.wikimedia.org\/w\/index.php?curid=18493064"},{"key":"e_1_3_2_1_6_1","unstructured":"Image courtesy by Ludovic.ferre (talk \u2022 contribs) - Own work GFDL https:\/\/commons.wikimedia.org\/w\/index.php?curid=10101288  Image courtesy by Ludovic.ferre (talk \u2022 contribs) - Own work GFDL https:\/\/commons.wikimedia.org\/w\/index.php?curid=10101288"},{"key":"e_1_3_2_1_7_1","volume-title":"Brad Kroese and Patrick C. K. Hung","author":"Laura Rafferty","year":"2015","unstructured":"Laura Rafferty , Brad Kroese and Patrick C. K. Hung , 2015 , Toy Computing Background, International Series on Computer Entertainment and Media Technology, Springer International Publishing Switzerland 2015 Laura Rafferty, Brad Kroese and Patrick C. K. Hung, 2015, Toy Computing Background, International Series on Computer Entertainment and Media Technology, Springer International Publishing Switzerland 2015"},{"key":"e_1_3_2_1_8_1","unstructured":"Kevin David Mitnick & William L. Simon 2003 The Art of Deception: Controlling the Human Element of Security   Kevin David Mitnick & William L. Simon 2003 The Art of Deception: Controlling the Human Element of Security"}],"event":{"name":"BDIOT2017: International Conference on Big Data and Internet of Thing","acronym":"BDIOT2017","location":"London United Kingdom"},"container-title":["Proceedings of the International Conference on Big Data and Internet of Thing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3175684.3175702","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3175684.3175702","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T19:04:49Z","timestamp":1750273489000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3175684.3175702"}},"subtitle":["From the Perspective of Big Data and IOT"],"short-title":[],"issued":{"date-parts":[[2017,12,20]]},"references-count":8,"alternative-id":["10.1145\/3175684.3175702","10.1145\/3175684"],"URL":"https:\/\/doi.org\/10.1145\/3175684.3175702","relation":{},"subject":[],"published":{"date-parts":[[2017,12,20]]},"assertion":[{"value":"2017-12-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}