{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:34:10Z","timestamp":1750221250961,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,8,27]],"date-time":"2018-08-27T00:00:00Z","timestamp":1535328000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,8,27]]},"DOI":"10.1145\/3230833.3233265","type":"proceedings-article","created":{"date-parts":[[2018,8,13]],"date-time":"2018-08-13T12:29:48Z","timestamp":1534163388000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Get Me Cited, Scotty!"],"prefix":"10.1145","author":[{"given":"Steffen","family":"Wendzel","sequence":"first","affiliation":[{"name":"Worms University of Applied Sciences \/ Fraunhofer FKIE, Bonn, Germany"}]}],"member":"320","published-online":{"date-parts":[[2018,8,27]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1531793.1531815"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3055305.3055307"},{"key":"e_1_3_2_1_3_1","volume-title":"The New Threats of Information Hiding: the Road Ahead","author":"Cabaj Krzysztof","year":"2018","unstructured":"Krzysztof Cabaj , Luca Caviglione , Wojciech Mazurczyk , Steffen Wendzel , Alan Woodward , and Sebastian Zander . 2018. The New Threats of Information Hiding: the Road Ahead . IEEE IT Professional ( 2018 ). in press. Krzysztof Cabaj, Luca Caviglione, Wojciech Mazurczyk, Steffen Wendzel, Alan Woodward, and Sebastian Zander. 2018. The New Threats of Information Hiding: the Road Ahead. IEEE IT Professional (2018). in press."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2898375.2898380"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2812803"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0306-4573(00)00047-9"},{"volume-title":"2017 IEEE Symposium on Security and Privacy (SP). 99--120","author":"Herley Cormac","key":"e_1_3_2_1_9_1","unstructured":"Cormac Herley and Paul C . van Oorschot. 2017. SoK: Science, Security and the Elusive Goal of Security as a Scientific Pursuit . In 2017 IEEE Symposium on Security and Privacy (SP). 99--120 . Cormac Herley and Paul C. van Oorschot. 2017. SoK: Science, Security and the Elusive Goal of Security as a Scientific Pursuit. In 2017 IEEE Symposium on Security and Privacy (SP). 99--120."},{"volume-title":"Towards Fundamental Science of Cyber Security","author":"Kott Alexander","key":"e_1_3_2_1_10_1","unstructured":"Alexander Kott . 2014. Towards Fundamental Science of Cyber Security . Springer New York , New York, NY , 1--13. Alexander Kott. 2014. Towards Fundamental Science of Cyber Security. Springer New York, New York, NY, 1--13."},{"key":"e_1_3_2_1_11_1","first-page":"1055","article-title":"Google Scholar citations and Google Web\/URL citations: A multi-discipline exploratory analysis","volume":"58","author":"Kousha Kayvan","year":"2007","unstructured":"Kayvan Kousha and Mike Thelwall . 2007 . Google Scholar citations and Google Web\/URL citations: A multi-discipline exploratory analysis . Journal of the Association for Information Science and Technology 58 , 7 (2007), 1055 -- 1065 . Kayvan Kousha and Mike Thelwall. 2007. Google Scholar citations and Google Web\/URL citations: A multi-discipline exploratory analysis. Journal of the Association for Information Science and Technology 58, 7 (2007), 1055--1065.","journal-title":"Journal of the Association for Information Science and Technology"},{"volume-title":"Information Hiding in Communication Networks: Fundamentals, Mechanisms, and Applications","author":"Mazurczyk Wojciech","key":"e_1_3_2_1_12_1","unstructured":"Wojciech Mazurczyk , Steffen Wendzel , Sebastian Zander , Amir Houmansadr , and Krzysztof Szczypiorski . 2016. Information Hiding in Communication Networks: Fundamentals, Mechanisms, and Applications . Wiley-IEEE press . Wojciech Mazurczyk, Steffen Wendzel, Sebastian Zander, Amir Houmansadr, and Krzysztof Szczypiorski. 2016. Information Hiding in Communication Networks: Fundamentals, Mechanisms, and Applications. Wiley-IEEE press."},{"key":"e_1_3_2_1_13_1","unstructured":"Bertrand Meyer. 2011. The nastiness problem in computer science. (2011). Posting in the blog of Comm. ACM http:\/\/cacm.acm.org\/blogs\/blog-cacm\/123611-the-nastiness-problem-in-computer-science\/fulltext.  Bertrand Meyer. 2011. The nastiness problem in computer science. (2011). Posting in the blog of Comm. ACM http:\/\/cacm.acm.org\/blogs\/blog-cacm\/123611-the-nastiness-problem-in-computer-science\/fulltext."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2500098.2500112"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/11558859_19"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11192-018-2691-0"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.joi.2009.06.002"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1515\/eletel-2017-0029"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1002\/pra2.2015.1450520100128"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2007.4317620"}],"event":{"name":"ARES 2018: International Conference on Availability, Reliability and Security","sponsor":["Universit\u00e4t Hamburg Universit\u00e4t Hamburg"],"location":"Hamburg Germany","acronym":"ARES 2018"},"container-title":["Proceedings of the 13th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3230833.3233265","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3230833.3233265","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:07:51Z","timestamp":1750212471000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3230833.3233265"}},"subtitle":["Analysis of Citations in Covert Channel\/Steganography Research"],"short-title":[],"issued":{"date-parts":[[2018,8,27]]},"references-count":18,"alternative-id":["10.1145\/3230833.3233265","10.1145\/3230833"],"URL":"https:\/\/doi.org\/10.1145\/3230833.3233265","relation":{},"subject":[],"published":{"date-parts":[[2018,8,27]]},"assertion":[{"value":"2018-08-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}