{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:25:28Z","timestamp":1750220728534,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,5,15]],"date-time":"2020-05-15T00:00:00Z","timestamp":1589500800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,5,15]]},"DOI":"10.1145\/3404663.3404669","type":"proceedings-article","created":{"date-parts":[[2020,7,10]],"date-time":"2020-07-10T22:10:11Z","timestamp":1594419011000},"page":"89-95","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Appropriate Security Algorithms to Mitigate the Risks in a Database of the National Customs Service of Ecuador"],"prefix":"10.1145","author":[{"given":"Segundo Mois\u00e9s T.","family":"Toapanta","sequence":"first","affiliation":[{"name":"Department Computer Science, Salesian Polytechnic University, Guayaquil, Ecuador"}]},{"given":"Karen Lissette Ponce","family":"Astudillo","sequence":"additional","affiliation":[{"name":"Department Computer Science, Salesian Polytechnic University, Guayaquil, Ecuador"}]},{"given":"Luis Enrique Mafla","family":"Gallegos","sequence":"additional","affiliation":[{"name":"National Polytechnic School, Quito, Ecuador"}]}],"member":"320","published-online":{"date-parts":[[2020,7,10]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"1149002","volume-title":"c","author":"Nacional S.","year":"2014","unstructured":"S. Nacional and D. E. A. Del , \"Servicio Nacional De Aduana Del Ecuador,\" no. c , p. 1149002 , 2014 . S. Nacional and D. E. A. Del, \"Servicio Nacional De Aduana Del Ecuador,\" no. c, p. 1149002, 2014."},{"key":"e_1_3_2_1_2_1","unstructured":"\"2_Decreto_No._312.pdf.\".  \"2_Decreto_No._312.pdf.\"."},{"key":"e_1_3_2_1_3_1","first-page":"933","volume-title":"Proc. - 2016 IEEE 14th Int. Conf. Dependable, Auton. Secur. Comput. DASC 2016, 2016 IEEE 14th Int. Conf. Pervasive Intell. Comput. PICom 2016, 2016 IEEE 2nd Int. Conf. Big Data","author":"Lu Z. W.","year":"2016","unstructured":"Z. W. Lu , \"Research about New Media Security Technology Base on Big Data Era,\" Proc. - 2016 IEEE 14th Int. Conf. Dependable, Auton. Secur. Comput. DASC 2016, 2016 IEEE 14th Int. Conf. Pervasive Intell. Comput. PICom 2016, 2016 IEEE 2nd Int. Conf. Big Data , pp. 933 -- 936 , 2016 , DOI= http:\/\/dx.doi.org\/10.1109\/DASC-PICom-DataCom-CyberSciTec.2016.160. 10.1109\/DASC-PICom-DataCom-CyberSciTec.2016.160 Z. W. Lu, \"Research about New Media Security Technology Base on Big Data Era,\" Proc. - 2016 IEEE 14th Int. Conf. Dependable, Auton. Secur. Comput. DASC 2016, 2016 IEEE 14th Int. Conf. Pervasive Intell. Comput. PICom 2016, 2016 IEEE 2nd Int. Conf. Big Data, pp. 933--936, 2016, DOI= http:\/\/dx.doi.org\/10.1109\/DASC-PICom-DataCom-CyberSciTec.2016.160."},{"key":"e_1_3_2_1_4_1","first-page":"338","volume-title":"Proc. - 2019 Int. Conf. Intell. Transp. Big Data Smart City, ICITBS 2019","author":"Yi J.","year":"2019","unstructured":"J. Yi , \"Analysis and Improvement Strategy for Profit Contribution of Bank Customer Under Big Data Background,\" Proc. - 2019 Int. Conf. Intell. Transp. Big Data Smart City, ICITBS 2019 , pp. 338 -- 341 , 2019 , DOI= http:\/\/dx.doi.org\/10.1109\/ICITBS.2019.00089. 10.1109\/ICITBS.2019.00089 J. Yi, \"Analysis and Improvement Strategy for Profit Contribution of Bank Customer Under Big Data Background,\" Proc. - 2019 Int. Conf. Intell. Transp. Big Data Smart City, ICITBS 2019, pp. 338--341, 2019, DOI= http:\/\/dx.doi.org\/10.1109\/ICITBS.2019.00089."},{"key":"e_1_3_2_1_5_1","first-page":"1","volume-title":"P. Que, and D. Difundirse, \"Y Acceso a La Informacion Publica,\"","author":"Cuarto T.","year":"2004","unstructured":"T. Cuarto , D. E. L. a Informacion , P. Que, and D. Difundirse, \"Y Acceso a La Informacion Publica,\" pp. 1 -- 10 , 2004 . T. Cuarto, D. E. L. a Informacion, P. Que, and D. Difundirse, \"Y Acceso a La Informacion Publica,\" pp. 1--10, 2004."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.12.011"},{"key":"e_1_3_2_1_7_1","first-page":"101609","article-title":"Improving information security risk analysis by including threat-occurrence predictive models","author":"Figueira P. T.","year":"2019","unstructured":"P. T. Figueira , C. L. Bravo , and J. L. R. L\u00f3pez , \" Improving information security risk analysis by including threat-occurrence predictive models ,\" Comput. Secur. , p. 101609 , 2019 , DOI= http:\/\/dx.doi.org\/10.1016\/j.cose.2019.101609. 10.1016\/j.cose.2019.101609 P. T. Figueira, C. L. Bravo, and J. L. R. L\u00f3pez, \"Improving information security risk analysis by including threat-occurrence predictive models,\" Comput. Secur., p. 101609, 2019, DOI= http:\/\/dx.doi.org\/10.1016\/j.cose.2019.101609.","journal-title":"Comput. Secur."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2019.04.127"},{"key":"e_1_3_2_1_9_1","first-page":"1","volume-title":"Black Sea Conf. Commun. Networking, BlackSeaCom 2018","author":"Globa L.","year":"2018","unstructured":"L. Globa , V. Kurdecha , I. Ishchenko , A. Zakharchuk , and N. Kunieva , \" The Intellectual IoT-System for Monitoring the Base Station Quality of Service,\" 2018 IEEE Int . Black Sea Conf. Commun. Networking, BlackSeaCom 2018 , pp. 1 -- 5 , 2018 , DOI= http:\/\/dx.doi.org\/10.1109\/BlackSeaCom.2018.8433715. 10.1109\/BlackSeaCom.2018.8433715 L. Globa, V. Kurdecha, I. Ishchenko, A. Zakharchuk, and N. Kunieva, \"The Intellectual IoT-System for Monitoring the Base Station Quality of Service,\" 2018 IEEE Int. Black Sea Conf. Commun. Networking, BlackSeaCom 2018, pp. 1--5, 2018, DOI= http:\/\/dx.doi.org\/10.1109\/BlackSeaCom.2018.8433715."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.01.003"},{"key":"e_1_3_2_1_11_1","first-page":"392","volume-title":"Conf. Semant. Comput. ICSC 2016","author":"Al-Shehhi M.","year":"2016","unstructured":"M. Al-Shehhi , B. Hirsch , K. Taha , M. Leida , and P. D. Yoo , \" A Knowledge Base Visual Analytics Technique for Semantic Web,\" Proc. - 2016 IEEE 10th Int . Conf. Semant. Comput. ICSC 2016 , pp. 392 -- 395 , 2016 , DOI= http:\/\/dx.doi.org\/10.1109\/ICSC.2016.52. 10.1109\/ICSC.2016.52 M. Al-Shehhi, B. Hirsch, K. Taha, M. Leida, and P. D. Yoo, \"A Knowledge Base Visual Analytics Technique for Semantic Web,\" Proc. - 2016 IEEE 10th Int. Conf. Semant. Comput. ICSC 2016, pp. 392--395, 2016, DOI= http:\/\/dx.doi.org\/10.1109\/ICSC.2016.52."},{"key":"e_1_3_2_1_12_1","first-page":"1","volume-title":"Conf. Work. Recent Adv. Innov. Eng. ICRAIE 2018","volume":"2018","author":"Sharma M.","year":"2019","unstructured":"M. Sharma , V. D. Sharma , and M. M. Bundele , \" Performance Analysis of RDBMS and No SQL Databases: PostgreSQL, MongoDB and Neo4j,\" 3rd Int . Conf. Work. Recent Adv. Innov. Eng. ICRAIE 2018 , vol. 2018 , no. November , pp. 1 -- 5 , 2019 , DOI= http:\/\/dx.doi.org\/10.1109\/ICRAIE.2018.8710439. 10.1109\/ICRAIE.2018.8710439 M. Sharma, V. D. Sharma, and M. M. Bundele, \"Performance Analysis of RDBMS and No SQL Databases: PostgreSQL, MongoDB and Neo4j,\" 3rd Int. Conf. Work. Recent Adv. Innov. Eng. ICRAIE 2018, vol. 2018, no. November, pp. 1--5, 2019, DOI= http:\/\/dx.doi.org\/10.1109\/ICRAIE.2018.8710439."},{"key":"e_1_3_2_1_13_1","volume-title":"Conf. Semant. Comput. ICSC 2018","volume":"259","author":"Andruszkiewicz P.","year":"2018","unstructured":"P. Andruszkiewicz and H. Rybinski , \" Data Acquisition and Information Extraction for Scientific Knowledge Base Building,\" Proc. - 12th IEEE Int . Conf. Semant. Comput. ICSC 2018 , vol. 2018-Janua, pp. 256-- 259 , 2018 , DOI= http:\/\/dx.doi.org\/10.1109\/ICSC.2018.00045. 10.1109\/ICSC.2018.00045 P. Andruszkiewicz and H. Rybinski, \"Data Acquisition and Information Extraction for Scientific Knowledge Base Building,\" Proc. - 12th IEEE Int. Conf. Semant. Comput. ICSC 2018, vol. 2018-Janua, pp. 256--259, 2018, DOI= http:\/\/dx.doi.org\/10.1109\/ICSC.2018.00045."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101601"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.visinf.2018.12.001"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.04.188"},{"key":"e_1_3_2_1_17_1","first-page":"70","volume-title":"Proc. - Resil. Week 2018, RWS 2018","author":"Mylrea M.","year":"2018","unstructured":"M. Mylrea and S. N. G. Gourisetti , \"Blockchain for Supply Chain Cybersecurity, Optimization and Compliance,\" Proc. - Resil. Week 2018, RWS 2018 , pp. 70 -- 76 , 2018 , DOI= http:\/\/dx.doi.org\/10.1109\/RWEEK.2018.8473517. 10.1109\/RWEEK.2018.8473517 M. Mylrea and S. N. G. Gourisetti, \"Blockchain for Supply Chain Cybersecurity, Optimization and Compliance,\" Proc. - Resil. Week 2018, RWS 2018, pp. 70--76, 2018, DOI= http:\/\/dx.doi.org\/10.1109\/RWEEK.2018.8473517."},{"key":"e_1_3_2_1_18_1","first-page":"37","volume-title":"5th Int. Conf. Syst. Model. Adv. Res. Trends, SMART 2016","author":"Kumar P.","year":"2017","unstructured":"P. Kumar , S. Rawat , T. Choudhury , and S. Pradhan , \" A performance based comparison of various symmetric cryptographic algorithms in run-time scenario,\" Proc . 5th Int. Conf. Syst. Model. Adv. Res. Trends, SMART 2016 , pp. 37 -- 41 , 2017 , DOI= http:\/\/dx.doi.org\/10.1109\/SYSMART.2016.7894485. 10.1109\/SYSMART.2016.7894485 P. Kumar, S. Rawat, T. Choudhury, and S. Pradhan, \"A performance based comparison of various symmetric cryptographic algorithms in run-time scenario,\" Proc. 5th Int. Conf. Syst. Model. Adv. Res. Trends, SMART 2016, pp. 37--41, 2017, DOI= http:\/\/dx.doi.org\/10.1109\/SYSMART.2016.7894485."},{"key":"e_1_3_2_1_19_1","first-page":"1","volume-title":"2015 Int. Conf. Netw. Syst. Secur. NSysS 2015","author":"Ahmad S.","year":"2015","unstructured":"S. Ahmad , K. M. R. Alam , H. Rahman , and S. Tamura , \" A comparison between symmetric and asymmetric key encryption algorithm based decryption mixnets,\" Proc . 2015 Int. Conf. Netw. Syst. Secur. NSysS 2015 , pp. 1 -- 5 , 2015 , DOI= http:\/\/dx.doi.org\/10.1109\/NSysS.2015.7043532. 10.1109\/NSysS.2015.7043532 S. Ahmad, K. M. R. Alam, H. Rahman, and S. Tamura, \"A comparison between symmetric and asymmetric key encryption algorithm based decryption mixnets,\" Proc. 2015 Int. Conf. Netw. Syst. Secur. NSysS 2015, pp. 1--5, 2015, DOI= http:\/\/dx.doi.org\/10.1109\/NSysS.2015.7043532."},{"key":"e_1_3_2_1_20_1","first-page":"1","volume-title":"Syst. Appl. Technol. Conf. LISAT 2017","author":"Sukhavasi S. B.","year":"2017","unstructured":"S. B. Sukhavasi , S. B. Sukhavasi , K. Elleithy , and A. Elleithy , \" Analysis and implementation of proficient Rijndael algorithm with optimized computation,\" 2017 IEEE Long Isl . Syst. Appl. Technol. Conf. LISAT 2017 , pp. 1 -- 5 , 2017 , DOI= http:\/\/dx.doi.org\/10.1109\/LISAT.2017.8001977. 10.1109\/LISAT.2017.8001977 S. B. Sukhavasi, S. B. Sukhavasi, K. Elleithy, and A. Elleithy, \"Analysis and implementation of proficient Rijndael algorithm with optimized computation,\" 2017 IEEE Long Isl. Syst. Appl. Technol. Conf. LISAT 2017, pp. 1--5, 2017, DOI= http:\/\/dx.doi.org\/10.1109\/LISAT.2017.8001977."},{"key":"e_1_3_2_1_21_1","first-page":"967","volume-title":"Conf. Adv. Comput. Commun. Informatics, ICACCI 2016","author":"Thakar L.","year":"2016","unstructured":"L. Thakar , C. Dutta , P. S. Sura , and S. Udupa , \" Design & realization of multi mission data handling system for remote sensing satellite,\" 2016 Int . Conf. Adv. Comput. Commun. Informatics, ICACCI 2016 , pp. 967 -- 972 , 2016 , DOI= http:\/\/dx.doi.org\/10.1109\/ICACCI.2016.7732170. 10.1109\/ICACCI.2016.7732170 L. Thakar, C. Dutta, P. S. Sura, and S. Udupa, \"Design & realization of multi mission data handling system for remote sensing satellite,\" 2016 Int. Conf. Adv. Comput. Commun. Informatics, ICACCI 2016, pp. 967--972, 2016, DOI= http:\/\/dx.doi.org\/10.1109\/ICACCI.2016.7732170."},{"key":"e_1_3_2_1_22_1","first-page":"84","volume-title":"Conf. Big Data Anal. ICBDA 2017","author":"Ning X.","year":"2017","unstructured":"X. Ning , Y. Xu , X. Gao , and Y. Li , \" Missing data of quality inspection imputation algorithm base on stacked denoising auto-encoder,\" 2017 IEEE 2nd Int . Conf. Big Data Anal. ICBDA 2017 , pp. 84 -- 88 , 2017 , DOI= http:\/\/dx.doi.org\/10.1109\/ICBDA.2017.8078781. 10.1109\/ICBDA.2017.8078781 X. Ning, Y. Xu, X. Gao, and Y. Li, \"Missing data of quality inspection imputation algorithm base on stacked denoising auto-encoder,\" 2017 IEEE 2nd Int. Conf. Big Data Anal. ICBDA 2017, pp. 84--88, 2017, DOI= http:\/\/dx.doi.org\/10.1109\/ICBDA.2017.8078781."},{"key":"e_1_3_2_1_23_1","first-page":"278","volume-title":"Conf. Big Data Smart Comput. BigComp 2018","author":"Gou X.","year":"2018","unstructured":"X. Gou : Use One Hash Function to Build Faster Hash Based Data Structures,\" Proc. - 2018 IEEE Int . Conf. Big Data Smart Comput. BigComp 2018 , pp. 278 -- 285 , 2018 , DOI= http:\/\/dx.doi.org\/10.1109\/BigComp.2018.00048. 10.1109\/BigComp.2018.00048 X. Gou et al., \"Single Hash: Use One Hash Function to Build Faster Hash Based Data Structures,\" Proc. - 2018 IEEE Int. Conf. Big Data Smart Comput. BigComp 2018, pp. 278--285, 2018, DOI= http:\/\/dx.doi.org\/10.1109\/BigComp.2018.00048."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2015.2505180"},{"key":"e_1_3_2_1_25_1","first-page":"1","volume-title":"Conf. Electr. Eng. Comput. Telecommun. Inf. Technol. ECTI-CON 2016","author":"Radwan A. G.","year":"2016","unstructured":"A. G. Radwan , S. H. Abdelhaleem , and S. K. Abd-El-Hafiz , \" Image encryption algorithms using non-chaotic substitutions and permutations,\" 2016 13th Int . Conf. Electr. Eng. Comput. Telecommun. Inf. Technol. ECTI-CON 2016 , pp. 1 -- 6 , 2016 , DOI= http:\/\/dx.doi.org\/10.1109\/ECTICon.2016.7561281. 10.1109\/ECTICon.2016.7561281 A. G. Radwan, S. H. Abdelhaleem, and S. K. Abd-El-Hafiz, \"Image encryption algorithms using non-chaotic substitutions and permutations,\" 2016 13th Int. Conf. Electr. Eng. Comput. Telecommun. Inf. Technol. ECTI-CON 2016, pp. 1--6, 2016, DOI= http:\/\/dx.doi.org\/10.1109\/ECTICon.2016.7561281."},{"key":"e_1_3_2_1_26_1","first-page":"69","volume-title":"Conf. Big Data Secur. Cloud, BigDataSecurity 2018, 4th IEEE Int. Conf. High Perform. Smart Comput. HPSC 2018 3rd IEEE Int. Conf. Intell. Data Secur.","author":"Elsayed M.","year":"2018","unstructured":"M. Elsayed and M. Zulkernine , \" Towards Security Monitoring for Cloud Analytic Applications,\" Proc. - 4th IEEE Int . Conf. Big Data Secur. Cloud, BigDataSecurity 2018, 4th IEEE Int. Conf. High Perform. Smart Comput. HPSC 2018 3rd IEEE Int. Conf. Intell. Data Secur. , pp. 69 -- 78 , 2018 , DOI= http:\/\/dx.doi.org\/10.1109\/BDS\/HPSC\/IDS18.2018.00028. 10.1109\/BDS M. Elsayed and M. Zulkernine, \"Towards Security Monitoring for Cloud Analytic Applications,\" Proc. - 4th IEEE Int. Conf. Big Data Secur. Cloud, BigDataSecurity 2018, 4th IEEE Int. Conf. High Perform. Smart Comput. HPSC 2018 3rd IEEE Int. Conf. Intell. Data Secur., pp. 69--78, 2018, DOI= http:\/\/dx.doi.org\/10.1109\/BDS\/HPSC\/IDS18.2018.00028."},{"key":"e_1_3_2_1_27_1","first-page":"481","volume-title":"Conf. Big Data Smart Comput. BigComp 2016","author":"Kim S. M.","year":"2016","unstructured":"S. M. Kim and Y. G. Ha , \" Automated discovery of small business domain knowledge using web crawling and data mining,\" 2016 Int . Conf. Big Data Smart Comput. BigComp 2016 , pp. 481 -- 484 , 2016 , DOI= http:\/\/dx.doi.org\/10.1109\/BIGCOMP.2016.7425974. 10.1109\/BIGCOMP.2016.7425974 S. M. Kim and Y. G. Ha, \"Automated discovery of small business domain knowledge using web crawling and data mining,\" 2016 Int. Conf. Big Data Smart Comput. BigComp 2016, pp. 481--484, 2016, DOI= http:\/\/dx.doi.org\/10.1109\/BIGCOMP.2016.7425974."},{"key":"e_1_3_2_1_28_1","first-page":"205","volume-title":"Conf. Intell. Secur. Informatics Secur. Big Data, ISI 2017","author":"Li K.","year":"2007","unstructured":"K. Li , Y. Li , J. Liu , R. Zhang , and X. Duan , \" Attack pattern mining algorithm based on security log,\" 2017 IEEE Int . Conf. Intell. Secur. Informatics Secur. Big Data, ISI 2017 , no. Nas 2007 , p. 205 , 2017, DOI= http:\/\/dx.doi.org\/10.1109\/ISI.2017.8004918. 10.1109\/ISI.2017.8004918 K. Li, Y. Li, J. Liu, R. Zhang, and X. Duan, \"Attack pattern mining algorithm based on security log,\" 2017 IEEE Int. Conf. Intell. Secur. Informatics Secur. Big Data, ISI 2017, no. Nas 2007, p. 205, 2017, DOI= http:\/\/dx.doi.org\/10.1109\/ISI.2017.8004918."},{"key":"e_1_3_2_1_29_1","first-page":"145","volume-title":"Conf. Big Data Secur. Cloud, BigDataSecurity 2017, 3rd IEEE Int. Conf. High Perform. Smart Comput. HPSC 2017 2nd IEEE Int. Conf. Intell. Data Secur.","author":"Diao Z.","year":"2017","unstructured":"Z. Diao , Q. Wang , N. Su , and Y. Zhang , \" Study on Data Security Policy Based on Cloud Storage,\" Proc. - 3rd IEEE Int . Conf. Big Data Secur. Cloud, BigDataSecurity 2017, 3rd IEEE Int. Conf. High Perform. Smart Comput. HPSC 2017 2nd IEEE Int. Conf. Intell. Data Secur. , pp. 145 -- 149 , 2017 , DOI= http:\/\/dx.doi.org\/10.1109\/BigDataSecurity.2017.12. 10.1109\/BigDataSecurity.2017.12 Z. Diao, Q. Wang, N. Su, and Y. Zhang, \"Study on Data Security Policy Based on Cloud Storage,\" Proc. - 3rd IEEE Int. Conf. Big Data Secur. Cloud, BigDataSecurity 2017, 3rd IEEE Int. Conf. High Perform. Smart Comput. HPSC 2017 2nd IEEE Int. Conf. Intell. Data Secur., pp. 145--149, 2017, DOI= http:\/\/dx.doi.org\/10.1109\/BigDataSecurity.2017.12."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2868885"}],"event":{"name":"ICISDM 2020: 2020 the 4th International Conference on Information System and Data Mining","acronym":"ICISDM 2020","location":"Hawaii HI USA"},"container-title":["Proceedings of the 2020 the 4th International Conference on Information System and Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3404663.3404669","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3404663.3404669","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:38:18Z","timestamp":1750199898000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3404663.3404669"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5,15]]},"references-count":30,"alternative-id":["10.1145\/3404663.3404669","10.1145\/3404663"],"URL":"https:\/\/doi.org\/10.1145\/3404663.3404669","relation":{},"subject":[],"published":{"date-parts":[[2020,5,15]]},"assertion":[{"value":"2020-07-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}