{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,22]],"date-time":"2025-12-22T22:22:39Z","timestamp":1766442159949,"version":"3.48.0"},"publisher-location":"New York, NY, USA","reference-count":0,"publisher":"ACM","license":[{"start":{"date-parts":[[2026,11,22]],"date-time":"2026-11-22T00:00:00Z","timestamp":1795305600000},"content-version":"vor","delay-in-days":368,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000015","name":"DOE U.S. Department of Energy","doi-asserted-by":"publisher","award":["DE-AC02-05CH11231"],"award-info":[{"award-number":["DE-AC02-05CH11231"]}],"id":[{"id":"10.13039\/100000015","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["2502117"],"award-info":[{"award-number":["2502117"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,11,19]]},"DOI":"10.1145\/3719027.3767661","type":"proceedings-article","created":{"date-parts":[[2025,11,22]],"date-time":"2025-11-22T23:33:16Z","timestamp":1763854396000},"page":"4896-4897","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["WATCH '25: First Workshop on Analytics, Telemetry, and Cybersecurity for HPCC"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1118-7109","authenticated-orcid":false,"given":"Massimo","family":"Cafaro","sequence":"first","affiliation":[{"name":"Universit\u00e0 del Salento, Lecce LE, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8367-5836","authenticated-orcid":false,"given":"Eric","family":"Chan-Tin","sequence":"additional","affiliation":[{"name":"Loyola University Chicago, Chicago, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7851-1140","authenticated-orcid":false,"given":"Jerry","family":"Chou","sequence":"additional","affiliation":[{"name":"National Tsing Hua University, Hsinchu, Taiwan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9835-1866","authenticated-orcid":false,"given":"Jinoh","family":"Kim","sequence":"additional","affiliation":[{"name":"East Texas A&amp;M University, Commerce, TX, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,11,22]]},"event":{"name":"CCS '25: ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Taipei Taiwan","acronym":"CCS '25"},"container-title":["Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3719027.3767661","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3719027.3767661","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,22]],"date-time":"2025-12-22T22:20:48Z","timestamp":1766442048000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3719027.3767661"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,19]]},"references-count":0,"alternative-id":["10.1145\/3719027.3767661","10.1145\/3719027"],"URL":"https:\/\/doi.org\/10.1145\/3719027.3767661","relation":{},"subject":[],"published":{"date-parts":[[2025,11,19]]},"assertion":[{"value":"2025-11-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}