{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,31]],"date-time":"2024-08-31T17:40:07Z","timestamp":1725126007760},"reference-count":0,"publisher":"PTI","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.15439\/2021f90","type":"proceedings-article","created":{"date-parts":[[2021,9,26]],"date-time":"2021-09-26T21:09:42Z","timestamp":1632690582000},"page":"211-218","source":"Crossref","is-referenced-by-count":0,"title":["Decentralized Controller for Software Interconnected System Subject to Malicious Attacks"],"prefix":"10.15439","volume":"26","author":[{"given":"Pushkar","family":"Kishore","sequence":"first","affiliation":[]},{"given":"Swadhin Kumar","family":"Barisal","sequence":"additional","affiliation":[]},{"given":"Durga Prasad","family":"Mohapatra","sequence":"additional","affiliation":[]}],"member":"6175","published-online":{"date-parts":[[2021,9,26]]},"event":{"name":"16th Conference on Computer Science and Intelligence Systems","start":{"date-parts":[[2021,9,2]]},"end":{"date-parts":[[2021,9,5]]},"acronym":"FedCSIS 2021"},"container-title":["Annals of Computer Science and Information Systems","Position and Communication Papers of the 16th Conference on Computer Science and Intelligence Systems"],"original-title":[],"deposited":{"date-parts":[[2024,8,31]],"date-time":"2024-08-31T16:45:25Z","timestamp":1725122725000},"score":1,"resource":{"primary":{"URL":"https:\/\/annals-csis.org\/Volume_26\/drp\/90.html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,26]]},"references-count":0,"URL":"https:\/\/doi.org\/10.15439\/2021f90","relation":{},"ISSN":["2300-5963"],"issn-type":[{"type":"print","value":"2300-5963"}],"subject":[],"published":{"date-parts":[[2021,9,26]]}}}