{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T09:28:01Z","timestamp":1648891681508},"reference-count":0,"publisher":"International Academy Publishing (IAP)","issue":"5","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JSW"],"published-print":{"date-parts":[[2015,5]]},"DOI":"10.17706\/jsw.10.5.650-658","type":"journal-article","created":{"date-parts":[[2015,9,21]],"date-time":"2015-09-21T03:29:20Z","timestamp":1442806160000},"page":"650-658","source":"Crossref","is-referenced-by-count":0,"title":["Analysis of Security Vulnerabilities Using Misuse Pattern Testing Approach"],"prefix":"10.17706","volume":"10","author":[{"given":"Yuan","family":"Yifan","sequence":"first","affiliation":[]}],"member":"7163","container-title":["Journal of Software"],"original-title":["Analysis of Security Vulnerabilities Using Misuse Pattern Testing Approach"],"link":[{"URL":"http:\/\/www.jsoftware.us\/vol10\/52-T041.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2015,9,28]],"date-time":"2015-09-28T00:31:19Z","timestamp":1443400279000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.jsoftware.us\/index.php?m=content&c=index&a=show&catid=152&id=2333"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,5]]},"references-count":0,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2015,5]]}},"URL":"https:\/\/doi.org\/10.17706\/jsw.10.5.650-658","relation":{},"ISSN":["1796-217X"],"issn-type":[{"value":"1796-217X","type":"print"}],"subject":[],"published":{"date-parts":[[2015,5]]}}}