{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,11]],"date-time":"2025-01-11T05:38:29Z","timestamp":1736573909152,"version":"3.32.0"},"reference-count":0,"publisher":"KSI Research Inc.","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,10,28]]},"DOI":"10.18293\/seke2024-062","type":"proceedings-article","created":{"date-parts":[[2025,1,11]],"date-time":"2025-01-11T02:18:01Z","timestamp":1736561881000},"page":"267-272","source":"Crossref","is-referenced-by-count":0,"title":["Intelligent Contract Timestamp Vulnerability Detection Based on Key Control FlowGraph"],"prefix":"10.18293","volume":"2024","author":[{"given":"Qing Yu","family":"Quan","sequence":"first","affiliation":[]},{"given":"Cheng","family":"Zeng","sequence":"additional","affiliation":[]},{"given":"Yi Feng","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jiao Ran","family":"Wang","sequence":"additional","affiliation":[]}],"member":"7672","published-online":{"date-parts":[[2024,10,28]]},"event":{"name":"The 36th International Conference on Software Engineering and Knowledge Engineering","acronym":"SEKE2024"},"container-title":["International Conferences on Software Engineering and Knowledge Engineering","Proceedings of the 36th International Conference on Software Engineering and Knowledge Engineering"],"original-title":[],"deposited":{"date-parts":[[2025,1,11]],"date-time":"2025-01-11T02:18:16Z","timestamp":1736561896000},"score":1,"resource":{"primary":{"URL":"http:\/\/ksiresearchorg.ipage.com\/seke\/seke24paper\/paper062.pdf"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,28]]},"references-count":0,"URL":"https:\/\/doi.org\/10.18293\/seke2024-062","relation":{},"ISSN":["2325-9000"],"issn-type":[{"value":"2325-9000","type":"print"}],"subject":[],"published":{"date-parts":[[2024,10,28]]}}}