{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T05:25:29Z","timestamp":1740115529473,"version":"3.37.3"},"reference-count":0,"publisher":"IOS Press","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.3233\/faia200070","type":"book-chapter","created":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T12:06:08Z","timestamp":1740053168000},"source":"Crossref","is-referenced-by-count":0,"title":["Strategic Monitor Placement Against Malicious Flows"],"prefix":"10.3233","author":[{"family":"Auletta Vincenzo","sequence":"additional","affiliation":[]},{"family":"De Nittis Giuseppe","sequence":"additional","affiliation":[]},{"family":"Ferraioli Diodato","sequence":"additional","affiliation":[]},{"family":"Gatti Nicola","sequence":"additional","affiliation":[]},{"family":"Longo Domenico","sequence":"additional","affiliation":[]}],"member":"7437","container-title":["Frontiers in Artificial Intelligence and Applications","ECAI 2020"],"original-title":[],"deposited":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T12:21:26Z","timestamp":1740054086000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.medra.org\/servlet\/aliasResolver?alias=iospressISBN&isbn=978-1-64368-100-9&spage=11&doi=10.3233\/FAIA200070"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":0,"URL":"https:\/\/doi.org\/10.3233\/faia200070","relation":{},"ISSN":["0922-6389"],"issn-type":[{"value":"0922-6389","type":"print"}],"subject":[],"published":{"date-parts":[[2020]]}}}