{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,18]],"date-time":"2023-09-18T07:52:30Z","timestamp":1695023550347},"reference-count":0,"publisher":"International Academy Publishing (IAP)","issue":"8","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JSW"],"DOI":"10.4304\/jsw.8.8.2000-2007","type":"journal-article","created":{"date-parts":[[2013,7,28]],"date-time":"2013-07-28T00:41:20Z","timestamp":1374972080000},"source":"Crossref","is-referenced-by-count":1,"title":["Vulnerability Discovery Technology and Its Applications"],"prefix":"10.17706","volume":"8","author":[{"given":"Zhunyang","family":"Pan","sequence":"first","affiliation":[]},{"given":"Caixia","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Shuxin","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Shuming","family":"Guo","sequence":"additional","affiliation":[]}],"member":"7163","published-online":{"date-parts":[[2013,8,1]]},"container-title":["Journal of Software"],"original-title":[],"deposited":{"date-parts":[[2015,9,15]],"date-time":"2015-09-15T15:25:48Z","timestamp":1442330748000},"score":1,"resource":{"primary":{"URL":"http:\/\/ojs.academypublisher.com\/index.php\/jsw\/article\/view\/9791"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,8,1]]},"references-count":0,"journal-issue":{"issue":"8","published-online":{"date-parts":[[2013,8,1]]}},"URL":"https:\/\/doi.org\/10.4304\/jsw.8.8.2000-2007","relation":{},"ISSN":["1796-217X"],"issn-type":[{"value":"1796-217X","type":"print"}],"subject":[],"published":{"date-parts":[[2013,8,1]]}}}