{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,31]],"date-time":"2022-03-31T04:31:20Z","timestamp":1648701080140},"reference-count":17,"publisher":"International Academy Publishing (IAP)","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JSW"],"DOI":"10.4304\/jsw.9.3.582-588","type":"journal-article","created":{"date-parts":[[2014,3,28]],"date-time":"2014-03-28T23:04:10Z","timestamp":1396047850000},"source":"Crossref","is-referenced-by-count":0,"title":["A Fast Method for Extracting all Minimal Siphons from Maximal Unmarked Siphons of a Petri Net"],"prefix":"10.17706","volume":"9","author":[{"given":"Qiaoli","family":"Zhuang","sequence":"first","affiliation":[]},{"given":"Wenzhan","family":"Dai","sequence":"additional","affiliation":[]}],"member":"7163","published-online":{"date-parts":[[2014,3,1]]},"reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1080\/09511929408944622"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.4156\/ijact.vol4.issue17.68"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.4304\/jcp.7.1.292-300"},{"issue":"no. 1","key":"ref4","first-page":"19","article-title":"Modeling and analysis of security protocols using colored petri nets","volume":"6","author":"Yang Xu","year":"2011","unstructured":"[4] X. X. Yang Xu, \"Modeling and analysis of security protocols using colored petri nets,\" Journal of Computers, vol. 6, no. 1, pp. 19\u201327, 2011.","journal-title":"Journal of Computers"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.4304\/jcp.6.8.1662-1669"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2003.820590"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2011.2164241"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/70.370500"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2010.2059698"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1080\/00207540010002405"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/70.650158"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1080\/00207540500464942"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2008.916925"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1080\/00207543.2011.590540"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1080\/0951192X.2011.575182"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2008.918605"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/5.24143"}],"container-title":["Journal of Software"],"original-title":[],"deposited":{"date-parts":[[2015,9,15]],"date-time":"2015-09-15T15:27:00Z","timestamp":1442330820000},"score":1,"resource":{"primary":{"URL":"http:\/\/ojs.academypublisher.com\/index.php\/jsw\/article\/view\/10622"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,3,1]]},"references-count":17,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2014,3,1]]}},"URL":"https:\/\/doi.org\/10.4304\/jsw.9.3.582-588","relation":{},"ISSN":["1796-217X"],"issn-type":[{"value":"1796-217X","type":"print"}],"subject":[],"published":{"date-parts":[[2014,3,1]]}}}