{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,5]],"date-time":"2026-01-05T21:50:05Z","timestamp":1767649805632},"reference-count":0,"publisher":"SCITEPRESS - Science and Technology Publications","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.5220\/0006577202590266","type":"proceedings-article","created":{"date-parts":[[2018,2,1]],"date-time":"2018-02-01T11:51:41Z","timestamp":1517485901000},"page":"259-266","source":"Crossref","is-referenced-by-count":3,"title":["Hardware-based Cyber Threats"],"prefix":"10.5220","author":[{"given":"Thiago","family":"Alves","sequence":"first","affiliation":[{"name":"The University of Alabama in Huntsville, United States"}]},{"given":"Thomas","family":"Morris","sequence":"first","affiliation":[{"name":"The University of Alabama in Huntsville, United States"}]}],"member":"3171","event":{"name":"4th International Conference on Information Systems Security and Privacy","start":{"date-parts":[[2018,1,22]]},"location":"Funchal, Madeira, Portugal","end":{"date-parts":[[2018,1,24]]}},"container-title":["Proceedings of the 4th International Conference on Information Systems Security and Privacy"],"original-title":["Hardware-based Cyber Threats"],"deposited":{"date-parts":[[2018,4,4]],"date-time":"2018-04-04T13:33:37Z","timestamp":1522848817000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.scitepress.org\/DigitalLibrary\/Link.aspx?doi=10.5220\/0006577202590266"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2018]]},"references-count":0,"URL":"https:\/\/doi.org\/10.5220\/0006577202590266","relation":{},"subject":[],"published":{"date-parts":[[2018]]}}}