{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,2]],"date-time":"2025-11-02T02:26:07Z","timestamp":1762050367557,"version":"build-2065373602"},"reference-count":0,"publisher":"SCITEPRESS - Science and Technology Publications","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.5220\/0011077100003179","type":"proceedings-article","created":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T10:05:45Z","timestamp":1652177145000},"page":"142-147","source":"Crossref","is-referenced-by-count":2,"title":["Exploring Azure Active Directory Attack Surface: Enumerating Authentication Methods with Open-Source Intelligence Tools"],"prefix":"10.5220","author":[{"given":"Nestori","family":"Syynimaa","sequence":"first","affiliation":[{"name":"Secureworks, Counter Threat Unit, U.S.A. Faculty of Information Technology, University of Jyv\u00e4skyl\u00e4, Jyv\u00e4skyl\u00e4, Finland, --- Select a Country ---"}]}],"member":"3171","event":{"name":"24th International Conference on Enterprise Information Systems","start":{"date-parts":[[2022,4,25]]},"location":"Online Streaming, --- Select a Country ---","end":{"date-parts":[[2022,4,27]]}},"container-title":["Proceedings of the 24th International Conference on Enterprise Information Systems"],"original-title":["Exploring Azure Active Directory Attack Surface: Enumerating Authentication Methods with Open-Source Intelligence Tools"],"deposited":{"date-parts":[[2022,7,1]],"date-time":"2022-07-01T16:58:20Z","timestamp":1656694700000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.scitepress.org\/DigitalLibrary\/Link.aspx?doi=10.5220\/0011077100003179"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2022]]},"references-count":0,"URL":"https:\/\/doi.org\/10.5220\/0011077100003179","relation":{},"subject":[],"published":{"date-parts":[[2022]]}}}