{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,10,6]],"date-time":"2023-10-06T07:19:57Z","timestamp":1696576797166},"reference-count":0,"publisher":"Wiley","issue":"6","license":[{"start":{"date-parts":[[2016,2,11]],"date-time":"2016-02-11T00:00:00Z","timestamp":1455148800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security Comm Networks"],"published-print":{"date-parts":[[2016,4]]},"DOI":"10.1002\/sec.1468","type":"journal-article","created":{"date-parts":[[2016,2,11]],"date-time":"2016-02-11T12:44:51Z","timestamp":1455194691000},"page":"455-456","source":"Crossref","is-referenced-by-count":0,"title":["Challenges and opportunities in next\u2010generation cyberspace security"],"prefix":"10.1002","volume":"9","author":[{"given":"Jong Hyuk","family":"Park","sequence":"first","affiliation":[{"name":"Seoultech  Seoul Korea"}]},{"given":"Stefanos","family":"Gritzalis","sequence":"additional","affiliation":[{"name":"University of the Aegean  Greece"}]},{"given":"Bo\u2010Chao","family":"Cheng","sequence":"additional","affiliation":[{"name":"National Chung\u2010Cheng University  Taiwan"}]},{"given":"Ning","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of Manchester  Manchester UK"}]}],"member":"311","published-online":{"date-parts":[[2016,2,11]]},"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fsec.1468","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/sec.1468","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,5]],"date-time":"2023-10-05T18:22:50Z","timestamp":1696530170000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/onlinelibrary.wiley.com\/doi\/10.1002\/sec.1468"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,2,11]]},"references-count":0,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2016,4]]}},"alternative-id":["10.1002\/sec.1468"],"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1002\/sec.1468","archive":["Portico"],"relation":{},"ISSN":["1939-0114","1939-0122"],"issn-type":[{"value":"1939-0114","type":"print"},{"value":"1939-0122","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,2,11]]}}}