{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T21:04:10Z","timestamp":1761771850747,"version":"build-2065373602"},"reference-count":5,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2013,7,16]],"date-time":"2013-07-16T00:00:00Z","timestamp":1373932800000},"content-version":"vor","delay-in-days":196,"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/creativecommons.org\/licenses\/by-nc-nd\/3.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Procedia Computer Science"],"published-print":{"date-parts":[[2013]]},"DOI":"10.1016\/j.procs.2013.05.029","type":"journal-article","created":{"date-parts":[[2013,5,16]],"date-time":"2013-05-16T09:22:19Z","timestamp":1368696139000},"page":"214-221","update-policy":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":5,"special_numbering":"C","title":["Mobile Cloud Computing Network Attack and Defense Learning System Based on Fuzzy Soft Sets"],"prefix":"10.1016","volume":"17","author":[{"given":"Ye","family":"Wang","sequence":"first","affiliation":[]},{"given":"Zengliang","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Zhao","family":"Du","sequence":"additional","affiliation":[]},{"given":"Yong","family":"Huang","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"3","key":"10.1016\/j.procs.2013.05.029_bib0005","doi-asserted-by":"crossref","first-page":"338","DOI":"10.1016\/S0019-9958(65)90241-X","article-title":"Fuzzy Sets","volume":"8","author":"Lotfi","year":"1965","journal-title":"Information and Control"},{"issue":"4","key":"10.1016\/j.procs.2013.05.029_bib0010","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1016\/S0898-1221(99)00056-5","article-title":"Soft Set Theory-First Results","volume":"37","author":"Molodtsov","year":"1999","journal-title":"Computers & Mathematics with Applications"},{"key":"10.1016\/j.procs.2013.05.029_bib0015","doi-asserted-by":"crossref","first-page":"555","DOI":"10.1016\/S0898-1221(03)00016-6","article-title":"Soft Set Theory","volume":"45","author":"Maji","year":"2003","journal-title":"Computers & Mathematics with Applications"},{"issue":"3","key":"10.1016\/j.procs.2013.05.029_bib0020","first-page":"589","article-title":"Fuzzy Soft Sets","volume":"9","author":"RabitraKumar","year":"2001","journal-title":"The Jourhal of Fuzzy Mathematics"},{"key":"10.1016\/j.procs.2013.05.029_bib0025","first-page":"P1753","article-title":"An Oriented-application Adaptive Mobile Cloud Computing Middleware","author":"YeWang","year":"2012","journal-title":"IEEE CCIS"}],"container-title":["Procedia Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/api.elsevier.com\/content\/article\/PII:S1877050913001622?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/api.elsevier.com\/content\/article\/PII:S1877050913001622?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T21:00:45Z","timestamp":1761771645000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/linkinghub.elsevier.com\/retrieve\/pii\/S1877050913001622"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"references-count":5,"alternative-id":["S1877050913001622"],"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1016\/j.procs.2013.05.029","relation":{},"ISSN":["1877-0509"],"issn-type":[{"type":"print","value":"1877-0509"}],"subject":[],"published":{"date-parts":[[2013]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Mobile Cloud Computing Network Attack and Defense Learning System Based on Fuzzy Soft Sets","name":"articletitle","label":"Article Title"},{"value":"Procedia Computer Science","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1016\/j.procs.2013.05.029","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"Copyright \u00a9 2013 The Authors. Published by Elsevier B.V.","name":"copyright","label":"Copyright"}]}}