{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T10:30:49Z","timestamp":1725791449732},"publisher-location":"Cham","reference-count":8,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319059389"},{"type":"electronic","value":"9783319059396"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-05939-6_17","type":"book-chapter","created":{"date-parts":[[2014,4,9]],"date-time":"2014-04-09T15:08:51Z","timestamp":1397056131000},"page":"168-177","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Rule-Based Techniques Using Abstract Syntax Tree for Code Optimization and Secure Programming in Java"],"prefix":"10.1007","author":[{"given":"Nguyen","family":"Hung-Cuong","sequence":"first","affiliation":[]},{"given":"Huynh","family":"Quyet-Thang","sequence":"additional","affiliation":[]},{"given":"Tru","family":"Ba-Vuong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,4,10]]},"reference":[{"volume-title":"Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Input Validation & More","year":"2009","author":"J Viega","key":"17_CR1","unstructured":"Viega, J., Messier, M.: Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Input Validation & More. O\u2019Reilly Media, Inc., Sebastopol (2009)"},{"key":"17_CR2","unstructured":"Wheeler, D.A.: Secure programming for linux and unix howto (2003)"},{"volume-title":"Java Security","year":"1998","author":"S Oaks","key":"17_CR3","unstructured":"Oaks, S.: Java Security. O\u2019Reilly, Sebastopol (1998). (ISBN 1565924037)"},{"volume-title":"Effective Java","year":"2008","author":"J Bloch","key":"17_CR4","unstructured":"Bloch, J.: Effective Java. Addison-Wesley Professional, Amsterdam (2008)"},{"key":"17_CR5","unstructured":"Aho, A.V., et al.: Compilers: principles, techniques, & tools. Pearson Education India (2007)"},{"key":"17_CR6","unstructured":"Gross, T.K.R.: Code optimization of pipeline constraints (1983)"},{"volume-title":"Code Optimization Techniques for Embedded Processors: Methods, Algorithms, and Tools","year":"2010","author":"R Leupers","key":"17_CR7","unstructured":"Leupers, R.: Code Optimization Techniques for Embedded Processors: Methods, Algorithms, and Tools. Springer Publishing Company, Incorporated, New York (2010)"},{"key":"17_CR8","doi-asserted-by":"publisher","DOI":"10.1007\/1-84628-295-0","volume-title":"System Software Reliability","author":"H Pham","year":"2006","unstructured":"Pham, H.: System Software Reliability. Springer, London (2006)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Context-Aware Systems and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-05939-6_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,2]],"date-time":"2024-04-02T16:21:50Z","timestamp":1712074910000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-05939-6_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319059389","9783319059396"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-05939-6_17","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"10 April 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}