{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,1,2]],"date-time":"2023-01-02T05:54:56Z","timestamp":1672638896049},"reference-count":0,"publisher":"Association for Computing Machinery (ACM)","issue":"February","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Ubiquity"],"published-print":{"date-parts":[[2000,2]]},"DOI":"10.1145\/334407.334420","type":"journal-article","created":{"date-parts":[[2020,9,10]],"date-time":"2020-09-10T01:08:38Z","timestamp":1599700118000},"page":"3","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Distributed denial-of-service attacks, contributory negligence and downstream liability"],"prefix":"10.1145","volume":"2000","author":[{"given":"M. E.","family":"Kabay","sequence":"first","affiliation":[{"name":"Adario"}]}],"member":"320","published-online":{"date-parts":[[2018,9,23]]},"container-title":["Ubiquity"],"original-title":[],"language":"en","deposited":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T11:37:28Z","timestamp":1672573048000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/334407.334420"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000,2]]},"references-count":0,"journal-issue":{"issue":"February","published-print":{"date-parts":[[2000,2]]}},"alternative-id":["10.1145\/334407.334420"],"URL":"https:\/\/doi.org\/10.1145\/334407.334420","relation":{},"ISSN":["1530-2180"],"issn-type":[{"value":"1530-2180","type":"electronic"}],"subject":[],"published":{"date-parts":[[2000,2]]},"assertion":[{"value":"2018-09-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}