{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,1,31]],"date-time":"2023-01-31T18:42:08Z","timestamp":1675190528839},"reference-count":0,"publisher":"Inderscience Publishers","issue":"2\/3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IJICS"],"published-print":{"date-parts":[[2020]]},"DOI":"10.1504\/ijics.2020.105180","type":"journal-article","created":{"date-parts":[[2020,2,15]],"date-time":"2020-02-15T12:39:08Z","timestamp":1581770348000},"page":"269","source":"Crossref","is-referenced-by-count":3,"title":["Scrutinising internet banking security solutions"],"prefix":"10.1504","volume":"12","author":[{"given":"Burhan Ul Islam","family":"Khan","sequence":"first","affiliation":[]},{"given":"Rashidah Funke","family":"Olanrewaju","sequence":"additional","affiliation":[]},{"given":"Farhat","family":"Anwar","sequence":"additional","affiliation":[]},{"given":"Roohie Naaz","family":"Mir","sequence":"additional","affiliation":[]},{"given":"Mashkuri","family":"Yaacob","sequence":"additional","affiliation":[]}],"member":"378","container-title":["International Journal of Information and Computer Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.inderscienceonline.com\/doi\/full\/10.1504\/IJICS.2020.105180","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,15]],"date-time":"2020-02-15T12:39:12Z","timestamp":1581770352000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.inderscience.com\/link.php?id=105180"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":0,"journal-issue":{"issue":"2\/3","published-print":{"date-parts":[[2020]]}},"URL":"https:\/\/doi.org\/10.1504\/ijics.2020.105180","relation":{},"ISSN":["1744-1765","1744-1773"],"issn-type":[{"value":"1744-1765","type":"print"},{"value":"1744-1773","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]}}}