abstracts |
[]
|
container |
{'state': 'active', 'ident': 'sdme5pnua5auzcsjgqmqefb66m', 'revision': '9e0b14b0-003d-4e72-9bdd-22597ceef37c', 'redirect': None, 'extra': {'country': 'gb', 'default_license': 'CC-BY', 'doaj': {'archive': ['LOCKSS', 'Portico'], 'as_of': '2022-07-06', 'default_license': 'CC-BY', 'seal': True}, 'kbart': {'clockss': {'year_spans': [[2008, 2016]]}, 'lockss': {'year_spans': [[2017, 2018]]}, 'portico': {'year_spans': [[2011, 2022]]}, 'scholarsportal': {'year_spans': [[2008, 2015]]}}, 'languages': ['en'], 'publisher_type': 'big5', 'sherpa_romeo': {'color': 'green'}, 'urls': ['https://www.hindawi.com/journals/scn/', 'http://www.interscience.wiley.com/journal/security', 'http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1939-0122']}, 'edit_extra': None, 'name': 'Security and Communication Networks', 'container_type': None, 'publication_status': None, 'publisher': 'Hindawi Limited', 'issnl': '1939-0122', 'issne': '1939-0122', 'issnp': '1939-0114', 'wikidata_qid': 'Q15762718'}
|
container_id |
sdme5pnua5auzcsjgqmqefb66m
|
contribs[] |
{'index': 0, 'creator_id': None, 'creator': None, 'raw_name': 'Security and Communication Networks', 'given_name': 'Security', 'surname': 'and Communication Networks', 'role': 'author', 'raw_affiliation': None, 'extra': {'seq': 'first'}}
|
ext_ids |
{'doi': '10.1155/2024/9827176', 'wikidata_qid': None, 'isbn13': None, 'pmid': None, 'pmcid': None, 'core': None, 'arxiv': None, 'jstor': None, 'ark': None, 'mag': None, 'doaj': None, 'dblp': None, 'oai': None, 'hdl': None}
|
files[] |
{'state': 'active', 'ident': 'elvt3cq56ng2noglrgyr4o5df4', 'revision': '98edc442-094e-4010-9b88-625a1f546d7b', 'redirect': None, 'extra': None, 'edit_extra': None, 'size': 206136, 'md5': '17654449a561f03121974d3fdfc284b1', 'sha1': '04dec52e914f7a43bd32fcd565557c568addf528', 'sha256': '1361cf09f99661e19c13b82165d99dbfba4f0c50e3bdde004f8ee665eae74965', 'urls': [{'url': 'https://downloads.hindawi.com/journals/scn/2024/9827176.pdf', 'rel': 'publisher'}, {'url': 'https://web.archive.org/web/20240126083915/https://downloads.hindawi.com/journals/scn/2024/9827176.pdf', 'rel': 'webarchive'}], 'mimetype': 'application/pdf', 'content_scope': None, 'release_ids': ['df354mbwkrg6djved6viw4ddhy'], 'releases': None}
|
filesets |
[]
|
issue |
|
language |
en
|
license_slug |
CC-BY
|
number |
|
original_title |
|
pages |
1-1
|
publisher |
Hindawi Limited
|
refs[] |
{'index': 0, 'target_release_id': None, 'extra': {'doi': '10.1155/2022/2834982'}, 'key': '1', 'year': None, 'container_name': None, 'title': None, 'locator': None}
|
release_date |
2024-01-09
|
release_stage |
published
|
release_type |
article-journal
|
release_year |
2024
|
subtitle |
|
title |
Retracted: Software Security Testing through Coverage in Deep Neural Networks
|
version |
|
volume |
2024
|
webcaptures |
[]
|
withdrawn_date |
|
withdrawn_status |
|
withdrawn_year |
|
work_id |
3m3vijuk5vampeozi6zurybxg4
|