{"entities":{"Q2982431":{"pageid":2993156,"ns":120,"title":"Item:Q2982431","lastrevid":79655159,"modified":"2026-05-06T14:25:04Z","type":"item","id":"Q2982431","labels":{"en":{"language":"en","value":"Fool Me If You Can: Mimicking Attacks and Anti-Attacks in Cyberspace"}},"descriptions":{"en":{"language":"en","value":"scientific article; zbMATH DE number 6716509"}},"aliases":{},"claims":{"P31":[{"mainsnak":{"snaktype":"value","property":"P31","hash":"fd5912e4dab4b881a8eb0eb27e7893fef55176ad","datavalue":{"value":{"entity-type":"item","numeric-id":56887,"id":"Q56887"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q2982431$973490BE-186E-446B-BA88-6872CAF72E0F","rank":"normal"}],"P159":[{"mainsnak":{"snaktype":"value","property":"P159","hash":"38567e4fa28ab2099634d1f8f051f0ac28162a64","datavalue":{"value":{"text":"Fool Me If You Can: Mimicking Attacks and Anti-Attacks in Cyberspace","language":"en"},"type":"monolingualtext"},"datatype":"monolingualtext"},"type":"statement","id":"Q2982431$75884DC1-10F3-4D9B-A3F5-B606BAE58BF1","rank":"normal"}],"P225":[{"mainsnak":{"snaktype":"value","property":"P225","hash":"39fcc101ee60d19f5a5188a67091325ec8d0f706","datavalue":{"value":"1360.68192","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q2982431$2F976BBB-DB7D-4DE7-BC1E-54C8F244E3FD","rank":"normal"}],"P27":[{"mainsnak":{"snaktype":"value","property":"P27","hash":"7d9eb5bce0b7b3e73d2c5cd0c804ac5cc61553bf","datavalue":{"value":"10.1109/TC.2013.191","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q2982431$5E57E9D3-E893-47B3-AD85-3CE035784C49","rank":"normal"}],"P16":[{"mainsnak":{"snaktype":"value","property":"P16","hash":"aafaa5b336b28cfccd3be52e5bea851c0508df1b","datavalue":{"value":{"entity-type":"item","numeric-id":1037882,"id":"Q1037882"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q2982431$4F8A4088-EAAC-4FF6-9F96-FE641477F2CA","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P16","hash":"f3d86ca70f3ef2a2164e37fe649042995a40ce18","datavalue":{"value":{"entity-type":"item","numeric-id":507490,"id":"Q507490"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q2982431$7ED29A6D-4C21-43B9-A2BE-9C13D7BEDB27","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P16","hash":"51149425cfd0041766e9190a28dd4f1dfa2163a2","datavalue":{"value":{"entity-type":"item","numeric-id":223042,"id":"Q223042"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q2982431$9E963295-D0D0-4474-85F2-18DD5851A6B0","rank":"normal"}],"P200":[{"mainsnak":{"snaktype":"value","property":"P200","hash":"cb95ba1181f89055fe808aa2c36bea9d3930d0fc","datavalue":{"value":{"entity-type":"item","numeric-id":80442,"id":"Q80442"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q2982431$F9969A9C-7132-4340-AD1A-567E9599F4D8","rank":"normal"}],"P28":[{"mainsnak":{"snaktype":"value","property":"P28","hash":"daa85c3fca52a36a5bd491b86ad0a10dbad35089","datavalue":{"value":{"time":"+2017-05-16T00:00:00Z","timezone":0,"before":0,"after":0,"precision":11,"calendarmodel":"http://www.wikidata.org/entity/Q1985727"},"type":"time"},"datatype":"time"},"type":"statement","id":"Q2982431$E359BFDC-B72A-4F3F-99ED-BCE084D1C56D","rank":"normal"}],"P226":[{"mainsnak":{"snaktype":"value","property":"P226","hash":"bb3685facee6981d0664afe5afbdc986c78292cb","datavalue":{"value":"68M11","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q2982431$142D5197-FFB0-46D8-B424-9ADA3B48DFC0","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P226","hash":"4264b8bf260e532ba12469970b36fcaf09f85467","datavalue":{"value":"68P30","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q2982431$D8CED865-CA71-4FC7-9A68-9B199942483A","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P226","hash":"0dd26fa594336927a7a04e8147a405d69e5da239","datavalue":{"value":"68Q87","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q2982431$71896677-9138-4948-812C-16C3F04D7689","rank":"normal"}],"P1451":[{"mainsnak":{"snaktype":"value","property":"P1451","hash":"d6da2bb78ea965b8088758a7e62482885cdd8e03","datavalue":{"value":"6716509","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q2982431$B69C4A0D-FC11-4948-9631-5D763B2D643F","rank":"normal"}],"P1460":[{"mainsnak":{"snaktype":"value","property":"P1460","hash":"57f7fea50d2ce1b39b695c4a1313582eed405e38","datavalue":{"value":{"entity-type":"item","numeric-id":5976449,"id":"Q5976449"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q2982431$A06864F0-EA73-4BC4-90B1-E4EE9D25A3C1","rank":"normal"}],"P205":[{"mainsnak":{"snaktype":"value","property":"P205","hash":"0063903f506497ec4cfc6acef7779eef845d4974","datavalue":{"value":"https://doi.org/10.1109/tc.2013.191","type":"string"},"datatype":"url"},"type":"statement","id":"Q2982431$797B075A-9025-4944-9EAB-CC9673673D5E","rank":"normal"}],"P388":[{"mainsnak":{"snaktype":"value","property":"P388","hash":"5e9171e59a0d7fe167d5efe954e3c598ac3a7512","datavalue":{"value":"W2079411451","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q2982431$578A9E70-7C53-4582-9183-33E339CC4008","rank":"normal"}]},"sitelinks":{"mardi":{"site":"mardi","title":"Fool Me If You Can: Mimicking Attacks and Anti-Attacks in Cyberspace","badges":[],"url":"https://portal.mardi4nfdi.de/wiki/Fool_Me_If_You_Can:_Mimicking_Attacks_and_Anti-Attacks_in_Cyberspace"}}}}}