{"entities":{"Q5890413":{"pageid":7926208,"ns":120,"title":"Item:Q5890413","lastrevid":41987829,"modified":"2025-05-21T07:51:38Z","type":"item","id":"Q5890413","labels":{"en":{"language":"en","value":"Reply to `Comment on ``A framework for modelling trojans and computer virus infection''\\,' by E. M\u00e4kinen"}},"descriptions":{"en":{"language":"en","value":"scientific article; zbMATH DE number 1694338"}},"aliases":{},"claims":{"P31":[{"mainsnak":{"snaktype":"value","property":"P31","hash":"fd5912e4dab4b881a8eb0eb27e7893fef55176ad","datavalue":{"value":{"entity-type":"item","numeric-id":56887,"id":"Q56887"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q5890413$6D8BF846-FA41-4065-9C2A-468098B3A7E3","rank":"normal"}],"P225":[{"mainsnak":{"snaktype":"value","property":"P225","hash":"ad864ed9b899ddb3f4944a2974354bccbb1b1400","datavalue":{"value":"1051.68538","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q5890413$0FCAC72D-5655-4415-AA21-86FB79AA8560","rank":"normal"}],"P28":[{"mainsnak":{"snaktype":"value","property":"P28","hash":"d6f630a8f9062cc7a61bf0b0d4072e8f242af2b3","datavalue":{"value":{"time":"+2001-00-00T00:00:00Z","timezone":0,"before":0,"after":0,"precision":9,"calendarmodel":"http://www.wikidata.org/entity/Q1985727"},"type":"time"},"datatype":"time"},"type":"statement","id":"Q5890413$37E78A39-33BC-47E3-92E1-10F99ABF596B","rank":"normal"}],"P226":[{"mainsnak":{"snaktype":"value","property":"P226","hash":"b8e3f40e3cc87753c4e0b7d7ce4bdc00805f626f","datavalue":{"value":"68N01","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q5890413$92487C13-5C21-4BFA-A410-31649BD44A03","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P226","hash":"a7dde57cbaf704d564d8f981ca98d6340e3d4aaf","datavalue":{"value":"68Q05","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q5890413$99DD9E30-5291-404C-8918-235EF4868D2F","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P226","hash":"517ace4a4f9c45a5475b4a8927a567447dbdb293","datavalue":{"value":"68N99","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q5890413$86E6D075-853B-4D11-B704-5B4DFD70E046","rank":"normal"}],"P1451":[{"mainsnak":{"snaktype":"value","property":"P1451","hash":"310de9d81f1b9ad7bf39e081f0427498a888560f","datavalue":{"value":"1694338","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q5890413$14352D69-F6FB-4795-A278-28523F1220DD","rank":"normal"}],"P16":[{"mainsnak":{"snaktype":"value","property":"P16","hash":"a194fa37492fd38a1bff712886e93685f89481a6","datavalue":{"value":{"entity-type":"item","numeric-id":667612,"id":"Q667612"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q5890413$B277E4C3-1AB1-4F53-86C2-9F9B8972A5C0","rank":"normal"}],"P1460":[{"mainsnak":{"snaktype":"value","property":"P1460","hash":"57f7fea50d2ce1b39b695c4a1313582eed405e38","datavalue":{"value":{"entity-type":"item","numeric-id":5976449,"id":"Q5976449"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q5890413$B768D699-77E4-48DF-B51B-68C5D0CD0B87","rank":"normal"}],"P205":[{"mainsnak":{"snaktype":"value","property":"P205","hash":"082ccce200ad9894697a547bbbfbf8495026f279","datavalue":{"value":"https://doi.org/10.1093/comjnl/44.4.326","type":"string"},"datatype":"url"},"type":"statement","id":"Q5890413$E3110AB0-FDE5-4C41-A616-738358B216FC","rank":"normal"}],"P388":[{"mainsnak":{"snaktype":"value","property":"P388","hash":"2078d6531f3954789cfb6556667e682083668086","datavalue":{"value":"W2085565952","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q5890413$6551E321-B107-4EDD-BDDC-3DD47F508D8B","rank":"normal"}],"P12":[{"mainsnak":{"snaktype":"value","property":"P12","hash":"d9904ceecc19a2eeb696d298839aa41acb9a444f","datavalue":{"value":"Q59568329","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q5890413$898490C9-6324-45B0-A76F-B787C53363D8","rank":"normal"}],"P1635":[{"mainsnak":{"snaktype":"value","property":"P1635","hash":"871173208b51f0ce27702eb1a663af5e4cd625c2","datavalue":{"value":"journals/cj/Cohen01","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q5890413$6BFA2798-7F86-47B6-A3F3-BCEE688EA72C","rank":"normal"}],"P27":[{"mainsnak":{"snaktype":"value","property":"P27","hash":"05931464ca6a5e170c4d913d07b654806719a123","datavalue":{"value":"10.1093/COMJNL/44.4.326","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q5890413$37DBA8BA-2C56-44E0-851E-1258AA2DCC77","rank":"normal"}],"P159":[{"mainsnak":{"snaktype":"value","property":"P159","hash":"43590bbd5af614e9a81cab44df2913bf29641b44","datavalue":{"value":{"text":"Reply to `Comment on ``A framework for modelling trojans and computer virus infection''\\,' by E. M\u00e4kinen","language":"en"},"type":"monolingualtext"},"datatype":"monolingualtext"},"type":"statement","id":"Q5890413$261C223F-1DDD-4459-B417-02818E0E2555","rank":"normal"}],"P200":[{"mainsnak":{"snaktype":"value","property":"P200","hash":"6a0bdd8998eb86ef97e8e0d5b3adcd7d90578311","datavalue":{"value":{"entity-type":"item","numeric-id":6768742,"id":"Q6768742"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q5890413$72A9038A-0292-424A-A26D-D9D1A9394A2F","rank":"normal"}],"P1448":[{"mainsnak":{"snaktype":"value","property":"P1448","hash":"ed46de1a263f00c9fbf2f804eec5a5ba6dc08a45","datavalue":{"value":"Reply to \\textit{E. M\u00e4kinen}, ibid. 44, 321--323 (2001; Zbl 1051.68539).","type":"string"},"datatype":"string"},"type":"statement","id":"Q5890413$FA77935D-66A7-496F-9A12-83E352EE7AEB","rank":"normal"}]},"sitelinks":{"mardi":{"site":"mardi","title":"Publication:5890413","badges":[],"url":"https://portal.mardi4nfdi.de/wiki/Publication:5890413"}}}}}