{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T17:10:31Z","timestamp":1767373831794,"version":"3.40.3"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319395630"},{"type":"electronic","value":"9783319395647"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-39564-7_22","type":"book-chapter","created":{"date-parts":[[2016,6,6]],"date-time":"2016-06-06T07:27:56Z","timestamp":1465198076000},"page":"231-242","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Associating the Severity of Vulnerabilities with their Description"],"prefix":"10.1007","author":[{"given":"Dimitrios","family":"Toloudis","sequence":"first","affiliation":[]},{"given":"Georgios","family":"Spanos","sequence":"additional","affiliation":[]},{"given":"Lefteris","family":"Angelis","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,6,7]]},"reference":[{"key":"22_CR1","unstructured":"CVE \u2013 Terminology. https:\/\/cve.mitre.org\/about\/terminology.html"},{"key":"22_CR2","unstructured":"Mell, P., Scarfone, K., Romanosky, S.: A complete guide to the common vulnerability scoring system version 2.0 (2007). https:\/\/www.first.org\/cvss\/v2\/guide"},{"key":"22_CR3","unstructured":"Schiffman, M., Cisco, C.I.A.G.: A complete guide to the common vulnerability scoring system (cvss) (2005). http:\/\/www.first.org\/cvss\/v1\/guide"},{"key":"22_CR4","unstructured":"NVD \u2013 National Vulnerability Database. https:\/\/nvd.nist.gov\/"},{"key":"22_CR5","doi-asserted-by":"crossref","unstructured":"Spanos, G., Sioziou, A., Angelis, L.: WIVSS: a new methodology for scoring information systems vulnerabilities. In: Proceedings of the 17th Panhellenic Conference on Informatics, pp. 83\u201390. ACM, New York (2013)","DOI":"10.1145\/2491845.2491871"},{"issue":"1\u20133","key":"22_CR6","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1080\/19393555.2015.1051675","volume":"24","author":"G Spanos","year":"2015","unstructured":"Spanos, G., Angelis, L.: Impact metrics of security vulnerabilities: analysis and weighing. Inf. Secur. J. Gobal Perspect. 24(1\u20133), 57\u201371 (2015)","journal-title":"Inf. Secur. J. Gobal Perspect."},{"issue":"3","key":"22_CR7","doi-asserted-by":"publisher","first-page":"264","DOI":"10.1016\/j.comcom.2010.04.006","volume":"34","author":"Q Liu","year":"2011","unstructured":"Liu, Q., Zhang, Y.: VRSS: a new system for rating and scoring vulnerabilities. Comput. Commun. 34(3), 264\u2013273 (2011)","journal-title":"Comput. Commun."},{"issue":"8","key":"22_CR8","doi-asserted-by":"publisher","first-page":"1699","DOI":"10.1016\/j.jss.2012.03.057","volume":"85","author":"Q Liu","year":"2012","unstructured":"Liu, Q., Zhang, Y., Kong, Y., Wu, Q.: Improving VRSS-based vulnerability prioritization using analytic hierarchy process. J. Syst. Softw. 85(8), 1699\u20131708 (2012)","journal-title":"J. Syst. Softw."},{"issue":"2","key":"22_CR9","first-page":"579","volume":"8","author":"Y Wang","year":"2012","unstructured":"Wang, Y., Yang, Y.: PVL: a novel metric for single vulnerability rating and its application in IMS. J. Comput. Inf. Syst. 8(2), 579\u2013590 (2012)","journal-title":"J. Comput. Inf. Syst."},{"key":"22_CR10","doi-asserted-by":"publisher","first-page":"601","DOI":"10.1016\/j.ijmedinf.2006.04.011","volume":"76","author":"T Theodosiou","year":"2007","unstructured":"Theodosiou, T., Angelis, L., Vakali, A., Thomopoulos, G.N.: Gene functional annotation by statistical analysis of biomedical articles. Int. J. Med. Inform. 76, 601\u2013613 (2007)","journal-title":"Int. J. Med. Inform."},{"key":"22_CR11","doi-asserted-by":"publisher","first-page":"202","DOI":"10.1016\/j.jbi.2007.06.004","volume":"41","author":"T Theodosiou","year":"2008","unstructured":"Theodosiou, T., Angelis, L., Vakali, A.: Non-linear correlation of content and metadata information extracted from biomedical article datasets. J. Biomed. Inform. 41, 202\u2013216 (2008)","journal-title":"J. Biomed. Inform."},{"key":"22_CR12","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1177\/1094428108317202","volume":"12","author":"N Janasik","year":"2009","unstructured":"Janasik, N., Honkela, T., Bruun, H.: Text mining in qualitative research: application of an unsupervised learning method. Organ. Res. Methods 12, 436\u2013460 (2009)","journal-title":"Organ. Res. Methods"},{"key":"22_CR13","doi-asserted-by":"crossref","unstructured":"Hovsepyan, A., Scandariato, R., Joosen, W., Walden, J.: Software vulnerability prediction using text analysis techniques. In: 4th International Workshop on Security Measurements and Metrics, pp. 7\u201310. ACM, New York (2012)","DOI":"10.1145\/2372225.2372230"},{"key":"22_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"274","DOI":"10.1007\/978-3-642-28490-8_29","volume-title":"Intelligent Information and Database Systems","author":"C Liu","year":"2012","unstructured":"Liu, C., Li, J., Chen, X.: Network vulnerability analysis using text mining. In: Pan, J.-S., Chen, S.-M., Nguyen, N.T. (eds.) ACIIDS 2012, Part II. LNCS, vol. 7197, pp. 274\u2013283. Springer, Heidelberg (2012)"},{"key":"22_CR15","doi-asserted-by":"publisher","first-page":"10583","DOI":"10.1016\/j.eswa.2012.02.138","volume":"39","author":"K Nishanth","year":"2012","unstructured":"Nishanth, K., Ravi, V., Ankaiah, N., Bose, I.: Soft computing based imputation and hybrid data and text mining: the case of predicting the severity of phishing alerts. Expert Syst. Appl. 39, 10583\u201310589 (2012)","journal-title":"Expert Syst. Appl."},{"key":"22_CR16","doi-asserted-by":"publisher","first-page":"662","DOI":"10.1016\/j.dss.2010.08.020","volume":"50","author":"X Chen","year":"2011","unstructured":"Chen, X., Bose, I., Leung, A., Guo, C.: Assessing the severity of phishing attacks: a hybrid data mining approach. Decis. Support Syst. 50, 662\u2013672 (2011)","journal-title":"Decis. Support Syst."},{"key":"22_CR17","unstructured":"Wang, T.-W., Rees, J., Kannan, K.: Reading the disclosures with new eyes: bridging the gap between information security disclosures and incidents. In: 7th Workshop on the Economics of Information Security (WEIS), Hanover, NH (2008)"},{"key":"22_CR18","unstructured":"FIRST.org\/FIRST - Improving security together. http:\/\/www.first.org"},{"key":"22_CR19","unstructured":"CVSS-SIG Team. https:\/\/www.first.org\/cvss\/v2\/team"},{"key":"22_CR20","volume-title":"Mining of Massive Datasets","author":"A Rajaraman","year":"2012","unstructured":"Rajaraman, A., Ullman, J.D.: Mining of Massive Datasets, vol. 1. Cambridge University Press, Cambridge (2012)"},{"key":"22_CR21","volume-title":"Handbook of Parametric and Non-parametric Statistical Procedures","author":"DJ Sheskin","year":"2004","unstructured":"Sheskin, D.J.: Handbook of Parametric and Non-parametric Statistical Procedures. Chapman & Hall\/CRC, Boca Raton (2004)"},{"key":"22_CR22","volume-title":"The Analysis and Interpretation of Multivariate Data for Social Scientists","author":"DJ Bartholomew","year":"2002","unstructured":"Bartholomew, D.J., Steele, F., Moustaki, I., Galbraith, J.I.: The Analysis and Interpretation of Multivariate Data for Social Scientists. Chapman & Hall\/CRC, Boca Raton (2002)"}],"container-title":["Lecture Notes in Business Information Processing","Advanced Information Systems Engineering Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-39564-7_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,7]],"date-time":"2021-06-07T00:08:35Z","timestamp":1623024515000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-39564-7_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319395630","9783319395647"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-39564-7_22","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"7 June 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CAiSE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Information Systems Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ljubljana","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Slovenia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 June 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 June 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"caise2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}