{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T11:37:37Z","timestamp":1742989057893,"version":"3.40.3"},"publisher-location":"Cham","reference-count":9,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319914459"},{"type":"electronic","value":"9783319914466"}],"license":[{"start":{"date-parts":[[2018,5,27]],"date-time":"2018-05-27T00:00:00Z","timestamp":1527379200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-319-91446-6_29","type":"book-chapter","created":{"date-parts":[[2018,5,26]],"date-time":"2018-05-26T00:54:03Z","timestamp":1527296043000},"page":"306-315","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Platform for Software Quality and Dependability Data Analysis"],"prefix":"10.1007","author":[{"given":"Rafa\u0142","family":"Kozik","sequence":"first","affiliation":[]},{"given":"Micha\u0142","family":"Chora\u015b","sequence":"additional","affiliation":[]},{"given":"Damian","family":"Puchalski","sequence":"additional","affiliation":[]},{"given":"Rafa\u0142","family":"Renk","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,5,27]]},"reference":[{"issue":"6","key":"29_CR1","doi-asserted-by":"publisher","first-page":"783","DOI":"10.1007\/s12652-015-0283-x","volume":"6","author":"R Kozik","year":"2015","unstructured":"Kozik, R., Chora\u015b, M., Flizikowski, A., Theocharidou, M., Rosato, V., Rome, E.: Advanced services for critical infrastructures protection. J. Ambient Intell. Humanized Comput. 6(6), 783\u2013795 (2015)","journal-title":"J. Ambient Intell. Humanized Comput."},{"key":"29_CR2","first-page":"177","volume-title":"Advances in Intelligent Systems and Computing","author":"Micha\u0142 Chora\u015b","year":"2013","unstructured":"Chora\u015b, M., Kozik, R., Puchalski, D., Holubowicz, W.: Correlation approach for SQL injection attacks detection. In: Herrero, A., et al. (eds.) Advances in Intelligent and Soft Computing, vol. 189, pp. 177\u2013186. Springer (2012)"},{"key":"29_CR3","first-page":"48","volume-title":"Communications in Computer and Information Science","author":"Micha\u0142 Chora\u015b","year":"2011","unstructured":"Chora\u015b, M., Kozik, R.: Network event correlation and semantic reasoning for federated networks protection system. In: Chaki, N., et al. (eds.) Computer Information Systems Analysis and Technologies. CCIS, pp. 48\u201354. Springer (2011)"},{"key":"29_CR4","volume-title":"Software Testing: A Craftsman\u2019s Approach","author":"PC Jorgensen","year":"2016","unstructured":"Jorgensen, P.C.: Software Testing: A Craftsman\u2019s Approach. CRC Press, Hoboken (2016)"},{"key":"29_CR5","unstructured":"Capgemini: World Quality Report 2016\u201317, 8th edn. https:\/\/www.capgemini.com\/world-quality-report-2016-17\/ . Accessed 9 Oct 2017"},{"key":"29_CR6","volume-title":"The Economics of Software Quality","author":"C Jones","year":"2011","unstructured":"Jones, C., Bonsignour, O.: The Economics of Software Quality. Addison-Wesley Professional, Reading (2011)"},{"issue":"3","key":"29_CR7","doi-asserted-by":"publisher","first-page":"519","DOI":"10.1007\/s11219-015-9289-z","volume":"24","author":"M Felderer","year":"2016","unstructured":"Felderer, M., Ramler, R.: Risk orientation in software testing processes of small and medium enterprises: an exploratory and comparative study. Softw. Qual. J. 24(3), 519\u2013548 (2016)","journal-title":"Softw. Qual. J."},{"key":"29_CR8","unstructured":"H2020 project Q-Rapids. http:\/\/www.q-rapids.eu\/ . Accessed 9 Oct 2017"},{"key":"29_CR9","doi-asserted-by":"crossref","unstructured":"Kozik, R., Chora\u015b, M., Puchalski, D., Renk, R.: Data analysis tool supporting software analysis process. In: Proceedings of 14th IEEE International Scientific Conference on Informatics, Poprad, Slovakia, 14\u201316 November 2017, pp. 179\u2013184 (2017)","DOI":"10.1109\/INFORMATICS.2017.8327243"}],"container-title":["Advances in Intelligent Systems and Computing","Contemporary Complex Systems and Their Dependability"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-91446-6_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,18]],"date-time":"2019-10-18T12:06:39Z","timestamp":1571400399000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-91446-6_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5,27]]},"ISBN":["9783319914459","9783319914466"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-91446-6_29","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2018,5,27]]}}}