{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T03:56:37Z","timestamp":1742961397897,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642001987"},{"type":"electronic","value":"9783642001994"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-00199-4_17","type":"book-chapter","created":{"date-parts":[[2009,3,26]],"date-time":"2009-03-26T09:26:36Z","timestamp":1238059596000},"page":"195-199","source":"Crossref","is-referenced-by-count":0,"title":["Idea: Measuring the Effect of Code Complexity on Static Analysis Results"],"prefix":"10.1007","author":[{"given":"James","family":"Walden","sequence":"first","affiliation":[]},{"given":"Adam","family":"Messer","sequence":"additional","affiliation":[]},{"given":"Alex","family":"Kuhl","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"17_CR1","unstructured":"Gcc 3.4 changes, \n                    \n                      http:\/\/gcc.gnu.org\/gcc-3.4\/changes.html"},{"key":"17_CR2","volume-title":"Proceedings of the 37th Hawaii International Conference on System Sciences","author":"J. Heffley","year":"2004","unstructured":"Heffley, J., Meunier, P.: Can Source Code Auditing Software Identify Common Vulnerabilities and Be Used to Evaluate Software Security? In: Proceedings of the 37th Hawaii International Conference on System Sciences. IEEE Press, New York (2004)"},{"key":"17_CR3","unstructured":"Kratkiewicz, K., Lippmann, R.: Using a Diagnostic Corpus of C Programs to Evaluate Buffer Overflow Detection by Static Analysis Tools. In: 2005 Workshop on the Evaluation of Software Defect Tools (2005)"},{"issue":"4","key":"17_CR4","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1109\/TSE.1976.233837","volume":"2","author":"T.J. McCabe","year":"1976","unstructured":"McCabe, T.J.: A Complexity Measure. IEEE Transactions on Software Engineering\u00a02(4), 308\u2013320 (1976)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"17_CR5","unstructured":"Newsham, T., Chess, B.: ABM: A Prototype for Benchmarking Source Code Analyzers. In: Workshop on Software Security Assurance Tools, Techniques, and Metrics. U.S. National Institute of Standards and Technology (NIST) Special Publication (SP), pp. 500\u2013265 (2006)"},{"key":"17_CR6","unstructured":"NVD, \n                    \n                      http:\/\/nvd.nist.gov\/"},{"key":"17_CR7","unstructured":"PMMCABE, \n                    \n                      http:\/\/www.parisc-linux.org\/~bame\/pmccabe\/overview.html"},{"key":"17_CR8","unstructured":"SLOCCount, \n                    \n                      http:\/\/www.dwheeler.com\/sloccount\/"},{"key":"17_CR9","unstructured":"Wilander, J., Kamkar, M.: A Comparison of Publicly Available Tools For Static Intrusion Prevention. In: Proceedings of the 7th Nordic Workshop on Secure IT Systems, Karlstad, Sweden, pp. 68\u201384 (2002)"},{"issue":"6","key":"17_CR10","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1145\/1041685.1029911","volume":"29","author":"M. Zitser","year":"2004","unstructured":"Zitser, M., Lippmann, R., Leek, T.: Testing Static Analysis Tools using Exploitable Buffer Overflows from Open Source Code. SIGSOFT Software Engineering Notes\u00a029(6), 97\u2013106 (2004)","journal-title":"SIGSOFT Software Engineering Notes"}],"container-title":["Lecture Notes in Computer Science","Engineering Secure Software and Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-00199-4_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,29]],"date-time":"2020-01-29T14:27:08Z","timestamp":1580308028000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-00199-4_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642001987","9783642001994"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-00199-4_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}