{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T20:45:39Z","timestamp":1742935539107,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662474006"},{"type":"electronic","value":"9783662474013"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-662-47401-3_19","type":"book-chapter","created":{"date-parts":[[2015,6,19]],"date-time":"2015-06-19T08:27:04Z","timestamp":1434702424000},"page":"144-151","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Software Vulnerability Severity Evaluation Based on Economic Losses"],"prefix":"10.1007","author":[{"given":"Yunxue","family":"Yang","sequence":"first","affiliation":[]},{"given":"Shuyuan","family":"Jin","sequence":"additional","affiliation":[]},{"given":"Xiaowei","family":"He","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,6,20]]},"reference":[{"key":"19_CR1","unstructured":"Global Corporate IT Security Risks (2013). http:\/\/media.kaspersky.com\/en\/business-security\/Kaspersky_Global_IT_Security_Risks_Survey_report_Eng_final.pdf"},{"key":"19_CR2","unstructured":"National Vulnerability Database. http:\/\/nvd.nist.gov\/"},{"key":"19_CR3","unstructured":"Common Vulnerability Scoring System (CVSS-SIG). http:\/\/www.first.org\/cvss"},{"key":"19_CR4","doi-asserted-by":"crossref","unstructured":"Frigault, M., Wang, L.Y., Singhal, A., Jajodia, S.: Measuring network security using dynamic Bayesian network. In: ACM Conference on Computer and Communications Security, pp. 23\u00a0\u2212\u00a030 (2008)","DOI":"10.1145\/1456362.1456368"},{"key":"19_CR5","doi-asserted-by":"crossref","unstructured":"Cheng, P.S., Wang, L.Y., Jajodia, S., Singhal, A.: Aggregating CVSS base scores for semantics-rich network security metrics. In: 2012 IEEE 31st International Symposium on Reliable Distributed Systems (SRDS 2012), Irvine, CA, USA, 8\u00a0\u2212\u00a011 October 2012","DOI":"10.1109\/SRDS.2012.4"},{"issue":"1","key":"19_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2630069","volume":"17","author":"L Allodi","year":"2014","unstructured":"Allodi, L., Massacci, F.: Comparing vulnerability severity and exploits using case-control studies. ACM Trans. Inf. Syst. Secur. 17(1), 1\u201320 (2014)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"19_CR7","doi-asserted-by":"publisher","first-page":"2822","DOI":"10.1016\/j.jss.2013.06.040","volume":"86","author":"CC Huang","year":"2013","unstructured":"Huang, C.C., Lin, F.Y., Lin, F.Y.-S., Sun, Y.S.: A novel approach to evaluate software vulnerability prioritization. J. Syst. Softw. 86, 2822\u20132840 (2013)","journal-title":"J. Syst. Softw."},{"issue":"3","key":"19_CR8","doi-asserted-by":"publisher","first-page":"264","DOI":"10.1016\/j.comcom.2010.04.006","volume":"34","author":"QX Liu","year":"2011","unstructured":"Liu, Q.X., Zhang, Y.Q.: VRSS: a new system for rating and scoring vulnerabilities. Comput. Commun. 34(3), 264\u2013273 (2011)","journal-title":"Comput. Commun."},{"key":"19_CR9","doi-asserted-by":"publisher","first-page":"1699","DOI":"10.1016\/j.jss.2012.03.057","volume":"85","author":"QX Liu","year":"2012","unstructured":"Liu, Q.X., Zhang, Y.Q., Kong, Y., Wu, Q.R.: Improving VRSS-based vulnerability prioritization using analytic hierarchy process. J. Syst. Softw. 85, 1699\u20131708 (2012)","journal-title":"J. Syst. Softw."},{"key":"19_CR10","doi-asserted-by":"crossref","unstructured":"Ghani, H., Luna, J., Suri, N.: Quantitative assessment of software vulnerabilities based on economic-driven security metrics. In: 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), IEEE Computer Society, p. 8 (2013)","DOI":"10.1109\/CRiSIS.2013.6766361"},{"key":"19_CR11","doi-asserted-by":"crossref","unstructured":"Innerhofer-Oberperfler, F., Breu, R.: An empirically derived loss taxonomy based on publicly known security incidents. In: 4th International Conference on Availability, Reliability and Security (ARES), vol. 1 and 2, pp. 66\u201373 (2009)","DOI":"10.1109\/ARES.2009.85"},{"key":"19_CR12","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1016\/0377-2217(90)90057-I","volume":"48","author":"TL Saaty","year":"1990","unstructured":"Saaty, T.L.: How to make a decision: the analytic hierarchy process. Eur. J. Oper. Res. 48, 9\u201326 (1990)","journal-title":"Eur. J. Oper. Res."}],"container-title":["Communications in Computer and Information Science","Trustworthy Computing and Services"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-47401-3_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,15]],"date-time":"2023-02-15T11:26:54Z","timestamp":1676460414000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-662-47401-3_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783662474006","9783662474013"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-47401-3_19","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"20 June 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}