{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,23]],"date-time":"2025-09-23T17:08:43Z","timestamp":1758647323736,"version":"3.44.0"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031689482"},{"type":"electronic","value":"9783031689499"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-68949-9_6","type":"book-chapter","created":{"date-parts":[[2025,1,10]],"date-time":"2025-01-10T17:58:34Z","timestamp":1736531914000},"page":"69-82","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Risk Assessment of Vulnerabilities Exploitation"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9276-7011","authenticated-orcid":false,"given":"M.","family":"F\u00e1tima Brilhante","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3406-1077","authenticated-orcid":false,"given":"Pedro","family":"Pestana","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9966-2271","authenticated-orcid":false,"given":"M.","family":"Lu\u00edsa Rocha","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9388-1123","authenticated-orcid":false,"given":"Fernando","family":"Sequeira","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,1,11]]},"reference":[{"key":"6_CR1","unstructured":"Tunggal, A.: What is a Vulnerability? Definition+Examples (2022). URL http:\/\/www.upguard.com\/blog\/vulnerability"},{"issue":"3","key":"6_CR2","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1080\/10920277.2022.2034507","volume":"27","author":"M Eling","year":"2022","unstructured":"Eling, M., Elvedi, M., Falco, G.: The economic impact of extreme cyber risk scenarios. N. Am. Actuar. J. 27(3), 429\u2013443 (2022)","journal-title":"N. Am. Actuar. J."},{"key":"6_CR3","unstructured":"EPSS: Exploit Prediction Scoring System. http:\/\/first.org\/epss"},{"key":"6_CR4","unstructured":"Dugal, D., Rich, D.: Announcing CVSS v4.0. In: 35th Annual FIRST Conference, Montr\u00e9al, Canada (2023)"},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"Frei, S., May, M., Fiedler, U., Plattner, B.: Large-scale vulnerability analysis. In: Proceedings of the 2006 SIGCOMM workshop on Large-scale attack defense, pp. 131\u2013138 (2006)","DOI":"10.1145\/1162666.1162671"},{"issue":"1","key":"6_CR6","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/TDSC.2013.21","volume":"11","author":"H Holm","year":"2013","unstructured":"Holm, H.: A large-scale study of the time required to compromise a computer system. IEEE Trans. Dependable Secure Comput. 11(1), 2\u201315 (2013)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"6_CR7","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/978-3-319-15618-7_11","volume-title":"Engineering Secure Software and Systems","author":"L Allodi","year":"2015","unstructured":"Allodi, L.: The heavy tails of vulnerability exploitation. In: Piessens, F., Caballero, J., Bielova, N. (eds.) Engineering Secure Software and Systems, pp. 133\u2013148. Springer International Publishing, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-15618-7_11"},{"issue":"4","key":"6_CR8","doi-asserted-by":"publisher","first-page":"661","DOI":"10.1137\/070710111","volume":"51","author":"A Clauset","year":"2009","unstructured":"Clauset, A., Shalizi, C.R., Newman, M.E.J.: Power-law distributions in empirical data. SIAM Rev. 51(4), 661\u2013703 (2009)","journal-title":"SIAM Rev."},{"key":"6_CR9","first-page":"38","volume":"4","author":"J Karamata","year":"1930","unstructured":"Karamata, J.: Sur un mode de croissance r\u00e9guli\u00e9re des fonctions. Mathematica (Cluj) 4, 38\u201453 (1930)","journal-title":"Mathematica (Cluj)"},{"issue":"6069","key":"6_CR10","doi-asserted-by":"publisher","first-page":"665","DOI":"10.1126\/science.1216142","volume":"335","author":"MPH Stumpf","year":"2012","unstructured":"Stumpf, M.P.H., Porter, M.A.: Critical truths about power laws. Science 335(6069), 665\u2013666 (2012)","journal-title":"Science"},{"key":"6_CR11","unstructured":"CVEdetails.com: http:\/\/www.cvedetails.com"},{"issue":"1","key":"6_CR12","doi-asserted-by":"publisher","first-page":"20","DOI":"10.3390\/appliedmath4010002","volume":"4","author":"MF Brilhante","year":"2023","unstructured":"Brilhante, M.F., Pestana, D., Pestana, P., Rocha, M.L.: Measuring the risk of vulnerabilities exploitation. Appl. Math. 4(1), 20\u201354 (2023). https:\/\/doi.org\/10.3390\/appliedmath4010002","journal-title":"Appl. Math."},{"issue":"2","key":"6_CR13","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1080\/15326349108807184","volume":"7","author":"ST Rachev","year":"1991","unstructured":"Rachev, S.T., Resnick, S.: Max-geometric infinite divisibility and stability. Commun. Stat. Stochastic Models 7(2), 191\u2013218 (1991). https:\/\/doi.org\/10.1080\/15326349108807184","journal-title":"Commun. Stat. Stochastic Models"},{"key":"6_CR14","doi-asserted-by":"crossref","unstructured":"Nurmi, D., Brevik, J., Wolski, R.: Modeling machine availability in enterprise and wide-area distributed computing environments. In: Euro-Par 2005 Parallel Processing: 11th International Euro-Par Conference, Lisbon, Portugal, August 30-September 2, 2005. Proceedings 11, pp. 432\u2013441. Springer (2005)","DOI":"10.1007\/11549468_50"},{"issue":"3-4","key":"6_CR15","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1016\/S0166-5316(97)00003-5","volume":"31","author":"A Feldmann","year":"1998","unstructured":"Feldmann, A., Whitt, W.: Fitting mixtures of exponentials to long-tail distributions to analyze network performance models. Perform. Eval. 31(3-4), 245\u2013279 (1998)","journal-title":"Perform. Eval."},{"key":"6_CR16","doi-asserted-by":"crossref","unstructured":"Vuong, Q.H.: Likelihood ratio tests for model selection and non-nested hypotheses. Econ. J. Econ. Soc. 307\u2013333 (1989)","DOI":"10.2307\/1912557"},{"issue":"1","key":"6_CR17","first-page":"54","volume":"1","author":"B Efron","year":"1986","unstructured":"Efron, B., Tibshirani, R.: Bootstrap methods for standard errors, confidence intervals, and other measures of statistical accuracy. Stat. Sci. 1(1), 54\u201375 (1986)","journal-title":"Stat. Sci."},{"key":"6_CR18","unstructured":"CVSS: Common Vulnerabilities Scoring System. http:\/\/first.org\/cvss"}],"container-title":["Springer Proceedings in Mathematics &amp; Statistics","New Frontiers in Statistics and Data Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-68949-9_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,23]],"date-time":"2025-09-23T16:23:07Z","timestamp":1758644587000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-68949-9_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031689482","9783031689499"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-68949-9_6","relation":{},"ISSN":["2194-1009","2194-1017"],"issn-type":[{"type":"print","value":"2194-1009"},{"type":"electronic","value":"2194-1017"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"11 January 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SPE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Congress of the Portuguese Statistical Society","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Evora","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Portugal","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 October 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 October 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"spe2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.spe2021.uevora.pt\/en\/inicio-english\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}