{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,28]],"date-time":"2025-08-28T12:44:12Z","timestamp":1756385052743,"version":"3.44.0"},"reference-count":12,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T00:00:00Z","timestamp":1754265600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T00:00:00Z","timestamp":1754265600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,8,4]]},"DOI":"10.1109\/csr64739.2025.11130104","type":"proceedings-article","created":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T19:04:27Z","timestamp":1756235067000},"page":"153-158","source":"Crossref","is-referenced-by-count":1,"title":["Classification of Software Vulnerability Artifacts Using Public Internet Data"],"prefix":"10.1109","author":[{"given":"Leonardo Ambrus","family":"de Lima","sequence":"first","affiliation":[{"name":"Institute of Computing, Federal University of Rio de Janeiro (UFRJ)"}]},{"given":"Estevao Rabello","family":"Ussler","sequence":"additional","affiliation":[{"name":"Institute of Computing, Federal University of Rio de Janeiro (UFRJ)"}]},{"given":"Miguel Angelo Santos","family":"Bicudo","sequence":"additional","affiliation":[{"name":"Institute of Computing, Federal University of Rio de Janeiro (UFRJ)"}]},{"given":"Daniel Sadoc","family":"Menasche","sequence":"additional","affiliation":[{"name":"Institute of Computing, Federal University of Rio de Janeiro (UFRJ)"}]},{"given":"Anton","family":"Kocheturov","sequence":"additional","affiliation":[{"name":"Siemens AG,Princeton,NJ,USA"}]},{"given":"Gaurav","family":"Srivastava","sequence":"additional","affiliation":[{"name":"Siemens AG,Princeton,NJ,USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3078727"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2023.3234554"},{"key":"ref3","article-title":"Beyond the surface: Investigating malicious CVE proof of concept exploits on github","author":"Yadmani","year":"2022","journal-title":"arXiv preprint arXiv:2210.08374"},{"key":"ref4","first-page":"149","article-title":"SourceFinder: Finding malware Source-Code from publicly available repositories in GitHub","volume-title":"23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020)","author":"Rokon"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CSNet59123.2023.10339782"},{"key":"ref6","first-page":"377","article-title":"Expected exploitability: Predicting the development of functional vulnerability exploits","author":"Suciu","year":"2022","journal-title":"USENIX Security"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/DSN48987.2021.00030"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.14722\/madweb.2024.23004"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-34671-2_36"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3436242"},{"key":"ref11","doi-asserted-by":"crossref","DOI":"10.1109\/CSR64739.2025.11130104","article-title":"Classification of Software Vulnerability Artifacts Using Public Internet Data","author":"de Lima","year":"2025"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2025.3551664"}],"event":{"name":"2025 IEEE International Conference on Cyber Security and Resilience (CSR)","start":{"date-parts":[[2025,8,4]]},"location":"Chania, Crete, Greece","end":{"date-parts":[[2025,8,6]]}},"container-title":["2025 IEEE International Conference on Cyber Security and Resilience (CSR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11129696\/11129957\/11130104.pdf?arnumber=11130104","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T05:14:05Z","timestamp":1756271645000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11130104\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,4]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/csr64739.2025.11130104","relation":{},"subject":[],"published":{"date-parts":[[2025,8,4]]}}}