{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T17:31:50Z","timestamp":1730223110452,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,8]]},"DOI":"10.1109\/fuzzy.2009.5277421","type":"proceedings-article","created":{"date-parts":[[2009,10,6]],"date-time":"2009-10-06T19:04:47Z","timestamp":1254855887000},"page":"92-97","source":"Crossref","is-referenced-by-count":1,"title":["A vulnerability recommendation system in linux kernel variables"],"prefix":"10.1109","author":[{"given":"Jaekwang","family":"Kim","sequence":"first","affiliation":[]},{"given":"Bo Kyeong","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Seunghun","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Jee-Hyong","family":"Lee","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"15"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/ICADIWT.2008.4664327"},{"year":"0","key":"14"},{"key":"11","article-title":"using cqual for static analysis of authorization hook placement","author":"zhang","year":"2002","journal-title":"Proc of the 11th USENIX Security Symposium"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2007.97"},{"key":"3","first-page":"3716","article-title":"a methodology for finding source-level vulnerabilities of the linux kernel variables","author":"kim","year":"2008","journal-title":"IEEE International Joint Conference on Neural Networks (IJCNN"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1007\/11596981_172"},{"key":"1","first-page":"127","article-title":"a taxonomy of linux kernel vulnerabilities according to vulnerable causes","volume":"5","author":"kim","year":"2004","journal-title":"Proc of 2004 KSII Fall Conference"},{"year":"0","key":"10"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1049\/ip-sen:20020198"},{"key":"6","article-title":"toward a secure system engineering methodology","author":"salter","year":"1998","journal-title":"New Security Paradigms Workshop"},{"key":"5","article-title":"using cqual for static analysis of authorization hook placement","author":"zhang","year":"2002","journal-title":"Proc of the 11th USENIX Security Symposium"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2000.898880"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2000.898880"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/986537.986583"}],"event":{"name":"2009 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE)","start":{"date-parts":[[2009,8,20]]},"location":"Jeju Island, South Korea","end":{"date-parts":[[2009,8,24]]}},"container-title":["2009 IEEE International Conference on Fuzzy Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5247842\/5276875\/05277421.pdf?arnumber=5277421","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,18]],"date-time":"2017-03-18T23:00:14Z","timestamp":1489878014000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5277421\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,8]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/fuzzy.2009.5277421","relation":{},"subject":[],"published":{"date-parts":[[2009,8]]}}}