{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T17:45:03Z","timestamp":1730223903020,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1109\/glocom.2018.8647583","type":"proceedings-article","created":{"date-parts":[[2019,2,21]],"date-time":"2019-02-21T23:34:06Z","timestamp":1550792046000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["Vulnerability Prediction Based on Weighted Software Network for Secure Software Building"],"prefix":"10.1109","author":[{"given":"Shengjun","family":"Wei","sequence":"first","affiliation":[]},{"given":"Hao","family":"Zhong","sequence":"additional","affiliation":[]},{"given":"Chun","family":"Shan","sequence":"additional","affiliation":[]},{"given":"Lin","family":"Ye","sequence":"additional","affiliation":[]},{"given":"Xiaojiang","family":"Du","sequence":"additional","affiliation":[]},{"given":"Mohsen","family":"Guizani","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2010.06.003"},{"key":"ref11","first-page":"23","volume":"379","author":"cheng","year":"0","journal-title":"A lightweight live memory forensic approach based on hardware virtualization"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2472993"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1456362.1456372"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1414004.1414065"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.81"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2010.32"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2340398"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2014.32"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2016.15"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2006.05.012"},{"year":"0","key":"ref28"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2009.060598"},{"journal-title":"Mozilla foundation security advisory","year":"0","key":"ref27"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315311"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6567115"},{"journal-title":"WEKA","year":"0","key":"ref29"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-011-9190-8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1988630.1988632"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"2314","DOI":"10.1016\/j.comcom.2007.04.009","article-title":"A Survey of Key Management Schemes in Wireless Sensor Networks","volume":"30","author":"xiao","year":"2007","journal-title":"Journal of Computer Communications"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1853919.1853923"},{"journal-title":"Building Secure Software","year":"2002","author":"viega","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2746194.2746198"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368161"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1209\/epl\/i2002-00248-2"},{"key":"ref24","first-page":"444","article-title":"A probabilistic model for software defect prediction","volume":"2143","author":"fenton","year":"2001","journal-title":"IEEE Transactions on Software Engineering"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"2814","DOI":"10.3724\/SP.J.1001.2013.04397","article-title":"Software Networks Nodes Impact Analysis of Complex Software Systems","volume":"24","author":"wang","year":"2013","journal-title":"Journal of Software(in chinese)"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(02)00024-9"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(00)00086-8"}],"event":{"name":"GLOBECOM 2018 - 2018 IEEE Global Communications Conference","start":{"date-parts":[[2018,12,9]]},"location":"Abu Dhabi, United Arab Emirates","end":{"date-parts":[[2018,12,13]]}},"container-title":["2018 IEEE Global Communications Conference (GLOBECOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8634808\/8647127\/08647583.pdf?arnumber=8647583","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T05:26:00Z","timestamp":1643261160000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8647583\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/glocom.2018.8647583","relation":{},"subject":[],"published":{"date-parts":[[2018,12]]}}}