{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,15]],"date-time":"2025-05-15T04:07:22Z","timestamp":1747282042973,"version":"3.40.5"},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,2,17]],"date-time":"2025-02-17T00:00:00Z","timestamp":1739750400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,2,17]],"date-time":"2025-02-17T00:00:00Z","timestamp":1739750400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,2,17]]},"DOI":"10.1109\/icnc64010.2025.10994117","type":"proceedings-article","created":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T17:44:51Z","timestamp":1747158291000},"page":"238-242","source":"Crossref","is-referenced-by-count":0,"title":["A Product-Oriented Assessment of Vulnerability Severity Through NVD CVSS Scores"],"prefix":"10.1109","author":[{"given":"Lucas","family":"Miranda","sequence":"first","affiliation":[{"name":"Federal Univ. of Rio de Janeiro,RJ,Brazil"}]},{"given":"Lucas","family":"Senos","sequence":"additional","affiliation":[{"name":"Federal Univ. of Rio de Janeiro,RJ,Brazil"}]},{"given":"Daniel","family":"Menasch\u00e9","sequence":"additional","affiliation":[{"name":"Federal Univ. of Rio de Janeiro,RJ,Brazil"}]},{"given":"Gaurav","family":"Srivastava","sequence":"additional","affiliation":[{"name":"Siemens Corporate Technology,Princeton,NJ"}]},{"given":"Anton","family":"Kocheturov","sequence":"additional","affiliation":[{"name":"Siemens Corporate Technology,Princeton,NJ"}]},{"given":"Enrico","family":"Lovat","sequence":"additional","affiliation":[{"name":"Siemens Corporate Technology,Princeton,NJ"}]},{"given":"Abhishek","family":"Ramchandran","sequence":"additional","affiliation":[{"name":"Siemens Corporate Technology,Princeton,NJ"}]},{"given":"Tobias","family":"Limmer","sequence":"additional","affiliation":[{"name":"Siemens AG,Munchen,Germany"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/sp54263.2024.00058"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2023.3333936"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-019-09797-4"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CloudNet62863.2024.10815736"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3697090.3697109"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICNC59896.2024.10556231"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICNC59896.2024.10555953"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SANER53432.2022.00050"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom59040.2023.00039"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3125270"},{"key":"ref11","first-page":"869","article-title":"Towards the detection of inconsistencies in public security vulnerability reports","author":"Dong","year":"2019","journal-title":"USENIX Security"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE48619.2023.00022"},{"article-title":"CVE-LLM: Automatic vulnerability evaluation in medical device industry using large language models","year":"2024","author":"Ghosh","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3407023.3407038"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3179692"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103286"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA52953.2021.00256"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2017.52"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.3233\/IFS-151733"}],"event":{"name":"2025 International Conference on Computing, Networking and Communications (ICNC)","start":{"date-parts":[[2025,2,17]]},"location":"Honolulu, HI, USA","end":{"date-parts":[[2025,2,20]]}},"container-title":["2025 International Conference on Computing, Networking and Communications (ICNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10993495\/10993515\/10994117.pdf?arnumber=10994117","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T05:23:38Z","timestamp":1747200218000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10994117\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2,17]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/icnc64010.2025.10994117","relation":{},"subject":[],"published":{"date-parts":[[2025,2,17]]}}}