{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T05:33:37Z","timestamp":1730266417385,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,7,18]],"date-time":"2021-07-18T00:00:00Z","timestamp":1626566400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,7,18]],"date-time":"2021-07-18T00:00:00Z","timestamp":1626566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,7,18]],"date-time":"2021-07-18T00:00:00Z","timestamp":1626566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,7,18]]},"DOI":"10.1109\/ijcnn52387.2021.9534259","type":"proceedings-article","created":{"date-parts":[[2021,9,22]],"date-time":"2021-09-22T20:32:37Z","timestamp":1632342757000},"page":"1-8","source":"Crossref","is-referenced-by-count":4,"title":["Automatic Classification of Vulnerabilities using Deep Learning and Machine Learning Algorithms"],"prefix":"10.1109","author":[{"given":"Vishnu","family":"Ramesh","sequence":"first","affiliation":[]},{"given":"Sara","family":"Abraham","sequence":"additional","affiliation":[]},{"given":"P","family":"Vinod","sequence":"additional","affiliation":[]},{"given":"Isham","family":"Mohamed","sequence":"additional","affiliation":[]},{"given":"Corrado A.","family":"Visaggio","sequence":"additional","affiliation":[]},{"given":"Sonia","family":"Laudanna","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1108\/eb046814"},{"key":"ref11","first-page":"238","article-title":"Software Design Level Vulnerability Classification Model","volume":"6","author":"rehman","year":"2012","journal-title":"International Journal of Computer Science and Security (IJCSS)"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2019.06.001"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICInfA.2013.6720316"},{"journal-title":"Skybox Security","year":"0","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/IECON.2014.7049035"},{"key":"ref16","first-page":"903","article-title":"From patching delays to infection symptoms: using risk profiles for an early discovery of vulnerabilities exploited in the wild","author":"xiao","year":"0","journal-title":"27th USENIX Security Symposium ( USENIX Security 18)"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23088-2_15"},{"journal-title":"Common Vulnerability Scoring System SIG","year":"0","key":"ref4"},{"journal-title":"Common Vulnerabilities and Exposures (CVE)","year":"0","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2017.52"},{"key":"ref5","first-page":"3","article-title":"Automatic vulnerability classification using machine learning","author":"gawron","year":"2017","journal-title":"International Conference on Risks and Security of Internet and Systems"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/RAM.2017.7889792"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2900462"},{"journal-title":"Keras","year":"2015","author":"chollet","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1835804.1835821"},{"key":"ref9","first-page":"2825","article-title":"Scikit-learn: Machine Learning in Python","volume":"12","author":"pedregosa","year":"2011","journal-title":"Journal of Machine Learning Research"}],"event":{"name":"2021 International Joint Conference on Neural Networks (IJCNN)","start":{"date-parts":[[2021,7,18]]},"location":"Shenzhen, China","end":{"date-parts":[[2021,7,22]]}},"container-title":["2021 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9533266\/9533267\/09534259.pdf?arnumber=9534259","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T15:46:01Z","timestamp":1652197561000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9534259\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,18]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/ijcnn52387.2021.9534259","relation":{},"subject":[],"published":{"date-parts":[[2021,7,18]]}}}