{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T17:42:47Z","timestamp":1761932567589,"version":"build-2065373602"},"reference-count":15,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2004,3,1]],"date-time":"2004-03-01T00:00:00Z","timestamp":1078099200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Secur. Privacy Mag."],"published-print":{"date-parts":[[2004,3]]},"DOI":"10.1109\/msecp.2004.1281240","type":"journal-article","created":{"date-parts":[[2004,4,6]],"date-time":"2004-04-06T16:09:16Z","timestamp":1081267756000},"page":"16-21","source":"Crossref","is-referenced-by-count":13,"title":["Susceptibility matrix: a new aid to software auditing"],"prefix":"10.1109","volume":"2","author":[{"given":"K.","family":"Jiwnani","sequence":"first","affiliation":[]},{"given":"M.","family":"Zelkowitz","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Protection analysis project final report","year":"1978","author":"bisbey","key":"ref4"},{"journal-title":"Use of a Taxonomy of Security Faults","year":"1996","author":"aslam","key":"ref3"},{"journal-title":"A Grammar Based Fault Classification Scheme and its Application to the Classification of the Errors of TEX","year":"1995","author":"demillo","key":"ref6"},{"year":"0","key":"ref4s"},{"key":"ref5s","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1176994"},{"journal-title":"A Taxonomy of UNIX System and Network Vulnerabilities","year":"1995","author":"bishop","key":"ref5"},{"key":"ref6s","first-page":"115","author":"mcgraw","year":"2001","journal-title":"Building Secure Software How to Avoid Security Problems the Right Way"},{"journal-title":"A Survey of Software Fault Surveys","year":"1990","author":"marick","key":"ref8"},{"key":"ref7","article-title":"Categorization of Software Errors that Led to Security Breaches","author":"du","year":"1998","journal-title":"Proc 21st Nat'l Information Systems Security Conf (NISSC'98)"},{"journal-title":"A Taxonomy of Security Faults in the UNIX operating system","year":"1995","author":"aslam","key":"ref2"},{"key":"ref1","doi-asserted-by":"crossref","DOI":"10.6028\/NBS.IR.76-1041","author":"abbott","year":"1976","journal-title":"Security Analysis and Enhancements of Computer Operating Systems"},{"key":"ref9","first-page":"34","article-title":"Common System Vulnerabilities","author":"spafford","year":"1992","journal-title":"Proc Workshop Future Directions in Computer Misuse and Anomaly Detection"},{"key":"ref2s","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2002.1167766"},{"key":"ref3s","doi-asserted-by":"publisher","DOI":"10.1109\/2.963441"},{"key":"ref1s","doi-asserted-by":"publisher","DOI":"10.1145\/185403.185412"}],"container-title":["IEEE Security &amp; Privacy Magazine"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8013\/28622\/01281240.pdf?arnumber=1281240","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:21:22Z","timestamp":1642004482000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1281240\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,3]]},"references-count":15,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2004,3]]}},"URL":"https:\/\/doi.org\/10.1109\/msecp.2004.1281240","relation":{},"ISSN":["1540-7993"],"issn-type":[{"type":"print","value":"1540-7993"}],"subject":[],"published":{"date-parts":[[2004,3]]}}}