{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:05:20Z","timestamp":1740099920425,"version":"3.37.3"},"reference-count":12,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,12,5]],"date-time":"2020-12-05T00:00:00Z","timestamp":1607126400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,12,5]],"date-time":"2020-12-05T00:00:00Z","timestamp":1607126400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,12,5]],"date-time":"2020-12-05T00:00:00Z","timestamp":1607126400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea(NRF)","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,12,5]]},"DOI":"10.1109\/scisisis50064.2020.9322746","type":"proceedings-article","created":{"date-parts":[[2021,1,21]],"date-time":"2021-01-21T21:32:33Z","timestamp":1611264753000},"page":"1-4","source":"Crossref","is-referenced-by-count":0,"title":["A Study on the Evaluation System through Software Weakness Analysis"],"prefix":"10.1109","author":[{"given":"Kyung-won","family":"Kim","sequence":"first","affiliation":[]},{"given":"Seokmin","family":"Chang","sequence":"additional","affiliation":[]},{"given":"Kyubin","family":"Park","sequence":"additional","affiliation":[]},{"given":"Yunsik","family":"Son","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Common Weakness Enumeration A Community-Developed List of Software & Hardware Weakness Types(CWE)","year":"2020","key":"ref4"},{"key":"ref3","first-page":"7","article-title":"A study on the standard list of security weaknesses for software development security","volume":"25","author":"ahn","year":"2015","journal-title":"Information Security and Society"},{"journal-title":"2019 cwe top 25 most dangerous software errors","year":"2019","key":"ref10"},{"journal-title":"Common Vulnerabilities and Exposures","year":"2020","key":"ref6"},{"journal-title":"OWASP Top Ten Web Application Security Risks","year":"2020","key":"ref11"},{"journal-title":"Common Weakness Risk Analysis Framework","year":"2019","key":"ref5"},{"journal-title":"Software Development Security Guide","year":"2019","key":"ref12"},{"journal-title":"National Vulnerability Database","year":"2020","key":"ref8"},{"journal-title":"Common Vulnerability Scoring System SIG(CVSS)","year":"2020","key":"ref7"},{"key":"ref2","first-page":"83","article-title":"Weapon system cyber security policy trend","volume":"28","author":"lee","year":"2018","journal-title":"Journal of Information and Security Korea"},{"journal-title":"Common weakness scoring system (CWSS)","year":"2014","key":"ref9"},{"key":"ref1","first-page":"90","article-title":"Defense SW Secure Coding Application Method for Cyberwarfare Focused on the Warfare System Embedded SW Application Level","volume":"19","author":"choi","year":"2012","journal-title":"Journal of the Korean Association of Defense Industry Studies"}],"event":{"name":"2020 Joint 11th International Conference on Soft Computing and Intelligent Systems and 21st International Symposium on Advanced Intelligent Systems (SCIS-ISIS)","start":{"date-parts":[[2020,12,5]]},"location":"Hachijo Island, Japan","end":{"date-parts":[[2020,12,8]]}},"container-title":["2020 Joint 11th International Conference on Soft Computing and Intelligent Systems and 21st International Symposium on Advanced Intelligent Systems (SCIS-ISIS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9322651\/9322668\/09322746.pdf?arnumber=9322746","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,30]],"date-time":"2022-06-30T15:16:30Z","timestamp":1656602190000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9322746\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,5]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/scisisis50064.2020.9322746","relation":{},"subject":[],"published":{"date-parts":[[2020,12,5]]}}}