{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T21:06:37Z","timestamp":1740171997166,"version":"3.37.3"},"reference-count":33,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T00:00:00Z","timestamp":1648771200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T00:00:00Z","timestamp":1648771200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T00:00:00Z","timestamp":1648771200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"IBM T.J. Watson Research Center"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Cloud Comput."],"published-print":{"date-parts":[[2022,4,1]]},"DOI":"10.1109\/tcc.2020.2975439","type":"journal-article","created":{"date-parts":[[2020,2,25]],"date-time":"2020-02-25T04:18:00Z","timestamp":1582604280000},"page":"872-884","source":"Crossref","is-referenced-by-count":2,"title":["Praxi: Cloud Software Discovery That Learns From Practice"],"prefix":"10.1109","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3192-0726","authenticated-orcid":false,"given":"Anthony","family":"Byrne","sequence":"first","affiliation":[{"name":"Department of Electrical and Computer Engineering, Boston University, Boston, MA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2292-2626","authenticated-orcid":false,"given":"Emre","family":"Ates","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Boston University, Boston, MA, USA"}]},{"given":"Ata","family":"Turk","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Boston University, Boston, MA, USA"}]},{"given":"Vladimir","family":"Pchelin","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Boston University, Boston, MA, USA"}]},{"given":"Sastry","family":"Duri","sequence":"additional","affiliation":[{"name":"IBM T.J. Watson Research Center, Ossining, NY, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2763-9299","authenticated-orcid":false,"given":"Shripad","family":"Nadgowda","sequence":"additional","affiliation":[{"name":"IBM T.J. Watson Research Center, Ossining, NY, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5249-7272","authenticated-orcid":false,"given":"Canturk","family":"Isci","sequence":"additional","affiliation":[{"name":"IBM T.J. Watson Research Center, Ossining, NY, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6554-088X","authenticated-orcid":false,"given":"Ayse K.","family":"Coskun","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Boston University, Boston, MA, USA"}]}],"member":"263","reference":[{"article-title":"How open source became the default business model for software","year":"2018","author":"Sijbrandij","key":"ref1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-5026-8_1"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2014.07.009"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/AGILE.2009.10"},{"year":"2018","key":"ref5","article-title":"Cloud computing trends: 2018 state of the cloud survey"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2016.2522411"},{"key":"ref7","article-title":"National vulnerability database"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2014.7004217"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1147\/JRD.2015.2511811"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2016.7840669"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/IC2E.2017.14"},{"key":"ref12","article-title":"Endpoint manager relevance language guide"},{"key":"ref13","article-title":"OpenIOC"},{"key":"ref14","volume-title":"Agile Software Development","volume":"177","author":"Cockburn","year":"2002"},{"volume-title":"Continuous Delivery: Reliable Software Releases Through Build, Test, and Deployment Automation","year":"2011","author":"Humble","key":"ref15"},{"article-title":"Vowpal wabbit: Online learning project","year":"2007","author":"Langford","key":"ref16"},{"article-title":"Murmurhash3 hash function","year":"2017","author":"Appleby","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2014.17"},{"key":"ref19","article-title":"Open source software discovery"},{"key":"ref20","article-title":"OSS discovery developer guide"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2005.35"},{"article-title":"WattsUpDoc: Power side channels to nonintrusively discover untargeted malware on embedded medical devices","volume-title":"Proc. USENIX Workshop Health Inf. Technol.","author":"Clark","key":"ref22"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96983-1_7"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1218063.1217972"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3127479.3129249"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2015.2441715"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2016.2535295"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2644865.2541983"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2220352.2220354"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/1755913.1755926"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/1095809.1095821"},{"article-title":"Origami: Systems as data","year":"2014","author":"Isci","key":"ref32"},{"key":"ref33","first-page":"22","article-title":"Virtual machine images as structured data: The mirage image library","volume-title":"Proc. USENIX Conf. Hot Topics Cloud Comput.","author":"Ammons"}],"container-title":["IEEE Transactions on Cloud Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6245519\/9789509\/09007526.pdf?arnumber=9007526","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,9]],"date-time":"2024-01-09T22:21:54Z","timestamp":1704838914000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9007526\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,1]]},"references-count":33,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tcc.2020.2975439","relation":{},"ISSN":["2168-7161","2372-0018"],"issn-type":[{"type":"electronic","value":"2168-7161"},{"type":"electronic","value":"2372-0018"}],"subject":[],"published":{"date-parts":[[2022,4,1]]}}}