{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T16:21:04Z","timestamp":1772986864880,"version":"3.50.1"},"reference-count":52,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:00:00Z","timestamp":1654041600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:00:00Z","timestamp":1654041600000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:00:00Z","timestamp":1654041600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:00:00Z","timestamp":1654041600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Serv. Manage."],"published-print":{"date-parts":[[2022,6]]},"DOI":"10.1109\/tnsm.2021.3133811","type":"journal-article","created":{"date-parts":[[2021,12,8]],"date-time":"2021-12-08T21:07:34Z","timestamp":1638997654000},"page":"1746-1760","source":"Crossref","is-referenced-by-count":22,"title":["LICALITY\u2014Likelihood and Criticality: Vulnerability Risk Prioritization Through Logical Reasoning and Deep Learning"],"prefix":"10.1109","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7877-292X","authenticated-orcid":false,"given":"Zhen","family":"Zeng","sequence":"first","affiliation":[{"name":"School of Computing, Informatics, and Decision Systems Engineering, Arizona State University, Tempe, AZ, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9043-5774","authenticated-orcid":false,"given":"Zhun","family":"Yang","sequence":"additional","affiliation":[{"name":"School of Computing, Informatics, and Decision Systems Engineering, Arizona State University, Tempe, AZ, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3257-6349","authenticated-orcid":false,"given":"Dijiang","family":"Huang","sequence":"additional","affiliation":[{"name":"School of Computing and Augmented Intelligence, Arizona State University, Tempe, AZ, USA"}]},{"given":"Chun-Jen","family":"Chung","sequence":"additional","affiliation":[{"name":"School of Computing, Informatics, and Decision Systems Engineering, Arizona State University, Tempe, AZ, USA"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1111\/j.1539-6924.1981.tb01350.x"},{"key":"ref38","year":"2020","journal-title":"APT Actors Chaining Vulnerabilities Against SLTT Critical Infrastructure and Elections Organizations"},{"key":"ref33","year":"2021","journal-title":"Threat Modeling"},{"key":"ref32","article-title":"The neuro-symbolic concept learner: Interpreting scenes, words, and sentences from natural supervision","author":"mao","year":"2019","journal-title":"arXiv 1904 12584"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2885561"},{"key":"ref30","first-page":"1602","article-title":"Multi-relational latent semantic analysis","author":"chang","year":"2013","journal-title":"Proc Conf Empir Methods Natural Lang Process (EMNLP)"},{"key":"ref37","first-page":"1","article-title":"Latent feature vulnerability ranking of CVSS vectors","author":"ross","year":"2017","journal-title":"Proc Summer Simulat Multi-Conf"},{"key":"ref36","year":"2020","journal-title":"Exploitdb"},{"key":"ref35","first-page":"74","article-title":"Semantic Cyberthreat Modelling","author":"bromander","year":"2016","journal-title":"Proc STIDS"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3140368.3140372"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/1835804.1835821"},{"key":"ref27","author":"eiram","year":"2021","journal-title":"The CVSSv2 Shortcomings Faults and Failures Formulation"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330742"},{"key":"ref2","author":"oltsik","year":"2019","journal-title":"Vulnerability Management Woes Continue but There Is Hope"},{"key":"ref1","year":"2021","journal-title":"Risk Impact Assessment and Prioritization"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CSCloud.2015.56"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3381038"},{"key":"ref21","first-page":"23","article-title":"A complete guide to the common vulnerability scoring system version 2.0","volume":"1","author":"mell","year":"2007","journal-title":"On the Forum for Incident Response and Security Team"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3098954.3098965"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CANDAR.2018.00009"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1111\/risa.13732"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2010.32"},{"key":"ref50","year":"2020","journal-title":"Microsoft Vulnerabilities Report 2020"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2891891"},{"key":"ref52","year":"2021","journal-title":"Keras early stopping"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3041008.3041009"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1002\/aris.1440380105"},{"key":"ref40","article-title":"Cyber threat metrics","author":"mateski","year":"2012"},{"key":"ref12","first-page":"7","article-title":"Neuro-symbolic = Neural + Logical + Probabilistic","author":"de raedt","year":"2019","journal-title":"Proc NeSy IJCAI 14th Int Workshop Neural Symbolic Learn Reason"},{"key":"ref13","article-title":"Neural-symbolic computing: An effective methodology for principled integration of machine learning and reasoning","author":"garcez","year":"2019","journal-title":"arXiv 1905 06088"},{"key":"ref14","year":"2021","journal-title":"About cis"},{"key":"ref15","year":"2020","journal-title":"NVD national vulnerability database"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2007.244"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-015-9274-6"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2012.03.057"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3372224.3418162"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2006.145"},{"key":"ref3","year":"2021","journal-title":"Common Vulnerability Scoring System SIG"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1093\/cybsec\/tyaa015"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2630069"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3338501.3357365"},{"key":"ref7","author":"johnson","year":"2019","journal-title":"What Is CVSS v3 1? Understanding the New CVSS"},{"key":"ref49","year":"2020","journal-title":"Top 10 Most Exploited Vulnerabilities 2016&#x2013;2019"},{"key":"ref9","first-page":"1041","article-title":"Vulnerability disclosure in the age of social media: Exploiting twitter for predicting real-world exploits","author":"sabottke","year":"2015","journal-title":"Proc 24th USENIX Secur Symp"},{"key":"ref46","first-page":"2462","article-title":"ProbLog: A probabilistic prolog and its application in link discovery","volume":"7","author":"de raedt","year":"2007","journal-title":"Proc IJCAI"},{"key":"ref45","year":"2021","journal-title":"Stochastic Descent"},{"key":"ref48","first-page":"819","article-title":"SDD: A new canonical representation of propositional knowledge bases","author":"darwiche","year":"2011","journal-title":"Proc 22nd Int Joint Conf Artif Intell"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/5.58337"},{"key":"ref42","year":"2017","journal-title":"APT28 At the Center of the Storm"},{"key":"ref41","year":"2015","journal-title":"Top 30 Targeted High Risk Vulnerabilities"},{"key":"ref44","article-title":"Adam: A method for stochastic optimization","author":"kingma","year":"2014","journal-title":"arXiv 1412 6980"},{"key":"ref43","first-page":"3749","article-title":"Deepproblog: Neural Probabilistic Logic Programming","author":"manhaeve","year":"2018","journal-title":"Proc Adv Neural Inf Process Syst"}],"container-title":["IEEE Transactions on Network and Service Management"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/4275028\/9792219\/9642043-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4275028\/9792219\/09642043.pdf?arnumber=9642043","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T20:32:51Z","timestamp":1656361971000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9642043\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6]]},"references-count":52,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tnsm.2021.3133811","relation":{},"ISSN":["1932-4537","2373-7379"],"issn-type":[{"value":"1932-4537","type":"electronic"},{"value":"2373-7379","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,6]]}}}