{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,2]],"date-time":"2025-11-02T00:50:50Z","timestamp":1762044650625,"version":"build-2065373602"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,10,1]],"date-time":"2021-10-01T00:00:00Z","timestamp":1633046400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,10,1]],"date-time":"2021-10-01T00:00:00Z","timestamp":1633046400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,10,1]],"date-time":"2021-10-01T00:00:00Z","timestamp":1633046400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,10]]},"DOI":"10.1109\/vizsec53666.2021.00014","type":"proceedings-article","created":{"date-parts":[[2021,12,7]],"date-time":"2021-12-07T20:52:44Z","timestamp":1638910364000},"page":"79-83","source":"Crossref","is-referenced-by-count":8,"title":["VulnEx: Exploring Open-Source Software Vulnerabilities in Large Development Organizations to Understand Risk Exposure"],"prefix":"10.1109","author":[{"given":"Frederik L.","family":"Dennig","sequence":"first","affiliation":[]},{"given":"Eren","family":"Cakmak","sequence":"additional","affiliation":[]},{"given":"Henrik","family":"Plate","sequence":"additional","affiliation":[]},{"given":"Daniel A.","family":"Keim","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"article-title":"Software Visualization - Visualizing the Structure, Behaviour, and Evolution of Software","year":"2007","author":"diehl","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2379690.2379692"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/240455.240464"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1850795.1850800"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2379690.2379694"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2669557.2669572"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2017.10.004"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"1543","DOI":"10.1109\/TVCG.2018.2811488","article-title":"Lineage: Visualizing multivariate clinical data in genealogy graphs","volume":"25","author":"nobre","year":"2019","journal-title":"IEEE Transactions on Visualization and Computer Graphics"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2018.2865149"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2018.8622092"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/VizSec48167.2019.9161524"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/VizSec51108.2020.00011"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/VIZSEC.2016.7739576"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2018.2865028"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1111\/cgf.13677"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3041008.3041009"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.5430\/air.v10n1p34"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s12650-020-00647-w"},{"journal-title":"Technical Report","article-title":"State of the software supply chain (2020)","year":"2020","key":"ref1"},{"key":"ref20","article-title":"Open source security analysis - the state of open source security in commercial applications","author":"pittenger","year":"2016","journal-title":"Black Duck Software Tech Rep"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-020-09830-x"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2015.7332492"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.4018\/IJOSSP.2018100101"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"336","DOI":"10.1109\/VL.1996.545307","article-title":"The eyes have it: A task by data type taxonomy for information visualizations","author":"shneiderman","year":"1996","journal-title":"Proceedings of the 1996 IEEE Symposium on Visual Languages"},{"key":"ref26","first-page":"105","article-title":"A survey of visualization systems for malware analysis","author":"wagner","year":"2015","journal-title":"17th Eurographics Conference on Visualization"},{"key":"ref25","article-title":"Software Engineering","author":"sommerville","year":"2010","journal-title":"it Informatik"}],"event":{"name":"2021 IEEE Symposium on Visualization for Cyber Security (VizSec)","start":{"date-parts":[[2021,10,27]]},"location":"New Orleans, LA, USA","end":{"date-parts":[[2021,10,27]]}},"container-title":["2021 IEEE Symposium on Visualization for Cyber Security (VizSec)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9629354\/9629395\/09629403.pdf?arnumber=9629403","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T16:54:04Z","timestamp":1652201644000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9629403\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/vizsec53666.2021.00014","relation":{},"subject":[],"published":{"date-parts":[[2021,10]]}}}