{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T07:26:44Z","timestamp":1772782004907,"version":"3.50.1"},"reference-count":21,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,12,14]],"date-time":"2023-12-14T00:00:00Z","timestamp":1702512000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,12,14]],"date-time":"2023-12-14T00:00:00Z","timestamp":1702512000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,12,14]]},"DOI":"10.1109\/wetice57085.2023.10477812","type":"proceedings-article","created":{"date-parts":[[2024,3,28]],"date-time":"2024-03-28T18:43:21Z","timestamp":1711651401000},"page":"1-8","source":"Crossref","is-referenced-by-count":1,"title":["Securing the Software Supply Chain: A New Taxonomy for Attack Classification"],"prefix":"10.1109","author":[{"given":"Kawouther","family":"Thabet","sequence":"first","affiliation":[{"name":"Higher Institute of Computer and Communication Techniques,Tunisia"}]},{"given":"Jihen","family":"Bennaceur","sequence":"additional","affiliation":[{"name":"Mediterranean Institute of Technology, South Mediterranean University,Tunisia"}]},{"given":"Salma","family":"Hamza","sequence":"additional","affiliation":[{"name":"MedTech, South Mediterranean University (SMU)"}]},{"given":"Raoudha Ben","family":"Jemaa","sequence":"additional","affiliation":[{"name":"SAMA PARTNERS Business Solutions GmbH,Mannheim,Germany"}]},{"given":"Wissem","family":"Zouaghi","sequence":"additional","affiliation":[{"name":"SAMA PARTNERS Business Solutions GmbH,Mannheim,Germany"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2023.719"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3407023.3409183"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM52596.2021.9652901"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/QRS54544.2021.00060"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2010.355"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3510457.3513044"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/APSCC.2012.41"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/STC.2017.8234461"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SYSCON.2011.5929123"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICSIoT47925.2019.00014"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2022.3190801"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/bigdata55660.2022.10020813"},{"key":"ref13","article-title":"Software Taxonomy of Attacks on Open Source Software Supply Chains","author":"Ladisa","year":"2023","journal-title":"IEEE SP"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/hicss.2011.36"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SITIS.2009.75"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ISSREW55968.2022.00081"},{"key":"ref17","doi-asserted-by":"crossref","DOI":"10.1145\/3183440.3183454","article-title":"Constructing Supply Chains in Open Source Software","volume-title":"40th International Conference on Software Engineering: Companion (ICSE- Companion)","author":"Ma"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC54236.2022.00097"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-52683-2_2"},{"key":"ref20","first-page":"16","article-title":"Security vulnerabilities of the top ten programming languages: C, Java, C++, Objective C, C#, PHP, Visual Basic,Python, Perl, and Ruby, HackerNoon.com","author":"Turne","year":"2014","journal-title":"Journal of Technology Research"},{"key":"ref21","first-page":"50","author":"Ellison","year":"2010","journal-title":"Evaluating and Mitigating Software Supply Chain Security Risks, Research, Technology, and System Solutions (RTSS) and CERT Programs"}],"event":{"name":"2023 IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)","location":"Paris, France","start":{"date-parts":[[2023,12,14]]},"end":{"date-parts":[[2023,12,16]]}},"container-title":["2023 IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10477677\/10477776\/10477812.pdf?arnumber=10477812","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,7]],"date-time":"2024-11-07T19:40:19Z","timestamp":1731008419000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10477812\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,14]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/wetice57085.2023.10477812","relation":{},"subject":[],"published":{"date-parts":[[2023,12,14]]}}}