{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T12:34:50Z","timestamp":1740141290793,"version":"3.37.3"},"reference-count":45,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2022,7,1]],"date-time":"2022-07-01T00:00:00Z","timestamp":1656633600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,7,1]],"date-time":"2022-07-01T00:00:00Z","timestamp":1656633600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,7,1]],"date-time":"2022-07-01T00:00:00Z","timestamp":1656633600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"METRICS","award":["POCI-01-0145-FEDER-032504"],"award-info":[{"award-number":["POCI-01-0145-FEDER-032504"]}]},{"name":"Portuguese Foundation for Science and Technology"},{"DOI":"10.13039\/501100008530","name":"European Regional Development Fund","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100008530","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Ministerio de Econom&#x00ED;a, Industria y Competitividad de Espa&#x00F1;a","award":["TIN2016-81075-R"],"award-info":[{"award-number":["TIN2016-81075-R"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2022,7,1]]},"DOI":"10.1109\/tdsc.2020.3048202","type":"journal-article","created":{"date-parts":[[2020,12,30]],"date-time":"2020-12-30T21:14:16Z","timestamp":1609362856000},"page":"2151-2164","source":"Crossref","is-referenced-by-count":1,"title":["A Multi-Criteria Analysis of Benchmark Results With Expert Support for Security Tools"],"prefix":"10.1109","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5601-6990","authenticated-orcid":false,"given":"Miquel","family":"Martinez","sequence":"first","affiliation":[{"name":"Instituto ITACA of the Universitat Polit&#x00E8;cnica de Val&#x00E8;ncia, Valencia, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7678-3513","authenticated-orcid":false,"given":"Juan-Carlos","family":"Ruiz","sequence":"additional","affiliation":[{"name":"Instituto ITACA of the Universitat Polit&#x00E8;cnica de Val&#x00E8;ncia, Valencia, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6044-4012","authenticated-orcid":false,"given":"Nuno","family":"Antunes","sequence":"additional","affiliation":[{"name":"CISUC, DEI, University of Coimbra, Coimbra, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4744-3795","authenticated-orcid":false,"given":"David","family":"de Andres","sequence":"additional","affiliation":[{"name":"Instituto ITACA of the Universitat Polit&#x00E8;cnica de Val&#x00E8;ncia, Valencia, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5103-8541","authenticated-orcid":false,"given":"Marco","family":"Vieira","sequence":"additional","affiliation":[{"name":"CISUC, DEI, University of Coimbra, Coimbra, Portugal"}]}],"member":"263","reference":[{"volume-title":"The Web Application Hacker\u2019s Handbook: Discovering and Exploiting Security Flaws","year":"2007","author":"Stuttard","key":"ref1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/11430230_4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14215-4_7"},{"volume-title":"Benchmark Handbook: For Database and Transaction Processing Systems","year":"1992","author":"Gray","key":"ref4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1002\/9780470370506"},{"key":"ref6","article-title":"Setting goals and choosing metrics for recommender system evaluations","volume-title":"Proc. Workshop 5th ACM Conf. Recommender Syst.","volume":"23","author":"Schr\u00f6der"},{"volume-title":"Security Metrics: Replacing Fear, Uncertainty, and Doubt","year":"2007","author":"Jaquith","key":"ref7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2017.24"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2019.00-18"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SYNASC.2017.00035"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2010.32"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2014.2310221"},{"key":"ref13","first-page":"37","article-title":"Evaluation: From precision, recall and F-measure to ROC, informedness, markedness and correlation","volume":"2","author":"Powers","year":"2011","journal-title":"J. Mach. Learn. Technol."},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2015.30"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/0951-8320(96)00060-9"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/QSIC.2006.59"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2017.2749798"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2005.10.010"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/S0034-4257(97)00083-7"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2017.18"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-83555-1_5"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2009.06.012"},{"issue":"11","key":"ref23","article-title":"Construction and operation of analytic hierarchy process about moral education evaluation in colleges and universities","volume-title":"Proc. Int. Conf. Inf. Sci. Serv. Sci.","volume":"3","author":"Sun"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2007.10.014"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-1665-1_2"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/0022-2496(85)90002-1"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2007.01.044"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0190(95)00185-9"},{"volume-title":"GIS and Multicriteria Decision Analysis","year":"1999","author":"Malczewski","key":"ref29"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/S0377-2217(02)00227-8"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488506004114"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/S0377-2217(97)00244-0"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2010.03.003"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1080\/03155986.1994.11732238"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.1019"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/IWSM-MENSURA.2011.15"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948144"},{"year":"2018","key":"ref38","article-title":"An open source database firewall used to protect databases from SQL injection attacks"},{"year":"2018","key":"ref39","article-title":"Apache log analyzer for security"},{"key":"ref40","first-page":"229","article-title":"Snort - lightweight intrusion detection for networks","volume-title":"Proc. 13th USENIX Conf. Syst. Admin.","author":"Roesch"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74409-2_28"},{"year":"2016","key":"ref42","article-title":"Modsecurity: Open source web application firewall"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.envsoft.2017.11.032"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/0895-7177(93)90183-Y"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/0167-9236(89)90037-7"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8858\/9821019\/09311199.pdf?arnumber=9311199","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,9]],"date-time":"2024-01-09T23:59:13Z","timestamp":1704844753000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9311199\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,1]]},"references-count":45,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2020.3048202","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"type":"print","value":"1545-5971"},{"type":"electronic","value":"1941-0018"},{"type":"electronic","value":"2160-9209"}],"subject":[],"published":{"date-parts":[[2022,7,1]]}}}