{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:34:55Z","timestamp":1750307695050,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,4,13]],"date-time":"2009-04-13T00:00:00Z","timestamp":1239580800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,4,13]]},"DOI":"10.1145\/1558607.1558625","type":"proceedings-article","created":{"date-parts":[[2009,6,30]],"date-time":"2009-06-30T13:10:54Z","timestamp":1246367454000},"page":"1-4","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["Ontology-based security assessment for software products"],"prefix":"10.1145","author":[{"given":"Ju An","family":"Wang","sequence":"first","affiliation":[{"name":"Southern Polytechnic State University, Marietta, GA"}]},{"given":"Minzhe","family":"Guo","sequence":"additional","affiliation":[{"name":"Southern Polytechnic State University, Marietta, GA"}]},{"given":"Hao","family":"Wang","sequence":"additional","affiliation":[{"name":"Southern Polytechnic State University, Marietta, GA"}]},{"given":"Min","family":"Xia","sequence":"additional","affiliation":[{"name":"Southern Polytechnic State University, Marietta, GA"}]},{"given":"Linfeng","family":"Zhou","sequence":"additional","affiliation":[{"name":"Southern Polytechnic State University, Marietta, GA"}]}],"member":"320","published-online":{"date-parts":[[2009,4,13]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Peter Mell Karen Scarfone and Sasha Romanosky A Complete Guide to the Common Vulnerability Scoring System (CVSS) Version 2.0 Forum of Incident Response and Security Teams http:\/\/www.first.org\/cvss\/cvss-guide.html (July 2007).  Peter Mell Karen Scarfone and Sasha Romanosky A Complete Guide to the Common Vulnerability Scoring System (CVSS) Version 2.0 Forum of Incident Response and Security Teams http:\/\/www.first.org\/cvss\/cvss-guide.html (July 2007)."},{"issue":"1","key":"e_1_3_2_1_2_1","first-page":"48","volume":"1","author":"Wang J. A.","year":"2008","journal-title":"\"Metrics for Information Security Vulnerabilities, Journal of Applied Global Research"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1413140.1413191"},{"key":"e_1_3_2_1_4_1","unstructured":"NHS and NIST National Vulnerability Database (NVD) automating vulnerability management security measurement and compliance checking http:\/\/nvd.nist.gov\/scap.cfm.  NHS and NIST National Vulnerability Database (NVD) automating vulnerability management security measurement and compliance checking http:\/\/nvd.nist.gov\/scap.cfm."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2007.478"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2008.211"},{"key":"e_1_3_2_1_7_1","unstructured":"Matt Bishop Computer Security Art and Science Addison-Wesley 2003. ISBN 0201440997.  Matt Bishop Computer Security Art and Science Addison-Wesley 2003. ISBN 0201440997."},{"key":"e_1_3_2_1_8_1","unstructured":"NIST Information Security Automation Program (ISAP) Automating Vulnerability Management Security Measurement and Compliance Version 1.0 Beta revised on May 22 2007.  NIST Information Security Automation Program (ISAP) Automating Vulnerability Management Security Measurement and Compliance Version 1.0 Beta revised on May 22 2007."},{"volume-title":"Implementation and Application","year":"2003","author":"Franz","key":"e_1_3_2_1_9_1"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1006\/ijhc.1995.1081"},{"key":"e_1_3_2_1_12_1","unstructured":"Common Vulnerabilities and Exposures. {Online}. The MITRE Corporation. Available: http:\/\/cve.mitre.org\/.  Common Vulnerabilities and Exposures. {Online}. The MITRE Corporation. Available: http:\/\/cve.mitre.org\/."},{"key":"e_1_3_2_1_13_1","unstructured":"Common Platform Enumeration (CPE). http:\/\/cpe.mitre.org\/ November 2008.  Common Platform Enumeration (CPE). http:\/\/cpe.mitre.org\/ November 2008."},{"key":"e_1_3_2_1_14_1","unstructured":"Common Weakness Enumeration (CWE). http:\/\/cwe.mitre.org\/ February 2009.  Common Weakness Enumeration (CWE). http:\/\/cwe.mitre.org\/ February 2009."}],"event":{"name":"CSIIRW '09: Fifth Cyber Security and Information Intelligence Research Workshop","acronym":"CSIIRW '09","location":"Oak Ridge Tennessee USA"},"container-title":["Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1558607.1558625","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1558607.1558625","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:29:57Z","timestamp":1750253397000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1558607.1558625"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,4,13]]},"references-count":13,"alternative-id":["10.1145\/1558607.1558625","10.1145\/1558607"],"URL":"https:\/\/doi.org\/10.1145\/1558607.1558625","relation":{},"subject":[],"published":{"date-parts":[[2009,4,13]]},"assertion":[{"value":"2009-04-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}