{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,24]],"date-time":"2025-10-24T08:09:58Z","timestamp":1761293398880,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":6,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,4,5]],"date-time":"2016-04-05T00:00:00Z","timestamp":1459814400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,4,5]]},"DOI":"10.1145\/2897795.2897813","type":"proceedings-article","created":{"date-parts":[[2016,4,7]],"date-time":"2016-04-07T22:22:33Z","timestamp":1460067753000},"page":"1-4","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Forecasting Zero-Day Vulnerabilities"],"prefix":"10.1145","author":[{"given":"David","family":"Last","sequence":"first","affiliation":[{"name":"United States Air Force, 425 Brooks Road, Rome, NY 13441"}]}],"member":"320","published-online":{"date-parts":[[2016,4,5]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2005.30"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.2007.78"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"S. Zhang D. Caragea and X. Ou \"An empirical study on using the national vulnerability database to predict software vulnerabilities \" Database and Expert Systems Applications pp. 217--231 2011.   S. Zhang D. Caragea and X. Ou \"An empirical study on using the national vulnerability database to predict software vulnerabilities \" Database and Expert Systems Applications pp. 217--231 2011.","DOI":"10.1007\/978-3-642-23088-2_15"},{"key":"e_1_3_2_1_4_1","unstructured":"\"National Vulnerability Database \" National Institute of Standards and Technology (NIST) {Online}. Available: https:\/\/nvd.nist.gov\/. {Accessed 8 December 2015}.  \"National Vulnerability Database \" National Institute of Standards and Technology (NIST) {Online}. Available: https:\/\/nvd.nist.gov\/. {Accessed 8 December 2015}."},{"key":"e_1_3_2_1_5_1","unstructured":"\"Weka 3: Data Mining Software in Java \" {Online}. Available: http:\/\/www.cs.waikato.ac.nz\/ml\/weka\/. {Accessed 1 December 2015}.  \"Weka 3: Data Mining Software in Java \" {Online}. Available: http:\/\/www.cs.waikato.ac.nz\/ml\/weka\/. {Accessed 1 December 2015}."},{"journal-title":"\"Probabilistic forecasting of electricity spot prices using Factor Quantile Regression Averaging,\" International Journal of Forecasting","year":"2015","author":"Maciejowska K.","key":"e_1_3_2_1_6_1"}],"event":{"name":"CISRC '16: 11th Annual Cyber and Information Security Research","sponsor":["Oak Ridge National Laboratory"],"location":"Oak Ridge TN USA","acronym":"CISRC '16"},"container-title":["Proceedings of the 11th Annual Cyber and Information Security Research Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2897795.2897813","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2897795.2897813","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:38:45Z","timestamp":1750221525000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2897795.2897813"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,4,5]]},"references-count":6,"alternative-id":["10.1145\/2897795.2897813","10.1145\/2897795"],"URL":"https:\/\/doi.org\/10.1145\/2897795.2897813","relation":{},"subject":[],"published":{"date-parts":[[2016,4,5]]},"assertion":[{"value":"2016-04-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}