{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:33:23Z","timestamp":1750221203126,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":3,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,5,27]],"date-time":"2018-05-27T00:00:00Z","timestamp":1527379200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"SESAR JU WPE","award":["12-120610-C12 (EMFASE)"],"award-info":[{"award-number":["12-120610-C12 (EMFASE)"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,5,27]]},"DOI":"10.1145\/3180155.3182511","type":"proceedings-article","created":{"date-parts":[[2018,12,13]],"date-time":"2018-12-13T15:45:16Z","timestamp":1544715916000},"page":"395-395","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Model comprehension for security risk assessment"],"prefix":"10.1145","author":[{"given":"Katsiaryna","family":"Labunets","sequence":"first","affiliation":[{"name":"Delft University of Technology"}]},{"given":"Fabio","family":"Massacci","sequence":"additional","affiliation":[{"name":"University of Trento, IT"}]},{"given":"Federica","family":"Paci","sequence":"additional","affiliation":[{"name":"University of Southampton, UK"}]},{"given":"Sabrina","family":"Marczak","sequence":"additional","affiliation":[{"name":"Pontif\u00edcia Universidade, Cat\u00f2lica do Rio Grande do Sul, BR"}]},{"given":"Fl\u00e1vio Moreira","family":"de Oliveira","sequence":"additional","affiliation":[{"name":"Pontif\u00edcia Universidade, Cat\u00f2lica do Rio Grande do Sul, BR"}]}],"member":"320","published-online":{"date-parts":[[2018,5,27]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-017-9502-8"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2017.40"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/0749-5978(86)90044-0"}],"event":{"name":"ICSE '18: 40th International Conference on Software Engineering","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE-CS Computer Society"],"location":"Gothenburg Sweden","acronym":"ICSE '18"},"container-title":["Proceedings of the 40th International Conference on Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3180155.3182511","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3180155.3182511","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:39:30Z","timestamp":1750210770000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3180155.3182511"}},"subtitle":["an empirical comparison of tabular vs. graphical representations"],"short-title":[],"issued":{"date-parts":[[2018,5,27]]},"references-count":3,"alternative-id":["10.1145\/3180155.3182511","10.1145\/3180155"],"URL":"https:\/\/doi.org\/10.1145\/3180155.3182511","relation":{},"subject":[],"published":{"date-parts":[[2018,5,27]]},"assertion":[{"value":"2018-05-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}