{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:19:20Z","timestamp":1750220360688,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,8,17]],"date-time":"2021-08-17T00:00:00Z","timestamp":1629158400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,8,17]]},"DOI":"10.1145\/3465481.3470027","type":"proceedings-article","created":{"date-parts":[[2021,8,16]],"date-time":"2021-08-16T18:07:25Z","timestamp":1629137245000},"page":"1-9","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Cr\u00e8me de la Cr\u00e8me: Lessons from Papers in Security Publications"],"prefix":"10.1145","author":[{"given":"Simon","family":"Vrhovec","sequence":"first","affiliation":[{"name":"University of Maribor, Slovenia"}]},{"given":"Luca","family":"Caviglione","sequence":"additional","affiliation":[{"name":"National Research Council of Italy, Genova, Italy"}]},{"given":"Steffen","family":"Wendzel","sequence":"additional","affiliation":[{"name":"Hochschule Worms &amp; Fern Universit\u00e4t in Hagen, Germany"}]}],"member":"320","published-online":{"date-parts":[[2021,8,17]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Clarivate Analytics. 2021. Title Suppressions. http:\/\/help.prod-incites.com\/incitesLiveJCR\/JCRGroup\/titleSuppressions\/version\/42. (2021). Accessed: 2021-04-11."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-73951-9_16"},{"key":"e_1_3_2_1_3_1","volume-title":"Do journals flipping to gold open access show an OA citation or publication advantage?Scientometrics 124, 3","author":"Bautista-Puig Nuria","year":"2020","unstructured":"Nuria Bautista-Puig, Carmen Lopez-Illescas, Felix de Moya-Anegon, Vicente Guerrero-Bote, and Henk\u00a0F Moed. 2020. Do journals flipping to gold open access show an OA citation or publication advantage?Scientometrics 124, 3 (2020), 2551\u20132575."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.joi.2010.11.001"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.joi.2011.05.008"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.joi.2014.11.008"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.joi.2020.101077"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.joi.2016.01.006"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2240236.2240256"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0049476"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3339252.3341479"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.3897\/jucs.2020.042"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0306-4573(00)00047-9"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11192-020-03358-z"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11192-020-03703-2"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.joi.2019.101004"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11192-019-03086-z"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11192-020-03526-1"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11192-021-03870-w"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.joi.2017.03.008"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.joi.2020.101066"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.joi.2013.10.006"},{"key":"e_1_3_2_1_23_1","volume-title":"A bibliometric analysis of recent research on machine learning for cyber security. Intelligent communication and computational technologies","author":"Makawana R","year":"2018","unstructured":"Pooja\u00a0R Makawana and Rutvij\u00a0H Jhaveri. 2018. A bibliometric analysis of recent research on machine learning for cyber security. Intelligent communication and computational technologies (2018), 213\u2013226."},{"key":"e_1_3_2_1_24_1","volume-title":"Juliza\u00a0Mohamad Arif, Salwana Mohamad, and Ahmad Firdaus.","author":"Ratibah\u00a0Tuan Mat Sharfah","year":"2021","unstructured":"Sharfah Ratibah\u00a0Tuan Mat, Mohd\u00a0Faizal Ab\u00a0Razak, Mohd Nizam\u00a0Mohmad Kahar, Juliza\u00a0Mohamad Arif, Salwana Mohamad, and Ahmad Firdaus. 2021. Towards a systematic description of the field using bibliometric analysis: malware evolution. Scientometrics (2021), 1\u201343."},{"key":"e_1_3_2_1_25_1","unstructured":"Clarivate\u00a0Web of Science. 2020. Web of Science Journal Citation Reports: Suppression Policy. https:\/\/clarivate.com\/webofsciencegroup\/wp-content\/uploads\/sites\/2\/2020\/06\/jcr-suppression-policy-2020.pdf. (2020). Accessed: 2021-04-11."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11192-020-03388-7"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11192-020-03827-5"},{"key":"e_1_3_2_1_28_1","volume-title":"Nonreplicable publications are cited more than replicable ones. Science advances 7, 21","author":"Serra-Garcia Marta","year":"2021","unstructured":"Marta Serra-Garcia and Uri Gneezy. 2021. Nonreplicable publications are cited more than replicable ones. Science advances 7, 21 (2021), eabd1705."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.joi.2009.06.002"},{"key":"e_1_3_2_1_30_1","unstructured":"VOSviewer. 2021. VOSviewer \u2013 Visualizing scientific landscapes. https:\/\/www.vosviewer.com\/. (2021). Accessed: 2021-03-28."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.3897\/jucs.2020.045"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3230833.3233265"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11192-019-03279-6"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.joi.2017.12.005"}],"event":{"name":"ARES 2021: The 16th International Conference on Availability, Reliability and Security","acronym":"ARES 2021","location":"Vienna Austria"},"container-title":["Proceedings of the 16th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3465481.3470027","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3465481.3470027","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:17:24Z","timestamp":1750191444000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3465481.3470027"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,17]]},"references-count":34,"alternative-id":["10.1145\/3465481.3470027","10.1145\/3465481"],"URL":"https:\/\/doi.org\/10.1145\/3465481.3470027","relation":{},"subject":[],"published":{"date-parts":[[2021,8,17]]},"assertion":[{"value":"2021-08-17","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}