{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,13]],"date-time":"2026-05-13T21:49:13Z","timestamp":1778708953563,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":53,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,9,19]],"date-time":"2022-09-19T00:00:00Z","timestamp":1663545600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Swiss National Science Foundation","award":["200021_197227"],"award-info":[{"award-number":["200021_197227"]}]},{"DOI":"10.13039\/100018569","name":"Swiss National Science Foundation","doi-asserted-by":"publisher","award":["PZ00P2_186090"],"award-info":[{"award-number":["PZ00P2_186090"]}],"id":[{"id":"10.13039\/100018569","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,9,19]]},"DOI":"10.1145\/3544902.3546250","type":"proceedings-article","created":{"date-parts":[[2022,9,7]],"date-time":"2022-09-07T04:07:45Z","timestamp":1662523665000},"page":"12-22","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["An Exploratory Study on Regression Vulnerabilities"],"prefix":"10.1145","author":[{"given":"Larissa","family":"Braz","sequence":"first","affiliation":[{"name":"University of Zurich, Switzerland"}]},{"given":"Enrico","family":"Fregnan","sequence":"additional","affiliation":[{"name":"University of Zurich, Switzerland"}]},{"given":"Vivek","family":"Arora","sequence":"additional","affiliation":[{"name":"Self, Netherlands"}]},{"given":"Alberto","family":"Bacchelli","sequence":"additional","affiliation":[{"name":"University of Zurich, Switzerland"}]}],"member":"320","published-online":{"date-parts":[[2022,9,19]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Last accessed","author":"Updates\u00a0Leopard Again Apple","year":"2022","unstructured":"Apple Updates\u00a0Leopard Again . Last accessed March 2022 . Washington Post . https:\/\/doi.org\/10.5281\/zenodo.6792317. 10.5281\/zenodo.6792317 Apple Updates\u00a0Leopard Again. Last accessed March 2022. Washington Post. https:\/\/doi.org\/10.5281\/zenodo.6792317."},{"key":"e_1_3_2_1_2_1","volume-title":"Predicting bug-fixing time: A replication study using an open source software project. journal of Systems and Software 136","author":"Akbarinasaji Shirin","year":"2018","unstructured":"Shirin Akbarinasaji , Bora Caglayan , and Ayse Bener . 2018. Predicting bug-fixing time: A replication study using an open source software project. journal of Systems and Software 136 ( 2018 ), 173\u2013186. Shirin Akbarinasaji, Bora Caglayan, and Ayse Bener. 2018. Predicting bug-fixing time: A replication study using an open source software project. journal of Systems and Software 136 (2018), 173\u2013186."},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of the International Conference on Software Engineering. 712\u2013721","author":"Bacchelli A.","unstructured":"A. Bacchelli and C. Bird . 2013. Expectations, outcomes, and challenges of modern code review . In Proceedings of the International Conference on Software Engineering. 712\u2013721 . A. Bacchelli and C. Bird. 2013. Expectations, outcomes, and challenges of modern code review. In Proceedings of the International Conference on Software Engineering. 712\u2013721."},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of the International Conference on Software Engineering. 59\u201367","author":"Baker M.","unstructured":"M. Baker and S. Eick . 1994. Visualizing software systems . In Proceedings of the International Conference on Software Engineering. 59\u201367 . M. Baker and S. Eick. 1994. Visualizing software systems. In Proceedings of the International Conference on Software Engineering. 59\u201367."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2007.101"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3511560"},{"key":"#cr-split#-e_1_3_2_1_7_1.1","unstructured":"L. Braz E. Fregnan V. Arora and A. Bacchelli. 2022. Data and Material. https:\/\/doi.org\/10.5281\/zenodo.6792317. 10.5281\/zenodo.6792317"},{"key":"#cr-split#-e_1_3_2_1_7_1.2","unstructured":"L. Braz E. Fregnan V. Arora and A. Bacchelli. 2022. Data and Material. https:\/\/doi.org\/10.5281\/zenodo.6792317."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE43902.2021.00054"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"F. Brooks. 1995. The mythical man-month: essays on software engineering. Pearson Education.  F. Brooks. 1995. The mythical man-month: essays on software engineering. Pearson Education.","DOI":"10.1109\/MS.1995.10042"},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of the Working Conference on Mining Software Repositories. 269\u2013279","author":"Camilo F.","unstructured":"F. Camilo , A. Meneely , and M. Nagappan . 2015. Do bugs foreshadow vulnerabilities? A study of the chromium project . In Proceedings of the Working Conference on Mining Software Repositories. 269\u2013279 . F. Camilo, A. Meneely, and M. Nagappan. 2015. Do bugs foreshadow vulnerabilities? A study of the chromium project. In Proceedings of the Working Conference on Mining Software Repositories. 269\u2013279."},{"key":"e_1_3_2_1_11_1","volume-title":"Proceedings of the conference of the Centre for Advanced Studies on Collaborative research.","author":"Chen Y.","year":"2002","unstructured":"Y. Chen , R. Probert , and D.l Sims. 2002 . Specification-based regression test selection with risk analysis . In Proceedings of the conference of the Centre for Advanced Studies on Collaborative research. Y. Chen, R. Probert, and D.l Sims. 2002. Specification-based regression test selection with risk analysis. In Proceedings of the conference of the Centre for Advanced Studies on Collaborative research."},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the international conference on automated software engineering. 332\u2013343","author":"Christakis M.","unstructured":"M. Christakis and C. Bird . 2016. What developers want and need from program analysis: an empirical study . In Proceedings of the international conference on automated software engineering. 332\u2013343 . M. Christakis and C. Bird. 2016. What developers want and need from program analysis: an empirical study. In Proceedings of the international conference on automated software engineering. 332\u2013343."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/0164-1212(89)90039-3"},{"key":"e_1_3_2_1_14_1","volume-title":"Last accessed","author":"Computer Bleeping","year":"2022","unstructured":"Bleeping Computer . Last accessed March 2022 . Windows 10 gets temp patch for critical flaw fixed in buggy update. https:\/\/www.bleepingcomputer.com\/news\/security\/windows-10-gets-temp-patch-for-critical-flaw-fixed-in-buggy-update\/. Bleeping Computer. Last accessed March 2022. Windows 10 gets temp patch for critical flaw fixed in buggy update. https:\/\/www.bleepingcomputer.com\/news\/security\/windows-10-gets-temp-patch-for-critical-flaw-fixed-in-buggy-update\/."},{"key":"e_1_3_2_1_15_1","unstructured":"T. Cook and D. Campbell. 1979. Quasi-Experimentation: Design and Analysis Issues for Field Settings. Houghton Mifflin Company.  T. Cook and D. Campbell. 1979. Quasi-Experimentation: Design and Analysis Issues for Field Settings. Houghton Mifflin Company."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"K. Dempsey P. Eavy and G. Moore. 2017. Automation Support for Security Control Assessments. Technical Report. Technical Report NISTIR 8011 National Institute of Standards and Technology.  K. Dempsey P. Eavy and G. Moore. 2017. Automation Support for Security Control Assessments. Technical Report. Technical Report NISTIR 8011 National Institute of Standards and Technology.","DOI":"10.6028\/NIST.IR.8011-1"},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings Ninth International Symposium on Software Reliability Engineering (Cat. No.98TB100257)","author":"El\u00a0Emam K.","unstructured":"K. El\u00a0Emam and I. Wieczorek . 1998. The repeatability of code defect classifications . In Proceedings Ninth International Symposium on Software Reliability Engineering (Cat. No.98TB100257) . 322\u2013333. K. El\u00a0Emam and I. Wieczorek. 1998. The repeatability of code defect classifications. In Proceedings Ninth International Symposium on Software Reliability Engineering (Cat. No.98TB100257). 322\u2013333."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10009-015-0365-2"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.4018\/ijsse.2014100103"},{"key":"e_1_3_2_1_20_1","unstructured":"Mozilla Foundation. 2017. mozregression tool. https:\/\/mozilla.github.io\/mozregression\/.  Mozilla Foundation. 2017. mozregression tool. https:\/\/mozilla.github.io\/mozregression\/."},{"key":"e_1_3_2_1_21_1","volume-title":"Last accessed","author":"Foundation Mozilla","year":"2022","unstructured":"Mozilla Foundation . Last accessed April 2022 . Oxidation Project . https:\/\/wiki.allizom.org\/Oxidation. Mozilla Foundation. Last accessed April 2022. Oxidation Project. https:\/\/wiki.allizom.org\/Oxidation."},{"key":"e_1_3_2_1_22_1","volume-title":"Last accessed","author":"Foundation Mozilla","year":"2022","unstructured":"Mozilla Foundation . Last accessed in March 2022 . How to Mark Regressions . https:\/\/firefox-source-docs.mozilla.org\/bug-mgmt\/processes\/regressions.html. Mozilla Foundation. Last accessed in March 2022. How to Mark Regressions. https:\/\/firefox-source-docs.mozilla.org\/bug-mgmt\/processes\/regressions.html."},{"key":"e_1_3_2_1_23_1","volume-title":"Last accessed","author":"Foundation Mozilla","year":"2022","unstructured":"Mozilla Foundation . Last accessed June 2022 . Address Manifesto . https:\/\/www.mozilla.org\/en-US\/about\/manifesto\/. Mozilla Foundation. Last accessed June 2022. Address Manifesto. https:\/\/www.mozilla.org\/en-US\/about\/manifesto\/."},{"key":"e_1_3_2_1_24_1","volume-title":"Last accessed","author":"Foundation Mozilla","year":"2022","unstructured":"Mozilla Foundation . Last accessed June 2022 . Address Sanitizers . https:\/\/firefox-source-docs.mozilla.org\/tools\/sanitizer\/index.html. Mozilla Foundation. Last accessed June 2022. Address Sanitizers. https:\/\/firefox-source-docs.mozilla.org\/tools\/sanitizer\/index.html."},{"key":"e_1_3_2_1_25_1","volume-title":"Last accessed","author":"Foundation Mozilla","year":"2022","unstructured":"Mozilla Foundation . Last accessed June 2022 . Bug Types . https:\/\/firefox-source-docs.mozilla.org\/bug-mgmt\/guides\/bug-types.html. Mozilla Foundation. Last accessed June 2022. Bug Types. https:\/\/firefox-source-docs.mozilla.org\/bug-mgmt\/guides\/bug-types.html."},{"key":"e_1_3_2_1_26_1","volume-title":"Last accessed","author":"Foundation Mozilla","year":"2022","unstructured":"Mozilla Foundation . Last accessed March 2022 . Mozilla . https:\/\/www.mozilla.org\/. Mozilla Foundation. Last accessed March 2022. Mozilla. https:\/\/www.mozilla.org\/."},{"key":"e_1_3_2_1_27_1","volume-title":"Last accessed","author":"Foundation Mozilla","year":"2022","unstructured":"Mozilla Foundation . Last accessed March 2022 . Mozilla\u2019s Bugzilla . https:\/\/bugzilla.mozilla.org\/home. Mozilla Foundation. Last accessed March 2022. Mozilla\u2019s Bugzilla. https:\/\/bugzilla.mozilla.org\/home."},{"key":"e_1_3_2_1_28_1","volume-title":"Last accessed on","author":"Foundation Mozilla","year":"2022","unstructured":"Mozilla Foundation . Last accessed on April 2022 . Mozilla Crash Reports . https:\/\/crash-stats.mozilla.org\/. Mozilla Foundation. Last accessed on April 2022. Mozilla Crash Reports. https:\/\/crash-stats.mozilla.org\/."},{"key":"e_1_3_2_1_29_1","volume-title":"Last accessed","author":"Foundation OWASP","year":"2022","unstructured":"The\u00a0 OWASP Foundation . Last accessed March 2022 . OWASP Foundation . https:\/\/owasp.org\/ The\u00a0OWASP Foundation. Last accessed March 2022. OWASP Foundation. https:\/\/owasp.org\/"},{"key":"e_1_3_2_1_30_1","volume-title":"Response bias, social desirability and dissimulation. Personality and individual differences 7, 3","author":"Furnham A.","year":"1986","unstructured":"A. Furnham . 1986. Response bias, social desirability and dissimulation. Personality and individual differences 7, 3 ( 1986 ), 385\u2013400. A. Furnham. 1986. Response bias, social desirability and dissimulation. Personality and individual differences 7, 3 (1986), 385\u2013400."},{"key":"e_1_3_2_1_31_1","volume-title":"Proceedings of the International Conference on Software Engineering, Vol.\u00a01. 55\u201364","author":"Gu Z.","unstructured":"Z. Gu , E. Barr , D. Hamilton , and Z. Su . 2010. Has the bug really been fixed? . In Proceedings of the International Conference on Software Engineering, Vol.\u00a01. 55\u201364 . Z. Gu, E. Barr, D. Hamilton, and Z. Su. 2010. Has the bug really been fixed?. In Proceedings of the International Conference on Software Engineering, Vol.\u00a01. 55\u201364."},{"key":"e_1_3_2_1_32_1","volume-title":"Last accessed","year":"2022","unstructured":"Heap. Last accessed April 2022 . What is a tech stack?https:\/\/heap.io\/topics\/what-is-a-tech-stack. Heap. Last accessed April 2022. What is a tech stack?https:\/\/heap.io\/topics\/what-is-a-tech-stack."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1037\/h0040518"},{"key":"e_1_3_2_1_34_1","volume-title":"Research Interview: Analysing a Neglected Dimension in Research*. Canadian Review of Sociology\/Revue canadienne de sociologie 41, 1(2004), 1\u201326.","author":"Hiller H.","year":"2004","unstructured":"H. Hiller and L. Diluzio . 2004 . The Interviewee and the Research Interview: Analysing a Neglected Dimension in Research*. Canadian Review of Sociology\/Revue canadienne de sociologie 41, 1(2004), 1\u201326. H. Hiller and L. Diluzio. 2004. The Interviewee and the Research Interview: Analysing a Neglected Dimension in Research*. Canadian Review of Sociology\/Revue canadienne de sociologie 41, 1(2004), 1\u201326."},{"key":"e_1_3_2_1_35_1","volume-title":"Proceedings of the International Symposium on Software Metrics. 10\u2013pp.","author":"Hove S.","unstructured":"S. Hove and B. Anda . 2005. Experiences from conducting semi-structured interviews in empirical software engineering research . In Proceedings of the International Symposium on Software Metrics. 10\u2013pp. S. Hove and B. Anda. 2005. Experiences from conducting semi-structured interviews in empirical software engineering research. In Proceedings of the International Symposium on Software Metrics. 10\u2013pp."},{"key":"e_1_3_2_1_36_1","volume-title":"Proceedings of the Conference on Software Maintenance. 60\u201369","author":"Leung H.","unstructured":"H. Leung and L. White . 1989. Insights into regression testing (software testing) . In Proceedings of the Conference on Software Maintenance. 60\u201369 . H. Leung and L. White. 1989. Insights into regression testing (software testing). In Proceedings of the Conference on Software Maintenance. 60\u201369."},{"key":"e_1_3_2_1_37_1","unstructured":"T.\u00a0R Lindlof and B. Taylor. 2002. Qualitative communication research methods. Sage.  T.\u00a0R Lindlof and B. Taylor. 2002. Qualitative communication research methods. Sage."},{"key":"e_1_3_2_1_38_1","unstructured":"D. Mehta. 2007. Effective software security management. https:\/\/www. owasp.org\/images\/2\/28\/Effective_Software_Security_Management.pdf.  D. Mehta. 2007. Effective software security management. https:\/\/www. owasp.org\/images\/2\/28\/Effective_Software_Security_Management.pdf."},{"key":"e_1_3_2_1_39_1","volume-title":"Last accessed","year":"2022","unstructured":"Mitre. Last accessed March 2022 . CWE - Common Weakness Enumeration . https:\/\/cwe.mitre.org\/index.html. Mitre. Last accessed March 2022. CWE - Common Weakness Enumeration. https:\/\/cwe.mitre.org\/index.html."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"crossref","unstructured":"M. M\u00e4ntyl\u00e4 and C. Lassenius. 2009. What Types of Defects Are Really Discovered in Code Reviews?Transactions on Software Engineering 35 3 (2009) 430\u2013448.  M. M\u00e4ntyl\u00e4 and C. Lassenius. 2009. What Types of Defects Are Really Discovered in Code Reviews?Transactions on Software Engineering 35 3 (2009) 430\u2013448.","DOI":"10.1109\/TSE.2008.71"},{"key":"e_1_3_2_1_41_1","volume-title":"Proceedings of the International Haifa Verification Conference on Hardware and Software: Verification and Testing. 218\u2013234","author":"Nir D.","unstructured":"D. Nir , S. Tyszberowicz , and A. Yehudai . 2007. Locating Regression Bugs . In Proceedings of the International Haifa Verification Conference on Hardware and Software: Verification and Testing. 218\u2013234 . D. Nir, S. Tyszberowicz, and A. Yehudai. 2007. Locating Regression Bugs. In Proceedings of the International Haifa Verification Conference on Hardware and Software: Verification and Testing. 218\u2013234."},{"key":"e_1_3_2_1_42_1","volume-title":"Proceedings of the International Workshop on Mining Software Repositories. 90\u201394","author":"Purushothaman R.","unstructured":"R. Purushothaman and D. Perry . 2004. Towards understanding the rhetoric of small changes-extended abstract . In Proceedings of the International Workshop on Mining Software Repositories. 90\u201394 . R. Purushothaman and D. Perry. 2004. Towards understanding the rhetoric of small changes-extended abstract. In Proceedings of the International Workshop on Mining Software Repositories. 90\u201394."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"crossref","unstructured":"Y. Shin A. Meneely L. Williams and J. Osborne. 2010. Evaluating complexity code churn and developer activity metrics as indicators of software vulnerabilities. transactions on software engineering 37 6 (2010) 772\u2013787.  Y. Shin A. Meneely L. Williams and J. Osborne. 2010. Evaluating complexity code churn and developer activity metrics as indicators of software vulnerabilities. transactions on software engineering 37 6 (2010) 772\u2013787.","DOI":"10.1109\/TSE.2010.81"},{"key":"e_1_3_2_1_44_1","volume-title":"International Workshop on Mining Software Repositories. 1\u20135.","author":"Sliwerski J.","unstructured":"J. Sliwerski , T. Zimmermann , and A. Zeller . 2005. When Do Changes Induce Fixes? . In International Workshop on Mining Software Repositories. 1\u20135. J. Sliwerski, T. Zimmermann, and A. Zeller. 2005. When Do Changes Induce Fixes?. In International Workshop on Mining Software Repositories. 1\u20135."},{"key":"e_1_3_2_1_45_1","volume-title":"Last accessed","author":"Firefox","year":"2022","unstructured":"Firefox source docs. Last accessed : April 2022 . Fixing Security Bugs . https:\/\/firefox-source-docs.mozilla.org\/bug-mgmt\/processes\/fixing-security-bugs.html Firefox source docs. Last accessed: April 2022. Fixing Security Bugs. https:\/\/firefox-source-docs.mozilla.org\/bug-mgmt\/processes\/fixing-security-bugs.html"},{"key":"e_1_3_2_1_46_1","unstructured":"D. Spencer. 2009. Card sorting: Designing usable categories. Rosenfeld Media.  D. Spencer. 2009. Card sorting: Designing usable categories. Rosenfeld Media."},{"key":"e_1_3_2_1_47_1","volume-title":"Learning from Strangers: The art and method of qualitative interview studies","author":"Weiss R.","year":"1995","unstructured":"R. Weiss . 1995. Learning from Strangers: The art and method of qualitative interview studies . The Free Press ( 1995 ). R. Weiss. 1995. Learning from Strangers: The art and method of qualitative interview studies. The Free Press (1995)."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2006.08.003"},{"key":"e_1_3_2_1_49_1","volume-title":"Last accessed","author":"World Info","year":"2022","unstructured":"Info World . Last accessed March 2022 . Criminal Exploit Windows Flaw after Buggy Patch . http:\/\/www.infoworld.com\/d\/security-central\/after-buggy-patch-criminals-exploit-windows-flaw-848. Info World. Last accessed March 2022. Criminal Exploit Windows Flaw after Buggy Patch. http:\/\/www.infoworld.com\/d\/security-central\/after-buggy-patch-criminals-exploit-windows-flaw-848."},{"key":"e_1_3_2_1_50_1","volume-title":"Last accessed","author":"World Network","year":"2022","unstructured":"Network World . Last accessed March 2022 . Mozilla re-patches Firefox after regression bug. https:\/\/www.networkworld.com\/article\/2268408\/mozilla-re-patches-firefox-after-regression-bug-pops-up.html. Network World. Last accessed March 2022. Mozilla re-patches Firefox after regression bug. https:\/\/www.networkworld.com\/article\/2268408\/mozilla-re-patches-firefox-after-regression-bug-pops-up.html."},{"key":"e_1_3_2_1_51_1","volume-title":"Proceedings of the Symposium and the 13th European Conference on Foundations of Software Engineering. 26\u201336","author":"Yin Z.","unstructured":"Z. Yin , D. Yuan , Y. Zhou , S. Pasupathy , and L. Bairavasundaram . 2011. How Do Fixes Become Bugs? . In Proceedings of the Symposium and the 13th European Conference on Foundations of Software Engineering. 26\u201336 . Z. Yin, D. Yuan, Y. Zhou, S. Pasupathy, and L. Bairavasundaram. 2011. How Do Fixes Become Bugs?. In Proceedings of the Symposium and the 13th European Conference on Foundations of Software Engineering. 26\u201336."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2012.32"}],"event":{"name":"ESEM '22: ACM \/ IEEE International Symposium on Empirical Software Engineering and Measurement","location":"Helsinki Finland","acronym":"ESEM '22","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 16th ACM \/ IEEE International Symposium on Empirical Software Engineering and Measurement"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3544902.3546250","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3544902.3546250","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:00:01Z","timestamp":1750186801000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3544902.3546250"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,19]]},"references-count":53,"alternative-id":["10.1145\/3544902.3546250","10.1145\/3544902"],"URL":"https:\/\/doi.org\/10.1145\/3544902.3546250","relation":{},"subject":[],"published":{"date-parts":[[2022,9,19]]},"assertion":[{"value":"2022-09-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}