{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,31]],"date-time":"2024-08-31T00:04:07Z","timestamp":1725062647739},"reference-count":0,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.15439\/2019f84","type":"proceedings-article","created":{"date-parts":[[2019,9,20]],"date-time":"2019-09-20T15:11:17Z","timestamp":1568992277000},"page":"443-447","source":"Crossref","is-referenced-by-count":0,"title":["Formalization of Software Risk Assessment Results in Legal Metrology Based on ISO\/IEC 18045 Vulnerability Analysis"],"prefix":"10.15439","volume":"18","author":[{"given":"Marko","family":"Esche","sequence":"first","affiliation":[]},{"given":"Felix","family":"Salwiczek","sequence":"additional","affiliation":[]},{"given":"Federico Grasso","family":"Toro","sequence":"additional","affiliation":[]}],"member":"6175","published-online":{"date-parts":[[2019,9,26]]},"event":{"name":"2019 Federated Conference on Computer Science and Information Systems","start":{"date-parts":[[2019,9,1]]},"end":{"date-parts":[[2019,9,4]]},"acronym":"FedCSIS 2019"},"container-title":["Annals of Computer Science and Information Systems","Proceedings of the 2019 Federated Conference on Computer Science and Information Systems"],"original-title":[],"deposited":{"date-parts":[[2024,8,30]],"date-time":"2024-08-30T07:05:50Z","timestamp":1725001550000},"score":1,"resource":{"primary":{"URL":"https:\/\/annals-csis.org\/Volume_18\/drp\/84.html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9,26]]},"references-count":0,"URL":"https:\/\/doi.org\/10.15439\/2019f84","relation":{},"ISSN":["2300-5963"],"issn-type":[{"type":"print","value":"2300-5963"}],"subject":[],"published":{"date-parts":[[2019,9,26]]}}}