{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,9]],"date-time":"2025-12-09T18:10:47Z","timestamp":1765303847784},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T00:00:00Z","timestamp":1651017600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T00:00:00Z","timestamp":1651017600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,4,27]]},"DOI":"10.23919\/fruct54823.2022.9770888","type":"proceedings-article","created":{"date-parts":[[2022,5,11]],"date-time":"2022-05-11T20:32:27Z","timestamp":1652301147000},"source":"Crossref","is-referenced-by-count":1,"title":["Processing of Unstructured Information About Software Vulnerabilities"],"prefix":"10.23919","author":[{"given":"Daniela-Kler","family":"Nkodia","sequence":"first","affiliation":[{"name":"ITMO University,Saint Petersburg,Russia"}]},{"given":"Alexander","family":"Menshchikov","sequence":"additional","affiliation":[{"name":"ITMO University,Saint Petersburg,Russia"}]},{"given":"Dmitriy","family":"Tatarov","sequence":"additional","affiliation":[{"name":"ITMO University,Saint Petersburg,Russia"}]}],"member":"263","reference":[{"key":"ref10","article-title":"ThreatZoom: CVE2CWE using Hierarchical Neural Network","author":"aghaei","year":"2020","journal-title":"16th EAI International Conference on Security and Privacy in Communication Networks"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC50000.2020.9219568"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.3233\/FI-2010-288"},{"key":"ref13","first-page":"222","year":"2013","journal-title":"National Institute of Standards and Technology Interagency or Internal Report NISTIR 7298 R2 &#x201C;Glossary of Key Information Security Terms&#x201D;"},{"key":"ref14","first-page":"12","article-title":"Information protection. Vulnerabilities in information systems. The classification of vulnerabilities in information systems","year":"2015"},{"key":"ref15","year":"0","journal-title":"Github repository of the project Mapping MITRE ATT&CK&#x00AE; to CVEs for Impact"},{"key":"ref16","year":"0","journal-title":"MITRE OVAL official website"},{"key":"ref17","year":"0","journal-title":"ScanOVAL program description"},{"key":"ref18","first-page":"12","article-title":"Information protection. Vulnerabilities in information systems. Rules of vulnerabilities description","year":"2016"},{"key":"ref19","first-page":"31","article-title":"Survey of Existing SBOM Formats and Standards","year":"2019","journal-title":"Version 20191025"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2016.7745435"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3350546.3352519"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2017.8258359"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ROEDUNET.2019.8909609"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2018.8587336"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/WI-IAT.2011.26"},{"key":"ref2","first-page":"667","article-title":"Early Warnings of Cyber Threats in Online Discussions","author":"sapienza","year":"2018","journal-title":"IEEE International Conference on Data Mining Workshops (ICDMW06)"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ISI49825.2020.9280548"},{"key":"ref1","author":"details","year":"0","journal-title":"Vulnerabilities By Type"},{"key":"ref20","year":"0","journal-title":"CycloneDX official website"},{"key":"ref22","year":"0","journal-title":"Vulnerability database"},{"key":"ref21","year":"0","journal-title":"Dependency-Track official website"}],"event":{"name":"2022 31st Conference of Open Innovations Association (FRUCT)","location":"Helsinki, Finland","start":{"date-parts":[[2022,4,27]]},"end":{"date-parts":[[2022,4,29]]}},"container-title":["2022 31st Conference of Open Innovations Association (FRUCT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9770852\/9770880\/09770888.pdf?arnumber=9770888","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,4]],"date-time":"2022-07-04T20:09:49Z","timestamp":1656965389000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9770888\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,27]]},"references-count":22,"URL":"https:\/\/doi.org\/10.23919\/fruct54823.2022.9770888","relation":{},"subject":[],"published":{"date-parts":[[2022,4,27]]}}}