{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T13:10:00Z","timestamp":1725801000216},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,2]]},"DOI":"10.23919\/icact.2018.8323940","type":"proceedings-article","created":{"date-parts":[[2018,4,11]],"date-time":"2018-04-11T17:11:35Z","timestamp":1523466695000},"page":"1-8","source":"Crossref","is-referenced-by-count":6,"title":["Metric of vulnerability at the base of the life cycle of software representations"],"prefix":"10.23919","author":[{"given":"Mikhail","family":"Buinevich","sequence":"first","affiliation":[]},{"given":"Konstantin","family":"Izrailov","sequence":"additional","affiliation":[]},{"given":"Andrei","family":"Vladyko","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.lindif.2017.04.002"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884808"},{"key":"ref12","first-page":"66","article-title":"A security metric based on security arguments","author":"knight","year":"2014","journal-title":"Proc Workshop Emerging Trends in Software Metrics"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2008.4534520"},{"key":"ref14","first-page":"1237","article-title":"Metrics and measurement of trustworthy systems","year":"2016","journal-title":"Military Communications Conference (MILCOM)"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"1237","DOI":"10.1109\/MILCOM.2016.7795500","article-title":"Metrics and measurement of trustworthy systems","author":"cho","year":"2016","journal-title":"Proc IEEE 35th Military Communications Conference (MILCOM 2016)"},{"key":"ref16","first-page":"293","article-title":"Software Defined Internet of Things: Cyber Antifragility and Vulnerability Forecast","author":"buinevich","year":"2017","journal-title":"Proc IEEE 11th International Conference on Application of Information and Communication Technologies (AICT)"},{"key":"ref4","first-page":"700","article-title":"Method and Prototype of Utility for Partial Recovering Source Code for Low-Level and Medium-Level Vulnerability Search","author":"buinevich","year":"2016","journal-title":"Proc IEEE 18th International Conference on Advanced Communication Technology (ICACT)"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICACT.2015.7224760"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1002\/9781118964637.ch4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICACT.2014.6778943"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/PDP.2015.38"},{"key":"ref7","article-title":"Analyzing Vulnerability Databases","author":"aliyev","year":"2016","journal-title":"Proc 10th IEEE International Conference on Application of Information and Communication Technologies (AICI)"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/EduCon.2013.6530276"},{"key":"ref1","first-page":"430","article-title":"The life cycle of vulnerabilities in the representations of software for telecommunication devices","author":"buinevich","year":"2016","journal-title":"Proc 8th IEEE International Conference on Advanced Communication Technology (ICACT)"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1093\/oxfordhb\/9780195376746.013.0029"}],"event":{"name":"2018 20th International Conference on Advanced Communications Technology (ICACT)","start":{"date-parts":[[2018,2,11]]},"location":"Chuncheon-si Gangwon-do, Korea (South)","end":{"date-parts":[[2018,2,14]]}},"container-title":["2018 20th International Conference on Advanced Communication Technology (ICACT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8318543\/8323471\/08323940.pdf?arnumber=8323940","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,23]],"date-time":"2020-08-23T19:19:06Z","timestamp":1598210346000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8323940\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,2]]},"references-count":16,"URL":"https:\/\/doi.org\/10.23919\/icact.2018.8323940","relation":{},"subject":[],"published":{"date-parts":[[2018,2]]}}}