{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T18:47:47Z","timestamp":1732042067926},"publisher-location":"Cham","reference-count":14,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031184086"},{"type":"electronic","value":"9783031184093"}],"license":[{"start":{"date-parts":[[2022,11,5]],"date-time":"2022-11-05T00:00:00Z","timestamp":1667606400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,11,5]],"date-time":"2022-11-05T00:00:00Z","timestamp":1667606400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-18409-3_16","type":"book-chapter","created":{"date-parts":[[2022,11,4]],"date-time":"2022-11-04T14:04:09Z","timestamp":1667570649000},"page":"159-168","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Forecasting the\u00a0Number of\u00a0Bugs and\u00a0Vulnerabilities in\u00a0Software Components Using Neural Network Models"],"prefix":"10.1007","author":[{"given":"Ovidiu","family":"Cosma","sequence":"first","affiliation":[]},{"given":"Petric\u0103","family":"Pop","sequence":"additional","affiliation":[]},{"given":"Cosmin","family":"Sabo","sequence":"additional","affiliation":[]},{"given":"Laura","family":"Cosma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,11,5]]},"reference":[{"key":"16_CR1","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1007\/978-3-030-87872-6_22","volume-title":"14th International Conference on Computational Intelligence in Security for Information Systems and 12th International Conference on European Transnational Educational (CISIS 2021 and ICEUTE 2021)","author":"O Cosma","year":"2022","unstructured":"Cosma, O., Macelaru, M., Pop, P.C., Sabo, C., Zelina, I.: A comparative study of the most important methods for forecasting the ICT systems vulnerabilities. In: Gude Prego, J.J., de la Puerta, J.G., Garc\u00eda Bringas, P., Quinti\u00e1n, H., Corchado, E. (eds.) CISIS - ICEUTE 2021. AISC, vol. 1400, pp. 224\u2013233. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-030-87872-6_22"},{"key":"16_CR2","doi-asserted-by":"crossref","unstructured":"Gencer, K., Basciftci, F.: Time series forecast modeling of vulnerabilities in the Android operating system using ARIMA and deep learning methods. Sustain. Comput. Inform. Syst. 30, 100515 (2021)","DOI":"10.1016\/j.suscom.2021.100515"},{"issue":"3","key":"16_CR3","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1049\/cit2.12002","volume":"6","author":"R Kaushik","year":"2021","unstructured":"Kaushik, R., Jain, S., Jain, S., Dash, T.: Performance evaluation of deep neural networks for forecasting time-series with multiple structural breaks and high volatility. CAAI Trans. Intell. Technol. 6(3), 265\u2013280 (2021)","journal-title":"CAAI Trans. Intell. Technol."},{"key":"16_CR4","first-page":"362","volume":"8","author":"NR Pokhrel","year":"2017","unstructured":"Pokhrel, N.R., Rodrigo, H., Tsokos, C.P.: Cybersecurity: time series predictive modeling of vulnerabilities of desktop operating system using linear and non-linear approach. J. Inf. Secur. 8, 362\u2013382 (2017)","journal-title":"J. Inf. Secur."},{"key":"16_CR5","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1016\/j.cose.2015.03.003","volume":"51","author":"Y Roumani","year":"2015","unstructured":"Roumani, Y., Nwankpa, J.K., Roumani, Y.F.: Time series modeling of vulnerabilities. Comput. Secur. 51, 32\u201340 (2015)","journal-title":"Comput. Secur."},{"key":"16_CR6","doi-asserted-by":"crossref","unstructured":"Yasasin, E., Prester, J., Wagner, G., Schryen, G.: Forecasting IT security vulnerabilities - an empirical analysis. Comput. Secur. 88, 101610 (2020)","DOI":"10.1016\/j.cose.2019.101610"},{"issue":"2","key":"16_CR7","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1109\/TR.2013.2257052","volume":"62","author":"S Rahimi","year":"2013","unstructured":"Rahimi, S., Zargham, M.: Vulnerability scrying method for software vulnerability discovery prediction without a vulnerability database. IEEE Trans. Reliab. 62(2), 395\u2013407 (2013)","journal-title":"IEEE Trans. Reliab."},{"key":"16_CR8","doi-asserted-by":"crossref","unstructured":"Williams, M.A., Barranco, R.C., Naim, S.M., Dey, S., Hossain, M.S, Akbar, M.: A vulnerability analysis and prediction framework. Comput. Secur. 92, 101751 (2020)","DOI":"10.1016\/j.cose.2020.101751"},{"key":"16_CR9","unstructured":"Keras. https:\/\/keras.io\/"},{"key":"16_CR10","unstructured":"Canonical: UBUNTU releases. http:\/\/releases.ubuntu.com\/"},{"key":"16_CR11","unstructured":"National Institute of Standards and Technology: National Vulnerability Database. https:\/\/nvd.nist.gov\/"},{"key":"16_CR12","unstructured":"Robust-rosin: ROBUST ROS Bug Study. https:\/\/github.com\/robust-rosin\/robust"},{"key":"16_CR13","unstructured":"ROS-Industrial Quality-Assured Robot Software Components. https:\/\/www.rosin-project.eu\/"},{"key":"16_CR14","unstructured":"YAML.org: Yet Another Markup Language (YAML) 1.0"}],"container-title":["Lecture Notes in Networks and Systems","International Joint Conference 15th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2022) 13th International Conference on EUropean Transnational Education (ICEUTE 2022)"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-18409-3_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,4]],"date-time":"2022-11-04T14:40:37Z","timestamp":1667572837000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-18409-3_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,5]]},"ISBN":["9783031184086","9783031184093"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-18409-3_16","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2022,11,5]]},"assertion":[{"value":"5 November 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CISIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Computational Intelligence in Security for Information Systems Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Salamanca","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 September 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 September 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cisis-spain2022a","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2022.cisisconference.eu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}