{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T13:05:31Z","timestamp":1725714331897},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.1109\/cloudcom55334.2022.00038","type":"proceedings-article","created":{"date-parts":[[2023,1,9]],"date-time":"2023-01-09T21:27:37Z","timestamp":1673299657000},"page":"214-221","source":"Crossref","is-referenced-by-count":0,"title":["Software Vulnerability Assessment: Vendor, Scanner, and User Analysis"],"prefix":"10.1109","author":[{"given":"Kietthibhum","family":"Boonchuay","sequence":"first","affiliation":[]},{"given":"Wachirawich","family":"Siripaktanakon","sequence":"additional","affiliation":[]},{"given":"Orathai","family":"Sangpetch","sequence":"additional","affiliation":[]},{"given":"Akkarit","family":"Sangpetch","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"2022","key":"ref1","article-title":"The Numbers Behind Log4j Vulnerability"},{"year":"2022","key":"ref2","article-title":"The Full Costs of Log4J"},{"year":"2022","key":"ref3","article-title":"IDC Vulnerability Management Market Share"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/RAMS.2005.1408432"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00038"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00071"},{"volume-title":"What is Vulnerability?","year":"2022","key":"ref7"},{"volume-title":"What is CVE?","year":"2022","key":"ref8"},{"volume-title":"Vunerability Metrics","year":"2022","key":"ref9"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1080.0226"},{"volume-title":"Export Software Vulnerabilities","year":"2022","key":"ref11"},{"volume-title":"Explore the KnowledgeBase","year":"2022","key":"ref12"},{"key":"ref13","article-title":"Cyber security vulnerability statistics and facts of 2021","author":"O\u2019Driscol","year":"2022","journal-title":"Comparitech"},{"volume-title":"Explore the Knowledge Base","year":"2022","key":"ref14"},{"article-title":"Cyber security vulnerability statistics and facts of 2021","year":"2022","author":"O\u2019Driscol","key":"ref15"},{"year":"2022","key":"ref16","article-title":"Guide for Conducting Risk Assessment"},{"volume-title":"Security Update Guide","year":"2022","key":"ref17"},{"volume-title":"Chrome Releases","year":"2022","key":"ref18"},{"volume-title":"Common Questions About Update","year":"2022","key":"ref19"},{"volume-title":"Firefox Releases","year":"2022","key":"ref20"},{"volume-title":"Release Highlights","year":"2022","key":"ref21"},{"volume-title":"Zero-day attacks climb as hackers get more sophisticated","year":"2022","key":"ref22"},{"key":"ref23","article-title":"How Frequently Attackers Exploit Vulnerabilities?","author":"Kass","year":"2022","journal-title":"MSSP Alert"}],"event":{"name":"2022 IEEE International Conference on Cloud Computing Technology and Science (CloudCom)","start":{"date-parts":[[2022,12,13]]},"location":"Bangkok, Thailand","end":{"date-parts":[[2022,12,16]]}},"container-title":["2022 IEEE International Conference on Cloud Computing Technology and Science (CloudCom)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10005312\/10005342\/10005529.pdf?arnumber=10005529","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,9]],"date-time":"2024-02-09T09:27:21Z","timestamp":1707470841000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10005529\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/cloudcom55334.2022.00038","relation":{},"subject":[],"published":{"date-parts":[[2022,12]]}}}