{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T23:50:47Z","timestamp":1729641047104,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,10]]},"DOI":"10.1109\/crisis.2012.6378954","type":"proceedings-article","created":{"date-parts":[[2012,12,18]],"date-time":"2012-12-18T21:54:22Z","timestamp":1355867662000},"page":"1-8","source":"Crossref","is-referenced-by-count":12,"title":["Security-related vulnerability life cycle analysis"],"prefix":"10.1109","author":[{"given":"Geraldine Vache","family":"Marconato","sequence":"first","affiliation":[]},{"given":"Vincent","family":"Nicomette","sequence":"additional","affiliation":[]},{"given":"Mohamed","family":"Kaaniche","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"A Complete Guide to the Common Vulnerability Scoring System Version 2 0","year":"0","author":"mell","key":"17"},{"journal-title":"Analysis of Security Data from A Large Computing Organization","year":"2010","author":"sharma","key":"15"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2009.5315969"},{"journal-title":"0-day Patch - Exposing Vendors (In)security Performance","year":"2008","author":"frei","key":"13"},{"year":"0","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ISECS.2008.212"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/1162666.1162671"},{"journal-title":"The Bugtraq Database","year":"0","key":"3"},{"journal-title":"National Vulnerability Database","year":"0","key":"2"},{"journal-title":"Open Source Vulnerability Database","year":"0","key":"1"},{"key":"10","article-title":"Impact of vulnerability disclosure and patch availability - An empirical analysis","author":"arora","year":"0","journal-title":"Third Workshop on the Economics of Information Security 2004"},{"key":"7","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1109\/MSP.2005.17","article-title":"Is finding security holes a good idea?","volume":"3","author":"rescorla","year":"2005","journal-title":"Security & Privacy IEEE"},{"journal-title":"Le Cycle de Vie D'une Vulnrabilit","year":"2003","author":"fischbach","key":"6"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/2.889093"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04468-7_9"},{"journal-title":"Security Econometrics - The Dynamics of (In)security","year":"2009","author":"frei","key":"9"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2007.81"}],"event":{"name":"2012 7th International Conference on Risks and Security of Internet and Systems (CRiSIS)","start":{"date-parts":[[2012,10,10]]},"location":"Cork, Ireland","end":{"date-parts":[[2012,10,12]]}},"container-title":["2012 7th International Conference on Risks and Security of Internet and Systems (CRiSIS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6362373\/6378933\/06378954.pdf?arnumber=6378954","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T04:23:32Z","timestamp":1498019012000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6378954\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/crisis.2012.6378954","relation":{},"subject":[],"published":{"date-parts":[[2012,10]]}}}