{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T03:22:13Z","timestamp":1730258533598,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,10,1]],"date-time":"2023-10-01T00:00:00Z","timestamp":1696118400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,10,1]],"date-time":"2023-10-01T00:00:00Z","timestamp":1696118400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,10,1]]},"DOI":"10.1109\/icsme58846.2023.00060","type":"proceedings-article","created":{"date-parts":[[2023,12,11]],"date-time":"2023-12-11T19:44:29Z","timestamp":1702323869000},"page":"463-473","source":"Crossref","is-referenced-by-count":0,"title":["Finding an Optimal Set of Static Analyzers To Detect Software Vulnerabilities"],"prefix":"10.1109","author":[{"given":"Jiaqi","family":"He","sequence":"first","affiliation":[{"name":"University of Alberta"}]},{"given":"Revan","family":"MacQueen","sequence":"additional","affiliation":[{"name":"University of Alberta"}]},{"given":"Natalie","family":"Bombardieri","sequence":"additional","affiliation":[{"name":"University of Alberta"}]},{"given":"Karim","family":"Ali","sequence":"additional","affiliation":[{"name":"University of Alberta"}]},{"given":"James R.","family":"Wright","sequence":"additional","affiliation":[{"name":"University of Alberta"}]},{"given":"Cristina","family":"Cifuentes","sequence":"additional","affiliation":[{"name":"Oracle"}]}],"member":"263","reference":[{"article-title":"The cost of poor software quality in the us: A 2020 report","year":"2021","author":"Krasner","key":"ref1"},{"article-title":"The economic impacts of inadequate infrastructure for software testing","year":"2002","author":"Tassey","key":"ref2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970347"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3377813.3381347"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1177\/1071181319631096"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.76"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2889160.2889222"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1287\/inte.1100.0505"},{"year":"2022","key":"ref9","article-title":"The software assurance metrics and tool evaluation (samate) project"},{"article-title":"The national vulnerability database (nvd): Overview","year":"2013","author":"Booth","key":"ref10"},{"volume-title":"Market Structure and Equilibrium.","year":"2010","author":"von Stackelberg","key":"ref11"},{"key":"ref12","article-title":"Leadership with commitment to mixed strategies","volume-title":"Citeseer, Tech. Rep.","author":"Von Stengel","year":"2004"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/S1574-0005(02)03014-X"},{"key":"ref14","first-page":"689","article-title":"Computing optimal randomized resource allocations for massive security games","volume-title":"8th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2009), Budapest, Hungary, May 10-15, 2009","volume":"1","author":"Kiekintveld"},{"key":"ref16","article-title":"Parfait - designing a scalable bug checker","volume-title":"Scalable Program Analysis, 13.04. - 18.04.2008","volume":"08161","author":"Cifuentes","year":"2008"},{"article-title":"Uno: Static source code checking for user-defined properties 1","year":"2002","author":"Holzmann","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20398-5_33"},{"key":"ref19","first-page":"209","article-title":"Klee: Unassisted and automatic generation of high-coverage tests for complex systems programs","volume-title":"Proceedings of the 8th USENIX Conference on Operating Systems Design and Implementation, ser. OSDI\u201908","author":"Cadar"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/52.976940"},{"key":"ref24","first-page":"337","article-title":"Z3: an efficient SMT solver","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems, 14th International Conference, TACAS 2008, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2008, Budapest, Hungary, March 29-April 6, 2008. Proceedings","volume":"4963","author":"de Moura"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2018\/775"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1609\/aimag.v33i4.2432"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2808475.2808476"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.2016.48"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2013.122313.131118"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34266-0_12"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-14039-1_5"}],"event":{"name":"2023 IEEE International Conference on Software Maintenance and Evolution (ICSME)","start":{"date-parts":[[2023,10,1]]},"location":"Bogot\u00e1, Colombia","end":{"date-parts":[[2023,10,6]]}},"container-title":["2023 IEEE International Conference on Software Maintenance and Evolution (ICSME)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10336175\/10336255\/10336293.pdf?arnumber=10336293","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,19]],"date-time":"2023-12-19T22:27:17Z","timestamp":1703024837000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10336293\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,1]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/icsme58846.2023.00060","relation":{},"subject":[],"published":{"date-parts":[[2023,10,1]]}}}