{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T06:35:23Z","timestamp":1726036523606},"reference-count":14,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2008,9,1]],"date-time":"2008-09-01T00:00:00Z","timestamp":1220227200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Softw."],"published-print":{"date-parts":[[2008,9]]},"DOI":"10.1109\/ms.2008.130","type":"journal-article","created":{"date-parts":[[2008,8,20]],"date-time":"2008-08-20T15:10:58Z","timestamp":1219245058000},"page":"22-29","source":"Crossref","is-referenced-by-count":359,"title":["Using Static Analysis to Find Bugs"],"prefix":"10.1109","volume":"25","author":[{"given":"Nathaniel","family":"Ayewah","sequence":"first","affiliation":[]},{"given":"William","family":"Pugh","sequence":"additional","affiliation":[]},{"given":"David","family":"Hovemeyer","sequence":"additional","affiliation":[]},{"given":"J. David","family":"Morgenthaler","sequence":"additional","affiliation":[]},{"given":"John","family":"Penix","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/586094.586097"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1251535.1251536"},{"key":"ref12","year":"2006","journal-title":"Mondrian Code Review on the Web"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1297846.1297894"},{"key":"ref14","year":"0","journal-title":"JSR 305 Annotations for Software Defect Detection"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-024X(200006)30:7<775::AID-SPE309>3.0.CO;2-H"},{"key":"ref3","author":"chess","year":"2007","journal-title":"Secure Programming with Static Analysis"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1137983.1138014"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1108792.1108798"},{"key":"ref8","year":"2003","journal-title":"Reasoning Inspection Service Defect Data Report for Tomcat Version 4 1 24"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1251535.1251537"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1145\/966712.966722","volume":"1","author":"hallem","year":"2003","journal-title":"Queue"},{"key":"ref1","author":"darwin","year":"1988","journal-title":"Checking C Programs with Lint"},{"key":"ref9","author":"copeland","year":"2005","journal-title":"PMD Applied"}],"container-title":["IEEE Software"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/52\/4602659\/04602670.pdf?arnumber=4602670","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:20:44Z","timestamp":1642004444000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/4602670\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,9]]},"references-count":14,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/ms.2008.130","relation":{},"ISSN":["0740-7459","1937-4194"],"issn-type":[{"value":"0740-7459","type":"print"},{"value":"1937-4194","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008,9]]}}}