{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T19:26:00Z","timestamp":1730316360791,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,10,15]]},"DOI":"10.1145\/2382416.2382427","type":"proceedings-article","created":{"date-parts":[[2012,10,15]],"date-time":"2012-10-15T17:13:12Z","timestamp":1350321192000},"page":"17-24","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":36,"title":["A preliminary analysis of vulnerability scores for attacks in wild"],"prefix":"10.1145","author":[{"given":"Luca","family":"Allodi","sequence":"first","affiliation":[{"name":"University of Trento, Povo (TN), Italy"}]},{"given":"Fabio","family":"Massacci","sequence":"additional","affiliation":[{"name":"University of Trento, Povo (TN), Italy"}]}],"member":"320","published-online":{"date-parts":[[2012,10,15]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.2307\/1879431"},{"issue":"1","key":"e_1_3_2_1_2_1","first-page":"14","article-title":"Application of vulnerability discovery models to major operating systems","volume":"57","author":"Alhazmi O.","year":"2008","unstructured":"O. Alhazmi and Y. Malaiya . Application of vulnerability discovery models to major operating systems . IEEE Trans. , 57 ( 1 ): 14 -- 22 , march 2008 . O. Alhazmi and Y. Malaiya. Application of vulnerability discovery models to major operating systems. IEEE Trans., 57(1):14--22, march 2008.","journal-title":"IEEE Trans."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1835804.1835821"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315292"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1162666.1162671"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2011.5720656"},{"volume-title":"Nobody sells gold for the price of silver: Dishonesty, uncertainty and the underground economy","year":"2010","author":"Herley C.","key":"e_1_3_2_1_7_1","unstructured":"C. Herley and D. Florencio . Nobody sells gold for the price of silver: Dishonesty, uncertainty and the underground economy . Springer Econ . of Inf. Sec. and Priv., 2010 . C. Herley and D. Florencio. Nobody sells gold for the price of silver: Dishonesty, uncertainty and the underground economy. Springer Econ. of Inf. Sec. and Priv., 2010."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-24006-3_8"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2414456.2414459"},{"volume-title":"A Complete Guide to the Common Vulnerability Scoring System Version 2.0","year":"2007","author":"Mell P.","key":"e_1_3_2_1_10_1","unstructured":"P. Mell and K. Scarfone . A Complete Guide to the Common Vulnerability Scoring System Version 2.0 . Carnegie Mellon University , 2007 . P. Mell and K. Scarfone. A Complete Guide to the Common Vulnerability Scoring System Version 2.0. Carnegie Mellon University, 2007."},{"volume-title":"Proc. of WEIS'07","year":"2007","author":"Miller C.","key":"e_1_3_2_1_11_1","unstructured":"C. Miller . The legitimate vulnerability market: Inside the secretive world of 0-day exploit sales . In Proc. of WEIS'07 , 2007 . C. Miller. The legitimate vulnerability market: Inside the secretive world of 0-day exploit sales. In Proc. of WEIS'07, 2007."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068824"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/336512.336586"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/2206201"},{"volume-title":"R: A Language and Environment for Statistical Computing","year":"2012","author":"Core Team R","key":"e_1_3_2_1_15_1","unstructured":"R Core Team . R: A Language and Environment for Statistical Computing . R Foundation for Statistical Computing, Vienna, Austria , 2012 . ISBN 3-900051-07-0. R Core Team. R: A Language and Environment for Statistical Computing. R Foundation for Statistical Computing, Vienna, Austria, 2012. ISBN 3-900051-07-0."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2009.5314220"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337223.2337314"},{"volume-title":"Available on the web at http:\/\/www.symantec.com\/threatreport\/topic.jsp?id=threat_activity_trends&aid=analysis_of_malicious_web_activity, online edition","year":"2011","key":"e_1_3_2_1_18_1","unstructured":"Symantec. Analysis of Malicious Web Activity by Attack Toolkits. Symantec , Available on the web at http:\/\/www.symantec.com\/threatreport\/topic.jsp?id=threat_activity_trends&aid=analysis_of_malicious_web_activity, online edition , 2011 . Accessed on June 1012. Symantec. Analysis of Malicious Web Activity by Attack Toolkits. Symantec, Available on the web at http:\/\/www.symantec.com\/threatreport\/topic.jsp?id=threat_activity_trends&aid=analysis_of_malicious_web_activity, online edition, 2011. Accessed on June 1012."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70567-3_22"}],"event":{"name":"CCS'12: the ACM Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Raleigh North Carolina USA","acronym":"CCS'12"},"container-title":["Proceedings of the 2012 ACM Workshop on Building analysis datasets and gathering experience returns for security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2382416.2382427","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,6]],"date-time":"2023-01-06T08:15:57Z","timestamp":1672992957000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2382416.2382427"}},"subtitle":["the ekits and sym datasets"],"short-title":[],"issued":{"date-parts":[[2012,10,15]]},"references-count":19,"alternative-id":["10.1145\/2382416.2382427","10.1145\/2382416"],"URL":"https:\/\/doi.org\/10.1145\/2382416.2382427","relation":{},"subject":[],"published":{"date-parts":[[2012,10,15]]},"assertion":[{"value":"2012-10-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}