{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T20:12:21Z","timestamp":1730319141021,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,30]],"date-time":"2017-10-30T00:00:00Z","timestamp":1509321600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100003246","name":"Nederlandse Organisatie voor Wetenschappelijk Onderzoek","doi-asserted-by":"publisher","award":["628.001.004"],"id":[{"id":"10.13039\/501100003246","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,10,30]]},"DOI":"10.1145\/3133956.3133960","type":"proceedings-article","created":{"date-parts":[[2017,10,27]],"date-time":"2017-10-27T12:48:18Z","timestamp":1509108498000},"page":"1483-1499","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":55,"title":["Economic Factors of Vulnerability Trade and Exploitation"],"prefix":"10.1145","author":[{"given":"Luca","family":"Allodi","sequence":"first","affiliation":[{"name":"Eindhoven University of Technology, Eindhoven, Netherlands"}]}],"member":"320","published-online":{"date-parts":[[2017,10,30]]},"reference":[{"volume-title":"Markets for cybercrime tools and stolen data: Hackers' bazaar","author":"Ablon Lillian","unstructured":"Lillian Ablon, Martin C Libicki, and Andrea A Golay. 2014. Markets for cybercrime tools and stolen data: Hackers' bazaar. Rand Corporation.","key":"e_1_3_2_2_1_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_2_1","DOI":"10.1007\/978-3-642-04898-2_161"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_3_1","DOI":"10.2307\/1879431"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_4_1","DOI":"10.1007\/978-3-319-15618-7_11"},{"volume-title":"Then and Now: On the Maturity of the Cybercrime Markets","year":"2015","author":"Allodi Luca","unstructured":"Luca Allodi, Marco Corradin, and Fabio Massacci. 2015. Then and Now: On the Maturity of the Cybercrime Markets. IEEE Transactions on Emerging Topics in Computing (2015).","key":"e_1_3_2_2_5_1"},{"key":"e_1_3_2_2_6_1","article-title":"Comparing vulnerability severity and exploits using case-control studies","volume":"17","author":"Allodi Luca","year":"2014","unstructured":"Luca Allodi and Fabio Massacci 2014. Comparing vulnerability severity and exploits using case-control studies. ACM Transaction on Information and System Security (TISSEC), Vol. 17, 1 (8 2014).","journal-title":"ACM Transaction on Information and System Security (TISSEC)"},{"volume-title":"In the Proceedings of the 2015 European Conference on Information Systems (ECIS).","year":"2015","author":"Allodi Luca","unstructured":"Luca Allodi and Fabio Massacci 2015. The work-averse attacker model. In In the Proceedings of the 2015 European Conference on Information Systems (ECIS).","key":"e_1_3_2_2_7_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_8_1","DOI":"10.1111\/risa.12864"},{"volume-title":"An empirical study of web vulnerability discovery ecosystems Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. ACM, 1105--1117","author":"Zhao Mingyi","unstructured":"Mingyi Zhao, Jens Grossklags, and Peng Liu. 2015. An empirical study of web vulnerability discovery ecosystems Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. ACM, 1105--1117.","key":"e_1_3_2_2_9_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_10_1","DOI":"10.1007\/978-0-387-09762-6_11"}],"event":{"sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"acronym":"CCS '17","name":"CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security","location":"Dallas Texas USA"},"container-title":["Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3133956.3133960","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,17]],"date-time":"2024-07-17T04:22:50Z","timestamp":1721190170000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3133960"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10,30]]},"references-count":10,"alternative-id":["10.1145\/3133956.3133960","10.1145\/3133956"],"URL":"https:\/\/doi.org\/10.1145\/3133956.3133960","relation":{},"subject":[],"published":{"date-parts":[[2017,10,30]]},"assertion":[{"value":"2017-10-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}