{"id":"https://openalex.org/W4390699702","doi":"https://doi.org/10.1007/978-981-99-8024-6_12","title":"Security Risk Indicator for\u00a0Open Source Software to\u00a0Measure Software Development Status","display_name":"Security Risk Indicator for\u00a0Open Source Software to\u00a0Measure Software Development Status","publication_year":2024,"publication_date":"2024-01-01","ids":{"openalex":"https://openalex.org/W4390699702","doi":"https://doi.org/10.1007/978-981-99-8024-6_12"},"language":"en","primary_location":{"id":"doi:10.1007/978-981-99-8024-6_12","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-981-99-8024-6_12","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://ris.utwente.nl/ws/files/358176542/978-981-99-8024-6_12.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5068194019","display_name":"Hiroki Kuzuno","orcid":"https://orcid.org/0000-0003-2686-2541"},"institutions":[{"id":"https://openalex.org/I65837984","display_name":"Kobe University","ror":"https://ror.org/03tgsfw79","country_code":"JP","type":"education","lineage":["https://openalex.org/I65837984"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Hiroki Kuzuno","raw_affiliation_strings":["Graduate School of Engineering, Kobe University, Kobe, Japan"],"raw_orcid":"https://orcid.org/0000-0003-2686-2541","affiliations":[{"raw_affiliation_string":"Graduate School of Engineering, Kobe University, Kobe, Japan","institution_ids":["https://openalex.org/I65837984"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111596645","display_name":"T. Yano","orcid":null},"institutions":[{"id":"https://openalex.org/I4210105785","display_name":"Intelligent Systems Research (United States)","ror":"https://ror.org/01reevc91","country_code":"US","type":"company","lineage":["https://openalex.org/I4210105785"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Tomohiko Yano","raw_affiliation_strings":["Intelligent Systems Laboratory, SECOM CO., LTD, Tokyo, Japan"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Intelligent Systems Laboratory, SECOM CO., LTD, Tokyo, Japan","institution_ids":["https://openalex.org/I4210105785"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5093698054","display_name":"Kazuki Omo","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Kazuki Omo","raw_affiliation_strings":["SIOS Technology, Inc., Tokyo, Japan"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"SIOS Technology, Inc., Tokyo, Japan","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036733211","display_name":"Jeroen van der Ham","orcid":"https://orcid.org/0000-0002-5685-8714"},"institutions":[{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Jeroen van der Ham","raw_affiliation_strings":["Faculty for Electrical Engineering, Mathematics and Computer Science, University of Twente, Enschede, The Netherlands"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Faculty for Electrical Engineering, Mathematics and Computer Science, University of Twente, Enschede, The Netherlands","institution_ids":["https://openalex.org/I94624287"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5004953139","display_name":"Toshihiro Yamauchi","orcid":"https://orcid.org/0000-0001-6226-5715"},"institutions":[{"id":"https://openalex.org/I163770644","display_name":"Okayama University","ror":"https://ror.org/02pc6pc55","country_code":"JP","type":"education","lineage":["https://openalex.org/I163770644"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Toshihiro Yamauchi","raw_affiliation_strings":["Faculty of Environmental, Life, Natural Science and Technology, Okayama University, Okayama, Japan"],"raw_orcid":"https://orcid.org/0000-0001-6226-5715","affiliations":[{"raw_affiliation_string":"Faculty of Environmental, Life, Natural Science and Technology, Okayama University, Okayama, Japan","institution_ids":["https://openalex.org/I163770644"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5068194019"],"corresponding_institution_ids":["https://openalex.org/I65837984"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":1.0571,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.70625981,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"143","last_page":"156"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.9943000078201294,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.75827956199646},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.7148780822753906},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6036368608474731},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.5334532260894775},{"id":"https://openalex.org/keywords/vulnerability-management","display_name":"Vulnerability management","score":0.5231803059577942},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.5208183526992798},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.47859737277030945},{"id":"https://openalex.org/keywords/secure-coding","display_name":"Secure coding","score":0.4516184329986572},{"id":"https://openalex.org/keywords/mainstream","display_name":"Mainstream","score":0.4513120949268341},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4468190371990204},{"id":"https://openalex.org/keywords/threat","display_name":"Threat","score":0.4156607389450073},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.39453375339508057},{"id":"https://openalex.org/keywords/vulnerability-assessment","display_name":"Vulnerability assessment","score":0.27269741892814636},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.2550162971019745},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.2271246314048767},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.14245614409446716},{"id":"https://openalex.org/keywords/network-security-policy","display_name":"Network security policy","score":0.06865248084068298}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.75827956199646},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.7148780822753906},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6036368608474731},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.5334532260894775},{"id":"https://openalex.org/C172776598","wikidata":"https://www.wikidata.org/wiki/Q7943570","display_name":"Vulnerability management","level":4,"score":0.5231803059577942},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.5208183526992798},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.47859737277030945},{"id":"https://openalex.org/C22680326","wikidata":"https://www.wikidata.org/wiki/Q7444867","display_name":"Secure coding","level":5,"score":0.4516184329986572},{"id":"https://openalex.org/C2777617010","wikidata":"https://www.wikidata.org/wiki/Q18957","display_name":"Mainstream","level":2,"score":0.4513120949268341},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4468190371990204},{"id":"https://openalex.org/C17520342","wikidata":"https://www.wikidata.org/wiki/Q7797190","display_name":"Threat","level":5,"score":0.4156607389450073},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.39453375339508057},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.27269741892814636},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.2550162971019745},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.2271246314048767},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.14245614409446716},{"id":"https://openalex.org/C117110713","wikidata":"https://www.wikidata.org/wiki/Q3394676","display_name":"Network security policy","level":4,"score":0.06865248084068298},{"id":"https://openalex.org/C137176749","wikidata":"https://www.wikidata.org/wiki/Q4105337","display_name":"Psychological resilience","level":2,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.0},{"id":"https://openalex.org/C27206212","wikidata":"https://www.wikidata.org/wiki/Q34178","display_name":"Theology","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/978-981-99-8024-6_12","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-981-99-8024-6_12","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:ris.utwente.nl:openaire/02b2f820-4751-424c-803a-f72723c1b09d","is_oa":true,"landing_page_url":"https://research.utwente.nl/en/publications/02b2f820-4751-424c-803a-f72723c1b09d","pdf_url":"https://ris.utwente.nl/ws/files/358176542/978-981-99-8024-6_12.pdf","source":{"id":"https://openalex.org/S4406922991","display_name":"University of Twente Research Information","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Kuzuno, H, Yano, T, Omo, K, van der Ham, J & Yamauchi, T 2024, Security Risk Indicator for\u00a0Open Source Software to\u00a0Measure Software Development Status. in H Kim & J Youn (eds), Information Security Applications : 24th International Conference, WISA 2023, Jeju Island, South Korea, August 23\u201325, 2023, Revised Selected Papers. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 14402, Springer, pp. 143-156, 24th International Conference on Information Security Applications, WISA 2023, Jeju Island, Korea, Republic of, 23/08/23. https://doi.org/10.1007/978-981-99-8024-6_12","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":{"id":"pmh:oai:ris.utwente.nl:openaire/02b2f820-4751-424c-803a-f72723c1b09d","is_oa":true,"landing_page_url":"https://research.utwente.nl/en/publications/02b2f820-4751-424c-803a-f72723c1b09d","pdf_url":"https://ris.utwente.nl/ws/files/358176542/978-981-99-8024-6_12.pdf","source":{"id":"https://openalex.org/S4406922991","display_name":"University of Twente Research Information","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Kuzuno, H, Yano, T, Omo, K, van der Ham, J & Yamauchi, T 2024, Security Risk Indicator for\u00a0Open Source Software to\u00a0Measure Software Development Status. in H Kim & J Youn (eds), Information Security Applications : 24th International Conference, WISA 2023, Jeju Island, South Korea, August 23\u201325, 2023, Revised Selected Papers. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 14402, Springer, pp. 143-156, 24th International Conference on Information Security Applications, WISA 2023, Jeju Island, Korea, Republic of, 23/08/23. https://doi.org/10.1007/978-981-99-8024-6_12","raw_type":"info:eu-repo/semantics/publishedVersion"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/17","score":0.4099999964237213,"display_name":"Partnerships for the goals"}],"awards":[{"id":"https://openalex.org/G7264929547","display_name":null,"funder_award_id":"JP19H04109","funder_id":"https://openalex.org/F4320334764","funder_display_name":"Japan Society for the Promotion of Science"}],"funders":[{"id":"https://openalex.org/F4320334764","display_name":"Japan Society for the Promotion of Science","ror":"https://ror.org/00hhkn466"}],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4390699702.pdf"},"referenced_works_count":14,"referenced_works":["https://openalex.org/W2177986285","https://openalex.org/W2744879410","https://openalex.org/W2766615649","https://openalex.org/W2892859754","https://openalex.org/W2911255072","https://openalex.org/W2965876165","https://openalex.org/W3084558590","https://openalex.org/W3158650358","https://openalex.org/W3175201754","https://openalex.org/W3176789817","https://openalex.org/W3195612455","https://openalex.org/W3199469813","https://openalex.org/W4200187475","https://openalex.org/W4385208592"],"related_works":["https://openalex.org/W2383958993","https://openalex.org/W3043810321","https://openalex.org/W2892115998","https://openalex.org/W2560421591","https://openalex.org/W2123075981","https://openalex.org/W2796094063","https://openalex.org/W2062583373","https://openalex.org/W2537414278","https://openalex.org/W1978034799","https://openalex.org/W4384518368"],"abstract_inverted_index":null,"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
