{"id":"https://openalex.org/W3000845437","doi":"https://doi.org/10.1007/s10664-019-09797-4","title":"Measuring the accuracy of software vulnerability assessments: experiments with students and professionals","display_name":"Measuring the accuracy of software vulnerability assessments: experiments with students and professionals","publication_year":2020,"publication_date":"2020-01-20","ids":{"openalex":"https://openalex.org/W3000845437","doi":"https://doi.org/10.1007/s10664-019-09797-4","mag":"3000845437"},"language":"en","primary_location":{"id":"doi:10.1007/s10664-019-09797-4","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10664-019-09797-4","pdf_url":null,"source":{"id":"https://openalex.org/S109852484","display_name":"Empirical Software Engineering","issn_l":"1382-3256","issn":["1382-3256","1573-7616"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Empirical Software Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://doi.org/10.1007/s10664-019-09797-4","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5047635330","display_name":"Luca Allodi","orcid":"https://orcid.org/0000-0003-1600-0868"},"institutions":[{"id":"https://openalex.org/I83019370","display_name":"Eindhoven University of Technology","ror":"https://ror.org/02c2kyt77","country_code":"NL","type":"education","lineage":["https://openalex.org/I83019370"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Luca Allodi","raw_affiliation_strings":["Eindhoven University of Technology, Eindhoven, Netherlands"],"affiliations":[{"raw_affiliation_string":"Eindhoven University of Technology, Eindhoven, Netherlands","institution_ids":["https://openalex.org/I83019370"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5080057892","display_name":"Marco Cremonini","orcid":"https://orcid.org/0000-0002-4031-9791"},"institutions":[{"id":"https://openalex.org/I189158943","display_name":"University of Milan","ror":"https://ror.org/00wjc7c48","country_code":"IT","type":"education","lineage":["https://openalex.org/I189158943"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Marco Cremonini","raw_affiliation_strings":["University of Milan, Milan, Italy"],"affiliations":[{"raw_affiliation_string":"University of Milan, Milan, Italy","institution_ids":["https://openalex.org/I189158943"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085639552","display_name":"Fabio Massacci","orcid":"https://orcid.org/0000-0002-1091-8486"},"institutions":[{"id":"https://openalex.org/I193223587","display_name":"University of Trento","ror":"https://ror.org/05trd4x28","country_code":"IT","type":"education","lineage":["https://openalex.org/I193223587"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Fabio Massacci","raw_affiliation_strings":["University of Trento, Trento, Italy"],"affiliations":[{"raw_affiliation_string":"University of Trento, Trento, Italy","institution_ids":["https://openalex.org/I193223587"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5001175026","display_name":"Woohyun Shim","orcid":null},"institutions":[{"id":"https://openalex.org/I919547610","display_name":"The Korea Institute of Public Administration","ror":"https://ror.org/05s6rc685","country_code":"KR","type":"government","lineage":["https://openalex.org/I4210097958","https://openalex.org/I919547610"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Woohyun Shim","raw_affiliation_strings":["Korea Institute of Public Administration, Seoul, South Korea"],"affiliations":[{"raw_affiliation_string":"Korea Institute of Public Administration, Seoul, South Korea","institution_ids":["https://openalex.org/I919547610"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5085639552"],"corresponding_institution_ids":["https://openalex.org/I193223587"],"apc_list":{"value":2290,"currency":"EUR","value_usd":2890},"apc_paid":{"value":2290,"currency":"EUR","value_usd":2890},"fwci":3.3377,"has_fulltext":false,"cited_by_count":37,"citation_normalized_percentile":{"value":0.93368099,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":100},"biblio":{"volume":"25","issue":"2","first_page":"1063","last_page":"1094"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.7766914367675781},{"id":"https://openalex.org/keywords/vulnerability-assessment","display_name":"Vulnerability assessment","score":0.6187793016433716},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6153867244720459},{"id":"https://openalex.org/keywords/vulnerability-management","display_name":"Vulnerability management","score":0.583102285861969},{"id":"https://openalex.org/keywords/work","display_name":"Work (physics)","score":0.569196343421936},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.5577791929244995},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5529041886329651},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5464885830879211},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.44794440269470215},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.4456061124801636},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.32500317692756653},{"id":"https://openalex.org/keywords/engineering-management","display_name":"Engineering management","score":0.3242442011833191},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3176736831665039},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.25245189666748047},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.11822351813316345},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.11161762475967407},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.07397991418838501}],"concepts":[{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.7766914367675781},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.6187793016433716},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6153867244720459},{"id":"https://openalex.org/C172776598","wikidata":"https://www.wikidata.org/wiki/Q7943570","display_name":"Vulnerability management","level":4,"score":0.583102285861969},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.569196343421936},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.5577791929244995},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5529041886329651},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5464885830879211},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.44794440269470215},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.4456061124801636},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.32500317692756653},{"id":"https://openalex.org/C110354214","wikidata":"https://www.wikidata.org/wiki/Q6314146","display_name":"Engineering management","level":1,"score":0.3242442011833191},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3176736831665039},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.25245189666748047},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.11822351813316345},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.11161762475967407},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.07397991418838501},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0},{"id":"https://openalex.org/C137176749","wikidata":"https://www.wikidata.org/wiki/Q4105337","display_name":"Psychological resilience","level":2,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":9,"locations":[{"id":"doi:10.1007/s10664-019-09797-4","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10664-019-09797-4","pdf_url":null,"source":{"id":"https://openalex.org/S109852484","display_name":"Empirical Software Engineering","issn_l":"1382-3256","issn":["1382-3256","1573-7616"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Empirical Software Engineering","raw_type":"journal-article"},{"id":"pmh:oai:pure.tue.nl:openaire/82754e95-c4b9-4f98-9c7b-34481d76027e","is_oa":true,"landing_page_url":"https://research.tue.nl/en/publications/82754e95-c4b9-4f98-9c7b-34481d76027e","pdf_url":null,"source":{"id":"https://openalex.org/S4406922641","display_name":"TU/e Research Portal","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Allodi, L, Cremonini, M, Massacci, F & Shim, W 2020, 'Measuring the accuracy of software vulnerability assessments : experiments with students and professionals', Empirical Software Engineering, vol. 25, no. 2, pp. 1063-1094. https://doi.org/10.1007/s10664-019-09797-4","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:research.vu.nl:publications/c4aab914-6efc-4ed1-a914-9657646df6b4","is_oa":true,"landing_page_url":"https://research.vu.nl/en/publications/c4aab914-6efc-4ed1-a914-9657646df6b4","pdf_url":null,"source":{"id":"https://openalex.org/S4306401107","display_name":"VU Research Portal","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I865915315","host_organization_name":"Vrije Universiteit Amsterdam","host_organization_lineage":["https://openalex.org/I865915315"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Allodi, L, Cremonini, M, Massacci, F & Shim, W 2020, 'Measuring the accuracy of software vulnerability assessments: experiments with students and professionals', Empirical Software Engineering, vol. 25, no. 2, pp. 1063-1094. https://doi.org/10.1007/s10664-019-09797-4","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:air.unimi.it:2434/701130","is_oa":true,"landing_page_url":"http://hdl.handle.net/2434/701130","pdf_url":null,"source":{"id":"https://openalex.org/S4306400516","display_name":"Archivio Istituzionale della Ricerca (Universita Degli Studi Di Milano)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I189158943","host_organization_name":"University of Milan","host_organization_lineage":["https://openalex.org/I189158943"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/article"},{"id":"pmh:oai:iris.unitn.it:11572/251140","is_oa":true,"landing_page_url":"https://link.springer.com/epdf/10.1007/s10664-019-09797-4?author_access_token=PTmJFygzA_oRnOlgRLaHbve4RwlQNchNByi7wbcMAY4ol3MewsEH4_vZTj0-mETd6CDFI-vxYeZgIn150fT-Oj8BIQX49feF90BwaPllGHXw5mEY5AK7zvjPcfj99F2AbUjO97cfglCVxYyQcjVuQg==","pdf_url":null,"source":{"id":"https://openalex.org/S4306401913","display_name":"Institutional Research Information System (Universit\u00e0 degli Studi di Trento)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I193223587","host_organization_name":"University of Trento","host_organization_lineage":["https://openalex.org/I193223587"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"info:eu-repo/semantics/article"},{"id":"pmh:oai:pure.tue.nl:publications/82754e95-c4b9-4f98-9c7b-34481d76027e","is_oa":true,"landing_page_url":"http://www.scopus.com/inward/record.url?scp=85078317554&partnerID=8YFLogxK","pdf_url":null,"source":{"id":"https://openalex.org/S4406922641","display_name":"TU/e Research Portal","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Allodi, L, Cremonini, M, Massacci, F & Shim, W 2020, 'Measuring the accuracy of software vulnerability assessments : experiments with students and professionals', Empirical Software Engineering, vol. 25, no. 2, pp. 1063-1094. https://doi.org/10.1007/s10664-019-09797-4","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:research.vu.nl:openaire_cris_publications/c4aab914-6efc-4ed1-a914-9657646df6b4","is_oa":true,"landing_page_url":"https://hdl.handle.net/1871.1/c4aab914-6efc-4ed1-a914-9657646df6b4","pdf_url":null,"source":{"id":"https://openalex.org/S4306401107","display_name":"VU Research Portal","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I865915315","host_organization_name":"Vrije Universiteit Amsterdam","host_organization_lineage":["https://openalex.org/I865915315"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Allodi, L, Cremonini, M, Massacci, F & Shim, W 2020, 'Measuring the accuracy of software vulnerability assessments: experiments with students and professionals', Empirical Software Engineering, vol. 25, no. 2, pp. 1063-1094. https://doi.org/10.1007/s10664-019-09797-4","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:tue:oai:pure.tue.nl:publications/82754e95-c4b9-4f98-9c7b-34481d76027e","is_oa":true,"landing_page_url":"https://research.tue.nl/nl/publications/82754e95-c4b9-4f98-9c7b-34481d76027e","pdf_url":null,"source":{"id":"https://openalex.org/S4306401843","display_name":"Data Archiving and Networked Services (DANS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1322597698","host_organization_name":"Royal Netherlands Academy of Arts and Sciences","host_organization_lineage":["https://openalex.org/I1322597698"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Empirical Software Engineering, 25(2), 1063 - 1094. Springer","raw_type":"info:eu-repo/semantics/article"},{"id":"pmh:vu:oai:research.vu.nl:publications/131e5262-be3f-4c05-8382-5a3152a075ac","is_oa":false,"landing_page_url":"https://research.vu.nl/en/publications/131e5262-be3f-4c05-8382-5a3152a075ac","pdf_url":null,"source":{"id":"https://openalex.org/S4306401843","display_name":"Data Archiving and Networked Services (DANS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1322597698","host_organization_name":"Royal Netherlands Academy of Arts and Sciences","host_organization_lineage":["https://openalex.org/I1322597698"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Empirical Software Engineering, 25(2), 1063 - 1094. Springer Netherlands","raw_type":"info:eu-repo/semantics/article"}],"best_oa_location":{"id":"doi:10.1007/s10664-019-09797-4","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10664-019-09797-4","pdf_url":null,"source":{"id":"https://openalex.org/S109852484","display_name":"Empirical Software Engineering","issn_l":"1382-3256","issn":["1382-3256","1573-7616"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Empirical Software Engineering","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.4099999964237213,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[{"id":"https://openalex.org/G4937468798","display_name":null,"funder_award_id":"H2020","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G5356549776","display_name":null,"funder_award_id":"830929","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G5541357959","display_name":null,"funder_award_id":"7th Framework Programme","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G6384328479","display_name":null,"funder_award_id":"830929","funder_id":"https://openalex.org/F4320332999","funder_display_name":"Horizon 2020 Framework Programme"},{"id":"https://openalex.org/G645663373","display_name":null,"funder_award_id":"7th Framework","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G8842823380","display_name":"Socio-Economics meets Security","funder_award_id":"285223","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"}],"funders":[{"id":"https://openalex.org/F4320320300","display_name":"European Commission","ror":"https://ror.org/00k4n6c32"},{"id":"https://openalex.org/F4320321800","display_name":"Nederlandse Organisatie voor Wetenschappelijk Onderzoek","ror":"https://ror.org/04jsz6e67"},{"id":"https://openalex.org/F4320332999","display_name":"Horizon 2020 Framework Programme","ror":"https://ror.org/00k4n6c32"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":68,"referenced_works":["https://openalex.org/W50237241","https://openalex.org/W63943973","https://openalex.org/W150078352","https://openalex.org/W384698140","https://openalex.org/W1463266149","https://openalex.org/W1490657313","https://openalex.org/W1531064568","https://openalex.org/W1543278958","https://openalex.org/W1628063087","https://openalex.org/W1842503650","https://openalex.org/W1929374880","https://openalex.org/W1971733255","https://openalex.org/W1977603982","https://openalex.org/W1985324839","https://openalex.org/W1996106493","https://openalex.org/W1996540199","https://openalex.org/W2001468118","https://openalex.org/W2012500654","https://openalex.org/W2019655958","https://openalex.org/W2024732646","https://openalex.org/W2057553235","https://openalex.org/W2067187955","https://openalex.org/W2083112004","https://openalex.org/W2093504720","https://openalex.org/W2099661551","https://openalex.org/W2128017766","https://openalex.org/W2133827592","https://openalex.org/W2145052282","https://openalex.org/W2164317000","https://openalex.org/W2170478581","https://openalex.org/W2342408547","https://openalex.org/W2479405203","https://openalex.org/W2511044583","https://openalex.org/W2511321172","https://openalex.org/W2593962681","https://openalex.org/W2603117807","https://openalex.org/W2608093196","https://openalex.org/W2610221470","https://openalex.org/W2622686099","https://openalex.org/W2698406033","https://openalex.org/W2742082076","https://openalex.org/W2744879410","https://openalex.org/W2765281396","https://openalex.org/W2789847713","https://openalex.org/W2800740927","https://openalex.org/W2807350197","https://openalex.org/W2808026833","https://openalex.org/W2885491818","https://openalex.org/W2887719616","https://openalex.org/W2889138022","https://openalex.org/W2892617864","https://openalex.org/W2893079038","https://openalex.org/W2897893551","https://openalex.org/W2928061718","https://openalex.org/W2928706969","https://openalex.org/W3084558590","https://openalex.org/W3101902053","https://openalex.org/W3123714006","https://openalex.org/W3124584635","https://openalex.org/W3148106702","https://openalex.org/W4205192141","https://openalex.org/W4233718138","https://openalex.org/W4237638794","https://openalex.org/W4238226847","https://openalex.org/W4247988028","https://openalex.org/W4248361652","https://openalex.org/W4254947497","https://openalex.org/W4291213652"],"related_works":["https://openalex.org/W2393340519","https://openalex.org/W4298219515","https://openalex.org/W3118510577","https://openalex.org/W2021298062","https://openalex.org/W2185499427","https://openalex.org/W1883246888","https://openalex.org/W2371301679","https://openalex.org/W2527966616","https://openalex.org/W4200316191","https://openalex.org/W2188018701"],"abstract_inverted_index":{"Abstract":[0],"Assessing":[1],"the":[2,32,40,59,94,100,117,146,153],"risks":[3],"of":[4,11,31,54,61,72,96,120,148,155],"software":[5,12,97,156],"vulnerabilities":[6,98],"is":[7,159],"a":[8],"key":[9],"process":[10],"development":[13],"and":[14,36,43,70,87,124,137,150],"security":[15,88,157],"management.":[16],"This":[17],"assessment":[18,123],"requires":[19],"to":[20,78,92,132],"consider":[21],"multiple":[22],"factors":[23],"(technical":[24],"features,":[25],"operational":[26],"environment,":[27],"involved":[28],"assets,":[29],"status":[30],"vulnerability":[33,63,121],"lifecycle,":[34],"etc.)":[35],"may":[37],"depend":[38],"from":[39],"assessor\u2019s":[41],"knowledge":[42,149],"skills.":[44],"In":[45],"this":[46,55],"work,":[47],"we":[48],"tackle":[49],"with":[50,67,83,99,128],"an":[51,76],"important":[52],"part":[53],"problem":[56],"by":[57,65],"measuring":[58,145],"accuracy":[60,154],"technical":[62,85],"assessments":[64,158],"assessors":[66],"different":[68,84],"level":[69],"type":[71],"knowledge.":[73],"We":[74],"report":[75],"experiment":[77],"compare":[79],"how":[80],"accurately":[81],"students":[82],"education":[86],"professionals":[89],"are":[90],"able":[91],"assess":[93],"severity":[95],"Common":[101],"Vulnerability":[102],"Scoring":[103],"System":[104],"(v3)":[105],"industry":[106],"methodology.":[107],"Our":[108],"results":[109],"could":[110],"be":[111],"useful":[112],"for":[113],"increasing":[114],"awareness":[115],"about":[116],"intrinsic":[118],"subtleties":[119],"risk":[122],"possibly":[125],"better":[126],"compliance":[127],"regulations.":[129],"With":[130],"respect":[131],"academic":[133],"education,":[134],"professional":[135],"training":[136],"human":[138],"resources":[139],"selections":[140],"our":[141],"work":[142],"suggests":[143],"that":[144],"effects":[147],"expertise":[151],"on":[152],"feasible":[160],"albeit":[161],"not":[162],"easy.":[163]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":17},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":3}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
