{"id":"https://openalex.org/W4388826738","doi":"https://doi.org/10.1007/s10664-023-10346-3","title":"AIBugHunter: A Practical tool for predicting, classifying and repairing software vulnerabilities","display_name":"AIBugHunter: A Practical tool for predicting, classifying and repairing software vulnerabilities","publication_year":2023,"publication_date":"2023-11-20","ids":{"openalex":"https://openalex.org/W4388826738","doi":"https://doi.org/10.1007/s10664-023-10346-3"},"language":"en","primary_location":{"id":"doi:10.1007/s10664-023-10346-3","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10664-023-10346-3","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10664-023-10346-3.pdf","source":{"id":"https://openalex.org/S109852484","display_name":"Empirical Software Engineering","issn_l":"1382-3256","issn":["1382-3256","1573-7616"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Empirical Software Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/s10664-023-10346-3.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102710465","display_name":"Michael C. Fu","orcid":"https://orcid.org/0000-0001-7211-3491"},"institutions":[{"id":"https://openalex.org/I56590836","display_name":"Monash University","ror":"https://ror.org/02bfwt286","country_code":"AU","type":"education","lineage":["https://openalex.org/I56590836"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Michael Fu","raw_affiliation_strings":["Monash University, Clayton, VIC, Australia"],"affiliations":[{"raw_affiliation_string":"Monash University, Clayton, VIC, Australia","institution_ids":["https://openalex.org/I56590836"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081449581","display_name":"Chakkrit Tantithamthavorn","orcid":"https://orcid.org/0000-0002-5516-9984"},"institutions":[{"id":"https://openalex.org/I56590836","display_name":"Monash University","ror":"https://ror.org/02bfwt286","country_code":"AU","type":"education","lineage":["https://openalex.org/I56590836"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Chakkrit Tantithamthavorn","raw_affiliation_strings":["Monash University, Clayton, VIC, Australia"],"affiliations":[{"raw_affiliation_string":"Monash University, Clayton, VIC, Australia","institution_ids":["https://openalex.org/I56590836"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102780660","display_name":"Trung Le","orcid":"https://orcid.org/0000-0003-0414-9067"},"institutions":[{"id":"https://openalex.org/I56590836","display_name":"Monash University","ror":"https://ror.org/02bfwt286","country_code":"AU","type":"education","lineage":["https://openalex.org/I56590836"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Trung Le","raw_affiliation_strings":["Monash University, Clayton, VIC, Australia"],"affiliations":[{"raw_affiliation_string":"Monash University, Clayton, VIC, Australia","institution_ids":["https://openalex.org/I56590836"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5112925464","display_name":"Yuki Kume","orcid":null},"institutions":[{"id":"https://openalex.org/I56590836","display_name":"Monash University","ror":"https://ror.org/02bfwt286","country_code":"AU","type":"education","lineage":["https://openalex.org/I56590836"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Yuki Kume","raw_affiliation_strings":["Monash University, Clayton, VIC, Australia"],"affiliations":[{"raw_affiliation_string":"Monash University, Clayton, VIC, Australia","institution_ids":["https://openalex.org/I56590836"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100769134","display_name":"Van Nguyen","orcid":"https://orcid.org/0000-0002-5838-3409"},"institutions":[{"id":"https://openalex.org/I56590836","display_name":"Monash University","ror":"https://ror.org/02bfwt286","country_code":"AU","type":"education","lineage":["https://openalex.org/I56590836"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Van Nguyen","raw_affiliation_strings":["Monash University, Clayton, VIC, Australia"],"affiliations":[{"raw_affiliation_string":"Monash University, Clayton, VIC, Australia","institution_ids":["https://openalex.org/I56590836"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036447132","display_name":"Dinh Phung","orcid":"https://orcid.org/0000-0002-9977-8247"},"institutions":[{"id":"https://openalex.org/I56590836","display_name":"Monash University","ror":"https://ror.org/02bfwt286","country_code":"AU","type":"education","lineage":["https://openalex.org/I56590836"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Dinh Phung","raw_affiliation_strings":["Monash University, Clayton, VIC, Australia"],"affiliations":[{"raw_affiliation_string":"Monash University, Clayton, VIC, Australia","institution_ids":["https://openalex.org/I56590836"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5082913979","display_name":"John Grundy","orcid":null},"institutions":[{"id":"https://openalex.org/I56590836","display_name":"Monash University","ror":"https://ror.org/02bfwt286","country_code":"AU","type":"education","lineage":["https://openalex.org/I56590836"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"John Grundy","raw_affiliation_strings":["Monash University, Clayton, VIC, Australia"],"affiliations":[{"raw_affiliation_string":"Monash University, Clayton, VIC, Australia","institution_ids":["https://openalex.org/I56590836"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5102710465"],"corresponding_institution_ids":["https://openalex.org/I56590836"],"apc_list":{"value":2290,"currency":"EUR","value_usd":2890},"apc_paid":{"value":2290,"currency":"EUR","value_usd":2890},"fwci":24.6588,"has_fulltext":true,"cited_by_count":54,"citation_normalized_percentile":{"value":0.99575605,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":"29","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.991599977016449,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.7247941493988037},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6926127672195435},{"id":"https://openalex.org/keywords/secure-coding","display_name":"Secure coding","score":0.5769074559211731},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5499274134635925},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5250601172447205},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5027315616607666},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.4914931058883667},{"id":"https://openalex.org/keywords/vulnerability-assessment","display_name":"Vulnerability assessment","score":0.4815680980682373},{"id":"https://openalex.org/keywords/code-smell","display_name":"Code smell","score":0.4380202293395996},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.43143048882484436},{"id":"https://openalex.org/keywords/empirical-research","display_name":"Empirical research","score":0.4255630373954773},{"id":"https://openalex.org/keywords/software-development","display_name":"Software development","score":0.4085933566093445},{"id":"https://openalex.org/keywords/software-quality","display_name":"Software quality","score":0.3528260886669159},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.24185049533843994},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.14847353100776672},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.09811973571777344}],"concepts":[{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.7247941493988037},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6926127672195435},{"id":"https://openalex.org/C22680326","wikidata":"https://www.wikidata.org/wiki/Q7444867","display_name":"Secure coding","level":5,"score":0.5769074559211731},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5499274134635925},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5250601172447205},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5027315616607666},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.4914931058883667},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.4815680980682373},{"id":"https://openalex.org/C133237599","wikidata":"https://www.wikidata.org/wiki/Q2295111","display_name":"Code smell","level":5,"score":0.4380202293395996},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.43143048882484436},{"id":"https://openalex.org/C120936955","wikidata":"https://www.wikidata.org/wiki/Q2155640","display_name":"Empirical research","level":2,"score":0.4255630373954773},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.4085933566093445},{"id":"https://openalex.org/C117447612","wikidata":"https://www.wikidata.org/wiki/Q1412670","display_name":"Software quality","level":4,"score":0.3528260886669159},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.24185049533843994},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.14847353100776672},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.09811973571777344},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C137176749","wikidata":"https://www.wikidata.org/wiki/Q4105337","display_name":"Psychological resilience","level":2,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1007/s10664-023-10346-3","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10664-023-10346-3","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10664-023-10346-3.pdf","source":{"id":"https://openalex.org/S109852484","display_name":"Empirical Software Engineering","issn_l":"1382-3256","issn":["1382-3256","1573-7616"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Empirical Software Engineering","raw_type":"journal-article"},{"id":"pmh:oai:monash.edu:openaire/abf844eb-f0d7-42b8-bafb-cee2a40b6a74","is_oa":true,"landing_page_url":"https://research.monash.edu/en/publications/abf844eb-f0d7-42b8-bafb-cee2a40b6a74","pdf_url":null,"source":{"id":"https://openalex.org/S4306402625","display_name":"Monash University Research Portal (Monash University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I56590836","host_organization_name":"Monash University","host_organization_lineage":["https://openalex.org/I56590836"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Fu, M, Tantithamthavorn, C, Le, T, Kume, Y, Nguyen, V, Phung, D & Grundy, J 2024, 'AIBugHunter : A Practical tool for predicting, classifying and repairing software vulnerabilities', Empirical Software Engineering, vol. 29, no. 1, 4. https://doi.org/10.1007/s10664-023-10346-3","raw_type":"article"},{"id":"pmh:oai:monash.edu:publications/abf844eb-f0d7-42b8-bafb-cee2a40b6a74","is_oa":true,"landing_page_url":"https://research.monash.edu/files/571653331/557334108_oa.pdf","pdf_url":null,"source":{"id":"https://openalex.org/S4306402625","display_name":"Monash University Research Portal (Monash University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I56590836","host_organization_name":"Monash University","host_organization_lineage":["https://openalex.org/I56590836"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Fu, M, Tantithamthavorn, C, Le, T, Kume, Y, Nguyen, V, Phung, D & Grundy, J 2024, 'AIBugHunter : A Practical tool for predicting, classifying and repairing software vulnerabilities', Empirical Software Engineering, vol. 29, no. 1, 4. https://doi.org/10.1007/s10664-023-10346-3","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1007/s10664-023-10346-3","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10664-023-10346-3","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10664-023-10346-3.pdf","source":{"id":"https://openalex.org/S109852484","display_name":"Empirical Software Engineering","issn_l":"1382-3256","issn":["1382-3256","1573-7616"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Empirical Software Engineering","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.5199999809265137,"display_name":"Decent work and economic growth","id":"https://metadata.un.org/sdg/8"}],"awards":[{"id":"https://openalex.org/G4416570303","display_name":null,"funder_award_id":"DE200100941","funder_id":"https://openalex.org/F4320334704","funder_display_name":"Australian Research Council"},{"id":"https://openalex.org/G4490389310","display_name":null,"funder_award_id":"FL190100035","funder_id":"https://openalex.org/F4320334704","funder_display_name":"Australian Research Council"}],"funders":[{"id":"https://openalex.org/F4320334704","display_name":"Australian Research Council","ror":"https://ror.org/05mmh0f86"}],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4388826738.pdf"},"referenced_works_count":41,"referenced_works":["https://openalex.org/W171406816","https://openalex.org/W1981276685","https://openalex.org/W2047468043","https://openalex.org/W2186354314","https://openalex.org/W2290181636","https://openalex.org/W2367798545","https://openalex.org/W2890264517","https://openalex.org/W2963520355","https://openalex.org/W2982413960","https://openalex.org/W3048065912","https://openalex.org/W3091588759","https://openalex.org/W3093734859","https://openalex.org/W3101118213","https://openalex.org/W3112944441","https://openalex.org/W3122149408","https://openalex.org/W3134215180","https://openalex.org/W3134708177","https://openalex.org/W3174067697","https://openalex.org/W3174750614","https://openalex.org/W3175995826","https://openalex.org/W3177116043","https://openalex.org/W3183469243","https://openalex.org/W3194346579","https://openalex.org/W3202871865","https://openalex.org/W3210162706","https://openalex.org/W4205601502","https://openalex.org/W4206241418","https://openalex.org/W4207068100","https://openalex.org/W4210320978","https://openalex.org/W4210964344","https://openalex.org/W4226169266","https://openalex.org/W4243650394","https://openalex.org/W4308641648","https://openalex.org/W4311165836","https://openalex.org/W4312290548","https://openalex.org/W4312436517","https://openalex.org/W4312969325","https://openalex.org/W4313185991","https://openalex.org/W4367059303","https://openalex.org/W4367059627","https://openalex.org/W4384434609"],"related_works":["https://openalex.org/W2141388993","https://openalex.org/W1978034799","https://openalex.org/W2999607548","https://openalex.org/W4308627662","https://openalex.org/W2956597637","https://openalex.org/W2044639210","https://openalex.org/W2293245356","https://openalex.org/W4225160120","https://openalex.org/W23486959","https://openalex.org/W101576598"],"abstract_inverted_index":{"Abstract":[0],"Many":[1],"Machine":[2,55],"Learning(ML)-based":[3],"approaches":[4,173],"have":[5,29,216],"been":[6,30],"proposed":[7,172],"to":[8,79,97,123,147,200],"automatically":[9],"detect,":[10],"localize,":[11],"and":[12,85,109,121,127,142,154,185,196,209],"repair":[13],"software":[14,57,77,202,245,267],"vulnerabilities.":[15],"While":[16],"ML-based":[17],"methods":[18,181],"are":[19,174],"more":[20,175],"effective":[21],"than":[22,177],"program":[23],"analysis-based":[24],"vulnerability":[25,58,82,103,107,112,125,139,152,183],"analysis":[26,59],"tools,":[27],"few":[28],"integrated":[31,66],"into":[32,67],"modern":[33],"Integrated":[34],"Development":[35],"Environments":[36],"(IDEs),":[37],"hindering":[38],"practical":[39],"adoption.":[40],"To":[41],"bridge":[42],"this":[43,49,130],"critical":[44],"gap,":[45],"we":[46,132,188],"propose":[47,133],"in":[48,220,262,274],"article":[50],"AIBugHunter":[51,75,91,149,207,214,229,242,257,269],",":[52],"a":[53,134,143,161,193,197],"novel":[54,135],"Learning-based":[56],"tool":[60,208],"for":[61,182],"C/C++":[62,167],"languages":[63],"that":[64,170,213,227,255],"is":[65,230,270],"the":[68,211,237,275],"Visual":[69,276],"Studio":[70,277],"Code":[71,278],"(VS":[72],"Code)":[73],"IDE.":[74],"helps":[76],"developers":[78],"achieve":[80,124],"real-time":[81],"detection,":[83],"explanation,":[84],"repairs":[86],"during":[87,243,266],"programming.":[88],"In":[89,129],"particular,":[90],"scans":[92],"through":[93],"developers\u2019":[94,218,260],"source":[95],"code":[96],"(1)":[98],"locate":[99],"vulnerabilities,":[100],"(2)":[101],"identify":[102,151],"types,":[104],"(3)":[105],"estimate":[106,155],"severity,":[108],"(4)":[110],"suggest":[111],"repairs.":[113,128],"We":[114],"integrate":[115],"our":[116,171,206,228,241,251,256],"previous":[117],"works":[118],"(i.e.,":[119],"LineVul":[120],"VulRepair)":[122],"localization":[126],"article,":[131],"multi-objective":[136],"optimization":[137],"(MOO)-based":[138],"classification":[140,184],"approach":[141,146],"transformer-based":[144],"estimation":[145],"help":[148],"accurately":[150],"types":[153],"severity.":[156],"Our":[157,223],"empirical":[158],"experiments":[159],"on":[160,217],"large":[162],"dataset":[163],"consisting":[164],"of":[165,205,236],"188K+":[166],"functions":[168],"confirm":[169],"accurate":[176],"other":[178],"state-of-the-art":[179],"baseline":[180],"estimation.":[186],"Furthermore,":[187],"conduct":[189],"qualitative":[190],"evaluations":[191],"including":[192],"survey":[194,224],"study":[195,199,225,253],"user":[198,252],"obtain":[201],"practitioners\u2019":[203],"perceptions":[204],"assess":[210],"impact":[212],"may":[215],"productivity":[219,261],"security":[221],"aspects.":[222],"shows":[226,254],"perceived":[231],"as":[232],"useful":[233],"where":[234],"90%":[235],"participants":[238],"consider":[239],"adopting":[240],"their":[244],"development.":[246,268],"Last":[247],"but":[248],"not":[249],"least,":[250],"can":[258],"enhance":[259],"combating":[263],"cybersecurity":[264],"issues":[265],"now":[271],"publicly":[272],"available":[273],"marketplace.":[279]},"counts_by_year":[{"year":2026,"cited_by_count":5},{"year":2025,"cited_by_count":30},{"year":2024,"cited_by_count":16},{"year":2023,"cited_by_count":3}],"updated_date":"2026-04-01T17:29:45.350535","created_date":"2025-10-10T00:00:00"}
