{"id":"https://openalex.org/W2805825883","doi":"https://doi.org/10.1145/3196494.3201580","title":"POSTER","display_name":"POSTER","publication_year":2018,"publication_date":"2018-05-29","ids":{"openalex":"https://openalex.org/W2805825883","doi":"https://doi.org/10.1145/3196494.3201580","mag":"2805825883"},"language":"en","primary_location":{"id":"doi:10.1145/3196494.3201580","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3196494.3201580","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3196494.3201580","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2018 on Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3196494.3201580","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5064140739","display_name":"Afsah Anwar","orcid":"https://orcid.org/0000-0003-1449-3590"},"institutions":[{"id":"https://openalex.org/I106165777","display_name":"University of Central Florida","ror":"https://ror.org/036nfer12","country_code":"US","type":"education","lineage":["https://openalex.org/I106165777"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Afsah Anwar","raw_affiliation_strings":["University of Central Florida, Orlando, FL, USA"],"affiliations":[{"raw_affiliation_string":"University of Central Florida, Orlando, FL, USA","institution_ids":["https://openalex.org/I106165777"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029436684","display_name":"Aminollah Khormali","orcid":"https://orcid.org/0000-0002-4171-8479"},"institutions":[{"id":"https://openalex.org/I106165777","display_name":"University of Central Florida","ror":"https://ror.org/036nfer12","country_code":"US","type":"education","lineage":["https://openalex.org/I106165777"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Aminollah Khormali","raw_affiliation_strings":["University of Central Florida, Orlando, FL, USA"],"affiliations":[{"raw_affiliation_string":"University of Central Florida, Orlando, FL, USA","institution_ids":["https://openalex.org/I106165777"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5077402873","display_name":"Aziz Mohaisen","orcid":"https://orcid.org/0000-0003-3227-2505"},"institutions":[{"id":"https://openalex.org/I106165777","display_name":"University of Central Florida","ror":"https://ror.org/036nfer12","country_code":"US","type":"education","lineage":["https://openalex.org/I106165777"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Aziz Mohaisen","raw_affiliation_strings":["University of Central Florida, Orlando, FL, USA"],"affiliations":[{"raw_affiliation_string":"University of Central Florida, Orlando, FL, USA","institution_ids":["https://openalex.org/I106165777"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5064140739"],"corresponding_institution_ids":["https://openalex.org/I106165777"],"apc_list":null,"apc_paid":null,"fwci":0.8223,"has_fulltext":true,"cited_by_count":2,"citation_normalized_percentile":{"value":0.8073689,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"793","last_page":"795"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.9927999973297119,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9907000064849854,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7134189605712891},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5849029421806335},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5369439125061035},{"id":"https://openalex.org/keywords/stock","display_name":"Stock (firearms)","score":0.5324697494506836},{"id":"https://openalex.org/keywords/reliability","display_name":"Reliability (semiconductor)","score":0.5013248920440674},{"id":"https://openalex.org/keywords/software-quality","display_name":"Software quality","score":0.47505852580070496},{"id":"https://openalex.org/keywords/data-modeling","display_name":"Data modeling","score":0.43742871284484863},{"id":"https://openalex.org/keywords/stock-price","display_name":"Stock price","score":0.42134860157966614},{"id":"https://openalex.org/keywords/fidelity","display_name":"Fidelity","score":0.4204803705215454},{"id":"https://openalex.org/keywords/econometrics","display_name":"Econometrics","score":0.35067087411880493},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.34850654006004333},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2832862138748169},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.14318051934242249},{"id":"https://openalex.org/keywords/software-development","display_name":"Software development","score":0.14131948351860046},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.1109514832496643},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.09201863408088684},{"id":"https://openalex.org/keywords/economics","display_name":"Economics","score":0.08598199486732483}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7134189605712891},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5849029421806335},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5369439125061035},{"id":"https://openalex.org/C204036174","wikidata":"https://www.wikidata.org/wiki/Q909380","display_name":"Stock (firearms)","level":2,"score":0.5324697494506836},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.5013248920440674},{"id":"https://openalex.org/C117447612","wikidata":"https://www.wikidata.org/wiki/Q1412670","display_name":"Software quality","level":4,"score":0.47505852580070496},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.43742871284484863},{"id":"https://openalex.org/C2988984586","wikidata":"https://www.wikidata.org/wiki/Q1020013","display_name":"Stock price","level":3,"score":0.42134860157966614},{"id":"https://openalex.org/C2776459999","wikidata":"https://www.wikidata.org/wiki/Q2119376","display_name":"Fidelity","level":2,"score":0.4204803705215454},{"id":"https://openalex.org/C149782125","wikidata":"https://www.wikidata.org/wiki/Q160039","display_name":"Econometrics","level":1,"score":0.35067087411880493},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.34850654006004333},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2832862138748169},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.14318051934242249},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.14131948351860046},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.1109514832496643},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.09201863408088684},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.08598199486732483},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C143724316","wikidata":"https://www.wikidata.org/wiki/Q312468","display_name":"Series (stratigraphy)","level":2,"score":0.0},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3196494.3201580","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3196494.3201580","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3196494.3201580","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2018 on Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"},{"id":"pmh:oai:stars.library.ucf.edu:scopus2015-11553","is_oa":true,"landing_page_url":"https://stars.library.ucf.edu/scopus2015/10554","pdf_url":null,"source":{"id":"https://openalex.org/S4210172555","display_name":"Journal of International Crisis and Risk Communication Research","issn_l":"2576-0017","issn":["2576-0017","2576-0025"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Scopus Export 2015-2019","raw_type":"text"}],"best_oa_location":{"id":"doi:10.1145/3196494.3201580","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3196494.3201580","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3196494.3201580","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2018 on Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"},"sustainable_development_goals":[{"score":0.4699999988079071,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[{"id":"https://openalex.org/G1455480652","display_name":null,"funder_award_id":"NRF-2016K1A1A2912757","funder_id":"https://openalex.org/F4320333169","funder_display_name":"National Science Foundation, United Arab Emirates"},{"id":"https://openalex.org/G3090149447","display_name":"EAGER: Collaborative: Towards Understanding the Attack Vector of Privacy Technologies","funder_award_id":"1809000","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G503663301","display_name":null,"funder_award_id":"CNS-1809000","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320333169","display_name":"National Science Foundation, United Arab Emirates","ror":null}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2805825883.pdf","grobid_xml":"https://content.openalex.org/works/W2805825883.grobid-xml"},"referenced_works_count":27,"referenced_works":["https://openalex.org/W1501321335","https://openalex.org/W1573745704","https://openalex.org/W1863670505","https://openalex.org/W1902264846","https://openalex.org/W1999623120","https://openalex.org/W2016287239","https://openalex.org/W2022913925","https://openalex.org/W2031892005","https://openalex.org/W2070959943","https://openalex.org/W2075488882","https://openalex.org/W2077937403","https://openalex.org/W2085249578","https://openalex.org/W2096274199","https://openalex.org/W2110485445","https://openalex.org/W2119068246","https://openalex.org/W2163509534","https://openalex.org/W2236623899","https://openalex.org/W2316695912","https://openalex.org/W2322673779","https://openalex.org/W2468802342","https://openalex.org/W2552211361","https://openalex.org/W2601296669","https://openalex.org/W2763924235","https://openalex.org/W2766411424","https://openalex.org/W2971109821","https://openalex.org/W4246587917","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W2381850946","https://openalex.org/W4380449851","https://openalex.org/W3125091513","https://openalex.org/W4318832338","https://openalex.org/W1919390113","https://openalex.org/W4248383205","https://openalex.org/W4234745530","https://openalex.org/W2146383839","https://openalex.org/W2231829109","https://openalex.org/W2916591301"],"abstract_inverted_index":{"In":[0],"this":[1],"work,":[2,74],"we":[3],"study":[4],"the":[5,13,55,62,68,93,104],"hidden":[6],"cost":[7],"of":[8,64,95],"software":[9,42],"vulnerabilities":[10,96],"reported":[11],"in":[12],"National":[14],"Vulnerability":[15],"Database":[16],"(NVD)":[17],"through":[18],"stock":[19,51,69],"price":[20,52],"analysis.":[21],"We":[22,45],"perform":[23],"a":[24,38,48],"high-fidelity":[25],"data":[26,30],"augmentation":[27],"to":[28,60,72,85],"ensure":[29],"reliability":[31],"for":[32,40,50],"estimating":[33],"vulnerability":[34,65],"disclosure":[35,66],"dates":[36],"as":[37],"baseline":[39],"assessing":[41],"vulnerabilities'":[43],"implication.":[44],"further":[46],"build":[47],"model":[49,59],"prediction":[53],"using":[54],"NARX":[56],"Neural":[57],"Network":[58],"estimate":[61],"effect":[63,94],"on":[67,77,97,103],"price.":[70],"Compared":[71],"prior":[73],"which":[75],"relies":[76],"linear":[78],"regression":[79],"models,":[80],"our":[81],"approach":[82],"is":[83],"shown":[84],"provide":[86],"better":[87],"accuracy.":[88],"Our":[89],"analysis":[90],"shows":[91],"that":[92],"vendors":[98],"varies,":[99],"and":[100],"greatly":[101],"depends":[102],"specific":[105],"industry.":[106]},"counts_by_year":[{"year":2020,"cited_by_count":1},{"year":2018,"cited_by_count":1}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2018-06-13T00:00:00"}
