{"id":"https://openalex.org/W3029879311","doi":"https://doi.org/10.1145/3379597.3387465","title":"The Impact of a Major Security Event on an Open Source Project","display_name":"The Impact of a Major Security Event on an Open Source Project","publication_year":2020,"publication_date":"2020-06-29","ids":{"openalex":"https://openalex.org/W3029879311","doi":"https://doi.org/10.1145/3379597.3387465","mag":"3029879311"},"language":"en","primary_location":{"id":"doi:10.1145/3379597.3387465","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3379597.3387465","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 17th International Conference on Mining Software Repositories","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2005.14242","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5073576608","display_name":"James Walden","orcid":null},"institutions":[{"id":"https://openalex.org/I168416876","display_name":"Northern Kentucky University","ror":"https://ror.org/01k44g025","country_code":"US","type":"education","lineage":["https://openalex.org/I168416876"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"James Walden","raw_affiliation_strings":["Northern Kentucky University, Highland Heights, KY"],"affiliations":[{"raw_affiliation_string":"Northern Kentucky University, Highland Heights, KY","institution_ids":["https://openalex.org/I168416876"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5073576608"],"corresponding_institution_ids":["https://openalex.org/I168416876"],"apc_list":null,"apc_paid":null,"fwci":4.9947,"has_fulltext":false,"cited_by_count":31,"citation_normalized_percentile":{"value":0.9568438,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"409","last_page":"419"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10430","display_name":"Software Engineering Techniques and Practices","score":0.9937999844551086,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6212792992591858},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5917536616325378},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5709166526794434},{"id":"https://openalex.org/keywords/source-code","display_name":"Source code","score":0.49883556365966797},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.4960952699184418},{"id":"https://openalex.org/keywords/code-review","display_name":"Code review","score":0.490582138299942},{"id":"https://openalex.org/keywords/software-quality","display_name":"Software quality","score":0.4671221375465393},{"id":"https://openalex.org/keywords/vulnerability-assessment","display_name":"Vulnerability assessment","score":0.46145379543304443},{"id":"https://openalex.org/keywords/open-source","display_name":"Open source","score":0.4407743811607361},{"id":"https://openalex.org/keywords/best-practice","display_name":"Best practice","score":0.415352463722229},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.39966335892677307},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.3359205722808838},{"id":"https://openalex.org/keywords/software-development","display_name":"Software development","score":0.26792171597480774},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1553475558757782}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6212792992591858},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5917536616325378},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5709166526794434},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.49883556365966797},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.4960952699184418},{"id":"https://openalex.org/C150292731","wikidata":"https://www.wikidata.org/wiki/Q1342704","display_name":"Code review","level":5,"score":0.490582138299942},{"id":"https://openalex.org/C117447612","wikidata":"https://www.wikidata.org/wiki/Q1412670","display_name":"Software quality","level":4,"score":0.4671221375465393},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.46145379543304443},{"id":"https://openalex.org/C3018397939","wikidata":"https://www.wikidata.org/wiki/Q3644502","display_name":"Open source","level":3,"score":0.4407743811607361},{"id":"https://openalex.org/C184356942","wikidata":"https://www.wikidata.org/wiki/Q830382","display_name":"Best practice","level":2,"score":0.415352463722229},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.39966335892677307},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.3359205722808838},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.26792171597480774},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1553475558757782},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C187736073","wikidata":"https://www.wikidata.org/wiki/Q2920921","display_name":"Management","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C137176749","wikidata":"https://www.wikidata.org/wiki/Q4105337","display_name":"Psychological resilience","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3379597.3387465","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3379597.3387465","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 17th International Conference on Mining Software Repositories","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:2005.14242","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2005.14242","pdf_url":"https://arxiv.org/pdf/2005.14242","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:2005.14242","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2005.14242","pdf_url":"https://arxiv.org/pdf/2005.14242","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[{"score":0.5099999904632568,"id":"https://metadata.un.org/sdg/17","display_name":"Partnerships for the goals"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W100770364","https://openalex.org/W1487206177","https://openalex.org/W1505648523","https://openalex.org/W1506513518","https://openalex.org/W1517055698","https://openalex.org/W1541057432","https://openalex.org/W1601087168","https://openalex.org/W1964962870","https://openalex.org/W1994718921","https://openalex.org/W2043837581","https://openalex.org/W2076990583","https://openalex.org/W2100476984","https://openalex.org/W2105376034","https://openalex.org/W2112736324","https://openalex.org/W2148423957","https://openalex.org/W2151187574","https://openalex.org/W2154403892","https://openalex.org/W2160958420","https://openalex.org/W2186153243","https://openalex.org/W2393682161","https://openalex.org/W2469403219","https://openalex.org/W2533800809","https://openalex.org/W2564850588","https://openalex.org/W2590040183","https://openalex.org/W2591587973","https://openalex.org/W2768067395","https://openalex.org/W2795081714","https://openalex.org/W2899407111","https://openalex.org/W2910245817","https://openalex.org/W2983418616","https://openalex.org/W3141989311","https://openalex.org/W3145100113","https://openalex.org/W4254118911","https://openalex.org/W4394230015","https://openalex.org/W6636032795"],"related_works":["https://openalex.org/W2113128227","https://openalex.org/W2904997879","https://openalex.org/W2344367508","https://openalex.org/W632256878","https://openalex.org/W2491403535","https://openalex.org/W2019257047","https://openalex.org/W1997548934","https://openalex.org/W2097696338","https://openalex.org/W2479811461","https://openalex.org/W4380568682"],"abstract_inverted_index":{"Context:":[0],"The":[1,11],"Heartbleed":[2],"vulnerability":[3,31],"brought":[4],"OpenSSL":[5],"to":[6,33],"international":[7],"attention":[8],"in":[9,20,36],"2014.":[10],"almost":[12],"moribund":[13],"project":[14],"was":[15],"a":[16,26],"key":[17],"security":[18],"component":[19],"public":[21],"web":[22],"servers":[23],"and":[24],"over":[25],"billion":[27],"mobile":[28],"devices.":[29],"This":[30],"led":[32],"new":[34],"investments":[35],"OpenSSL.":[37]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":9},{"year":2023,"cited_by_count":8},{"year":2022,"cited_by_count":6},{"year":2021,"cited_by_count":4}],"updated_date":"2026-03-03T08:47:05.690250","created_date":"2020-06-05T00:00:00"}
