{"id":"https://openalex.org/W4388955004","doi":"https://doi.org/10.1145/3605770","title":"Proceedings of the 2023 Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses","display_name":"Proceedings of the 2023 Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses","publication_year":2023,"publication_date":"2023-11-23","ids":{"openalex":"https://openalex.org/W4388955004","doi":"https://doi.org/10.1145/3605770"},"language":"en","primary_location":{"id":"doi:10.1145/3605770","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3605770","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":null,"raw_type":"proceedings"},"type":"paratext","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":0,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":true,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9538999795913696,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9538999795913696,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/offensive","display_name":"Offensive","score":0.811481773853302},{"id":"https://openalex.org/keywords/supply-chain","display_name":"Supply chain","score":0.6501690745353699},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5138943195343018},{"id":"https://openalex.org/keywords/pleasure","display_name":"Pleasure","score":0.5085772275924683},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.503476083278656},{"id":"https://openalex.org/keywords/attendance","display_name":"Attendance","score":0.48119932413101196},{"id":"https://openalex.org/keywords/work","display_name":"Work (physics)","score":0.44483041763305664},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3850589096546173},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.2790895700454712},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.2676103711128235},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.22642242908477783},{"id":"https://openalex.org/keywords/operations-research","display_name":"Operations research","score":0.18725904822349548},{"id":"https://openalex.org/keywords/marketing","display_name":"Marketing","score":0.17989465594291687},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.09595772624015808}],"concepts":[{"id":"https://openalex.org/C176856949","wikidata":"https://www.wikidata.org/wiki/Q2001676","display_name":"Offensive","level":2,"score":0.811481773853302},{"id":"https://openalex.org/C108713360","wikidata":"https://www.wikidata.org/wiki/Q1824206","display_name":"Supply chain","level":2,"score":0.6501690745353699},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5138943195343018},{"id":"https://openalex.org/C2777113389","wikidata":"https://www.wikidata.org/wiki/Q208195","display_name":"Pleasure","level":2,"score":0.5085772275924683},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.503476083278656},{"id":"https://openalex.org/C2778173179","wikidata":"https://www.wikidata.org/wiki/Q25339289","display_name":"Attendance","level":2,"score":0.48119932413101196},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.44483041763305664},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3850589096546173},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.2790895700454712},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.2676103711128235},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.22642242908477783},{"id":"https://openalex.org/C42475967","wikidata":"https://www.wikidata.org/wiki/Q194292","display_name":"Operations research","level":1,"score":0.18725904822349548},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.17989465594291687},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.09595772624015808},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C169760540","wikidata":"https://www.wikidata.org/wiki/Q207011","display_name":"Neuroscience","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3605770","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3605770","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":null,"raw_type":"proceedings"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Life in Land","score":0.4399999976158142,"id":"https://metadata.un.org/sdg/15"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W1568520348","https://openalex.org/W3214407891","https://openalex.org/W3194113117","https://openalex.org/W3213194066","https://openalex.org/W4287020359","https://openalex.org/W268355439","https://openalex.org/W2967125893","https://openalex.org/W4385323698","https://openalex.org/W2385362579","https://openalex.org/W2380993274"],"abstract_inverted_index":{"It":[0],"is":[1,30],"our":[2],"great":[3],"pleasure":[4],"to":[5,8,106],"welcome":[6],"you":[7],"ACM":[9,17],"SCORED":[10,94],"'23,":[11],"the":[12,16,59,68,84,107],"second":[13],"edition":[14,29],"of":[15,53,61,70,81,86,109],"Workshop":[18],"on":[19,55,78],"Software":[20],"Supply":[21],"Chain":[22],"Offensive":[23],"Research":[24],"and":[25,40,73,83,98,103,111,114],"Ecosystem":[26],"Defenses.":[27],"This":[28,43],"held":[31],"in":[32,100,116],"Copenhagen,":[33],"Denmark":[34],"with":[35,91],"extensive":[36],"support":[37],"for":[38,64],"in-person":[39],"virtual":[41],"attendance.":[42],"year's":[44],"program":[45],"includes":[46],"exciting":[47],"work":[48],"along":[49],"many":[50],"different":[51],"dimensions":[52],"research":[54],"supply":[56,66,118],"chain":[57,119],"security:":[58],"development":[60],"security":[62],"policies":[63],"software":[65,79,117],"chains,":[67],"use":[69],"artificial":[71],"intelligence":[72],"large":[74],"language":[75],"models,":[76],"approaches":[77],"bills":[80],"materials,":[82],"proposals":[85],"risk":[87],"mitigation":[88],"techniques.":[89],"Consistent":[90],"its":[92],"focus,":[93],"brings":[95],"researchers,":[96],"legislators":[97],"practitioners":[99],"both":[101],"open-":[102],"closed-source":[104],"ecosystems":[105],"center":[108],"current":[110],"emerging":[112],"challenges":[113],"opportunities":[115],"security.":[120]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
