{"id":"https://openalex.org/W4283777234","doi":"https://doi.org/10.1186/s42400-022-00118-9","title":"The inconsistency of documentation: a study of online C standard library documents","display_name":"The inconsistency of documentation: a study of online C standard library documents","publication_year":2022,"publication_date":"2022-07-02","ids":{"openalex":"https://openalex.org/W4283777234","doi":"https://doi.org/10.1186/s42400-022-00118-9"},"language":"en","primary_location":{"id":"doi:10.1186/s42400-022-00118-9","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-022-00118-9","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-022-00118-9","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-022-00118-9","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5020665153","display_name":"Ruishi Li","orcid":"https://orcid.org/0000-0003-2513-1704"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Ruishi Li","raw_affiliation_strings":["SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060388088","display_name":"Yunfei Yang","orcid":"https://orcid.org/0000-0001-7231-4816"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yunfei Yang","raw_affiliation_strings":["SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100678602","display_name":"Jinghua Liu","orcid":"https://orcid.org/0000-0002-5502-8102"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jinghua Liu","raw_affiliation_strings":["SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054356228","display_name":"Peiwei Hu","orcid":"https://orcid.org/0000-0003-2803-7166"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Peiwei Hu","raw_affiliation_strings":["SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5017417068","display_name":"Guozhu Meng","orcid":"https://orcid.org/0000-0001-6388-2571"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guozhu Meng","raw_affiliation_strings":["SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5020665153"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I4210156404","https://openalex.org/I4210165038"],"apc_list":null,"apc_paid":null,"fwci":0.3183,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.60485188,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"5","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9901000261306763,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/sss*","display_name":"SSS*","score":0.8733655214309692},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8238279819488525},{"id":"https://openalex.org/keywords/documentation","display_name":"Documentation","score":0.6794257164001465},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.5462538599967957},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.526810884475708},{"id":"https://openalex.org/keywords/constraint","display_name":"Constraint (computer-aided design)","score":0.5031558871269226},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.2357425093650818},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.14972683787345886}],"concepts":[{"id":"https://openalex.org/C148699463","wikidata":"https://www.wikidata.org/wiki/Q3492668","display_name":"SSS*","level":2,"score":0.8733655214309692},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8238279819488525},{"id":"https://openalex.org/C56666940","wikidata":"https://www.wikidata.org/wiki/Q788790","display_name":"Documentation","level":2,"score":0.6794257164001465},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.5462538599967957},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.526810884475708},{"id":"https://openalex.org/C2776036281","wikidata":"https://www.wikidata.org/wiki/Q48769818","display_name":"Constraint (computer-aided design)","level":2,"score":0.5031558871269226},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.2357425093650818},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.14972683787345886},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s42400-022-00118-9","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-022-00118-9","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-022-00118-9","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:7b776e121eb54399a652221e59d7d49e","is_oa":true,"landing_page_url":"https://doaj.org/article/7b776e121eb54399a652221e59d7d49e","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cybersecurity, Vol 5, Iss 1, Pp 1-15 (2022)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s42400-022-00118-9","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-022-00118-9","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-022-00118-9","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.6499999761581421}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4283777234.pdf","grobid_xml":"https://content.openalex.org/works/W4283777234.grobid-xml"},"referenced_works_count":22,"referenced_works":["https://openalex.org/W1832693441","https://openalex.org/W2118655104","https://openalex.org/W2152874840","https://openalex.org/W2156515921","https://openalex.org/W2166069603","https://openalex.org/W2250539671","https://openalex.org/W2265846598","https://openalex.org/W2470673105","https://openalex.org/W2471601946","https://openalex.org/W2493916176","https://openalex.org/W2617604339","https://openalex.org/W2879105418","https://openalex.org/W2915560446","https://openalex.org/W2963691697","https://openalex.org/W2970641574","https://openalex.org/W3021792233","https://openalex.org/W3089659633","https://openalex.org/W3107488247","https://openalex.org/W3129900239","https://openalex.org/W3130880317","https://openalex.org/W3149821397","https://openalex.org/W3154219957"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W4254148397","https://openalex.org/W2130422680","https://openalex.org/W2262308488","https://openalex.org/W2291521583","https://openalex.org/W2181393623","https://openalex.org/W3183058467","https://openalex.org/W2068666169","https://openalex.org/W2391599106","https://openalex.org/W2361521353"],"abstract_inverted_index":{"Abstract":[0],"The":[1],"C":[2,12,156],"standard":[3,157],"libraries":[4,8],"are":[5,28,42],"basic":[6],"function":[7],"standardized":[9],"by":[10,22,118],"the":[11,77,100,146,164],"language.":[13],"Programmers":[14],"usually":[15],"refer":[16],"to":[17,139],"their":[18,120,161,168],"API":[19,39,59,80],"documentation":[20],"provided":[21],"third-party":[23,155],"websites.":[24],"Unfortunately,":[25],"these":[26],"documents":[27],"not":[29],"necessarily":[30],"complete":[31],"or":[32,142],"accurate,":[33],"especially":[34],"for":[35,92],"constraint":[36,121],"sentences":[37,112],"of":[38,72,102,148],"usage,":[40],"which":[41,56,135],"called":[43],"Security":[44],"Specifications":[45],"(SSs).":[46],"SS":[47,65,183],"issues":[48,66],"can":[49,136],"prevent":[50],"programmers":[51],"from":[52,116,129],"following":[53],"obligatory":[54],"constraints,":[55],"results":[57],"in":[58],"misuse":[60],"vulnerabilities.":[61],"Previous":[62],"work":[63],"studying":[64],"could":[67],"only":[68],"find":[69],"certain":[70],"types":[71],"inaccurate":[73,97,143],"SSs":[74,98,115,128],"through":[75,99],"checking":[76],"compliance":[78],"between":[79],"usage":[81],"and":[82,96,113,170,172,181],"existing":[83],"SSs.":[84,105,144],"Therefore,":[85],"we":[86,150],"propose":[87],"a":[88,133],"novel":[89],"approach":[90],"SSeeker":[91,108,124],"quickly":[93],"discovering":[94],"missing":[95,141],"inconsistency":[101],"semantically":[103,126],"similar":[104,127],"More":[106],"specifically,":[107],"first":[109],"completes":[110],"broken":[111],"discovers":[114],"them":[117],"judging":[119],"sentiment.":[122],"Then":[123],"puts":[125],"different":[130],"sources":[131],"into":[132],"group,":[134],"be":[137],"used":[138],"discover":[140],"With":[145],"help":[147],"SSeeker,":[149],"investigated":[151],"4":[152],"popular":[153],"online":[154],"library":[158],"documents,":[159],"studied":[160],"conformity":[162],"with":[163],"C99":[165],"standard,":[166],"analyzed":[167],"APIs":[169],"SSs,":[171],"discovered":[173],"92":[174],"prototype":[175],"issues,":[176,180],"15":[177],"web":[178],"page":[179],"96":[182],"issues.":[184]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
