{"id":"https://openalex.org/W7131317583","doi":"https://doi.org/10.3103/s014641162570083x","title":"Method for Detecting Latent Vulnerabilities at the Final Stage of Software Development","display_name":"Method for Detecting Latent Vulnerabilities at the Final Stage of Software Development","publication_year":2025,"publication_date":"2025-12-01","ids":{"openalex":"https://openalex.org/W7131317583","doi":"https://doi.org/10.3103/s014641162570083x"},"language":"en","primary_location":{"id":"doi:10.3103/s014641162570083x","is_oa":false,"landing_page_url":"https://doi.org/10.3103/s014641162570083x","pdf_url":null,"source":{"id":"https://openalex.org/S17203304","display_name":"Automatic Control and Computer Sciences","issn_l":"0146-4116","issn":["0146-4116","1558-108X"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320267","host_organization_name":"Pleiades Publishing","host_organization_lineage":["https://openalex.org/P4310320267","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Pleiades Publishing","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Automatic Control and Computer Sciences","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5126696011","display_name":"A. S. Cherevan\u2019","orcid":null},"institutions":[{"id":"https://openalex.org/I4210104872","display_name":"Rostov State University of Economics","ror":"https://ror.org/01d1z8s73","country_code":"RU","type":"education","lineage":["https://openalex.org/I4210104872"]}],"countries":["RU"],"is_corresponding":true,"raw_author_name":"A. S. Cherevan\u2019","raw_affiliation_strings":["Rostov State University of Economics, 344002, Rostov-on-Don, Russia"],"affiliations":[{"raw_affiliation_string":"Rostov State University of Economics, 344002, Rostov-on-Don, Russia","institution_ids":["https://openalex.org/I4210104872"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5126701260","display_name":"A. P. Lapsar\u2019","orcid":null},"institutions":[{"id":"https://openalex.org/I4210104872","display_name":"Rostov State University of Economics","ror":"https://ror.org/01d1z8s73","country_code":"RU","type":"education","lineage":["https://openalex.org/I4210104872"]}],"countries":["RU"],"is_corresponding":false,"raw_author_name":"A. P. Lapsar\u2019","raw_affiliation_strings":["Rostov State University of Economics, 344002, Rostov-on-Don, Russia"],"affiliations":[{"raw_affiliation_string":"Rostov State University of Economics, 344002, Rostov-on-Don, Russia","institution_ids":["https://openalex.org/I4210104872"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5126696011"],"corresponding_institution_ids":["https://openalex.org/I4210104872"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.88709091,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"59","issue":"8","first_page":"1300","last_page":"1306"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T13935","display_name":"Mathematical Control Systems and Analysis","score":0.10000000149011612,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T13935","display_name":"Mathematical Control Systems and Analysis","score":0.10000000149011612,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13983","display_name":"Cybersecurity and Information Systems","score":0.09390000253915787,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14470","display_name":"Advanced Data Processing Techniques","score":0.0786999985575676,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.6560999751091003},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5486999750137329},{"id":"https://openalex.org/keywords/secure-coding","display_name":"Secure coding","score":0.4927000105381012},{"id":"https://openalex.org/keywords/software-development","display_name":"Software development","score":0.4156999886035919},{"id":"https://openalex.org/keywords/stage","display_name":"Stage (stratigraphy)","score":0.41510000824928284},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.38679999113082886}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8799999952316284},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.6560999751091003},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5486999750137329},{"id":"https://openalex.org/C22680326","wikidata":"https://www.wikidata.org/wiki/Q7444867","display_name":"Secure coding","level":5,"score":0.4927000105381012},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4603999853134155},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.4156999886035919},{"id":"https://openalex.org/C146357865","wikidata":"https://www.wikidata.org/wiki/Q1123245","display_name":"Stage (stratigraphy)","level":2,"score":0.41510000824928284},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3928000032901764},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.38679999113082886},{"id":"https://openalex.org/C131275738","wikidata":"https://www.wikidata.org/wiki/Q7445023","display_name":"Security bug","level":5,"score":0.36480000615119934},{"id":"https://openalex.org/C2776542497","wikidata":"https://www.wikidata.org/wiki/Q5266672","display_name":"Development (topology)","level":2,"score":0.3440999984741211},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.3086000084877014},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.295199990272522},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.2533999979496002}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3103/s014641162570083x","is_oa":false,"landing_page_url":"https://doi.org/10.3103/s014641162570083x","pdf_url":null,"source":{"id":"https://openalex.org/S17203304","display_name":"Automatic Control and Computer Sciences","issn_l":"0146-4116","issn":["0146-4116","1558-108X"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320267","host_organization_name":"Pleiades Publishing","host_organization_lineage":["https://openalex.org/P4310320267","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Pleiades Publishing","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Automatic Control and Computer Sciences","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":5,"referenced_works":["https://openalex.org/W2888684172","https://openalex.org/W3209781166","https://openalex.org/W4285207239","https://openalex.org/W4388026955","https://openalex.org/W4399501156"],"related_works":[],"abstract_inverted_index":{"A":[0],"method":[1,38,85],"for":[2,29],"detecting":[3],"and":[4,26,32,53,70,74,100],"eliminating":[5],"latent":[6,116],"vulnerabilities":[7,23,117],"in":[8,51,94],"mobile":[9,92],"applications":[10,93],"at":[11,48],"the":[12,42,45,56,61,81,84,89,95,107,110,127],"final":[13,102,128],"stage":[14],"of":[15,21,44,66,72,80,83,91,98,106,112,115,123,126],"development":[16,99],"is":[17,24,39,86],"presented.":[18],"The":[19,36,77,104],"nature":[20],"such":[22],"analyzed":[25],"existing":[27],"methods":[28],"their":[30,75],"identification":[31,71],"neutralization":[33],"are":[34],"considered.":[35],"developed":[37],"based":[40],"on":[41],"analysis":[43,65],"application\u2019s":[46],"state":[47],"different":[49],"points":[50],"time":[52],"comparison":[54],"with":[55],"reference":[57],"state.":[58],"Includes":[59],"recording":[60],"initial":[62],"state,":[63],"discrete":[64],"its":[67],"changes,":[68],"detection":[69,114],"vulnerabilities,":[73],"elimination.":[76],"main":[78],"area":[79],"application":[82],"to":[87,118],"ensure":[88,119],"security":[90,125],"late":[96],"stages":[97],"during":[101],"testing.":[103],"findings":[105],"study":[108],"highlight":[109],"importance":[111],"early":[113],"a":[120],"high":[121],"level":[122],"information":[124],"software":[129],"product.":[130]},"counts_by_year":[],"updated_date":"2026-02-25T21:11:00.739837","created_date":"2026-02-25T00:00:00"}
