{"id":"https://openalex.org/W4407923840","doi":"https://doi.org/10.3390/fi17030104","title":"Assessing Browser Security: A Detailed Study Based on CVE Metrics","display_name":"Assessing Browser Security: A Detailed Study Based on CVE Metrics","publication_year":2025,"publication_date":"2025-02-25","ids":{"openalex":"https://openalex.org/W4407923840","doi":"https://doi.org/10.3390/fi17030104"},"language":"en","primary_location":{"id":"doi:10.3390/fi17030104","is_oa":true,"landing_page_url":"https://doi.org/10.3390/fi17030104","pdf_url":"https://www.mdpi.com/1999-5903/17/3/104/pdf?version=1740471784","source":{"id":"https://openalex.org/S34838331","display_name":"Future Internet","issn_l":"1999-5903","issn":["1999-5903"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Future Internet","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/1999-5903/17/3/104/pdf?version=1740471784","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5021517257","display_name":"Oleksii Chalyi","orcid":"https://orcid.org/0009-0006-3536-9715"},"institutions":[{"id":"https://openalex.org/I173212132","display_name":"Vilnius University","ror":"https://ror.org/03nadee84","country_code":"LT","type":"education","lineage":["https://openalex.org/I173212132"]}],"countries":["LT"],"is_corresponding":true,"raw_author_name":"Oleksii Chalyi","raw_affiliation_strings":["Institute of Social Sciences and Applied Informatics, Vilnius University, Muitines St 8, LT-44280 Kaunas, Lithuania"],"raw_orcid":"https://orcid.org/0009-0006-3536-9715","affiliations":[{"raw_affiliation_string":"Institute of Social Sciences and Applied Informatics, Vilnius University, Muitines St 8, LT-44280 Kaunas, Lithuania","institution_ids":["https://openalex.org/I173212132"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066414594","display_name":"K\u0119stutis Driaunys","orcid":"https://orcid.org/0000-0002-8456-123X"},"institutions":[{"id":"https://openalex.org/I173212132","display_name":"Vilnius University","ror":"https://ror.org/03nadee84","country_code":"LT","type":"education","lineage":["https://openalex.org/I173212132"]}],"countries":["LT"],"is_corresponding":false,"raw_author_name":"K\u0119stutis Driaunys","raw_affiliation_strings":["Institute of Social Sciences and Applied Informatics, Vilnius University, Muitines St 8, LT-44280 Kaunas, Lithuania"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Institute of Social Sciences and Applied Informatics, Vilnius University, Muitines St 8, LT-44280 Kaunas, Lithuania","institution_ids":["https://openalex.org/I173212132"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5087945629","display_name":"Vytautas Rud\u017eionis","orcid":"https://orcid.org/0009-0007-5683-7546"},"institutions":[{"id":"https://openalex.org/I173212132","display_name":"Vilnius University","ror":"https://ror.org/03nadee84","country_code":"LT","type":"education","lineage":["https://openalex.org/I173212132"]}],"countries":["LT"],"is_corresponding":false,"raw_author_name":"Vytautas Rud\u017eionis","raw_affiliation_strings":["Institute of Social Sciences and Applied Informatics, Vilnius University, Muitines St 8, LT-44280 Kaunas, Lithuania"],"raw_orcid":"https://orcid.org/0009-0007-5683-7546","affiliations":[{"raw_affiliation_string":"Institute of Social Sciences and Applied Informatics, Vilnius University, Muitines St 8, LT-44280 Kaunas, Lithuania","institution_ids":["https://openalex.org/I173212132"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5021517257"],"corresponding_institution_ids":["https://openalex.org/I173212132"],"apc_list":{"value":1400,"currency":"CHF","value_usd":1515},"apc_paid":{"value":1400,"currency":"CHF","value_usd":1515},"fwci":7.6646,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.9640293,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":99},"biblio":{"volume":"17","issue":"3","first_page":"104","last_page":"104"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11675","display_name":"Open Source Software Innovations","score":0.9865000247955322,"subfield":{"id":"https://openalex.org/subfields/1706","display_name":"Computer Science Applications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.9051074981689453},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.3738698363304138},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3636237382888794}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.9051074981689453},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.3738698363304138},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3636237382888794}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.3390/fi17030104","is_oa":true,"landing_page_url":"https://doi.org/10.3390/fi17030104","pdf_url":"https://www.mdpi.com/1999-5903/17/3/104/pdf?version=1740471784","source":{"id":"https://openalex.org/S34838331","display_name":"Future Internet","issn_l":"1999-5903","issn":["1999-5903"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Future Internet","raw_type":"journal-article"},{"id":"pmh:oai:RePEc:gam:jftint:v:17:y:2025:i:3:p:104-:d:1598975","is_oa":false,"landing_page_url":"https://www.mdpi.com/1999-5903/17/3/104/","pdf_url":null,"source":{"id":"https://openalex.org/S4306401271","display_name":"RePEc: Research Papers in Economics","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I77793887","host_organization_name":"Federal Reserve Bank of St. Louis","host_organization_lineage":["https://openalex.org/I77793887"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},{"id":"pmh:oai:doaj.org/article:d1390b09a53643db8ea80c4ce1d6f7fb","is_oa":true,"landing_page_url":"https://doaj.org/article/d1390b09a53643db8ea80c4ce1d6f7fb","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Future Internet, Vol 17, Iss 3, p 104 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/fi17030104","is_oa":true,"landing_page_url":"https://doi.org/10.3390/fi17030104","pdf_url":"https://www.mdpi.com/1999-5903/17/3/104/pdf?version=1740471784","source":{"id":"https://openalex.org/S34838331","display_name":"Future Internet","issn_l":"1999-5903","issn":["1999-5903"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Future Internet","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4407923840.pdf"},"referenced_works_count":19,"referenced_works":["https://openalex.org/W1566985031","https://openalex.org/W2034096314","https://openalex.org/W2241929320","https://openalex.org/W2516920790","https://openalex.org/W2941537920","https://openalex.org/W4205690927","https://openalex.org/W4321783417","https://openalex.org/W4387396224","https://openalex.org/W4399501912","https://openalex.org/W4399571668","https://openalex.org/W4400587466","https://openalex.org/W4403570857","https://openalex.org/W4404360341","https://openalex.org/W4404579328","https://openalex.org/W4405393279","https://openalex.org/W4405841475","https://openalex.org/W4406503176","https://openalex.org/W4406603560","https://openalex.org/W6875549947"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"This":[0,103],"study":[1,104],"systematically":[2],"evaluates":[3],"the":[4,15,85,160],"vulnerabilities":[5],"of":[6,43,87],"modern":[7],"web":[8],"browsers":[9],"using":[10],"developed":[11],"indices":[12,25],"derived":[13],"from":[14],"CVE":[16],"database,":[17],"including":[18],"ICVE,":[19],"ICVSS,":[20],"IR":[21],"and":[22,32,57,131,140,158],"IT.":[23],"These":[24,75],"incorporate":[26],"metrics":[27],"such":[28],"as":[29,94],"vulnerability":[30],"severity":[31],"risks,":[33],"along":[34],"with":[35,148],"browser":[36,44,52,101,112,156],"popularity,":[37],"to":[38,73,99,128,154],"enable":[39],"a":[40,77,107,115],"balanced":[41],"comparison":[42],"security.":[45],"The":[46,82],"results":[47],"highlight":[48],"significant":[49],"differences":[50],"in":[51,91,166],"security:":[53],"while":[54],"Google":[55],"Chrome":[56],"Samsung":[58],"Internet":[59],"exhibited":[60],"lower":[61],"threat":[62],"indices,":[63],"Mozilla":[64],"Firefox":[65],"demonstrated":[66],"consistently":[67],"higher":[68],"scores,":[69],"indicating":[70],"greater":[71],"exposure":[72],"risks.":[74],"observations":[76],"slightly":[78],"contradict":[79],"widespread":[80],"opinion.":[81],"findings":[83],"emphasize":[84],"importance":[86],"timely":[88],"software":[89],"updates":[90],"mitigating":[92],"vulnerabilities,":[93],"many":[95],"incidents":[96],"were":[97],"linked":[98],"outdated":[100],"versions.":[102],"also":[105],"introduces":[106],"robust":[108],"methodology":[109],"for":[110,117,162],"assessing":[111],"threats,":[113],"providing":[114],"framework":[116],"future":[118,163],"research.":[119],"Potential":[120],"applications":[121],"include":[122],"developing":[123],"browser-based":[124],"penetration":[125],"testing":[126],"systems":[127],"simulate":[129],"phishing":[130],"data":[132],"extraction":[133],"scenarios,":[134],"offering":[135],"insights":[136],"into":[137],"user-specific":[138],"risks":[139],"broader":[141],"organizational":[142],"impacts.":[143],"By":[144],"combining":[145],"theoretical":[146],"analysis":[147],"practical":[149],"implications,":[150],"this":[151],"work":[152],"contributes":[153],"advancing":[155],"security":[157],"lays":[159],"foundation":[161],"applied":[164],"research":[165],"cybersecurity.":[167]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":1}],"updated_date":"2026-05-21T06:26:12.895304","created_date":"2025-10-10T00:00:00"}
