{"id":"https://openalex.org/W2048873803","doi":"https://doi.org/10.4304/jsw.8.11.2761-2769","title":"An Efficient Method for Scheduling Massive Vulnerability Scanning Plug-ins","display_name":"An Efficient Method for Scheduling Massive Vulnerability Scanning Plug-ins","publication_year":2013,"publication_date":"2013-11-01","ids":{"openalex":"https://openalex.org/W2048873803","doi":"https://doi.org/10.4304/jsw.8.11.2761-2769","mag":"2048873803"},"language":"en","primary_location":{"id":"doi:10.4304/jsw.8.11.2761-2769","is_oa":false,"landing_page_url":"https://doi.org/10.4304/jsw.8.11.2761-2769","pdf_url":null,"source":{"id":"https://openalex.org/S114141714","display_name":"Journal of Software","issn_l":"1796-217X","issn":["1796-217X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318660","host_organization_name":"Academy Publisher","host_organization_lineage":["https://openalex.org/P4310318660"],"host_organization_lineage_names":["Academy Publisher"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Software","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100449211","display_name":"Yulong Wang","orcid":"https://orcid.org/0000-0003-0759-2208"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Yulong Wang","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5100341092","display_name":"Nan Li","orcid":"https://orcid.org/0000-0002-9351-2800"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Nan Li","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5100449211"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.13914538,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"8","issue":"11","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9947999715805054,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9947999715805054,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10101","display_name":"Cloud Computing and Resource Management","score":0.991100013256073,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.982200026512146,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.9174476265907288},{"id":"https://openalex.org/keywords/plug-in","display_name":"Plug-in","score":0.4699523448944092},{"id":"https://openalex.org/keywords/scheduling","display_name":"Scheduling (production processes)","score":0.4652557969093323},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.26624584197998047},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.1478397250175476}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.9174476265907288},{"id":"https://openalex.org/C4924752","wikidata":"https://www.wikidata.org/wiki/Q184148","display_name":"Plug-in","level":2,"score":0.4699523448944092},{"id":"https://openalex.org/C206729178","wikidata":"https://www.wikidata.org/wiki/Q2271896","display_name":"Scheduling (production processes)","level":2,"score":0.4652557969093323},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.26624584197998047},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.1478397250175476},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.4304/jsw.8.11.2761-2769","is_oa":false,"landing_page_url":"https://doi.org/10.4304/jsw.8.11.2761-2769","pdf_url":null,"source":{"id":"https://openalex.org/S114141714","display_name":"Journal of Software","issn_l":"1796-217X","issn":["1796-217X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318660","host_organization_name":"Academy Publisher","host_organization_lineage":["https://openalex.org/P4310318660"],"host_organization_lineage_names":["Academy Publisher"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Software","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W4287378204","https://openalex.org/W2545422590","https://openalex.org/W4240705470","https://openalex.org/W2945311252","https://openalex.org/W2981957539","https://openalex.org/W1494668222","https://openalex.org/W631546281","https://openalex.org/W4213354039"],"abstract_inverted_index":{"More":[0],"and":[1,50,87,144,167,178,186],"more":[2],"security":[3,13],"vulnerabilities":[4,38],"were":[5],"found":[6],"in":[7,40,67,136],"network":[8,12],"softwares":[9],"nowadays,":[10],"making":[11],"assessment":[14],"one":[15],"of":[16,37,44,65,79,164,175,221],"the":[17,27,77,84,93,150,159,172,184,197,204,219],"most":[18],"important":[19],"tasks":[20],"for":[21,30,75,109,161,193],"IT":[22],"administrators.":[23],"Vulnerability":[24],"scanner":[25],"is":[26,71,139,156],"key":[28,73],"application":[29],"fulfilling":[31],"such":[32,62],"tasks.":[33],"However,":[34],"large":[35,63],"numbers":[36],"result":[39],"even":[41],"larger":[42],"number":[43,64],"vulnerability":[45,80],"plug-ins":[46,49,66,146,160,177,185,208],"including":[47],"common":[48],"specific":[51],"plug-ins,":[52],"which":[53,102,137],"may":[54],"involve":[55],"complex":[56],"dependencies.":[57],"Therefore,":[58],"how":[59],"to":[60,189,211,217],"schedule":[61],"an":[68,114],"efficient":[69,115],"manner":[70],"a":[72,105,128,162,190],"problem":[74,132,200],"improving":[76],"performance":[78],"scanners.":[81],"We":[82,123,213],"analyze":[83],"current":[85],"algorithms":[86],"find":[88],"that":[89,206],"they":[90],"doesn't":[91,98],"take":[92],"dependencies":[94],"into":[95],"consideration":[96],"or":[97],"handle":[99],"it":[100],"properly,":[101,201],"would":[103],"waste":[104],"considerable":[106],"CPU":[107],"time":[108,166],"scanning.":[110],"This":[111],"paper":[112],"proposes":[113],"plug-in":[116,125,198],"scheduling":[117,126],"algorithm":[118],"based":[119],"on":[120,149],"DAG":[121,134,173],"graph.":[122],"formalize":[124],"as":[127,141],"tree-like":[129],"topological":[130],"sorting":[131,183],"using":[133],"theory,":[135],"multi-thread":[138],"treated":[140],"task":[142,151,154],"lines":[143],"all":[145,176],"are":[147],"deployed":[148],"lines.":[152],"Each":[153],"line":[155],"occupied":[157],"by":[158],"period":[163],"executing":[165],"waiting":[168],"time.":[169],"By":[170],"constructing":[171],"graph":[174],"computing":[179],"their":[180],"``height''":[181],"value,":[182],"aligning":[187],"them":[188],"linked":[191],"list":[192],"scheduling,":[194],"we":[195],"solve":[196],"dependency":[199],"therefore":[202],"eliminate":[203],"possibilities":[205],"non-ready":[207],"being":[209],"scheduled":[210],"execute.":[212],"carry":[214],"out":[215],"experiments":[216],"validate":[218],"effectiveness":[220],"our":[222],"algorithm.":[223]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
