{“status”:“ok”,“message type”:“work”,“message version”:“1.0.0”,“message”:{“indexed”:{“date parts”:[[2024,11]],“date time”:“2024-01-11T23:03:36Z”,“timestamp”:1705014216142},“reference count”:23,“publisher”:“IEEE”,“license”:[{“start”:{“date parts”:[[2020,6,1],“date time”:“2020-06-01T00:00:00Z”,“timestamp”:1590969600000},“content version”:“vor”,“delay-in-days”:0,“URL”:“https:\/\/ieeexplore.iee.org\/Xplorehelp\/downloads\/license-information\/ieee.html”},{“start”:{“date-parts”:[[2020,6,1]],“date-time”:“2020-06-01T00:00:00Z”,“timestamp”:1590969600000},“content-version”:“stm-asf”,“delay-in-days“:0,”URL“https:\\/doi.org\/10.1 5223\/policy-029“},{“开始”:{“日期部分”:[[2020,6,1]],“date-time”:“2020-06-01T00:00:00Z”,“timestamp”:1590969600000},“content-version”:“stm-asf”,“delay-in-days”:0,“URL”:“https:\\/doi.org\/10.15223\/policy-037”}],“content-domain”:{“domain”:[],“crossmark-restriction”:false},”short-container-title“:[],”published-print“:{”date-parts“:[2020,6]},“doi”:“10.1109 \/cns48642.20200.9162225”,“类型”:“procesdings-article”,“created”:{“date-parts”:[[2020,8,7]],“date-time”:“2020-08-07T21:54:40Z”,“timestamp”:1596837280000},“source”:“Crossref”,“is-referenced-by-count”:8,“title”:[“Dynamic Risk-Aware Patch Scheduling”],“prefix”:“10.1109”,”author“:[{”given“Fengli”,“family”:“Zhang”,“sequence”:“first”,“affiliation”:[]},{“给定”:“清华”,“家庭”:“李”,“sequence”:“additional”,“affiliation”:[]}],“member”:“263”,“reference”:[{“key”:“ref10”,“doi-asserted-by”:“publisher”,“doi”:“10.1109\/CNS48642.20200.9162309”},{“密钥”:“ref11”,“dio-asserted-by”:”crossref“,”doi“10.1145\/3203422.3203432”,“article-title”:“电力设施中的安全漏洞和补丁管理:数据驱动分析”,“author”:“zhang”,“year”:“2018”,“journal-title”:“The 1st Radical and Experiential Security Workshop(RESEC)”},{“key”:“ref12”,“doi-asserted-by”:“publisher”,”doi“:”10.1145 \/1835804.1835821“},}“key:”ref13“,”first page“:”48“,”article-title“:”使用机器学习预测网络漏洞攻击“,”author“:”edkrantz“,”year“:”2015“,”journal-title“:”SCAI“},{“key”:“ref14”,“doi-asserted-by”:“publisher”,“doi”:“10.1145\/3041008.3041009”},{”key“:“ref15”,“首页”:“1041”,“article-title”:“社交媒体时代的漏洞披露:利用推特预测真实世界漏洞”,“author”:“sabottke”,“year”:“2015”,“journal-title“:”USENIX Security Symposium“},”{“key”:”ref16“,“doi-asserted-by”:“crossref”,“doi”:“10.1609\/aaai.v32i1.11428”,“article-title”:“Darkembed:利用神经语言模型进行预测”,“author”:“tavabi”,”year“:”2018“,”journal-title“:”第三十二届aaai人工智能会议“},{“key”:“ref17”,“year”:“0”},“key“:”ref18“,”year:“0”,“journal-title”“:”Impact score“}”,{“key”:“参考19”,“年份”:“0”,“期刊标题”:“Vulners数据库”},{“密钥”:“ref4”,“doi断言者”:“publisher”,“doi”:“10.1109\/ESEM.2009.5314230”},{“密钥”:“ref3”,“文章标题”:“美国国家标准与技术研究所”,“年份”:“0”,“期刊标题”:“国家漏洞数据库”},{“密钥”:“ref6”,“doi断言者”:“publisher”,“doi”:“10.1109\/ICTRC.2015.7156428”},{“key”:“ref5”,“doi-asserted-by”:“publisher”,“doi”:“10.109\/DSN.2014.68”},{“key”:“ref2”,“article-title”:“事件响应和安全团队论坛”,“年”:“0”,“日志标题”:“CVSS”},{“键”:“ref1”,“年“:“0“,“日志名称”:“美国国家标准与技术研究所”},{“键”:“参考21”,“年”:“0”,“日志标题”:“Tf-idf”},{“键”:“参考23”,“年“:“0“}],“事件”:{“名称”:“2020 IEEE通信与网络安全会议(CNS)”,“地点”:“法国阿维尼翁”,“开始”:{-“日期”:[[2020,6,29]]},“结束”:{“日期”],“original-title”:[],“link”:[{“URL”:“http://\/xplorestaging.ieee.org\/ielx7\/9153729\/9162157\/09162225.pdf?arnumber=9162225”,“content-type”:“unspecified”,“content-version”:“vor”,“intended-application”:“similarity-checking”}],“deposed”:{“date-parts”:[2022,11,6]],“date-time”:《2022-11-06T06:59:33Z》,“timestamp”“:1667717973000},”分数“:1,”资源“用法:{“primary”:{“URL”:“https:\/\/ieeexplore.iee.org\/document\/9162225\/”}},“subtitle”:[],“shorttitle”:[],“issued”:{《日期部分》:[[2020,6]]},”references-count“:23,”URL“:”http://\/dx.doi.org\/10.109\/cns48642.20200.9162225“,”关系“:{}”,“subject”:[】,“published”:}“date-parts”:[[2020,6]]}}}