{“状态”:“确定”,“消息类型”:“工作”,“信息版本”:“1.0.0”,“邮件”:{“索引”:{“日期-部件”:[[2023,9,26]],“日期-时间”:“2023-09-26T05:23:02Z”,“时间戳”:16957057828},“引用-计数”:22,“发布者”:“IEEE”,“许可证”:[{“开始”:“日期-零件”:[2023,7,31]],Z“,”timestamp“:1690761600000},”content-version“:“stm-asf”,“delay-in-days”:0,“URL”:“https:\\/doi.org\/10.15223\/policy-029”},{“start”:{“date-parts”:[[2023,7,31]],“date-time”:“2023-07-31T00:00:00Z”,“timestamp”:1690761600000},“content-version”:“stm-asf”、“delay-in-days“:0,”URL“https://doi.org\/10.152 23\/plicy-0323”7“}],”内容域“:{”域“:[],”交叉标记限制“:false},“short-container-title”:[],“published-print”:{“date-parts”:[[2023,7,31]]},“DOI”:“10.1109\/csr57506.2023.10224931”,“type”:“proceedings-article”,“created”:{“date-ports”:[2023,8,28]],“date-time”:“2023-08-28T17:50:16Z”,“timestamp”:1693245016000},”source:“Crossref”,“is-referenced-by-count”:0,“title”:[“通过图书馆实施选择最小化软件引发的风险”],“prefix”:“10.1109”,“author”:[{“given”:“Panagiotis”,“family”:“Sotiropoulos”,“sequence”:“first”,“affiliation”:[}“name”:“伯罗奔尼撒大学,希腊的黎波里信息与电信系,22100”}]},{“given”,“sequence”:“additional”,“affiliation”:[{“name”:“伯罗奔尼撒大学信息与电信系,希腊的黎波里,22100”}]},{“given”:“Nicholas”,“family”:“Kolokotronis”,“sequence”:“additional”,“affiliation”:[{“name”:“伯罗奔尼撒大学信息与电信系,希腊的黎波里,22100”}]}],“member”:“263”,“reference”:[[{”key“:”ref13“,”doi-asserted-by“:”publisher“,”doi“10.1109 \/ISI.2016.7745438”},{“key”:”ref12“,“doi-assert-by”:“出版商”,“DOI”:“10.1109\/TrustCom\/BigDataSE.2019.00076”},{“key”:“ref15”,“DOI-asserted-by”:“publisher”,“DOI:”10.3390\/fi14100276“}”,{”key“:”ref14“,”DOI-assert-by“:”publisher“,”DOI“:”10.23919\/MIPRO.2017.7973622“},”key:“ref20”,“author”:“miller”,“year”:“2010”,“journal-title”:“Apache Maven”},{“key”:“ref11”,“DOI-asserted-by”:“publisher”,“DOI”:“10.3390\/en14102818”},{“key”:“ref22”,“author”:“moeller”,“year”:“2023”,“journal-title”:“Fast serialization”}、{“key”:“ref10”,“article-title“:”OWASP静态代码分析“,”author“:”dewhurst“,”year“:”2023“,”journal-title“:”OWAST技术代表“},}“key”:“ref21”,“doi-asserted-by”:“publisher”,“doi”:“10.339”390\/电子10070818“},{“键”:“参考2”,“年份”:“0”,“journal-title”:“Tinylog(2023)Tinylog 2”},{“key”:“ref1”,“year”:“0”,“johnal-title:”Apache Group(2023年)Apache log4j™2“},”{“密钥”:“ref17”,“首页”:“1099”,“文章-标题”:“FIRM-AFL:通过增强过程仿真实现物联网固件的高吞吐量灰盒模糊化”,“author”:“zheng”,“年份”:“2019年”,“日记-标题”:“第28届USENIX安全研讨会论文集”},{“key”:“ref16”,“doi-asserted-by”:“publisher”,“doi”:“10.1145\/3533767.3534414”}{“key”:“ref8”,“article-title”:“安全软件开发的基本实践”,“年份”:“2018年”,“日志标题”:“SAFEcode Tech Rep 3rd”},{“key”:“ref7”,“doi-asserted-by”:“crossref”,“首页”:“1218”,“doi”:“10.3390\/electronics8111218”,“article-title”:“使用敏捷方法的新安全软件开发生命周期(s-SDLC)的应用”,“volume”:”8“author”:“de”,“year”:“2019”,“journal-title”:“Electronics”},{“key”:“ref9”,”article-title“:”CyBok Version 1.0“,”author“:”rashid“,”year“:”2019“,”journal-title“:”CyBok Tech Rep“},”key“:”ref4“,”年“:”0“,”journal-ttitle“:Logback(2023)Logback Project“},{”key“:”ref6“,”doi-asserted-by“:“publisher”,“DOI”:“10.1016\/j.procs.2020.04.217”},{“key”:“ref5”,“year”:“0”,“journal-title”:“Apache Group(2020)Apache Log4j™2 v 2 14 0”}],“event”:{“name”:“2023 IEEE网络安全与恢复(CSR)国际会议”,“location”:“Venice,Italy”,“start”:{“date-parts”:[2023,7,31]},“end”:{'date-parts':[2023 3,8,2]]}},“container-title”:[“2023 IEEE网络安全与恢复国际会议(CSR)”],“原始标题”:[],“链接”:[{“URL”:“http://\/xplorestaging.IEEE.org\/ielx7\/10224900\/10224823\/1022431.pdf?arnumber=10224931”,“内容类型”:“未指定”,“content-version”:“vor”,“intended-application”:“相似性检查”}],“存放”:{“日期段”:[2023,9,25]],“日期时间”:“2023-09-25T17:51:38Z”,“时间戳”:1695664298000},“分数”:1,“资源”:{“主要”:{“URL”:“https:\/\/ieeexplore.ieee.org\/document\/10224931\/”}},”副标题“:[],”短标题“:[],”已发布“:{”日期部分“:[2023,7,31]},:\/\/dx.doi.org\/10.109\/csr57506.2023.10224931“,”关系“:{},”主题“:[],“已发布”:{“日期部分”:[[2023,7,31]]}}