Changes
On November 28, 2024 at 1:15:48 PM UTC, admin:
-
Changed value of field
extra_authors
to[{'extra_author': 'Urban, Tobias', 'familyName': 'Urban', 'givenName': 'Tobias', 'orcid': ''}, {'extra_author': 'Wittek, Kevin', 'familyName': 'Wittek', 'givenName': 'Kevin', 'orcid': ''}, {'extra_author': 'Pohlmann, Norbert', 'familyName': 'Pohlmann', 'givenName': 'Norbert', 'orcid': ''}]
in Our (in)secure web: understanding update behavior of websites and its impact on security
f | 1 | { | f | 1 | { |
2 | "author": "Demir, Nurullah", | 2 | "author": "Demir, Nurullah", | ||
3 | "author_email": "", | 3 | "author_email": "", | ||
n | n | 4 | "citation": [], | ||
4 | "creator_user_id": "17755db4-395a-4b3b-ac09-e8e3484ca700", | 5 | "creator_user_id": "17755db4-395a-4b3b-ac09-e8e3484ca700", | ||
5 | "doi": "10.35097/1552", | 6 | "doi": "10.35097/1552", | ||
6 | "doi_date_published": "2023", | 7 | "doi_date_published": "2023", | ||
7 | "doi_publisher": "", | 8 | "doi_publisher": "", | ||
8 | "doi_status": "True", | 9 | "doi_status": "True", | ||
9 | "extra_authors": [ | 10 | "extra_authors": [ | ||
10 | { | 11 | { | ||
11 | "extra_author": "Urban, Tobias", | 12 | "extra_author": "Urban, Tobias", | ||
n | n | 13 | "familyName": "Urban", | ||
14 | "givenName": "Tobias", | ||||
12 | "orcid": "" | 15 | "orcid": "" | ||
13 | }, | 16 | }, | ||
14 | { | 17 | { | ||
15 | "extra_author": "Wittek, Kevin", | 18 | "extra_author": "Wittek, Kevin", | ||
n | n | 19 | "familyName": "Wittek", | ||
20 | "givenName": "Kevin", | ||||
16 | "orcid": "" | 21 | "orcid": "" | ||
17 | }, | 22 | }, | ||
18 | { | 23 | { | ||
19 | "extra_author": "Pohlmann, Norbert", | 24 | "extra_author": "Pohlmann, Norbert", | ||
n | n | 25 | "familyName": "Pohlmann", | ||
26 | "givenName": "Norbert", | ||||
20 | "orcid": "" | 27 | "orcid": "" | ||
21 | } | 28 | } | ||
22 | ], | 29 | ], | ||
n | n | 30 | "familyName": "Demir", | ||
31 | "givenName": "Nurullah", | ||||
23 | "groups": [], | 32 | "groups": [], | ||
24 | "id": "8f51a931-4503-4143-b64d-793e5c11b60c", | 33 | "id": "8f51a931-4503-4143-b64d-793e5c11b60c", | ||
25 | "isopen": false, | 34 | "isopen": false, | ||
26 | "license_id": "CC BY-SA 4.0 Attribution-ShareAlike", | 35 | "license_id": "CC BY-SA 4.0 Attribution-ShareAlike", | ||
27 | "license_title": "CC BY-SA 4.0 Attribution-ShareAlike", | 36 | "license_title": "CC BY-SA 4.0 Attribution-ShareAlike", | ||
28 | "metadata_created": "2023-08-04T08:51:02.983594", | 37 | "metadata_created": "2023-08-04T08:51:02.983594", | ||
t | 29 | "metadata_modified": "2023-08-04T09:31:30.627629", | t | 38 | "metadata_modified": "2024-11-28T13:15:48.101086", |
30 | "name": "rdr-doi-10-35097-1552", | 39 | "name": "rdr-doi-10-35097-1552", | ||
31 | "notes": "Abstract: Software updates take an essential role in | 40 | "notes": "Abstract: Software updates take an essential role in | ||
32 | keeping IT environments secure. If service providers delay or do not | 41 | keeping IT environments secure. If service providers delay or do not | ||
33 | install updates, it can cause unwanted security implications for their | 42 | install updates, it can cause unwanted security implications for their | ||
34 | environments. This paper conducts a large-scale measurement study of | 43 | environments. This paper conducts a large-scale measurement study of | ||
35 | the update behavior of websites and their utilized software stacks. | 44 | the update behavior of websites and their utilized software stacks. | ||
36 | Across 18 months, we analyze over 5.6M websites and 246 distinct | 45 | Across 18 months, we analyze over 5.6M websites and 246 distinct | ||
37 | client- and server-side software distributions. We found that almost | 46 | client- and server-side software distributions. We found that almost | ||
38 | all analyzed sites use outdated software.\r\nTechnicalRemarks: This | 47 | all analyzed sites use outdated software.\r\nTechnicalRemarks: This | ||
39 | dataset holds additional materials to the paper \"Our (in)Secure Web: | 48 | dataset holds additional materials to the paper \"Our (in)Secure Web: | ||
40 | Understanding Update Behavior of Websites and Its Impact on | 49 | Understanding Update Behavior of Websites and Its Impact on | ||
41 | Security\".", | 50 | Security\".", | ||
42 | "num_resources": 0, | 51 | "num_resources": 0, | ||
43 | "num_tags": 0, | 52 | "num_tags": 0, | ||
44 | "orcid": "", | 53 | "orcid": "", | ||
45 | "organization": { | 54 | "organization": { | ||
46 | "approval_status": "approved", | 55 | "approval_status": "approved", | ||
47 | "created": "2023-01-12T13:30:23.238233", | 56 | "created": "2023-01-12T13:30:23.238233", | ||
48 | "description": "RADAR (Research Data Repository) is a | 57 | "description": "RADAR (Research Data Repository) is a | ||
49 | cross-disciplinary repository for archiving and publishing research | 58 | cross-disciplinary repository for archiving and publishing research | ||
50 | data from completed scientific studies and projects. The focus is on | 59 | data from completed scientific studies and projects. The focus is on | ||
51 | research data from subjects that do not yet have their own | 60 | research data from subjects that do not yet have their own | ||
52 | discipline-specific infrastructures for research data management. ", | 61 | discipline-specific infrastructures for research data management. ", | ||
53 | "id": "013c89a9-383c-4200-8baa-0f78bf1d91f9", | 62 | "id": "013c89a9-383c-4200-8baa-0f78bf1d91f9", | ||
54 | "image_url": "radar-logo.svg", | 63 | "image_url": "radar-logo.svg", | ||
55 | "is_organization": true, | 64 | "is_organization": true, | ||
56 | "name": "radar", | 65 | "name": "radar", | ||
57 | "state": "active", | 66 | "state": "active", | ||
58 | "title": "RADAR", | 67 | "title": "RADAR", | ||
59 | "type": "organization" | 68 | "type": "organization" | ||
60 | }, | 69 | }, | ||
61 | "owner_org": "013c89a9-383c-4200-8baa-0f78bf1d91f9", | 70 | "owner_org": "013c89a9-383c-4200-8baa-0f78bf1d91f9", | ||
62 | "private": false, | 71 | "private": false, | ||
63 | "production_year": "2020", | 72 | "production_year": "2020", | ||
64 | "publication_year": "2023", | 73 | "publication_year": "2023", | ||
65 | "publishers": [ | 74 | "publishers": [ | ||
66 | { | 75 | { | ||
67 | "publisher": "Karlsruhe Institute of Technology" | 76 | "publisher": "Karlsruhe Institute of Technology" | ||
68 | } | 77 | } | ||
69 | ], | 78 | ], | ||
70 | "relationships_as_object": [], | 79 | "relationships_as_object": [], | ||
71 | "relationships_as_subject": [], | 80 | "relationships_as_subject": [], | ||
72 | "repository_name": "RADAR (Research Data Repository)", | 81 | "repository_name": "RADAR (Research Data Repository)", | ||
73 | "resources": [], | 82 | "resources": [], | ||
74 | "services_used_list": "", | 83 | "services_used_list": "", | ||
75 | "source_metadata_created": "2023", | 84 | "source_metadata_created": "2023", | ||
76 | "source_metadata_modified": "", | 85 | "source_metadata_modified": "", | ||
77 | "state": "active", | 86 | "state": "active", | ||
78 | "subject_areas": [ | 87 | "subject_areas": [ | ||
79 | { | 88 | { | ||
80 | "subject_area_additional": "", | 89 | "subject_area_additional": "", | ||
81 | "subject_area_name": "Computer Science" | 90 | "subject_area_name": "Computer Science" | ||
82 | } | 91 | } | ||
83 | ], | 92 | ], | ||
84 | "tags": [], | 93 | "tags": [], | ||
85 | "title": "Our (in)secure web: understanding update behavior of | 94 | "title": "Our (in)secure web: understanding update behavior of | ||
86 | websites and its impact on security", | 95 | websites and its impact on security", | ||
87 | "type": "vdataset", | 96 | "type": "vdataset", | ||
88 | "url": "https://doi.org/10.35097/1552" | 97 | "url": "https://doi.org/10.35097/1552" | ||
89 | } | 98 | } |