{"response":{"docs":[{"system_create_dtsi":"2019-07-13T15:17:35Z","system_modified_dtsi":"2019-07-13T15:18:38Z","has_model_ssim":["Article"],"id":"2227mq88z","accessControl_ssim":["14e53941-dd04-40ec-b6b6-f454511e1e27"],"hasRelatedMediaFragment_ssim":["37720f122"],"hasRelatedImage_ssim":["37720f122"],"depositor_ssim":["wang2wt@mail.uc.edu"],"depositor_tesim":["wang2wt@mail.uc.edu"],"title_tesim":["Artifacts of `Detecting Software Vulnerabilities via Requirements Dependency Analysis'"],"date_uploaded_dtsi":"2019-07-13T15:17:35Z","date_modified_dtsi":"2019-07-13T15:17:35Z","isPartOf_ssim":["admin_set/default"],"on_behalf_of_ssim":[""],"doi_tesim":["doi:10.7945/q8h2-t712"],"college_tesim":["Engineering and Applied Science"],"department_tesim":["- Elec Eng \u0026 Computing Systems"],"creator_tesim":["Niu, Nan","Wang, Wen Tao"],"publisher_tesim":["University of Cincinnati"],"description_tesim":["Please find within this study package the following items.\r\nContact anonymously.submit@gmail.com for further information or questions. Thanks!"],"license_tesim":["http://rightsstatements.org/vocab/InC/1.0/"],"thumbnail_path_ss":"/downloads/37720f122?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["m039k6035","p2676w77f","qr46r2159","pk02cb96x","37720f122","th83m090c","pv63g163b","db78td244"],"file_set_ids_ssim":["m039k6035","p2676w77f","qr46r2159","pk02cb96x","37720f122","th83m090c","pv63g163b","db78td244"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"ARTIFACTS OF DETECTING SOFTWARE VULNERABILITIES VIA REQUIREMENTS DEPENDENCY ANALYSIS","human_readable_type_tesim":["Article"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["wang2wt@mail.uc.edu"],"nesting_collection__pathnames_ssim":["2227mq88z"],"nesting_collection__deepest_nested_depth_isi":1,"_version_":1697114658818752512,"timestamp":"2021-04-15T13:51:02.112Z","score":0.00049999997}],"facets":[{"name":"human_readable_type_sim","items":[{"value":"Article","hits":1,"label":"Article"}],"label":"Human Readable Type Sim"},{"name":"creator_sim","items":[{"value":"Niu, Nan","hits":1,"label":"Niu, Nan"},{"value":"Wang, Wen Tao","hits":1,"label":"Wang, Wen Tao"}],"label":"Creator Sim"},{"name":"subject_sim","items":[],"label":"Subject Sim"},{"name":"college_sim","items":[{"value":"Engineering and Applied Science","hits":1,"label":"Engineering and Applied Science"}],"label":"College Sim"},{"name":"department_sim","items":[{"value":"- Elec Eng \u0026 Computing Systems","hits":1,"label":"- Elec Eng \u0026 Computing Systems"}],"label":"Department Sim"},{"name":"language_sim","items":[],"label":"Language Sim"},{"name":"publisher_sim","items":[{"value":"University of Cincinnati","hits":1,"label":"University of Cincinnati"}],"label":"Publisher Sim"},{"name":"date_created_sim","items":[],"label":"Date Created Sim"},{"name":"member_of_collection_ids_ssim","items":[],"label":"Member Of Collection Ids Ssim"},{"name":"generic_type_sim","items":[{"value":"Work","hits":1,"label":"Work"}],"label":"Generic Type Sim"}],"pages":{"current_page":1,"next_page":null,"prev_page":null,"total_pages":1,"limit_value":10,"offset_value":0,"total_count":1,"first_page?":true,"last_page?":true}}}