{"oa":"1","file_date_updated":"2018-12-13T15:15:42Z","issue":"No. 5","has_accepted_license":"1","volume":"Vol. 54","extern":"1","department":[{"_id":"277"}],"_id":"5640","year":"2011","citation":{"bibtex":"@article{Schryen_2011, title={Is open source security a myth? What do vulnerability and patch data say?}, volume={Vol. 54}, number={No. 5}, journal={Communications of the ACM (CACM)}, publisher={Association for Computing Machinery}, author={Schryen, Guido}, year={2011}, pages={130–139} }","ama":"Schryen G. Is open source security a myth? What do vulnerability and patch data say? Communications of the ACM (CACM). 2011;Vol. 54(No. 5):130-139.","apa":"Schryen, G. (2011). Is open source security a myth? What do vulnerability and patch data say? Communications of the ACM (CACM), Vol. 54(No. 5), 130–139.","chicago":"Schryen, Guido. “Is Open Source Security a Myth? What Do Vulnerability and Patch Data Say?” Communications of the ACM (CACM) Vol. 54, no. No. 5 (2011): 130–39.","mla":"Schryen, Guido. “Is Open Source Security a Myth? What Do Vulnerability and Patch Data Say?” Communications of the ACM (CACM), vol. Vol. 54, no. No. 5, Association for Computing Machinery, 2011, pp. 130–39.","ieee":"G. Schryen, “Is open source security a myth? What do vulnerability and patch data say?,” Communications of the ACM (CACM), vol. Vol. 54, no. No. 5, pp. 130–139, 2011.","short":"G. Schryen, Communications of the ACM (CACM) Vol. 54 (2011) 130–139."},"language":[{"iso":"eng"}],"file":[{"file_name":"CACM article.pdf","content_type":"application/pdf","relation":"main_file","date_created":"2018-12-11T15:03:56Z","creator":"hsiemes","access_level":"open_access","file_size":1020040,"date_updated":"2018-12-13T15:15:42Z","file_id":"6181"}],"date_created":"2018-11-14T14:34:54Z","publisher":"Association for Computing Machinery","ddc":["000"],"publication":"Communications of the ACM (CACM)","page":"130-139","status":"public","author":[{"full_name":"Schryen, Guido","first_name":"Guido","last_name":"Schryen","id":"72850"}],"title":"Is open source security a myth? What do vulnerability and patch data say?","date_updated":"2022-01-06T07:02:17Z","user_id":"61579","type":"journal_article"}