{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T18:35:24Z","timestamp":1725993324279},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030009151"},{"type":"electronic","value":"9783030009168"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-00916-8_42","type":"book-chapter","created":{"date-parts":[[2018,9,25]],"date-time":"2018-09-25T07:45:33Z","timestamp":1537861533000},"page":"444-455","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An Efficient Black-Box Vulnerability Scanning Method for Web Application"],"prefix":"10.1007","author":[{"given":"Haoxia","family":"Jin","sequence":"first","affiliation":[]},{"given":"Ming","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Xue","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Ting","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Ning","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Tao","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,26]]},"reference":[{"key":"42_CR1","unstructured":"Martin, R.A., Christey, S.: Vulnerability type distributions in CVE. MITRE Report (2007)"},{"key":"42_CR2","unstructured":"China Software Developer Network (CSDN) leaked 6 million user information. http:\/\/www.williamlong.info\/archives\/2933.html"},{"key":"42_CR3","doi-asserted-by":"crossref","unstructured":"Blanco, L., Dalvi, N., Machanavajjhala, A.: Highly efficient algorithms for structural clustering of large websites. In: WWW, pp. 437\u2013446 (2011)","DOI":"10.1145\/1963405.1963468"},{"key":"42_CR4","doi-asserted-by":"crossref","unstructured":"Medeiros, I., Neves, N.F., Correia, M.: DEKANT: a static analysis tool that learns to detect web application vulnerabilities. In: ISSTA, pp. 1\u201311 (2016)","DOI":"10.1145\/2931037.2931041"},{"key":"42_CR5","unstructured":"Felmetsger, V., Cavedon, L., Kruegel, C., Vigna, G.: Toward automated detection of logic vulnerabilities in web applications. In: USS, pp. 143\u2013160 (2010)"},{"key":"42_CR6","doi-asserted-by":"crossref","unstructured":"Halfond, W.G.J., Choudhary, S.R., Orso, A.: Penetration testing with improved input vector identification. In: ICST, pp. 346\u2013355 (2009)","DOI":"10.1109\/ICST.2009.26"},{"key":"42_CR7","doi-asserted-by":"crossref","unstructured":"McAllister, S., Kirda, E., Kruegel, C.: Leveraging user interactions for in-depth testing of web applications. In: RAID, pp. 191\u2013210 (2008)","DOI":"10.1007\/978-3-540-87403-4_11"},{"issue":"7","key":"42_CR8","first-page":"1279","volume":"55","author":"A Austin","year":"2013","unstructured":"Austin, A., Holmgreen, C., Williams, L.: A comparison of the efficiency and effectiveness of vulnerability discovery techniques. IST 55(7), 1279\u20131288 (2013)","journal-title":"IST"},{"key":"42_CR9","doi-asserted-by":"crossref","unstructured":"Doup\u00e9, A., Cova, M., Vigna, G.: Why Johnny can\u2019t pentest: an analysis of black-box web vulnerability scanners. In: DIMVA, pp. 111\u2013131 (2010)","DOI":"10.1007\/978-3-642-14215-4_7"},{"key":"42_CR10","unstructured":"Doup\u00e9, A., Cavedon, L., Kruegel, C., Vigna, G.: Enemy of the state: a state-aware black-box web vulnerability scanner. In: USS, pp. 523\u2013538 (2012)"},{"key":"42_CR11","first-page":"130","volume":"115","author":"I Hernndez","year":"2016","unstructured":"Hernndez, I., Rivero, C.R., Ruiz, D., Corchuelo, R.: CALA: classifying links automatically based on their URL. JSS 115, 130\u2013143 (2016)","journal-title":"JSS"},{"issue":"10","key":"42_CR12","doi-asserted-by":"publisher","first-page":"1347","DOI":"10.1109\/TKDE.2005.166","volume":"17","author":"G Grahne","year":"2005","unstructured":"Grahne, G., Zhu, J.: Fast algorithms for frequent itemset mining using FP-trees. TKDE 17(10), 1347\u20131362 (2005). https:\/\/doi.org\/10.1109\/TKDE.2005.166","journal-title":"TKDE"},{"key":"42_CR13","unstructured":"Shezaf, O.: Rest assessment cheat sheet. http:\/\/tinyurl.com\/mkqd8br"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Collaborative Computing: Networking, Applications and Worksharing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-00916-8_42","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,24]],"date-time":"2019-10-24T20:19:07Z","timestamp":1571948347000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-00916-8_42"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030009151","9783030009168"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-00916-8_42","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"CollaborateCom","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Collaborative Computing: Networking, Applications and Worksharing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Edinburgh","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 December 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 December 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"colcom2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/collaboratecom.eai-conferences.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}