{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T03:56:11Z","timestamp":1742961371482,"version":"3.40.3"},"publisher-location":"Cham","reference-count":10,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030627423"},{"type":"electronic","value":"9783030627430"}],"license":[{"start":{"date-parts":[[2020,11,4]],"date-time":"2020-11-04T00:00:00Z","timestamp":1604448000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,11,4]],"date-time":"2020-11-04T00:00:00Z","timestamp":1604448000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-62743-0_92","type":"book-chapter","created":{"date-parts":[[2020,11,3]],"date-time":"2020-11-03T06:02:58Z","timestamp":1604383378000},"page":"643-648","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Vulnerability Discovery and Security Protection Based on Web Application"],"prefix":"10.1007","author":[{"given":"Hui","family":"Yuan","sequence":"first","affiliation":[]},{"given":"Jie","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Liang","family":"Dong","sequence":"additional","affiliation":[]},{"given":"Lei","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Shan","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Jin","sequence":"additional","affiliation":[]},{"given":"RongTao","family":"Liao","sequence":"additional","affiliation":[]},{"given":"ZhiYong","family":"Zha","sequence":"additional","affiliation":[]},{"given":"HaoHua","family":"Meng","sequence":"additional","affiliation":[]},{"given":"GuoRu","family":"Deng","sequence":"additional","affiliation":[]},{"given":"Yan","family":"Zhuang","sequence":"additional","affiliation":[]},{"given":"Shuang","family":"Qiu","sequence":"additional","affiliation":[]},{"given":"Ning","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,4]]},"reference":[{"issue":"2","key":"92_CR1","first-page":"288","volume":"16","author":"K Periyasamy","year":"2019","unstructured":"Periyasamy, K., Arirangan, S.: Prediction of future vulnerability discovery in software applications using vulnerability syntax tree (PFVD-VST). Int. Arab J. Inf. Technol. 16(2), 288\u2013294 (2019)","journal-title":"Int. Arab J. Inf. Technol."},{"issue":"2","key":"92_CR2","doi-asserted-by":"publisher","first-page":"562","DOI":"10.1109\/TPDS.2013.162","volume":"26","author":"SA Zonouz","year":"2015","unstructured":"Zonouz, S.A., Berthier, R., Khurana, H., et al.: Seclius: an information flow-based, consequence-centric security metric. IEEE Trans. Parallel Distrib. Syst. 26(2), 562\u2013573 (2015)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"8","key":"92_CR3","doi-asserted-by":"publisher","first-page":"1445","DOI":"10.1002\/qre.1567","volume":"30","author":"HC Joh","year":"2015","unstructured":"Joh, H.C., Malaiya, Y.K.: Modeling skewness in vulnerability discovery. Qual. Reliab. Eng. Int. 30(8), 1445\u20131459 (2015)","journal-title":"Qual. Reliab. Eng. Int."},{"key":"92_CR4","doi-asserted-by":"crossref","unstructured":"Narang, S., Kapurt, P.K., Damodaran, D., et al.: Bi-criterion problem to determine optimal vulnerability discovery and patching time. Int. J. Reliab. Qual. Safety Eng. 25(1), 1850002:1\u20131850002:16 (2018)","DOI":"10.1142\/S021853931850002X"},{"key":"92_CR5","doi-asserted-by":"publisher","first-page":"1373","DOI":"10.1093\/bioinformatics\/btw010","volume":"9","author":"JH Young","year":"2016","unstructured":"Young, J.H., Michael, P., Hyun, S.K., et al.: Computational discovery of pathway-level genetic vulnerabilities in non-small-cell lung cancer. Bioinformatics 9, 1373\u20131379 (2016)","journal-title":"Bioinformatics"},{"issue":"2\u20133","key":"92_CR6","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1504\/IJCIS.2017.088229","volume":"13","author":"A Wood","year":"2017","unstructured":"Wood, A., He, Y., Maglaras, L.A., et al.: A security architectural pattern for risk management of industry control systems within critical national infrastructure. Int. J. Crit. Infrastruct. 13(2\u20133), 113 (2017)","journal-title":"Int. J. Crit. Infrastruct."},{"issue":"4","key":"92_CR7","doi-asserted-by":"publisher","first-page":"19","DOI":"10.4018\/IJSSE.2016100102","volume":"7","author":"R Sharma","year":"2016","unstructured":"Sharma, R., Sibal, R., Shrivastava, A.K.: Vulnerability discovery modeling for open and closed source software. Int. J. Secure Software Eng. 7(4), 19\u201338 (2016)","journal-title":"Int. J. Secure Software Eng."},{"key":"92_CR8","unstructured":"Gonzales, D., Kaplan, J.M., Saltzman, E., et al.: Cloud-trust - a security assessment model for infrastructure as a service (IaaS) clouds. IEEE Trans. Cloud Comput. 3, 1\u20131 (2017)"},{"issue":"7","key":"92_CR9","first-page":"178","volume":"4","author":"A Mooney","year":"2015","unstructured":"Mooney, A., Quille, K., Bergin, S.: PreSS#, A web-based educational system to predict programming performance. Int. J. Software Eng. Knowl. Eng. 4(7), 178\u2013189 (2015)","journal-title":"Int. J. Software Eng. Knowl. Eng."},{"key":"92_CR10","doi-asserted-by":"crossref","unstructured":"Kapur, P.K., Singh, O., Khatri, S.K.: Preface. Int. J. Reliability Qual. Saf. Eng. 23(6), 1602002:1 (2016)","DOI":"10.1142\/S0218539316020022"}],"container-title":["Advances in Intelligent Systems and Computing","The 2020 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-62743-0_92","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,3]],"date-time":"2020-11-03T06:42:07Z","timestamp":1604385727000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-62743-0_92"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,4]]},"ISBN":["9783030627423","9783030627430"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-62743-0_92","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020,11,4]]},"assertion":[{"value":"4 November 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SPIOT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Shanghai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 November 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 November 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"spiot2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/spiot2020.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}