{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:52:02Z","timestamp":1742914322553,"version":"3.40.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031283499"},{"type":"electronic","value":"9783031283505"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-28350-5_9","type":"book-chapter","created":{"date-parts":[[2023,3,27]],"date-time":"2023-03-27T01:15:28Z","timestamp":1679879728000},"page":"113-121","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Programmatic Solution to Stop Heartbleed Bug Attack"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9492-1753","authenticated-orcid":false,"given":"Urvashi","family":"Chugh","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6130-9373","authenticated-orcid":false,"given":"Amit","family":"Chugh","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4818-9351","authenticated-orcid":false,"given":"Prabhakar","family":"Agarwal","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7604-5123","authenticated-orcid":false,"given":"S. Pratap","family":"Singh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,3,19]]},"reference":[{"unstructured":"Heartbleed Keeps Flowing - Open Source Security Melissa Iori (miori01)","key":"9_CR1"},{"doi-asserted-by":"publisher","unstructured":"Sachdeva, S., Mchome, S., Bhalla, S.: Web services security issues in healthcare applications. In: 2010 IEEE\/ACIS 9th International Conference on Computer and Information Science, Yamagata, Japan, pp. 91\u201396. IEEE (2010). https:\/\/doi.org\/10.1109\/ICIS.2010.134","key":"9_CR2","DOI":"10.1109\/ICIS.2010.134"},{"doi-asserted-by":"publisher","unstructured":"Sachdeva, S., Batra, S., Bhalla, S.: Evolving large scale healthcare applications using open standards. Health Policy Technol. 6, 410\u2013425 (2017). https:\/\/doi.org\/10.1016\/j.hlpt.2017.10.001","key":"9_CR3","DOI":"10.1016\/j.hlpt.2017.10.001"},{"unstructured":"Bug, T.H.: The heartbleed bug (2021)","key":"9_CR4"},{"unstructured":"Yapri, J., Hananto, R.: Leak in OpenSSL. Department of Information Technology, Swiss German University, Tangerang 15143, Indonesia","key":"9_CR5"},{"doi-asserted-by":"crossref","unstructured":"Durumeric, Z., et al.: The matter of heartbleed. In: Proceedings of the 2014 Conference on Internet Measurement Conference, pp. 475\u2013488 (2014)","key":"9_CR6","DOI":"10.1145\/2663716.2663755"},{"key":"9_CR7","doi-asserted-by":"publisher","first-page":"113016","DOI":"10.1016\/j.eswa.2019.113016","volume":"142","author":"L Jain","year":"2020","unstructured":"Jain, L., Katarya, R., Sachdeva, S.: Opinion leader detection using whale optimization algorithm in online social network. Expert Syst. Appl. 142, 113016 (2020). https:\/\/doi.org\/10.1016\/j.eswa.2019.113016","journal-title":"Expert Syst. Appl."},{"issue":"3","key":"9_CR8","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1177\/1741659015592792","volume":"11","author":"J Banks","year":"2015","unstructured":"Banks, J.: The Heartbleed bug: Insecurity repackaged, rebranded and resold. Crime Media Cult. 11(3), 259\u2013279 (2015)","journal-title":"Crime Media Cult."},{"doi-asserted-by":"crossref","unstructured":"Kyatam, S., Alhayajneh, A., Hayajneh, T.: Heartbleed attacks implementation and vulnerability. In: 2017 IEEE Long Island Systems, Applications and Technology Conference (LISAT), pp. 1\u20136. IEEE (2017)","key":"9_CR9","DOI":"10.1109\/LISAT.2017.8001980"},{"issue":"4","key":"9_CR10","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1109\/MSP.2014.66","volume":"12","author":"M Carvalho","year":"2014","unstructured":"Carvalho, M., DeMott, J., Ford, R., Wheeler, D.A.: Heartbleed 101. IEEE Secur. Priv. 12(4), 63\u201367 (2014)","journal-title":"IEEE Secur. Priv."},{"unstructured":"A technical view of theOpenSSL \u2018Heartbleed\u2019vulnerability A look at the memory leak in the OpenSSL Heartbeat implementation Bipin Chandra","key":"9_CR11"},{"issue":"8","key":"9_CR12","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1109\/MC.2014.217","volume":"47","author":"DA Wheeler","year":"2014","unstructured":"Wheeler, D.A.: Preventing heartbleed. Computer 47(8), 80\u201383 (2014). https:\/\/doi.org\/10.1109\/MC.2014.217","journal-title":"Computer"},{"unstructured":"Wang, J., et al.: Risk assessment of buffer \u201cHeartbleed\u201d over\u00adtead vulnerabilities. In: 2015 45th Annual IEEE IFIP International Conference on Dependable Systems and Networks. IEEE (2015)","key":"9_CR13"},{"doi-asserted-by":"crossref","unstructured":"Ghafoor, I., Jattala, I., Durrani, S., Tahir, C.M.: Analysis of OpenSSL heartbleed vulnerability for embedded systems. In: 17th IEEE International Multi\u00adTopic Conference 2014, pp. 314\u2013319 (2014)","key":"9_CR14","DOI":"10.1109\/INMIC.2014.7097358"},{"issue":"4","key":"9_CR15","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1109\/MSP.2014.66","volume":"12","author":"M Carvalho","year":"2014","unstructured":"Carvalho, M., DeMott, J., Ford, R., Wheeler, D.A.: Heartbleed 101. IEEE Security Privacy 12(4), 63\u201367 (2014)","journal-title":"IEEE Security Privacy"},{"unstructured":"Wheeler, D.A.: How to Prevent the next Heartbleed, 2020-07-18 (originally 2014-04-29)","key":"9_CR16"}],"container-title":["Lecture Notes in Computer Science","Big Data Analytics in Astronomy, Science, and Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-28350-5_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,3,27]],"date-time":"2023-03-27T01:24:05Z","timestamp":1679880245000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-28350-5_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031283499","9783031283505"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-28350-5_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"19 March 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"BDA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Big Data Analytics","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 December 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 December 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"bigda2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/web-ext.u-aizu.ac.jp\/labs\/is-ds\/BDA2022-Aizu.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Microsoft CMT","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"70","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"14","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2,5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2,5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}