{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T05:49:15Z","timestamp":1757310555398,"version":"3.41.0"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031877711"},{"type":"electronic","value":"9783031877728"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-87772-8_23","type":"book-chapter","created":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T07:30:09Z","timestamp":1745307009000},"page":"269-281","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Modular and\u00a0Scalable Framework for\u00a0Effective Server-Side Forensic Analysis of\u00a0XSS Attacks"],"prefix":"10.1007","author":[{"given":"Raffaele","family":"Pizzolante","sequence":"first","affiliation":[]},{"given":"Arcangelo","family":"Castiglione","sequence":"additional","affiliation":[]},{"given":"Michele","family":"Mastroianni","sequence":"additional","affiliation":[]},{"given":"Francesco","family":"Palmieri","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,23]]},"reference":[{"key":"23_CR1","doi-asserted-by":"crossref","unstructured":"Alfieri, D., Ficco, M., Mastroianni, M., Palmieri, F.: XSS-unearth: a tool for forensics analysis of XSS attacks. In: Advanced Information Networking and Applications, Springer, Cham, pp. 317\u2013326 (2024)","DOI":"10.1007\/978-3-031-57931-8_31"},{"key":"23_CR2","unstructured":"Aspinwall, N.: Plaso\u2019s Process, The Leahy Center for Digital Forensics & Cybersecurity, 2013. https:\/\/leahycenterblog.champlain.edu\/2013\/11\/12\/plasos-process\/"},{"key":"23_CR3","doi-asserted-by":"crossref","unstructured":"Bhushan, S.: A novel digital forensic inspection model for XSS attack. In: Soft Computing: Theories and Applications: Proceedings of SoCTA 2021, Springer, pp. 747\u2013759 (2022)","DOI":"10.1007\/978-981-19-0707-4_68"},{"key":"23_CR4","unstructured":"Django REST Framework, \u201cDjango REST Framework, https:\/\/www.django-rest-framework.org\/, Accessed 26 Aug 2024"},{"key":"23_CR5","unstructured":"Python Software Foundation, \u201cPython: A Programming Language, https:\/\/www.python.org\/, Accessed 26 Aug 2024"},{"key":"23_CR6","doi-asserted-by":"crossref","unstructured":"Gagliardi, V.: Advantages and disadvantages of decoupled architectures. In: Decoupled Django, Apress, Berkeley, CA (2021)","DOI":"10.1007\/978-1-4842-7144-5"},{"key":"23_CR7","doi-asserted-by":"crossref","unstructured":"Hooshmand, S., et al.: D-forenria: distributed reconstruction of user-interactions for rich internet applications. In: Proceedings of the 25th International Conference Companion on World Wide Web, pp. 211\u2013214 (2016)","DOI":"10.1145\/2872518.2890547"},{"key":"23_CR8","doi-asserted-by":"crossref","unstructured":"Kent, K., Chevalier, S., Grance, T.: Guide to integrating forensic techniques into incident, Technical Report, pp. 800-886 (2006)","DOI":"10.6028\/NIST.SP.800-86"},{"key":"23_CR9","doi-asserted-by":"crossref","unstructured":"Khodayarseresht, E., Majumdar, S.: Digital forensics for emerging technologies: present and future. In: Innovations in Digital Forensics, World Scientific, pp. 1\u201311 (2023)","DOI":"10.1142\/9789811273209_0001"},{"issue":"1","key":"23_CR10","doi-asserted-by":"publisher","first-page":"7153","DOI":"10.1149\/10701.7153ecst","volume":"107","author":"S Kumar","year":"2022","unstructured":"Kumar, S., Pathak, S., Singh, J.: A comprehensive study of XSS attack and the digital forensic models to gather the evidence. ECS Trans. 107(1), 7153 (2022)","journal-title":"ECS Trans."},{"issue":"4","key":"23_CR11","doi-asserted-by":"publisher","first-page":"1009","DOI":"10.1080\/09720529.2022.2072424","volume":"25","author":"S Kumar","year":"2022","unstructured":"Kumar, S., Pathak, S., Singh, J.: An enhanced digital forensic investigation framework for XSS attack. J. Discrete Math. Sci. Cryptography 25(4), 1009\u20131018 (2022)","journal-title":"J. Discrete Math. Sci. Cryptography"},{"key":"23_CR12","unstructured":"OWASP Foundation, \u201cCross-Site Scripting (XSS), https:\/\/owasp.org\/www-community\/attacks\/xss\/, Accessed 18 Aug 2024"},{"key":"23_CR13","doi-asserted-by":"publisher","first-page":"106960","DOI":"10.1016\/j.comnet.2019.106960","volume":"166","author":"GE Rodr\u00edguez","year":"2020","unstructured":"Rodr\u00edguez, G.E., Torres, J.G., Flores, P., Benavides, D.E.: Cross-site scripting (XSS) attacks and mitigation: a survey. Comput. Netw. 166, 106960 (2020)","journal-title":"Comput. Netw."},{"key":"23_CR14","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1016\/j.jnca.2018.06.004","volume":"118","author":"U Sarmah","year":"2018","unstructured":"Sarmah, U., Bhattacharyya, D.K., Kalita, J.K.: A survey of detection methods for XSS attacks. J. Netw. Comput. Appl. 118, 113\u2013143 (2018)","journal-title":"J. Netw. Comput. Appl."},{"key":"23_CR15","doi-asserted-by":"crossref","unstructured":"\u0160uteva, N., Mileva, A., Loleski, M.: Computer forensic analysis of some web attacks. In: World Congress on Internet Security (WorldCIS-2014), pp. 42\u201347. IEEE (2014)","DOI":"10.1109\/WorldCIS.2014.7028164"},{"issue":"1","key":"23_CR16","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1504\/IJITST.2015.073938","volume":"6","author":"N \u0160uteva","year":"2015","unstructured":"\u0160uteva, N., Mileva, A., Loleski, M.: Finding forensic evidence for several web attacks. Int. J. Internet Technol. Secured Trans. 6(1), 64\u201378 (2015)","journal-title":"Int. J. Internet Technol. Secured Trans."},{"key":"23_CR17","unstructured":"The Plaso Team, \u201cPlaso - Log2timeline, https:\/\/github.com\/log2timeline\/plaso, Accessed 1 Oct 2024"},{"key":"23_CR18","doi-asserted-by":"crossref","unstructured":"Topham, N., McDougall, K.: Performance of the decoupled ACRI-1 architecture: the perfect club. In: High-Performance Computing and Networking. HPCN-Europe 1995, vol. 919, Springer, pp. 93\u2013104 (1995)","DOI":"10.1007\/BFb0046669"},{"key":"23_CR19","doi-asserted-by":"crossref","unstructured":"Wang, S.-J., Chang, Y.-H., Chiang, W.-Y., Juang, W.-S.: Investigations in cross-site script on web-systems gathering digital evidence against cyber-intrusions. In: Future Generation Communication and Networking (FGCN 2007), vol. 2, pp. 125\u2013129 (2007)","DOI":"10.1109\/FGCN.2007.156"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advanced Information Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-87772-8_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T18:38:05Z","timestamp":1751567885000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-87772-8_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031877711","9783031877728"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-87772-8_23","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"23 April 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AINA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Information Networking and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Barcelona","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 April 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 April 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"39","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aina0","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/aina\/2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}