{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T06:57:32Z","timestamp":1770447452385,"version":"3.49.0"},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319436951","type":"print"},{"value":"9783319436968","type":"electronic"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-43696-8_14","type":"book-chapter","created":{"date-parts":[[2016,10,13]],"date-time":"2016-10-13T11:03:05Z","timestamp":1476356585000},"page":"123-135","source":"Crossref","is-referenced-by-count":3,"title":["Vulnerabilities of Government Websites in a Developing Country \u2013 the Case of Burkina Faso"],"prefix":"10.1007","author":[{"given":"Tegawend\u00e9 F.","family":"Bissyand\u00e9","sequence":"first","affiliation":[]},{"given":"Jonathan","family":"Ouoba","sequence":"additional","affiliation":[]},{"given":"Daouda","family":"Ahmat","sequence":"additional","affiliation":[]},{"given":"Fr\u00e9deric","family":"Ou\u00e9draogo","sequence":"additional","affiliation":[]},{"given":"Cedric","family":"B\u00e9r\u00e9","sequence":"additional","affiliation":[]},{"given":"Moustapha","family":"Bikienga","sequence":"additional","affiliation":[]},{"given":"Abdoulaye","family":"Sere","sequence":"additional","affiliation":[]},{"given":"Mesmin","family":"Dandjinou","sequence":"additional","affiliation":[]},{"given":"Oumarou","family":"Si\u00e9","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,14]]},"reference":[{"key":"14_CR1","unstructured":"Shteiman, B.: How your CMS could be breeding security vulnerabilities (2013). http:\/\/www.itproportal.com\/2013\/10\/08\/how-your-cms-could-be-breeding-security-vulnerabilities\/"},{"key":"14_CR2","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1007\/978-3-319-16886-9_27","volume-title":"e-Infrastructure and e-Services for Developing Countries","author":"TF Bissyand\u00e9","year":"2015","unstructured":"Bissyand\u00e9, T.F., Ouoba, J., Ahmat, D., Sawadogo, A.D., Sawadogo, Z.: Bootstrapping software engineering training in developing countries. In: Nungu, A., Pehrson, B., Sansa-Otim, J. (eds.) AFRICOMM 2014. LNICSSITE, vol. 147, pp. 261\u2013268. Springer, Heidelberg (2015). doi: 10.1007\/978-3-319-16886-9_27"},{"issue":"6","key":"14_CR3","doi-asserted-by":"crossref","first-page":"1665","DOI":"10.1007\/s10664-013-9258-8","volume":"19","author":"L Tan","year":"2014","unstructured":"Tan, L., Liu, C., Li, Z., Wang, X., Zhou, Y., Zhai, C.: Bug characteristics in open source software. Emp. Softw. Eng. 19(6), 1665\u20131705 (2014)","journal-title":"Emp. Softw. Eng."},{"key":"14_CR4","doi-asserted-by":"crossref","unstructured":"Bissyand\u00e9, T.F., R\u00e9veill\u00e8re, L., Lawall, J.L., Muller, G.: Diagnosys: automatic generation of a debugging interface to the linux kernel. In: Proceedings of the 27th IEEE\/ACM International Conference on Automated Software Engineerinh, ASE 2012 (2012)","DOI":"10.1145\/2351676.2351686"},{"key":"14_CR5","first-page":"1","volume":"23","author":"TF Bissyand\u00e9","year":"2014","unstructured":"Bissyand\u00e9, T.F., R\u00e9veill\u00e8re, L., Lawall, J.L., Muller, G.: Ahead of time static analysis for automatic generation of debugging interfaces to the linux kernel. Autom. Softw. Eng. 23, 1\u201339 (2014)","journal-title":"Autom. Softw. Eng."},{"key":"14_CR6","doi-asserted-by":"crossref","unstructured":"Bissyand\u00e9, T.F., Thung, F., Lo, D., Jiang, L., R\u00e9veillere, L.: Popularity, interoperability, and impact of programming languages in 100,000 open source projects. In: Proceedings of the 37th Annual International Computer Software & Applications Conference, COMPSAC 2013, pp. 1\u201310 (2013)","DOI":"10.1109\/COMPSAC.2013.55"},{"key":"14_CR7","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1007\/978-3-319-08368-1_11","volume-title":"e-Infrastructure and e-Services for Developing Countries","author":"TF Bissyand\u00e9","year":"2014","unstructured":"Bissyand\u00e9, T.F., Ahmat, D., Ouoba, J., Stam, G., Klein, J., Traon, Y.: Sustainable ICT4D in Africa: where do we go from here? In: Bissyand\u00e9, T.F., Stam, G. (eds.) AFRICOMM 2013. LNICSSITE, vol. 135, pp. 95\u2013103. Springer, Heidelberg (2014). doi: 10.1007\/978-3-319-08368-1_11"},{"issue":"1","key":"14_CR8","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1504\/IJESDF.2007.013595","volume":"1","author":"V Moen","year":"2007","unstructured":"Moen, V., Klingsheim, A.N., Simonsen, K.I.F., Hole, K.J.: Vulnerabilities in e-governments. Int. J. Electron. Secur. Digit. Forensic 1(1), 89\u2013100 (2007)","journal-title":"Int. J. Electron. Secur. Digit. Forensic"},{"key":"14_CR9","unstructured":"Wang, J.A., Zhang, F., Xia, M.: Temporal metrics for software vulnerabilities. In: Proceedings of the 4th Annual Workshop on Cyber Security, Information Intelligence Research: Developing Strategies to Meet the Cyber Security and Information Intelligence Challenges Ahead, CSIIRW 2008, pp. 44:1\u201344:3. ACM, New York (2008). Observation of strains. Infect Dis Ther. 3(1), 35\u201343 (2011)"},{"key":"14_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1007\/978-3-540-70542-0_7","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"R Paleari","year":"2008","unstructured":"Paleari, R., Marrone, D., Bruschi, D., Monga, M.: On race vulnerabilities in web applications. In: Zamboni, D. (ed.) DIMVA 2008. LNCS, vol. 5137, pp. 126\u2013142. Springer, Heidelberg (2008). doi: 10.1007\/978-3-540-70542-0_7"},{"issue":"3","key":"14_CR11","doi-asserted-by":"crossref","first-page":"11:1","DOI":"10.1145\/2187671.2187673","volume":"44","author":"H Shahriar","year":"2012","unstructured":"Shahriar, H., Zulkernine, M.: Mitigating program security vulnerabilities: approaches and challenges. ACM Comput. Surv. 44(3), 11:1\u201311:46 (2012)","journal-title":"ACM Comput. Surv."},{"key":"14_CR12","doi-asserted-by":"crossref","unstructured":"Ciampa, A., Visaggio, C.A., Di Penta, M.: A heuristic-based approach for detecting sql-injection vulnerabilities in web applications. In: Proceedings of the 2010 ICSE Workshop on Software Engineering for Secure Systems, SESS 2010, pp. 43\u201349. ACM, New York (2010)","DOI":"10.1145\/1809100.1809107"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","e-Infrastructure and e-Services"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-43696-8_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T21:03:47Z","timestamp":1498338227000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-43696-8_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319436951","9783319436968"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-43696-8_14","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"value":"1867-8211","type":"print"},{"value":"1867-822X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016]]}}}