{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T20:34:55Z","timestamp":1760646895166,"version":"3.40.3"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319999265"},{"type":"electronic","value":"9783319999272"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-99927-2_3","type":"book-chapter","created":{"date-parts":[[2018,9,6]],"date-time":"2018-09-06T17:39:50Z","timestamp":1536255590000},"page":"33-38","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":21,"title":["Security Testing for Chatbots"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6086-8846","authenticated-orcid":false,"given":"Josip","family":"Bozic","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0462-2283","authenticated-orcid":false,"given":"Franz","family":"Wotawa","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,7]]},"reference":[{"key":"3_CR1","unstructured":"Botium - new generation testing. http:\/\/www.botium.at, accessed: 2018\u201305-07"},{"key":"3_CR2","unstructured":"BotMan - The PHP messaging and chatbot library. https:\/\/botman.io, accessed: 2018\u201305-20"},{"key":"3_CR3","unstructured":"BotMill.io - We Mill Bots and Create Bot Milling Tools! http:\/\/www.botmill.io, accessed: 2018\u201305-22"},{"key":"3_CR4","unstructured":"CharlieBot. https:\/\/sourceforge.net\/projects\/charliebot\/, accessed: 2018\u201305-22"},{"key":"3_CR5","unstructured":"Chatbot Market Size And Share Analysis, Industry Report, 2014\u20132025. https:\/\/www.grandviewresearch.com\/industry-analysis\/chatbot-market, accessed: 2018\u201305-07"},{"key":"3_CR6","unstructured":"Chatbottest. http:\/\/chatbottest.com, accessed: 2018\u201305-07"},{"key":"3_CR7","unstructured":"Gartner Top Strategic Predictions for 2018 and Beyond. https:\/\/www.gartner.com\/smarterwithgartner\/gartner-top-strategic-predictions-for-2018-and-beyond\/, accessed: 2018\u201305-07"},{"key":"3_CR8","unstructured":"jsoup: Java HTML Parser. https:\/\/jsoup.org\/, accessed: 2018\u201302-02"},{"key":"3_CR9","unstructured":"OWASP Top Ten Project. https:\/\/www.owasp.org\/index.php\/Category:OWASP_Top_Ten_Project, accessed: 2018\u201301-31"},{"key":"3_CR10","unstructured":"Program O AI Chatbot - The Friendly Open Source PHP, MySQL, AIML Chatbot. https:\/\/www.program-o.com, accessed: 2018\u201302-04"},{"key":"3_CR11","unstructured":"QMetry BOT Tester. http:\/\/www.qmetry.com\/qmetry-bot-tester\/, accessed: 2018\u201305-07"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Bozic, J., Wotawa, F.: Security Testing Based on Attack Patterns. In: Proceedings of the 5th International Workshop on Security Testing (SECTEST\u201914) (2014)","DOI":"10.1109\/ICSTW.2014.58"},{"key":"3_CR13","volume-title":"SQL Injection Attacks and Defense","author":"J Clarke","year":"2012","unstructured":"Clarke, J., Fowler, K., Oftedal, E., Alvarez, R.M., Hartley, D., Kornbrust, A., O\u2019Leary-Steele, G., Revelli, A., Siddharth, S., Slaviero, M.: SQL Injection Attacks and Defense, 2nd edn. Syngress, (2012)","edition":"2"},{"key":"3_CR14","volume-title":"Artificial Paranoia: A Computer Simulation of Paranoid Process","author":"K Colby","year":"1975","unstructured":"Colby, K.: Artificial Paranoia: A Computer Simulation of Paranoid Process. Pergamon Press, New York (1975)"},{"key":"3_CR15","doi-asserted-by":"crossref","unstructured":"Duchene, F., Rawat, S., Richier, J.L., Groz, R.: KameleonFuzz: Evolutionary Fuzzing for Black-Box XSS Detection. In: CODASPY. pp. 37\u201348. ACM (2014)","DOI":"10.1145\/2557547.2557550"},{"key":"3_CR16","volume-title":"XSS Attacks: Cross Site Scripting Exploits and Defense","author":"S Fogie","year":"2007","unstructured":"Fogie, S., Grossman, J., Hansen, R., Rager, A., Petkov, P.D.: XSS Attacks: Cross Site Scripting Exploits and Defense. Syngress, (2007)"},{"key":"3_CR17","unstructured":"Halfond, W.G.J., Viegas, J., Orso, A.: A Classification of SQL Injection Attacks and Countermeasures. In: Proceedings of the IEEE International Symposium on Secure Software Engineering. Arlington, VA, USA (2006)"},{"key":"3_CR18","doi-asserted-by":"crossref","unstructured":"Liu, G., Liu, Q., Zhang, W.: Model-Based Testing and Validation on Artificial Intelligence Systems. In: Second International Multisymposium on Computer and Computational Sciences (2007)","DOI":"10.1109\/IMSCCS.2007.37"},{"key":"3_CR19","doi-asserted-by":"crossref","unstructured":"Lowe, R., Noseworthy, M., Serban, I.V., Angelard-Gontier, N., Bengio, Y., Pineau, J.: Towards an Automatic Turing Test: Learning to Evaluate Dialogue Responses. In: Proceedings of the 5th International Conference on Learning Representations (ICLR) Workshop. Toulon, France (2017)","DOI":"10.18653\/v1\/P17-1103"},{"key":"3_CR20","unstructured":"Martin, M., Lam, M.S.: Automatic Generation of XSS and SQL Injection Attacks with Goal-Directed Model Checking. In: 17th USENIX Security Symposium (2008)"},{"key":"3_CR21","unstructured":"McCarthy, J., Hayes, P.J.: Some Philosophical Problems from the Standpoint of Artificial Intelligence. In: Meltzer, B., Michie, D. (eds.) Machine Intelligence 4, pp. 463\u2013502. Edinburgh University Press (1969), reprinted in McC90"},{"key":"3_CR22","unstructured":"Rushby, J.: Quality Measures and Assurance for AI Software. In: NASA Contract Report 4187, Washington DC (1988)"},{"issue":"4","key":"3_CR23","doi-asserted-by":"publisher","first-page":"489","DOI":"10.1075\/ijcl.10.4.06sha","volume":"10","author":"Bayan Abu Shawar","year":"2005","unstructured":"Shawar, B.A., Atwell, E.: Using corpora in machine-learning chatbot systems. In: International Journal of Corpus Linguistics, vol. 10 (2005)","journal-title":"International Journal of Corpus Linguistics"},{"key":"3_CR24","doi-asserted-by":"crossref","unstructured":"Vasconcelos, M., Candello, H., Pinhanez, C., dos Santos, T.: Bottester: Testing Conversational Systems with Simulated Users. In: IHC 2017: Proceedings of the XVI Brazilian Symposium on Human Factors in Computing Systems (2017)","DOI":"10.1145\/3160504.3160584"},{"key":"3_CR25","unstructured":"Wallace, R.S.: The Elements of AIML Style. In: ALICE A.I. Foundation (2003)"},{"key":"3_CR26","unstructured":"Wallace, R.S.: The Anatomy of A.L.I.C.E. In: ALICE A.I. Foundation (2004)"},{"issue":"1","key":"3_CR27","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1145\/365153.365168","volume":"9","author":"Joseph Weizenbaum","year":"1966","unstructured":"Weizenbaum, J.: ELIZA-A Computer Program For the Study of Natural Language Communication Between Man and Machine. In: Communications of the ACM Volume 9, Number 1 (January 1966) (1966)","journal-title":"Communications of the ACM"}],"container-title":["Lecture Notes in Computer Science","Testing Software and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-99927-2_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,1]],"date-time":"2022-08-01T01:10:49Z","timestamp":1659316249000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-99927-2_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319999265","9783319999272"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-99927-2_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"7 September 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICTSS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on Testing Software and Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"C\u00e1diz","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 October 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 October 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"pts2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ictss2018.uca.es\/ictss","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}