{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T07:01:17Z","timestamp":1760079677287},"publisher-location":"Berlin, Heidelberg","reference-count":53,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642359910"},{"type":"electronic","value":"9783642359927"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-35992-7_8","type":"book-chapter","created":{"date-parts":[[2013,1,2]],"date-time":"2013-01-02T06:22:16Z","timestamp":1357107736000},"page":"297-321","source":"Crossref","is-referenced-by-count":8,"title":["Dynamic Program Analysis for Database Reverse Engineering"],"prefix":"10.1007","author":[{"given":"Anthony","family":"Cleve","sequence":"first","affiliation":[]},{"given":"Nesrine","family":"Noughi","sequence":"additional","affiliation":[]},{"given":"Jean-Luc","family":"Hainaut","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"8_CR1","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1109\/52.43044","volume":"7","author":"E.J. Chikofsky","year":"1990","unstructured":"Chikofsky, E.J., Cross, J.H.: Reverse engineering and design recovery: A taxonomy. IEEE Software\u00a07(1), 13\u201317 (1990)","journal-title":"IEEE Software"},{"key":"8_CR2","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1109\/WCRE.1995.514700","volume-title":"Proc. of the Second Working Conference on Reverse Engineering (WCRE 1995)","author":"M.R. Blaha","year":"1995","unstructured":"Blaha, M.R., Premerlani, W.J.: Observed idiosyncracies of relational database designs. In: Proc. of the Second Working Conference on Reverse Engineering (WCRE 1995), p. 116. IEEE Computer Society, Washington, DC (1995)"},{"key":"8_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1007\/3-540-58786-1_91","volume-title":"Entity-Relationship Approach - ER \u201994. Business Modelling and Re-Engineering","author":"J.M. Petit","year":"1994","unstructured":"Petit, J.M., Kouloumdjian, J., Boulicaut, J.F., Toumani, F.: Using Queries to Improve Database Reverse Engineering. In: Loucopoulos, P. (ed.) ER 1994. LNCS, vol.\u00a0881, pp. 369\u2013386. Springer, Heidelberg (1994)"},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"Andersson, M.: Searching for semantics in cobol legacy applications. In: Data Mining and Reverse Engineering: Searching for Semantics, IFIP TC2\/WG2.6 Seventh Conference on Database Semantics (DS-7). IFIP Conference Proceedings, vol.\u00a0124, pp. 162\u2013183. Chapman & Hall (1998)","DOI":"10.1007\/978-0-387-35300-5_8"},{"key":"8_CR5","doi-asserted-by":"crossref","first-page":"345","DOI":"10.1109\/WCRE.2001.957841","volume-title":"Proc. of the 8th Working Conference on Reverse Engineering (WCRE 2001)","author":"S.M. Embury","year":"2001","unstructured":"Embury, S.M., Shao, J.: Assisting the comprehension of legacy transactions. In: Proc. of the 8th Working Conference on Reverse Engineering (WCRE 2001), p. 345. IEEE Computer Society, Washington, DC (2001)"},{"key":"8_CR6","doi-asserted-by":"publisher","first-page":"448","DOI":"10.1109\/ICSM.2004.1357833","volume-title":"ICSM 2004: Proceedings of the 20th IEEE International Conference on Software Maintenance","author":"D. Willmor","year":"2004","unstructured":"Willmor, D., Embury, S.M., Shao, J.: Program slicing in the presence of a database state. In: ICSM 2004: Proceedings of the 20th IEEE International Conference on Software Maintenance, pp. 448\u2013452. IEEE Computer Society, Washington, DC (2004)"},{"key":"8_CR7","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1109\/WCRE.2006.22","volume-title":"Proc. of the 13th Working Conference on Reverse Engineering (WCRE 2006)","author":"A. Cleve","year":"2006","unstructured":"Cleve, A., Henrard, J., Hainaut, J.L.: Data reverse engineering using system dependency graphs. In: Proc. of the 13th Working Conference on Reverse Engineering (WCRE 2006), pp. 157\u2013166. IEEE Computer Society, Washington, DC (2006)"},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Cleve, A.: Program Analysis and Transformation for Data-Intensive System Evolution. PhD thesis, University of Namur (October 2009)","DOI":"10.1109\/ICSM.2010.5609724"},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"Cleve, A., Hainaut, J.L.: Dynamic analysis of SQL statements for data-intensive applications reverse engineering. In: Proc. of the 15th Working Conference on Reverse Engineering, pp. 192\u2013196. IEEE Computer Society (2008)","DOI":"10.1109\/WCRE.2008.38"},{"key":"8_CR10","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1007\/978-3-642-22630-4_5","volume":"15","author":"A. Cleve","year":"2011","unstructured":"Cleve, A., Meurisse, J.R., Hainaut, J.L.: Database semantics recovery through analysis of dynamic SQL statements. Journal on Data Semantics\u00a015, 130\u2013157 (2011)","journal-title":"Journal on Data Semantics"},{"key":"8_CR11","unstructured":"Hainaut, J.L.: Introduction to database reverse engineering. LIBD Publish. (2002), \n                    \n                      http:\/\/www.info.fundp.ac.be\/~dbm\/publication\/2002\/DBRE-2002.pdf"},{"key":"8_CR12","doi-asserted-by":"crossref","unstructured":"L\u00e4mmel, R., De Schutter, K.: What does aspect-oriented programming mean to Cobol? In: Proc. of Aspect-Oriented Software Development (AOSD 2005), pp. 99\u2013110. ACM Press (March 2005)","DOI":"10.1145\/1052898.1052907"},{"key":"8_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1007\/3-540-45337-7_18","volume-title":"ECOOP 2001 - Object-Oriented Programming","author":"G. Kiczales","year":"2001","unstructured":"Kiczales, G., Hilsdale, E., Hugunin, J., Kersten, M., Palm, J., Griswold, W.G.: An Overview of AspectJ. In: Lee, S.H. (ed.) ECOOP 2001. LNCS, vol.\u00a02072, pp. 327\u2013353. Springer, Heidelberg (2001)"},{"issue":"2-3","key":"8_CR14","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1142\/S0218843095000123","volume":"4","author":"J.M. Petit","year":"1995","unstructured":"Petit, J.M., Toumani, F., Kouloumdjian, J.: Relational database reverse engineering: A method based on query analysis. Int. J. Cooperative Inf. Syst.\u00a04(2-3), 287\u2013316 (1995)","journal-title":"Int. J. Cooperative Inf. Syst."},{"key":"8_CR15","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"430","DOI":"10.1007\/978-3-540-48247-5_54","volume-title":"Principles of Data Mining and Knowledge Discovery","author":"S. Lopes","year":"1999","unstructured":"Lopes, S., Petit, J.M., Toumani, F.: Discovery of \u201cInteresting\u201d Data Dependencies from a Workload of SQL Statements. In: \u017bytkow, J.M., Rauch, J. (eds.) PKDD 1999. LNCS (LNAI), vol.\u00a01704, pp. 430\u2013435. Springer, Heidelberg (1999)"},{"issue":"4","key":"8_CR16","doi-asserted-by":"publisher","first-page":"825","DOI":"10.1109\/TKDE.2002.1019216","volume":"14","author":"H.B.K. Tan","year":"2002","unstructured":"Tan, H.B.K., Ling, T.W., Goh, C.H.: Exploring into programs for the recovery of data dependencies designed. IEEE Trans. Knowl. Data Eng.\u00a014(4), 825\u2013835 (2002)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"6","key":"8_CR17","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1002\/smr.290","volume":"15","author":"H.B.K. Tan","year":"2003","unstructured":"Tan, H.B.K., Zhao, Y.: Automated elicitation of inclusion dependencies from the source code for database transactions. Journal of Software Maintenance\u00a015(6), 379\u2013392 (2003)","journal-title":"Journal of Software Maintenance"},{"issue":"6","key":"8_CR18","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1145\/362384.362685","volume":"13","author":"E.F. Codd","year":"1970","unstructured":"Codd, E.F.: A relational model of data for large shared data banks. Commun. ACM\u00a013(6), 377\u2013387 (1970)","journal-title":"Commun. ACM"},{"key":"8_CR19","unstructured":"DB-MAIN: The DB-MAIN official website (2011), \n                    \n                      http:\/\/www.db-main.be"},{"key":"8_CR20","doi-asserted-by":"publisher","first-page":"366","DOI":"10.1145\/267580.267590","volume":"29","author":"H. Zhu","year":"1997","unstructured":"Zhu, H., Hall, P.A.V., May, J.H.R.: Software unit test coverage and adequacy. ACM Comput. Surv.\u00a029, 366\u2013427 (1997)","journal-title":"ACM Comput. Surv."},{"key":"8_CR21","first-page":"98","volume-title":"Proc. of the 9th European Software Engineering Conference Held Jointly with 11th ACM SIGSOFT International Symposium on Foundations of Software Engineering, ESEC\/FSE-11","author":"G.M. Kapfhammer","year":"2003","unstructured":"Kapfhammer, G.M., Soffa, M.L.: A family of test adequacy criteria for database-driven applications. In: Proc. of the 9th European Software Engineering Conference Held Jointly with 11th ACM SIGSOFT International Symposium on Foundations of Software Engineering, ESEC\/FSE-11, pp. 98\u2013107. ACM, New York (2003)"},{"issue":"1","key":"8_CR22","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1147\/rd.281.0082","volume":"28","author":"M.A. Casanova","year":"1984","unstructured":"Casanova, M.A., De Sa, J.E.A.: Mapping uninterpreted schemes into entity-relationship diagrams: two applications to conceptual schema design. IBM J. Res. Dev.\u00a028(1), 82\u201394 (1984)","journal-title":"IBM J. Res. Dev."},{"key":"8_CR23","first-page":"148","volume-title":"Proc. of the Fourth International Conference on Entity-Relationship Approach","author":"K.H. Davis","year":"1985","unstructured":"Davis, K.H., Arora, A.K.: A methodology for translating a conventional file system into an entity-relationship model. In: Proc. of the Fourth International Conference on Entity-Relationship Approach, pp. 148\u2013159. IEEE Computer Society, Washington, DC (1985)"},{"key":"8_CR24","first-page":"305","volume-title":"Proc. of the Sixth International Conference on Entity-Relationship Approach (ER 1987)","author":"S.B. Navathe","year":"1988","unstructured":"Navathe, S.B., Awong, A.M.: Abstracting relational and hierarchical data with a semantic data model. In: Proc. of the Sixth International Conference on Entity-Relationship Approach (ER 1987), pp. 305\u2013333. North-Holland Publishing Co., Amsterdam (1988)"},{"key":"8_CR25","first-page":"190","volume-title":"Proc. of the Tenth International Conference on Data Engineering (ICDE 2004)","author":"P. Johannesson","year":"1994","unstructured":"Johannesson, P.: A method for transforming relational schemas into conceptual schemas. In: Proc. of the Tenth International Conference on Data Engineering (ICDE 2004), pp. 190\u2013201. IEEE Computer Society, Washington, DC (1994)"},{"key":"8_CR26","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1007\/BF00126958","volume":"3","author":"J.L. Hainaut","year":"1996","unstructured":"Hainaut, J.L., Englebert, V., Henrard, J., Hick, J.M., Roland, D.: Database reverse engineering: From requirements to care tools. Automated Software Engineering\u00a03, 9\u201345 (1996)","journal-title":"Automated Software Engineering"},{"key":"8_CR27","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1109\/WCRE.2000.891454","volume-title":"Proc. of the Seventh Working Conference on Reverse Engineering (WCRE 2000)","author":"K.H. Davis","year":"2000","unstructured":"Davis, K.H., Aiken, P.H.: Data reverse engineering: A historical survey. In: Proc. of the Seventh Working Conference on Reverse Engineering (WCRE 2000), p. 70. IEEE Computer Society, Washington, DC (2000)"},{"key":"8_CR28","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1109\/WCRE.1993.287768","volume-title":"Proc. of the IEEE Working Conf. on Reverse Engineering","author":"J.L. Hainaut","year":"1993","unstructured":"Hainaut, J.L., Chandelon, M., Tonneau, C., Joris, M.: Contribution to a theory of database reverse engineering. In: Proc. of the IEEE Working Conf. on Reverse Engineering, pp. 161\u2013170. IEEE Computer Society Press, Baltimore (1993)"},{"key":"8_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1007\/3-540-58786-1_92","volume-title":"Entity-Relationship Approach - ER \u201994. Business Modelling and Re-Engineering","author":"O. Signore","year":"1994","unstructured":"Signore, O., Loffredo, M., Gregori, M., Cima, M.: Reconstruction of ER Schema from Database Applications: a Cognitive Approach. In: Loucopoulos, P. (ed.) ER 1994. LNCS, vol.\u00a0881, pp. 387\u2013402. Springer, Heidelberg (1994)"},{"issue":"2","key":"8_CR30","first-page":"173","volume":"15","author":"H. Yang","year":"1999","unstructured":"Yang, H., Chu, W.C.: Acquisition of entity relationship models for maintenance-dealing with data intensive programs in a transformation system. J. Inf. Sci. Eng.\u00a015(2), 173\u2013198 (1999)","journal-title":"J. Inf. Sci. Eng."},{"key":"8_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1007\/3-540-45341-5_14","volume-title":"Advanced Information Systems Engineering","author":"J. Shao","year":"2001","unstructured":"Shao, J., Liu, X., Fu, G., Embury, S.M., Gray, W.A.: Querying Data-Intensive Programs for Data Design. In: Dittrich, K.R., Geppert, A., Norrie, M. (eds.) CAiSE 2001. LNCS, vol.\u00a02068, pp. 203\u2013218. Springer, Heidelberg (2001)"},{"issue":"8","key":"8_CR32","doi-asserted-by":"publisher","first-page":"777","DOI":"10.1109\/32.57618","volume":"16","author":"V.M. Markowitz","year":"1990","unstructured":"Markowitz, V.M., Makowsky, J.A.: Identifying extended entity-relationship object structures in relational schemas. IEEE Trans. Softw. Eng.\u00a016(8), 777\u2013790 (1990)","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"5","key":"8_CR33","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1145\/175290.175293","volume":"37","author":"W.J. Premerlani","year":"1994","unstructured":"Premerlani, W.J., Blaha, M.R.: An approach for reverse engineering of relational databases. Commun. ACM\u00a037(5), 42\u201349 (1994)","journal-title":"Commun. ACM"},{"issue":"2","key":"8_CR34","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1016\/0169-023X(94)90011-6","volume":"12","author":"R.H.L. Chiang","year":"1994","unstructured":"Chiang, R.H.L., Barron, T.M., Storey, V.C.: Reverse engineering of relational databases: extraction of an eer model from a relational database. Data Knowl. Eng.\u00a012(2), 107\u2013142 (1994)","journal-title":"Data Knowl. Eng."},{"issue":"1","key":"8_CR35","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/S0306-4379(01)00027-8","volume":"27","author":"S. Lopes","year":"2002","unstructured":"Lopes, S., Petit, J.M., Toumani, F.: Discovering interesting inclusion dependencies: application to logical database tuning. Inf. Syst.\u00a027(1), 1\u201319 (2002)","journal-title":"Inf. Syst."},{"issue":"2","key":"8_CR36","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/s10618-007-0083-9","volume":"16","author":"H. Yao","year":"2008","unstructured":"Yao, H., Hamilton, H.J.: Mining functional dependencies from data. Data Min. Knowl. Discov.\u00a016(2), 197\u2013219 (2008)","journal-title":"Data Min. Knowl. Discov."},{"key":"8_CR37","unstructured":"Pannurat, N., Kerdprasop, N., Kerdprasop, K.: Database reverse engineering based on association rule mining. CoRR abs\/1004.3272 (2010)"},{"issue":"2","key":"8_CR38","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1145\/129630.129636","volume":"35","author":"J. Choobineh","year":"1992","unstructured":"Choobineh, J., Mannino, M.V., Tseng, V.P.: A form-based approach for database analysis and design. Communications of the ACM\u00a035(2), 108\u2013120 (1992)","journal-title":"Communications of the ACM"},{"key":"8_CR39","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"424","DOI":"10.1007\/11901181_32","volume-title":"Conceptual Modeling - ER 2006","author":"J.F. Terwilliger","year":"2006","unstructured":"Terwilliger, J.F., Delcambre, L.M.L., Logan, J.: The User Interface Is the Conceptual Model. In: Embley, D.W., Oliv\u00e9, A., Ram, S. (eds.) ER 2006. LNCS, vol.\u00a04215, pp. 424\u2013436. Springer, Heidelberg (2006)"},{"key":"8_CR40","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1007\/978-3-642-13094-6_27","volume-title":"Advanced Information Systems Engineering","author":"R. Ramdoyal","year":"2010","unstructured":"Ramdoyal, R., Cleve, A., Hainaut, J.-L.: Reverse Engineering User Interfaces for Interactive Database Conceptual Analysis. In: Pernici, B. (ed.) CAiSE 2010. LNCS, vol.\u00a06051, pp. 332\u2013347. Springer, Heidelberg (2010)"},{"key":"8_CR41","doi-asserted-by":"crossref","unstructured":"Di Lucca, G.A., Fasolino, A.R., de Carlini, U.: Recovering class diagrams from data-intensive legacy systems. In: Proc. of the 16th IEEE International Conference on Software Maintenance (ICSM 2000), p. 52. IEEE Computer Society (2000)","DOI":"10.1109\/ICSM.2000.883005"},{"key":"8_CR42","unstructured":"Henrard, J.: Program Understanding in Database Reverse Engineering. PhD thesis, University of Namur (2003)"},{"key":"8_CR43","doi-asserted-by":"crossref","unstructured":"van den Brink, H., van der Leek, R., Visser, J.: Quality assessment for embedded sql. In: Proc. of the 7th IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2007), pp. 163\u2013170. IEEE Computer Society (2007)","DOI":"10.1109\/SCAM.2007.23"},{"issue":"3","key":"8_CR44","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1016\/j.infsof.2006.11.005","volume":"50","author":"M.N. Ngo","year":"2008","unstructured":"Ngo, M.N., Tan, H.B.K.: Applying static analysis for automated extraction of database interactions in web applications. Inf. Softw. Technol.\u00a050(3), 160\u2013175 (2008)","journal-title":"Inf. Softw. Technol."},{"issue":"5","key":"8_CR45","doi-asserted-by":"publisher","first-page":"684","DOI":"10.1109\/TSE.2009.28","volume":"35","author":"B. Cornelissen","year":"2009","unstructured":"Cornelissen, B., Zaidman, A., van Deursen, A., Moonen, L., Koschke, R.: A systematic survey of program comprehension through dynamic analysis. IEEE Trans. Software Eng.\u00a035(5), 684\u2013702 (2009)","journal-title":"IEEE Trans. Software Eng."},{"key":"8_CR46","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/978-3-540-39671-0_23","volume-title":"Self-Managing Distributed Systems","author":"M. Debusmann","year":"2003","unstructured":"Debusmann, M., Geihs, K.: Efficient and Transparent Instrumentation of Application Components Using an Aspect-Oriented Approach. In: Brunner, M., Keller, A. (eds.) DSOM 2003. LNCS, vol.\u00a02867, pp. 209\u2013220. Springer, Heidelberg (2003)"},{"key":"8_CR47","doi-asserted-by":"crossref","unstructured":"Del Grosso, C., Di Penta, M.: Garc\u00eda Rodr\u00edguez de Guzm\u00e1n, I.: An approach for mining services in database oriented applications. In: Proceedings of the 11th European Conference on Software Maintenance and Reengineering (CSMR 2007), pp. 287\u2013296. IEEE Computer Society (2007)","DOI":"10.1109\/CSMR.2007.11"},{"key":"8_CR48","doi-asserted-by":"crossref","unstructured":"Yang, Y., Peng, X., Zhao, W.: Domain feature model recovery from multiple applications using data access semantics and formal concept analysis. In: Proc. of the 16th International Working Conference on Reverse Engineering (WCRE 2009), pp. 215\u2013224. IEEE Computer Society (2009)","DOI":"10.1109\/WCRE.2009.15"},{"key":"8_CR49","doi-asserted-by":"crossref","unstructured":"Alalfi, M., Cordy, J., Dean, T.: WAFA: Fine-grained dynamic analysis of web applications. In: Proc. of the 11th International Symposium on Web Systems Evolution (WSE 2009), pp. 41\u201350. IEEE Computer Society (2009)","DOI":"10.1109\/WSE.2009.5631226"},{"key":"8_CR50","unstructured":"Cleve, A., Lemaitre, J., Hainaut, J.L., Mouchet, C., Henrard, J.: The role of implicit schema constructs in data quality. In: Proc. of the 6th International Workshop on Quality in Databases (QDB 2008), pp. 33\u201340 (2008)"},{"key":"8_CR51","unstructured":"Deursen, A.V., Kuipers, T.: Rapid system understanding: Two cobol case studies. In: Proc. of the 6th International Workshop on Program Comprehension (IWPC 1998), p. 90. IEEE Computer Society (1998)"},{"key":"8_CR52","first-page":"147","volume-title":"Proc. Working Conf. Reverse Engineering (WCRE)","author":"E. Merlo","year":"2006","unstructured":"Merlo, E., Letarte, D., Antoniol, G.: Insider and outsider threat-sensitive sql injection vulnerability analysis in php. In: Proc. Working Conf. Reverse Engineering (WCRE), pp. 147\u2013156. IEEE Computer Society, Washington, DC (2006)"},{"key":"8_CR53","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1083246.1083250","volume-title":"WODA 2005: Proceedings of the Third International Workshop on Dynamic Analysis","author":"W.G.J. Halfond","year":"2005","unstructured":"Halfond, W.G.J., Orso, A.: Combining static analysis and runtime monitoring to counter sql-injection attacks. In: WODA 2005: Proceedings of the Third International Workshop on Dynamic Analysis, pp. 1\u20137. ACM, New York (2005)"}],"container-title":["Lecture Notes in Computer Science","Generative and Transformational Techniques in Software Engineering IV"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-35992-7_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,10]],"date-time":"2019-05-10T04:07:56Z","timestamp":1557461276000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-35992-7_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642359910","9783642359927"],"references-count":53,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-35992-7_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}