{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T12:00:57Z","timestamp":1725796857420},"publisher-location":"Cham","reference-count":11,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319091525"},{"type":"electronic","value":"9783319091532"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-09153-2_20","type":"book-chapter","created":{"date-parts":[[2014,7,2]],"date-time":"2014-07-02T10:14:42Z","timestamp":1404296082000},"page":"263-276","source":"Crossref","is-referenced-by-count":0,"title":["Characterizing the Control Logic of Web Applications\u2019 User Interfaces"],"prefix":"10.1007","author":[{"given":"Carlos Eduardo","family":"Silva","sequence":"first","affiliation":[]},{"given":"Jos\u00e9 Creissac","family":"Campos","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"20_CR1","unstructured":"Eilam, E.: Reversing: Secrets of Reverse Engineering. Wiley (2005)"},{"key":"20_CR2","doi-asserted-by":"crossref","unstructured":"Telea, A.C.: Reverse Engineering \u2013 Recent Advances and Applications. InTech (2012)","DOI":"10.5772\/1850"},{"key":"20_CR3","doi-asserted-by":"crossref","unstructured":"Mikkonen, T., Taivalsaari, A.: Web applications \u2013 spaghetti code for the 21st century. Technical Report SMLI TR-2007-166, Sun Microsystems (2007)","DOI":"10.1109\/SERA.2008.16"},{"key":"20_CR4","unstructured":"Silva, C.E.: Reverse engineering of rich internet applications. Master\u2019s thesis, Universidade do Minho (2009)"},{"key":"20_CR5","unstructured":"Campos, J.C., Saraiva, J., Silva, C., Silva, J.C.: GUIsurfer: A reverse engineering framework for user interface software. In: Telea [2], ch.2, pp. 31\u201354"},{"key":"20_CR6","unstructured":"de Kleijn, R.: Learning Selenium: Hands-on tutorials to create a robust and maintainable test automation framework. Leanpub (2014)"},{"key":"20_CR7","doi-asserted-by":"crossref","unstructured":"Mesbah, A., van Deursen, A., Lenselink, S.: Crawling Ajax-based web applications through dynamic analysis of user interface state changes. ACM Transactions on the Web (TWEB)\u00a06(1), 3:1\u20133:30 (2012)","DOI":"10.1145\/2109205.2109208"},{"key":"20_CR8","doi-asserted-by":"crossref","unstructured":"Morgado, I.C., Paiva, A.C.R., Faria, J.P., Camacho, R.: GUI reverse engineering with machine learning. In: 2012 First International Workshop on Realizing AI Synergies in Software Engineering (RAISE), pp. 27\u201331. IEEE (June 2012)","DOI":"10.1109\/RAISE.2012.6227966"},{"key":"20_CR9","doi-asserted-by":"crossref","unstructured":"Silva, C.E., Campos, J.C.: Combining static and dynamic analysis for the reverse engineering of web applications. In: Forbrig, P., Dewan, P., Harrison, M., Luyten, K., Santoro, C., Barbosa, S.D.J. (eds.) Proceedings of the 5th ACM SIGCHI Symposium on Engineering Interactive Computing Systems (EICS 2013), pp. 107\u2013112. ACM (2013)","DOI":"10.1145\/2494603.2480324"},{"key":"20_CR10","unstructured":"Jakob, J.: jQuery Compressed. Jenkov Aps (2011)"},{"key":"20_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1007\/978-3-642-24178-9_19","volume-title":"Information Hiding","author":"S. Schrittwieser","year":"2011","unstructured":"Schrittwieser, S., Katzenbeisser, S.: Code obfuscation against static and dynamic reverse engineering. In: Filler, T., Pevn\u00fd, T., Craver, S., Ker, A. (eds.) IH 2011. LNCS, vol.\u00a06958, pp. 270\u2013284. Springer, Heidelberg (2011)"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2014"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-09153-2_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T05:55:38Z","timestamp":1558936538000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-09153-2_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319091525","9783319091532"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-09153-2_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}