{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,2]],"date-time":"2025-04-02T04:10:35Z","timestamp":1743567035349,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":32,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819602346","type":"print"},{"value":"9789819602353","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-0235-3_23","type":"book-chapter","created":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T06:20:16Z","timestamp":1743488416000},"page":"281-291","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Look at Prevalent Vulnerabilities in Web and Mobile Applications: A Brief Systematic Review"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-8233-7813","authenticated-orcid":false,"given":"Alexandre","family":"Ferreira","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4847-5104","authenticated-orcid":false,"given":"Jo\u00e3o","family":"Barroso","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9818-7090","authenticated-orcid":false,"given":"Ars\u00e9nio","family":"Reis","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9343-4603","authenticated-orcid":false,"given":"Ant\u00f3nio Jorge","family":"Gouveia","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,31]]},"reference":[{"key":"23_CR1","doi-asserted-by":"crossref","unstructured":"Gigova, T., Valeva, K., Nikolova-Alexieva, V.: Digital transformation\u2014opportunity for industrial growth. In: 2019 International Conference on Creative Business for Smart and Sustainable Growth (CREBUS) (2019)","DOI":"10.1109\/CREBUS.2019.8840065"},{"key":"23_CR2","doi-asserted-by":"crossref","unstructured":"Lazarenko, Y., et al.: Digital transformation in the mining sector: exploring global technology trends and managerial issues. E3S Web Conf. 315 (2021)","DOI":"10.1051\/e3sconf\/202131504006"},{"issue":"2","key":"23_CR3","doi-asserted-by":"crossref","first-page":"325","DOI":"10.22214\/ijraset.2023.49016","volume":"11","author":"R Khanam","year":"2023","unstructured":"Khanam, R.: Review of threats in IoT systems: challenges and solutions. Int. J. Res. Appl. Sci. Engi. Technol. 11(2), 325\u2013341 (2023)","journal-title":"Int. J. Res. Appl. Sci. Engi. Technol."},{"issue":"2","key":"23_CR4","doi-asserted-by":"crossref","first-page":"7","DOI":"10.13189\/ujcn.2018.060201","volume":"6","author":"M Ichaba","year":"2018","unstructured":"Ichaba, M.: Security threats and solutions in mobile Ad Hoc networks; a review. Univers. J. Commun. Netw. 6(2), 7\u201317 (2018)","journal-title":"Univers. J. Commun. Netw."},{"key":"23_CR5","doi-asserted-by":"crossref","unstructured":"Pathan, A.S.K., Hyung-Woo, L., Choong Seon, H.: Security in wireless sensor networks: issues and challenges. In: 2006 8th International Conference Advanced Communication Technology (2006)","DOI":"10.1109\/ICACT.2006.206151"},{"key":"23_CR6","doi-asserted-by":"crossref","unstructured":"Scott-Hayward, S., Callaghan, G.O., Sezer, S.: Sdn security: a survey. In: 2013 IEEE SDN for Future Networks and Services (SDN4FNS) (2013)","DOI":"10.1109\/SDN4FNS.2013.6702553"},{"key":"23_CR7","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1016\/j.comcom.2017.03.010","volume":"107","author":"G Somani","year":"2017","unstructured":"Somani, G., et al.: DDoS attacks in cloud computing: issues, taxonomy, and future directions. Comput. Commun. 107, 30\u201348 (2017)","journal-title":"Comput. Commun."},{"key":"23_CR8","doi-asserted-by":"crossref","first-page":"222310","DOI":"10.1109\/ACCESS.2020.3041951","volume":"8","author":"K Shaukat","year":"2020","unstructured":"Shaukat, K., et al.: A survey on machine learning techniques for cyber security in the last decade. IEEE Access 8, 222310\u2013222354 (2020)","journal-title":"IEEE Access"},{"key":"23_CR9","doi-asserted-by":"crossref","unstructured":"AlDaajeh, S., et al.: The role of national cybersecurity strategies on the improvement of cybersecurity education. Comput. Secur. 119 (2022)","DOI":"10.1016\/j.cose.2022.102754"},{"key":"23_CR10","doi-asserted-by":"crossref","unstructured":"Edmundson, A., et al.: An empirical study on the effectiveness of security code review. In: Engineering Secure Software and Systems. Springer, Berlin, Heidelberg (2013)","DOI":"10.1007\/978-3-642-36563-8_14"},{"key":"23_CR11","doi-asserted-by":"crossref","unstructured":"Mendoza, A., Gu, G.: Mobile application web API reconnaissance: web-to-mobile inconsistencies & vulnerabilities. In: 2018 IEEE Symposium on Security and Privacy (SP), pp. 756\u2013769 (2018)","DOI":"10.1109\/SP.2018.00039"},{"key":"23_CR12","doi-asserted-by":"crossref","first-page":"415","DOI":"10.3233\/JCS-140498","volume":"22","author":"P Bisht","year":"2014","unstructured":"Bisht, P., et al.: Automated detection of parameter tampering opportunities and vulnerabilities in web applications. J. Comput. Secur. 22, 415\u2013465 (2014)","journal-title":"J. Comput. Secur."},{"key":"23_CR13","doi-asserted-by":"crossref","unstructured":"Hydara, I., et al.: The limitations of cross-site scripting vulnerabilities detection and removal techniques. Turk. J. Comput. Math. Educ. 12(3), 6 (2021)","DOI":"10.17762\/turcomat.v12i3.1033"},{"key":"23_CR14","doi-asserted-by":"crossref","unstructured":"Hydara, I., et al.: Towards cross-site scripting vulnerability detection in mobile web applications. Int. J. Eng. Technol. (UAE) 7, 18\u201321 (2018)","DOI":"10.14419\/ijet.v7i4.1.19484"},{"key":"23_CR15","doi-asserted-by":"crossref","unstructured":"Barraclough, P.A., Fehringer, G., Woodward, J.: Intelligent cyber-phishing detection for online. Comput. Secur. 104 (2021)","DOI":"10.1016\/j.cose.2020.102123"},{"key":"23_CR16","doi-asserted-by":"crossref","unstructured":"Mohammed, Z.A., Tejay, G.P.: Examining the privacy paradox through individuals\u2019 neural disposition in e-commerce: an exploratory neuroimaging study. Comput. Secur. 104 (2021)","DOI":"10.1016\/j.cose.2021.102201"},{"key":"23_CR17","doi-asserted-by":"crossref","unstructured":"Abelha, M., et al.: Graduate employability and competence development in higher education\u2014a systematic literature review using PRISMA. Sustainability 12(15) (2020)","DOI":"10.3390\/su12155900"},{"key":"23_CR18","volume":"372","author":"MJ Page","year":"2021","unstructured":"Page, M.J., et al.: PRISMA 2020 explanation and elaboration: updated guidance and exemplars for reporting systematic reviews. BMJ 372, n160 (2021)","journal-title":"BMJ"},{"key":"23_CR19","doi-asserted-by":"crossref","unstructured":"Nagendrababu, V., et al.: PRISMA for abstracts: best practice for reporting abstracts of systematic reviews in endodontology. Int. Endod. J., 1096\u20131107 (2019)","DOI":"10.1111\/iej.13118"},{"key":"23_CR20","doi-asserted-by":"crossref","first-page":"1360","DOI":"10.1109\/ACCESS.2021.3136861","volume":"10","author":"YM Tashtoush","year":"2022","unstructured":"Tashtoush, Y.M., et al.: Agile approaches for cybersecurity systems, IoT and intelligent transportation. IEEE Access 10, 1360\u20131375 (2022)","journal-title":"IEEE Access"},{"key":"23_CR21","doi-asserted-by":"crossref","unstructured":"Everson, D., Cheng, L., Zhang, Z.: Log4shell: redefining the web attack surface. In Proceedings 2022 Workshop on Measurements, Attacks, and Defenses for the Web (2022)","DOI":"10.14722\/madweb.2022.23010"},{"issue":"1","key":"23_CR22","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1109\/MSEC.2020.3037845","volume":"19","author":"JL Hernandez-Ramos","year":"2021","unstructured":"Hernandez-Ramos, J.L., Matheu, S.N., Skarmeta, A.: The challenges of software cybersecurity certification [building security In]. IEEE Secur. Priv.Secur. Priv. 19(1), 99\u2013102 (2021)","journal-title":"IEEE Secur. Priv.Secur. Priv."},{"key":"23_CR23","doi-asserted-by":"crossref","unstructured":"He, T., Zheng, Y., Ma, Z.: Study of network time synchronisation security strategy based on polar coding. Comput. Secur. 104 (2021)","DOI":"10.1016\/j.cose.2021.102214"},{"key":"23_CR24","doi-asserted-by":"crossref","unstructured":"Johansson, D., et al.: Information technology and medical technology personnel's perception regarding segmentation of medical devices: a focus group study. Healthcare (Basel) 8(1) (2020)","DOI":"10.3390\/healthcare8010023"},{"issue":"4","key":"23_CR25","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1109\/MCE.2021.3065857","volume":"10","author":"H Thapliyal","year":"2021","unstructured":"Thapliyal, H., Mohanty, S.P.: Physical unclonable function (PUF)-based sustainable cybersecurity. IEEE Consum. Electr. Mag. 10(4), 79\u201380 (2021)","journal-title":"IEEE Consum. Electr. Mag."},{"key":"23_CR26","first-page":"1","volume":"2018","author":"L Li","year":"2018","unstructured":"Li, L., et al.: Towards effective network intrusion detection: a hybrid model integrating Gini index and GBDT with PSO. J. Sensors 2018, 1\u20139 (2018)","journal-title":"J. Sensors"},{"key":"23_CR27","doi-asserted-by":"crossref","unstructured":"Alam, D., et al.: A case study of SQL injection vulnerabilities assessment of .bd domain web applications. In: 2015 Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic (CyberSec), pp. 73\u201377 (2015)","DOI":"10.1109\/CyberSec.2015.23"},{"issue":"2","key":"23_CR28","first-page":"201","volume":"12","author":"A Fadlil","year":"2022","unstructured":"Fadlil, A., Riadi, I., Fachri, F.: Mitigation web server for cross-site scripting attack using penetration testing method. Int. J. Saf. Secur. Eng. 12(2), 201\u2013208 (2022)","journal-title":"Int. J. Saf. Secur. Eng."},{"key":"23_CR29","doi-asserted-by":"crossref","unstructured":"Chen, J., et al.: FineFool: a novel DNN object contour attack on image recognition based on the attention perturbation adversarial technique. Comput. Secur. 104 (2021)","DOI":"10.1016\/j.cose.2021.102220"},{"key":"23_CR30","doi-asserted-by":"crossref","unstructured":"Kaur, R., Gabrijel\u010di\u010d, D., Klobu\u010dar, T.: Artificial intelligence for cybersecurity: literature review and future research directions. Inf. Fusion 97 (2023)","DOI":"10.1016\/j.inffus.2023.101804"},{"key":"23_CR31","doi-asserted-by":"crossref","unstructured":"Yuan, S., Wu, X.: Deep learning for insider threat detection: review, challenges and opportunities. Comput. Secur. 104 (2021)","DOI":"10.1016\/j.cose.2021.102221"},{"key":"23_CR32","doi-asserted-by":"crossref","unstructured":"Chen, S., et al.: DNS covert channel detection method using the LSTM model. Comput. Secur. 104 (2021)","DOI":"10.1016\/j.cose.2020.102095"}],"container-title":["Smart Innovation, Systems and Technologies","Developments and Advances in Defense and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-0235-3_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T06:20:53Z","timestamp":1743488453000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-0235-3_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819602346","9789819602353"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-0235-3_23","relation":{},"ISSN":["2190-3018","2190-3026"],"issn-type":[{"value":"2190-3018","type":"print"},{"value":"2190-3026","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"31 March 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MICRADS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Multidisciplinary International Conference of Research Applied to Defense and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Santiago","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chile","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 July 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 July 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"micrads12024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.micrads.org\/index.php\/en\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}