{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T09:22:28Z","timestamp":1730193748337,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,11,22]],"date-time":"2022-11-22T00:00:00Z","timestamp":1669075200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,11,22]],"date-time":"2022-11-22T00:00:00Z","timestamp":1669075200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,11,22]]},"DOI":"10.1109\/acit57182.2022.9994086","type":"proceedings-article","created":{"date-parts":[[2023,1,4]],"date-time":"2023-01-04T18:38:43Z","timestamp":1672857523000},"page":"1-7","source":"Crossref","is-referenced-by-count":0,"title":["Discovering Authorization Business Rules toward Detecting Web Applications Logic Flaws"],"prefix":"10.1109","author":[{"given":"Hamza","family":"Alkofahi","sequence":"first","affiliation":[{"name":"Jordan University of Science and Technology,Department of Software Engineering,Irbid,Jordan"}]},{"given":"David","family":"Umphress","sequence":"additional","affiliation":[{"name":"Auburn University,Department of Computer Science and Software Engineering,Auburn,USA"}]},{"given":"Heba","family":"Alawneh","sequence":"additional","affiliation":[{"name":"Al Hussein Technical University,Department of Cybersecurity,Amman,Jordan"}]}],"member":"263","reference":[{"issue":"10","key":"ref1","volume-title":"OWASP Top","volume":"10","year":"2021"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23021"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/HIS.2012.6421371"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICICS55353.2022.9811178"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.01.008"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.30"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.26"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74320-0_4"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076767"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1021\/pr060343h"},{"volume-title":"Criterion for determining the number of groups in a classification","year":"1978","author":"Ratkowsky","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/BF02294713"},{"volume-title":"osCommerce [Computer software]","year":"2022","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.18637\/jss.v061.i06"},{"issue":"34","key":"ref15","volume":"1","author":"Desgraupes","year":"2013","journal-title":"Clustering indices. University of Paris Ouest-Lab ModalX"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/BF02294245"},{"issue":"2\u20133","key":"ref17","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1023\/A:1012801612483","volume":"17","author":"Halkidi","year":"2001","journal-title":"On clustering validation techniques. Journal of intelligent information systems"},{"key":"ref18","first-page":"1","volume-title":"Comparing clusterings: an overview","author":"Wagner","year":"2007"},{"key":"ref19","article-title":"Enemy of the state: A state-aware black-box web vulnerability scanner","volume-title":"USENIX Security Symposium","volume":"14","author":"Doupe"},{"key":"ref20","first-page":"400","article-title":"Defining business rules-what are they really","author":"Hay","year":"2000","journal-title":"The Business Rules Group"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/BF01896809"},{"issue":"1","key":"ref22","first-page":"43","article-title":"A survey of binary similarity and distance measures","volume":"8","author":"Choi","year":"2010","journal-title":"Journal of Systemics, Cybernetics and Informatics"},{"volume-title":"Timing and Frequency Synchronization in Practical OFDM Systems","year":"2010","author":"Ruan","key":"ref23"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/26.4.354"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1207\/s15327906mbr2202_6"}],"event":{"name":"2022 International Arab Conference on Information Technology (ACIT)","start":{"date-parts":[[2022,11,22]]},"location":"Abu Dhabi, United Arab Emirates","end":{"date-parts":[[2022,11,24]]}},"container-title":["2022 International Arab Conference on Information Technology (ACIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9994070\/9994081\/09994086.pdf?arnumber=9994086","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T12:21:08Z","timestamp":1706790068000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9994086\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,22]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/acit57182.2022.9994086","relation":{},"subject":[],"published":{"date-parts":[[2022,11,22]]}}}