{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T09:23:52Z","timestamp":1730193832177,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,9,21]],"date-time":"2023-09-21T00:00:00Z","timestamp":1695254400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,9,21]],"date-time":"2023-09-21T00:00:00Z","timestamp":1695254400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,9,21]]},"DOI":"10.1109\/acit58437.2023.10275516","type":"proceedings-article","created":{"date-parts":[[2023,10,17]],"date-time":"2023-10-17T17:43:37Z","timestamp":1697564617000},"page":"414-419","source":"Crossref","is-referenced-by-count":1,"title":["Internal and External Threats in Cyber Security and Methods for Their Prevention"],"prefix":"10.1109","author":[{"given":"Vitalii","family":"Falkevych","sequence":"first","affiliation":[{"name":"Zaporizhzhia National University,Zaporizhzhia,Ukraine"}]},{"given":"Andrey","family":"Lisnyak","sequence":"additional","affiliation":[{"name":"Zaporizhzhia National University,Zaporizhzhia,Ukraine"}]}],"member":"263","reference":[{"journal-title":"Content security policy (CSP) (no date) HTTP","year":"2023","key":"ref13"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2945682"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2927417"},{"journal-title":"Cross-origin resource sharing (CORS) (no date) HTTP","year":"2023","key":"ref14"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2021.11.070"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2927417"},{"journal-title":"Verizon","year":"2021","key":"ref2"},{"journal-title":"Federal Bureau of Investigation","year":"2020","key":"ref1"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.37917\/ijeee.17.2.8"},{"journal-title":"Permissions policy - http MDN (no date) HTTP","year":"2023","key":"ref16"},{"journal-title":"Security flaws XSS CSRF SQL Injection HTML injection (no date) Zscaler","year":"2023","key":"ref19"},{"journal-title":"Sqills","year":"2020","key":"ref18"},{"journal-title":"CSRF vs XSS What are their similarity and differences","year":"2023","author":"dizdar","key":"ref24"},{"journal-title":"Cross-site Request Forgery (CSRF) Prevention Cheat Sheet","year":"2023","key":"ref23"},{"journal-title":"Distributed denial of service explained Imperva","year":"2020","key":"ref26"},{"journal-title":"What is a distributed denial-of-service (ddos) attack? - cloudflare (no date)","year":"2023","key":"ref25"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2021.1995537"},{"journal-title":"Cross-site request forgery (CSRF) (no date) Cross-Site Request Forgery (CSRF)","year":"2023","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1757\/1\/012055"},{"key":"ref8","article-title":"Cyber security, cyber threats, implications and future perspectives: A Review","author":"ghelani","year":"2022","journal-title":"Authorea Preprints"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSec.2015.23"},{"key":"ref9","article-title":"Cyber security approach in web application using SVM","volume":"57","author":"dangi","year":"2012","journal-title":"International Journal of Computer Applications"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-019-04319-2"},{"journal-title":"Ransomware attackers down shift to &#x2018;Mid-Game&#x2019; hunting in Q3 2021-Coveware","year":"2021","key":"ref3"},{"key":"ref6","article-title":"Towards simplifying PKI implementation: Client-server based validation of public key certificates","author":"berbecaru","year":"2019","journal-title":"arXiv preprint arXiv 1910 06458"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.24846\/v27i3y201811"}],"event":{"name":"2023 13th International Conference on Advanced Computer Information Technologies (ACIT)","start":{"date-parts":[[2023,9,21]]},"location":"Wroc\u0142aw, Poland","end":{"date-parts":[[2023,9,23]]}},"container-title":["2023 13th International Conference on Advanced Computer Information Technologies (ACIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10275066\/10275327\/10275516.pdf?arnumber=10275516","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,6]],"date-time":"2023-11-06T18:58:00Z","timestamp":1699297080000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10275516\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,21]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/acit58437.2023.10275516","relation":{},"subject":[],"published":{"date-parts":[[2023,9,21]]}}}