{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T17:51:37Z","timestamp":1725731497336},"reference-count":28,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,1,3]],"date-time":"2023-01-03T00:00:00Z","timestamp":1672704000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,1,3]],"date-time":"2023-01-03T00:00:00Z","timestamp":1672704000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,1,3]]},"DOI":"10.1109\/comsnets56262.2023.10041289","type":"proceedings-article","created":{"date-parts":[[2023,2,23]],"date-time":"2023-02-23T22:46:06Z","timestamp":1677192366000},"page":"522-528","source":"Crossref","is-referenced-by-count":1,"title":["Clarity: Analysing Security in Web Applications"],"prefix":"10.1109","author":[{"given":"Connor J.","family":"Potter","sequence":"first","affiliation":[{"name":"School of Computer Science &#x0026; Informatics, Cardiff University,Cardiff,United Kingdom"}]},{"given":"Neetesh","family":"Saxena","sequence":"additional","affiliation":[{"name":"School of Computer Science &#x0026; Informatics, Cardiff University,Cardiff,United Kingdom"}]},{"given":"Soumyadev","family":"Maity","sequence":"additional","affiliation":[{"name":"IIIT Allahabad,Department of Information technology,Prayagraj,India"}]}],"member":"263","reference":[{"volume-title":"Number of Digital Buyers Worldwide from 2014 to 2021","year":"2019","author":"Clement","key":"ref1"},{"key":"ref2","article-title":"A Survey on Web Application Vulnerabilities and Countermeasures","volume-title":"6th International Conference on Computer Sciences and Convergence Information Technology (ICCIT)","author":"Atashzar","year":"2011"},{"volume-title":"A Survey on Web Application Security","year":"2011","author":"Li","key":"ref4"},{"key":"ref5","first-page":"5","article-title":"The Benefits of PHP, MySQL, JavaScript, and CSS","author":"Nixon","year":"2012","journal-title":"Learning PHP, MySQL, JavaScript, and CSS, 2nd ed: OReilly Media"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.114"},{"article-title":"Detecting Security Vulnerabilities in Web Applications Using Dynamic Analysis with Penetration Testing","volume-title":"OWASP Application Security Conference","author":"Petukhov","key":"ref7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-24006-3_12"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/775152.775174"},{"key":"ref10","article-title":"Web Application Vulnerability Scanners - a Benchmark","author":"Wiegenstein","year":"2006","journal-title":"Virtual Forge GmbH"},{"key":"ref12","first-page":"273","article-title":"Finding Security Vulnerabilities in Java Applications with Static Analysis","volume-title":"14th Usenix Security Symposium","author":"Livshits","year":"2005"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/RAECE.2015.7510233"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2881070"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/DICTAP.2016.7544004"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2960449"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.2013.85"},{"key":"ref18","first-page":"647","article-title":"A survey on web application vulnerabilities and countermeasures","volume-title":"6th International Conference on Computer Sciences and Convergence Information Technology (ICCIT)","author":"Atashzar"},{"volume-title":"Bwapp, the deliberately insecure web application","key":"ref19"},{"volume-title":"Web Application (DVWA)","author":"Vulnerable","key":"ref20"},{"volume-title":"Wapiti open source vulnerability scanner","key":"ref21"},{"volume-title":"Vega open source vulnerability scanner","key":"ref22"},{"volume-title":"Netsparker vulnerability scanner","key":"ref23"},{"volume-title":"Acunetix vulnerability scanner","key":"ref24"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICDIS50059.2020.00012"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/PDGC.2018.8745996"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICAICST53116.2021.9497831"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICSENG.2018.8638176"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/QRS-C51114.2020.00114"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom50675.2020.00207"}],"event":{"name":"2023 15th International Conference on COMmunication Systems & NETworkS (COMSNETS)","start":{"date-parts":[[2023,1,3]]},"location":"Bangalore, India","end":{"date-parts":[[2023,1,8]]}},"container-title":["2023 15th International Conference on COMmunication Systems &amp; NETworkS (COMSNETS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10041243\/10041245\/10041289.pdf?arnumber=10041289","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,13]],"date-time":"2024-02-13T14:37:58Z","timestamp":1707835078000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10041289\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,3]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/comsnets56262.2023.10041289","relation":{},"subject":[],"published":{"date-parts":[[2023,1,3]]}}}