{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T16:53:06Z","timestamp":1769100786632,"version":"3.49.0"},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,7,17]],"date-time":"2024-07-17T00:00:00Z","timestamp":1721174400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,7,17]],"date-time":"2024-07-17T00:00:00Z","timestamp":1721174400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,7,17]]},"DOI":"10.1109\/csndsp60683.2024.10636578","type":"proceedings-article","created":{"date-parts":[[2024,8,23]],"date-time":"2024-08-23T17:39:00Z","timestamp":1724434740000},"page":"377-382","source":"Crossref","is-referenced-by-count":2,"title":["Evaluating the Performance Open-Source Vulnerability Scanners"],"prefix":"10.1109","author":[{"given":"Mohammad Rafi","family":"Gajula","sequence":"first","affiliation":[{"name":"LuminVibe,London,United Kingdom"}]},{"given":"Vassilios G.","family":"Vassilakis","sequence":"additional","affiliation":[{"name":"University of York,Department of Computer Science,York,United Kingdom"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.08.004"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CSNDSP54353.2022.9908039"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.array.2019.100011"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3230833.3233287"},{"key":"ref5","volume-title":"Nmap Network Scanner","year":"2024"},{"key":"ref6","volume-title":"[6] Zed Attack Proxy (ZAP)","year":"2024"},{"key":"ref7","volume-title":"Open Vulnerability Assessment Scanner (OpenVAS)","year":"2024"},{"key":"ref8","volume-title":"Nikto Web Server Scanner","year":"2024"},{"key":"ref9","volume-title":"Nessus Vulnerability Scanner","year":"2024"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2019.03.012"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICIoT48696.2020.9089514"},{"key":"ref12","author":"Booth","year":"2013","journal-title":"The national vulnerability database (NVD): Overview"},{"key":"ref13","volume-title":"Veracode Static Code Analysis","year":"2024"},{"key":"ref14","volume-title":"Wireshark Network Protocol Analyzer","year":"2024"},{"key":"ref15","volume-title":"BurpSuite Security Testing","year":"2024"},{"key":"ref16","volume-title":"Dynamic Application Security Testing (DAST) Software","year":"2024"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1002\/spe.2870"},{"key":"ref18","article-title":"Evaluation of open source web vulnerability scanners and their techniques used to find SQL injection and cross-site scripting vulnerabilities","volume-title":"Link\u00f6ping University","author":"Matti","year":"2021"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/6158107"},{"key":"ref20","volume-title":"[20] Amazon Web Services (AWS) Cloud Computing","year":"2024"},{"key":"ref21","volume-title":"Microsoft Azure Cloud Computing Services","year":"2024"},{"key":"ref22","volume-title":"Linode Cloud Computing Services","year":"2024"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS54207.2022.9789783"},{"key":"ref24","volume-title":"vnStat"},{"key":"ref25","volume-title":"nload","year":"2024"},{"key":"ref26","volume-title":"tshark","year":"2024"},{"key":"ref27","volume-title":"sysstat","year":"2024"}],"event":{"name":"2024 14th International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP)","location":"Rome, Italy","start":{"date-parts":[[2024,7,17]]},"end":{"date-parts":[[2024,7,19]]}},"container-title":["2024 14th International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10636307\/10636354\/10636578.pdf?arnumber=10636578","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,31]],"date-time":"2024-08-31T04:58:38Z","timestamp":1725080318000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10636578\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,17]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/csndsp60683.2024.10636578","relation":{},"subject":[],"published":{"date-parts":[[2024,7,17]]}}}