{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T17:41:06Z","timestamp":1776102066819,"version":"3.50.1"},"reference-count":34,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,10]]},"DOI":"10.1109\/csnet47905.2019.9108965","type":"proceedings-article","created":{"date-parts":[[2020,6,5]],"date-time":"2020-06-05T21:03:11Z","timestamp":1591390991000},"page":"142-149","source":"Crossref","is-referenced-by-count":3,"title":["XSStudent: Proposal to Avoid Cross-Site Scripting (XSS) Attacks in Universities"],"prefix":"10.1109","author":[{"given":"German","family":"Rodriguez","sequence":"first","affiliation":[]},{"given":"Jenny","family":"Torres","sequence":"additional","affiliation":[]},{"given":"Pamela","family":"Flores","sequence":"additional","affiliation":[]},{"given":"Eduardo","family":"Benavides","sequence":"additional","affiliation":[]},{"given":"Daniel","family":"Nunez-Agurto","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","year":"2019","journal-title":"Web application security and scanning"},{"key":"ref32","year":"2019","journal-title":"Cross site scripting What do you need to know about it?"},{"key":"ref31","year":"2019","journal-title":"Web app scanning"},{"key":"ref30","year":"2019","journal-title":"Ssl\/tls capabilities of your browser"},{"key":"ref34","year":"2019","journal-title":"Xsscon"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICCUBEA.2016.7860061"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICIT.2018.8352431"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41320-9_4"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/2156906"},{"key":"ref14","author":"tiny","year":"2019","journal-title":"URL () Tinyurl"},{"key":"ref15","author":"alcorn","year":"2019","journal-title":"Beef the Browser Exploitation Framework"},{"key":"ref16","year":"2019","journal-title":"Virus total url"},{"key":"ref17","year":"2019","journal-title":"Pentest yourself don&#x2019;t get hacked"},{"key":"ref18","year":"2019","journal-title":"Web Sandbox"},{"key":"ref19","year":"2019","journal-title":"Las mejores herramientas online para pentesting"},{"key":"ref28","year":"2019","journal-title":"Xss vulnerability scanning with acunetix"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2015.84"},{"key":"ref27","year":"2019","journal-title":"Cross-Site Scripting"},{"key":"ref3","year":"2019","journal-title":"que es el pharming y c&#x00F3;mo evitarlo"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MIPRO.2015.7160387"},{"key":"ref29","year":"2019","journal-title":"Xss"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2015.153"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CCAA.2017.8229850"},{"key":"ref7","first-page":"109","article-title":"A mobile based anti-phishing authentication scheme using qr code","author":"choi","year":"2011","journal-title":"International Conference on Mobile IT Convergence"},{"key":"ref2","year":"2019","journal-title":"Codigos qr con troyanos y tambi&#x00E9;n phishing"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/i-Society18435.2011.5978554"},{"key":"ref1","author":"incorporated","year":"2019","journal-title":"Foro codigos qr"},{"key":"ref20","year":"2019","journal-title":"Internet security and data mining"},{"key":"ref22","author":"design","year":"2019","journal-title":"Network tools by yougetsignal"},{"key":"ref21","year":"2019","journal-title":"Online ping traceroute dns lookup"},{"key":"ref24","year":"2019","journal-title":"9 cross-site scripting (xss) scan testing tools online"},{"key":"ref23","year":"2019","journal-title":"Url scanner"},{"key":"ref26","year":"2019","journal-title":"Threatsign! website anti-malware"},{"key":"ref25","year":"2019","journal-title":"Website Monitoring"}],"event":{"name":"2019 3rd Cyber Security in Networking Conference (CSNet)","location":"Quito, Ecuador","start":{"date-parts":[[2019,10,23]]},"end":{"date-parts":[[2019,10,25]]}},"container-title":["2019 3rd Cyber Security in Networking Conference (CSNet)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9106988\/9108844\/09108965.pdf?arnumber=9108965","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,15]],"date-time":"2022-07-15T03:12:17Z","timestamp":1657854737000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9108965\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/csnet47905.2019.9108965","relation":{},"subject":[],"published":{"date-parts":[[2019,10]]}}}