{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,10]],"date-time":"2025-11-10T18:48:59Z","timestamp":1762800539672,"version":"build-2065373602"},"reference-count":16,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T00:00:00Z","timestamp":1754265600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T00:00:00Z","timestamp":1754265600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,8,4]]},"DOI":"10.1109\/csr64739.2025.11130030","type":"proceedings-article","created":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T19:04:27Z","timestamp":1756235067000},"page":"29-35","source":"Crossref","is-referenced-by-count":0,"title":["A Machine Learning Approach to Automate Greybox Testing"],"prefix":"10.1109","author":[{"given":"Alaa","family":"Hijazi","sequence":"first","affiliation":[{"name":"Cyber Intelligence Unit Potech Consulting,Beirut,Lebanon"}]},{"given":"Dany","family":"Mezher","sequence":"additional","affiliation":[{"name":"Saint Joseph University of Beirut,Faculty of Engineering,Beirut,Lebanon"}]},{"given":"Elie","family":"Zeidan","sequence":"additional","affiliation":[{"name":"Thidesoft Potech Global,Beirut,Lebanon"}]},{"given":"Carole","family":"Bassil","sequence":"additional","affiliation":[{"name":"LaRRIS - Lebanese University,Research and Development Potech Global,Beirut,Lebanon"}]}],"member":"263","reference":[{"volume-title":"Salt Security. Api security trends","key":"ref1"},{"journal-title":"OWASP Top Ten 2021","article-title":"A01:2021-broken access control","year":"2021","key":"ref2"},{"journal-title":"PortSwigger","first-page":"2025","article-title":"Insecure direct object (idor)","key":"ref3"},{"journal-title":"PortSwigger","first-page":"2025","article-title":"Access control","key":"ref4"},{"key":"ref5","first-page":"2025","article-title":"Broken function-level authorization","year":"2023","journal-title":"OWASP API Security 2023"},{"volume-title":"Practical DevSecOps. Api without authentication","key":"ref6","first-page":"2025"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.5220\/0010300102040216"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23021"},{"issue":"2","key":"ref9","first-page":"2021","article-title":"Idot: Black-box detection of access control violations in web applications","volume":"13","author":"Hadavi","journal-title":"ISeCure"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataSecurity-HPSC-IDS49724.2020.00016"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SecDev53368.2022.00029"},{"key":"ref12","article-title":"Tlsh - a locality sensitive hash","author":"Oliver","year":"2025","journal-title":"Trend Micro"},{"article-title":"ssdeeper: Evaluating and improving ssdeep","author":"Jakobs","key":"ref13","doi-asserted-by":"crossref","DOI":"10.1016\/j.fsidi.2022.301402"},{"journal-title":"PortSwigger","article-title":"Burp suite","year":"2025","key":"ref14"},{"volume-title":"OpenAI","key":"ref15","first-page":"2025"},{"volume-title":"Scikit-learn developers. Model evaluation: quantifying the quality of predictions","key":"ref16","first-page":"2025"}],"event":{"name":"2025 IEEE International Conference on Cyber Security and Resilience (CSR)","start":{"date-parts":[[2025,8,4]]},"location":"Chania, Crete, Greece","end":{"date-parts":[[2025,8,6]]}},"container-title":["2025 IEEE International Conference on Cyber Security and Resilience (CSR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11129696\/11129957\/11130030.pdf?arnumber=11130030","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,10]],"date-time":"2025-11-10T18:44:51Z","timestamp":1762800291000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11130030\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,4]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/csr64739.2025.11130030","relation":{},"subject":[],"published":{"date-parts":[[2025,8,4]]}}}