{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T10:01:21Z","timestamp":1766484081151,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,6]]},"DOI":"10.1109\/cts.2015.7210446","type":"proceedings-article","created":{"date-parts":[[2015,8,20]],"date-time":"2015-08-20T17:46:15Z","timestamp":1440092775000},"page":"337-344","source":"Crossref","is-referenced-by-count":9,"title":["Classification of Lightweight Directory Access Protocol query injection attacks and mitigation techniques"],"prefix":"10.1109","author":[{"given":"Pranahita","family":"Bulusu","sequence":"first","affiliation":[]},{"given":"Hossain","family":"Shahriar","sequence":"additional","affiliation":[]},{"given":"Hisham M.","family":"Haddad","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606611"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2351676.2351691"},{"year":"0","key":"ref12","article-title":"Testing for LDAP Injection, Open Web Application Security Project (OWASP)"},{"journal-title":"Prevention of brute force attacks in LDAP","year":"2013","author":"venturin","key":"ref13"},{"key":"ref14","article-title":"LDAP Injection: Are Your Applications Vulnerable?","author":"faust","year":"0","journal-title":"SPI Labs"},{"year":"0","key":"ref15","article-title":"OpenLDAP Security Considerations"},{"key":"ref16","first-page":"374","article-title":"Detection and Prevention of SQL Injection attack","volume":"5","author":"kumar","year":"0","journal-title":"Proceedings of the International Journal of Computer Science and Information Technologies"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1529282.1529737"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/QSIC.2008.33"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.2012.31"},{"year":"0","key":"ref4","article-title":"Vulnerable Applications for LDAP Injection"},{"journal-title":"LDAP Injection Vulnerability in SmarterMail","year":"0","author":"hoyt","key":"ref3"},{"key":"ref6","article-title":"LDAP injection Attack and Defense Techniques","author":"coldwind","year":"0","journal-title":"HITB Magazine"},{"journal-title":"LDAP Injection Guide Veracode","year":"0","author":"dupaul","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1449814.1449912"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/IWSESS.2009.5068460"},{"year":"0","key":"ref2","article-title":"Open Web Application Security Project (OWASP), LDAP injection"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076770"},{"year":"0","key":"ref1","article-title":"Introduction to Lightweight Directory Access Protocol (LDAP), Article ID: 196455"},{"key":"ref20","first-page":"70","article-title":"An Analysis Framework for Security in Web Applications","author":"wassermann","year":"2004","journal-title":"Proceedings of the FSE Workshop on Specification and Verification of Component-Based Systems (SAVCBS 2004)"},{"year":"0","key":"ref22","article-title":"IBM Knowledge Center, Injection Attacks"},{"year":"0","key":"ref21","article-title":"Oracle Document, Interface PreparedStatement"},{"year":"0","key":"ref24","article-title":"Open Web Application Security Project (OWASP), SQL Injection"},{"year":"0","key":"ref23","article-title":"SQL Injection example"},{"year":"2013","key":"ref25","article-title":"Open Web Application Security Project (OWASP) Top Ten"}],"event":{"name":"2015 International Conference on Collaboration Technologies and Systems (CTS)","start":{"date-parts":[[2015,6,1]]},"location":"Atlanta, GA, USA","end":{"date-parts":[[2015,6,5]]}},"container-title":["2015 International Conference on Collaboration Technologies and Systems (CTS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7169724\/7210375\/07210446.pdf?arnumber=7210446","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T17:51:04Z","timestamp":1490377864000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7210446\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/cts.2015.7210446","relation":{},"subject":[],"published":{"date-parts":[[2015,6]]}}}