{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T14:09:35Z","timestamp":1768313375435,"version":"3.49.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,10]]},"DOI":"10.1109\/esem.2009.5314215","type":"proceedings-article","created":{"date-parts":[[2009,11,16]],"date-time":"2009-11-16T23:27:02Z","timestamp":1258414022000},"page":"545-553","source":"Crossref","is-referenced-by-count":19,"title":["Security of open source web applications"],"prefix":"10.1109","author":[{"given":"James","family":"Wal","sequence":"first","affiliation":[]},{"given":"Maureen","family":"Doyle","sequence":"additional","affiliation":[]},{"given":"Grant A.","family":"Welch","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Whelan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","year":"0"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1145\/1414004.1414065"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2005.1553604"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1145\/1456362.1456372"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134349"},{"key":"24","author":"wheeler","year":"0"},{"key":"15","article-title":"software [in]security: software security top 10 surprises","author":"mcgraw","year":"0","journal-title":"informIT"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2005.1553571"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.29"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1976.233837"},{"key":"11","year":"0"},{"key":"12","year":"2008","journal-title":"IBM Internet Security Systems X-Force 2008 Mid-year Trend Statistics"},{"key":"21","year":"0"},{"key":"3","year":"0"},{"key":"20","first-page":"93","article-title":"milk or wine: does software security improve with age?","author":"ozment","year":"2006","journal-title":"Proceedings of the 15th USENIX Security Symposium"},{"key":"2","author":"cohen","year":"1988","journal-title":"Statistical Power Analysis for the Behavioral Sciences"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/2.962984"},{"key":"10","year":"0","journal-title":"Open Source Security Study"},{"key":"7","year":"0"},{"key":"6","year":"2008","journal-title":"Open Source Report 2008"},{"key":"5","year":"0"},{"key":"4","year":"0"},{"key":"9","author":"fenton","year":"1998","journal-title":"Software Metrics A Rigorous and Practical Approach"},{"key":"8","author":"evers","year":"0","journal-title":"Computer crime costs $67 billion FBI says"}],"event":{"name":"2009 3rd International Symposium on Empirical Software Engineering and Measurement (ESEM)","location":"Lake Buena Vista, FL, USA","start":{"date-parts":[[2009,10,15]]},"end":{"date-parts":[[2009,10,16]]}},"container-title":["2009 3rd International Symposium on Empirical Software Engineering and Measurement"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5306516\/5314212\/05314215.pdf?arnumber=5314215","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,18]],"date-time":"2017-03-18T06:00:15Z","timestamp":1489816815000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5314215\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,10]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/esem.2009.5314215","relation":{},"subject":[],"published":{"date-parts":[[2009,10]]}}}