{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T04:09:55Z","timestamp":1759032595942},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.1109\/icacci.2018.8554656","type":"proceedings-article","created":{"date-parts":[[2018,12,4]],"date-time":"2018-12-04T01:17:32Z","timestamp":1543886252000},"page":"489-494","source":"Crossref","is-referenced-by-count":11,"title":["Vulnerability Coverage Criteria for Security Testing of Web Applications"],"prefix":"10.1109","author":[{"given":"P.V.R.","family":"Murthy","sequence":"first","affiliation":[]},{"given":"R.G.","family":"Shilpa","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070521"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2610384.2610403"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1007\/978-3-662-45231-8_24","article-title":"Risk-based vulnerability testing using security test patterns","author":"botella","year":"2014","journal-title":"Leveraging Applications of Formal Methods Verification and Validation Specialized Techniques and Applications"},{"journal-title":"Software Testing Verification and Reliability","year":"2015","author":"felderer","key":"ref13"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1145\/2593833.2593835","author":"thom\u00e9","year":"2014","journal-title":"Proceedings of IEEE International Workshop on Search Based Software Testing"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/LADC.2009.21"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.183"},{"key":"ref5","article-title":"Mutation Based SQL Injection Test Cases Generation for the Web Based Application Vulnerability Testing","author":"ilies","year":"2016","journal-title":"2nd International Conference on Electronics Network and Computer Engineering"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIP.2017.9"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICeND.2015.7328531"},{"key":"ref2","first-page":"230","article-title":"Detecting Vulnerabilities in Web Applications Using Automated Black Box and Manual Penetration Testing","author":"awang","year":"2013","journal-title":"Advances in Security of Information and Communication Networks First International Conference SecNet 2013"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2541315"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17714-9_9"}],"event":{"name":"2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","start":{"date-parts":[[2018,9,19]]},"location":"Bangalore, India","end":{"date-parts":[[2018,9,22]]}},"container-title":["2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8536361\/8554361\/08554656.pdf?arnumber=8554656","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,2]],"date-time":"2022-03-02T20:50:34Z","timestamp":1646254234000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8554656\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/icacci.2018.8554656","relation":{},"subject":[],"published":{"date-parts":[[2018,9]]}}}