{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:48:20Z","timestamp":1767340100614,"version":"3.37.3"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T00:00:00Z","timestamp":1648598400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T00:00:00Z","timestamp":1648598400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100004681","name":"Higher Education Commission (HEC), Pakistan","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004681","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,3,30]]},"DOI":"10.1109\/icai55435.2022.9773750","type":"proceedings-article","created":{"date-parts":[[2022,5,17]],"date-time":"2022-05-17T19:50:03Z","timestamp":1652817003000},"page":"105-111","source":"Crossref","is-referenced-by-count":6,"title":["SAT: Integrated Multi-agent Blackbox Security Assessment Tool using Machine Learning"],"prefix":"10.1109","author":[{"given":"Jahanzeb","family":"Shahid","sequence":"first","affiliation":[{"name":"National University of Sciences and Technology (NUST),Department of Information Security,Pakistan"}]},{"given":"Zia","family":"Muhammad","sequence":"additional","affiliation":[{"name":"Air University Islamabad,Faculty of Computing and AI,Department of Cybersecurity,Pakistan"}]},{"given":"Zafar","family":"Iqbal","sequence":"additional","affiliation":[{"name":"Air University Islamabad,Faculty of Computing and AI,Department of Cybersecurity,Pakistan"}]},{"given":"Muhammad Sohaib","family":"Khan","sequence":"additional","affiliation":[{"name":"National University of Sciences and Technology (NUST),Department of Information Security,Pakistan"}]},{"given":"Yousef","family":"Amer","sequence":"additional","affiliation":[{"name":"School of Engineering, University of South Australia, Khalifa University,Department of Engineering,UAE"}]},{"given":"Weisheng","family":"Si","sequence":"additional","affiliation":[{"name":"School of Computer, Data and Mathematical Sciences, Western Sydney University,Australia"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3199478.3199504"},{"journal-title":"OWASP Foundation","year":"0","key":"ref11"},{"key":"ref12","article-title":"A Malware Evasion Technique for Auditing Android Anti-Malware Solutions","author":"samrah","year":"2021","journal-title":"2021 IEEE 30th International Conference on Enabling Technologies Infrastructure for Collaborative Enterprises (WETICE)"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"701e","DOI":"10.7717\/peerj-cs.701","article-title":"A survey on common criteria (CC) evaluating schemes for security assessment of IT products","volume":"7","author":"maheen","year":"2021","journal-title":"PeerJ Computer Science"},{"year":"0","key":"ref14"},{"journal-title":"Micro Focus","year":"2021","key":"ref15"},{"journal-title":"Netsparker - Web Application Security For Enterprise","year":"0","key":"ref16"},{"journal-title":"HCL Software","year":"2021","key":"ref17"},{"journal-title":"Nessus Product Family","year":"2021","key":"ref18"},{"journal-title":"OWASP ZAP Zed Attack Proxy - OWASP","year":"0","key":"ref19"},{"journal-title":"Welcome to integrated cyber defense","year":"0","key":"ref4"},{"key":"ref3","first-page":"1","article-title":"A systematic review on security of E-commerce systems","volume":"18 2","author":"sumit","year":"2021","journal-title":"International Journal of Applied Science and Engineering"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"103270","DOI":"10.1016\/j.jnca.2021.103270","article-title":"An enhanced deep learning based framework for web attacks detection, mitigation and attacker profiling","volume":"198","author":"waleed bin","year":"2022","journal-title":"Journal of Network and Computer Applications"},{"journal-title":"Damn Vulnerable Web Application","year":"0","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICSENG.2018.8638176"},{"key":"ref7","first-page":"65","article-title":"Extracting rules for vulnerabilities detection with static metrics using machine learning","volume":"12 1","author":"aakanshi","year":"2021","journal-title":"International Journal of System Assurance Engineering and Management"},{"year":"0","key":"ref2"},{"key":"ref9","article-title":"A Performance Assessment of Free-to-Use Vulnerability Scanners-Revisited","author":"ricardo","year":"2021","journal-title":"IFIP In-ternational Conference on ICT Systems Security and Privacy Protection"},{"year":"0","key":"ref1"},{"journal-title":"Nikto2 - CIRT net&#x201D; Cirt net","year":"2021","key":"ref20"},{"journal-title":"Wapiti Open-Source web-application vulnerability scanner in Python for Windows Linux BSD OSX","year":"2021","key":"ref22"},{"journal-title":"w3af - Open Source Web Application Security Scanner","year":"2021","key":"ref21"},{"journal-title":"Burp Suite - Application Testing Software","year":"2021","key":"ref24"},{"journal-title":"Arachni web application security scanner framework","year":"2021","key":"ref23"},{"key":"ref26","first-page":"1685e","article-title":"MobSTer: A model-based security testing framework for web applications","volume":"28 8","author":"michele","year":"2018","journal-title":"Software Testing Verification and Reliability"},{"key":"ref25","article-title":"SQLi-Fuzzer: A SQL Injection Vulnerability Discovery Framework Based on Machine Learning","author":"yunheng","year":"2021","journal-title":"2021 IEEE 21st International Conference on Communication Technology (ICCT)"}],"event":{"name":"2022 2nd International Conference on Artificial Intelligence (ICAI)","start":{"date-parts":[[2022,3,30]]},"location":"Islamabad, Pakistan","end":{"date-parts":[[2022,3,31]]}},"container-title":["2022 2nd International Conference on Artificial Intelligence (ICAI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9773362\/9773374\/09773750.pdf?arnumber=9773750","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,13]],"date-time":"2022-06-13T21:13:45Z","timestamp":1655154825000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9773750\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3,30]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/icai55435.2022.9773750","relation":{},"subject":[],"published":{"date-parts":[[2022,3,30]]}}}