{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T08:52:46Z","timestamp":1770540766449,"version":"3.49.0"},"reference-count":30,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,6,29]],"date-time":"2021-06-29T00:00:00Z","timestamp":1624924800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,6,29]],"date-time":"2021-06-29T00:00:00Z","timestamp":1624924800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,6,29]],"date-time":"2021-06-29T00:00:00Z","timestamp":1624924800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,6,29]]},"DOI":"10.1109\/icaicst53116.2021.9497831","type":"proceedings-article","created":{"date-parts":[[2021,7,30]],"date-time":"2021-07-30T21:10:39Z","timestamp":1627679439000},"page":"200-204","source":"Crossref","is-referenced-by-count":14,"title":["Evaluation of Web Application Vulnerability Scanner for Modern Web Application"],"prefix":"10.1109","author":[{"given":"Azwar","family":"Al Anhar","sequence":"first","affiliation":[]},{"given":"Yohan","family":"Suryanto","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref30","article-title":"A cost-effective approach to evaluating security vulnerability scanner","author":"tung","year":"2013"},{"key":"ref10","article-title":"A buggy Web Application","year":"2014"},{"key":"ref11","article-title":"Stack Overflow Developer Survey 2020","year":"2020"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s00607-014-0394-9"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2007.611"},{"key":"ref14","article-title":"Different Forms of Software Testing Techniques for Finding Errors","author":"khan","year":"2010","journal-title":"Int J Comput Sci Issues"},{"key":"ref15","article-title":"OWASP Top 10- 2013","year":"2013","journal-title":"OWASP Top 10"},{"key":"ref16","article-title":"OWASP Top 10- 2017","year":"2017","journal-title":"OWASP Top 10"},{"key":"ref17","article-title":"Regular expression Denial of Service -ReDoS","year":"0"},{"key":"ref18","article-title":"Server Side Request Forgery (SSRF)","year":"0"},{"key":"ref19","article-title":"Node Up and Running","author":"hughes-croucher","year":"2012","journal-title":"Zh Eksp i Teor Fiz"},{"key":"ref28","article-title":"Burp Suite Professional","year":"2021"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1002\/spe.2870"},{"key":"ref27","article-title":"Arachni Web Application Security Scanner Framework","year":"2017"},{"key":"ref3","article-title":"Open Source Web Vulnerability Scanners: The Cost Effective Choice ?","author":"mcquade","year":"2014","journal-title":"2014 Proc Conf Inf Syst Appl Res"},{"key":"ref6","article-title":"Evaluation of web vulnerability scanners based on OWASP benchmark","author":"mburano","year":"2019"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2015.30"},{"key":"ref5","article-title":"Evaluation of Web Application Vulnerability Scanners in Modern Pentest\/SSDLC Usage Scenarios","author":"chen","year":"2017"},{"key":"ref8","article-title":"Damn Vulnerable Web Application (DVWA)","year":"2015"},{"key":"ref7","article-title":"Performance Evaluation of Open Source Web Application Vulnerability Scanners based on OWASP Benchmark","author":"sarpong","year":"2021","journal-title":"Int J Comput Appl"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1135777.1135817"},{"key":"ref9","article-title":"OWASP WebGoat","year":"0"},{"key":"ref1","article-title":"Why Johnny can&#x2019;t pentest: An analysis of black-box web vulnerability scanners","author":"doup\u00e9","year":"2010"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/IDAACS.2015.7340766"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.25007\/ajnu.v9n1a532"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/6158107"},{"key":"ref24","article-title":"Projects\/OWASP Node js Goat Project","year":"0"},{"key":"ref23","article-title":"Damn Vulnerable NodeJS Application (DVNA)","year":"0"},{"key":"ref26","article-title":"The web-application vulnerability scanner","author":"surribas","year":"2021"},{"key":"ref25","article-title":"OWASP Zed Attack Proxy Project","year":"2020"}],"event":{"name":"2021 International Conference on Artificial Intelligence and Computer Science Technology (ICAICST)","location":"Yogyakarta, Indonesia","start":{"date-parts":[[2021,6,29]]},"end":{"date-parts":[[2021,6,30]]}},"container-title":["2021 International Conference on Artificial Intelligence and Computer Science Technology (ICAICST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9497776\/9497791\/09497831.pdf?arnumber=9497831","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T15:48:35Z","timestamp":1652197715000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9497831\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,29]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/icaicst53116.2021.9497831","relation":{},"subject":[],"published":{"date-parts":[[2021,6,29]]}}}