{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T23:16:48Z","timestamp":1771888608822,"version":"3.50.1"},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,6,24]],"date-time":"2024-06-24T00:00:00Z","timestamp":1719187200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,6,24]],"date-time":"2024-06-24T00:00:00Z","timestamp":1719187200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,6,24]]},"DOI":"10.1109\/icccnt61001.2024.10726271","type":"proceedings-article","created":{"date-parts":[[2024,11,4]],"date-time":"2024-11-04T23:06:46Z","timestamp":1730761606000},"page":"1-8","source":"Crossref","is-referenced-by-count":2,"title":["Securing PHP code: A Parsing Approach"],"prefix":"10.1109","author":[{"given":"Alokam","family":"Meghana","sequence":"first","affiliation":[{"name":"Amrita School of Computing,Dept. of CSE&#x0026;AI,Bengaluru,India"}]},{"given":"Bilakanti","family":"Vanshika","sequence":"additional","affiliation":[{"name":"Amrita School of Computing,Dept. of CSE&#x0026;AI,Bengaluru,India"}]},{"given":"Karnam Veda","family":"Samhitha","sequence":"additional","affiliation":[{"name":"Amrita School of Computing,Dept. of CSE&#x0026;AI,Bengaluru,India"}]},{"given":"Keerthana","family":"Murali","sequence":"additional","affiliation":[{"name":"Amrita School of Computing,Dept. of CSE&#x0026;AI,Bengaluru,India"}]},{"given":"Meena","family":"Belwal","sequence":"additional","affiliation":[{"name":"Amrita School of Computing,Dept. of CSE,Bengaluru,India"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW54247.2022.9833880"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2018.00049"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICCA49400.2020.9022833"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSIT.2010.5563777"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SANER50967.2021.00040"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2012.727132"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2013.06.007"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/429807"},{"key":"ref9","first-page":"135","article-title":"File parsing vulnerability detection with symbolic execution","volume-title":"2020 Sixth International Symposium on Theoretical Aspects of Software Engineering","author":"Chaojian"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00033"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SP54263.2024.00177"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICTCS.2017.19"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIP.2019.00021"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1108473.1108496"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SPW54247.2022.9833883"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.4236\/ijcns.2022.158010"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2010.12"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ISSREW.2019.00098"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.33"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.5120\/21653-5063"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CSITSS60515.2023.10334103"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CSITSS60515.2023.10334236"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.23919\/indiacom61295.2024.10498858"},{"key":"ref24","article-title":"Deep Learning for Cyber Security Applications: A Comprehensive Survey","author":"Ravi","year":"2021"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2024.03.270"}],"event":{"name":"2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT)","location":"Kamand, India","start":{"date-parts":[[2024,6,24]]},"end":{"date-parts":[[2024,6,28]]}},"container-title":["2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10723818\/10723316\/10726271.pdf?arnumber=10726271","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T09:40:12Z","timestamp":1732700412000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10726271\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,24]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/icccnt61001.2024.10726271","relation":{},"subject":[],"published":{"date-parts":[[2024,6,24]]}}}