{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:18:07Z","timestamp":1725488287076},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,7]]},"DOI":"10.1109\/iceei.2011.6021795","type":"proceedings-article","created":{"date-parts":[[2011,10,12]],"date-time":"2011-10-12T20:25:16Z","timestamp":1318451116000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Web Vulnerability Assessment: Outsource dilemmas"],"prefix":"10.1109","author":[{"given":"Arniyati","family":"Ahmad","sequence":"first","affiliation":[]},{"given":"Siti Rohaidah","family":"Ahmad","sequence":"additional","affiliation":[]},{"given":"Nor Fatimah","family":"Awang","sequence":"additional","affiliation":[]},{"given":"Zulkarnain Md.","family":"Ali","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Open Web Application Security Project (Owasp)","year":"0","key":"3"},{"journal-title":"Improving Web Application Security Threats and Countermeasures","year":"2003","author":"meier","key":"2"},{"journal-title":"Advanced Penetration Testing and Security Analysis","year":"0","key":"10"},{"journal-title":"Computer and Information Security Handbook","year":"2009","author":"vacca","key":"1"},{"journal-title":"Black Hat Briefings and Training","year":"0","key":"7"},{"journal-title":"Certified Security Analyst\/ Licensed Penetration Tester","year":"0","key":"6"},{"journal-title":"Payment Card Industry Data Security Standards (PCI DSS)","year":"0","key":"5"},{"journal-title":"Open Source Security Test Methodology Manual (OSSTMM)","year":"0","key":"4"},{"journal-title":"EC-council Certified Ethical Hacker","year":"0","key":"9"},{"journal-title":"Penetration Testing Procedures and Methodologies","year":"2010","key":"8"},{"journal-title":"Licensed Penetration Tester (LPT)","year":"0","key":"11"},{"journal-title":"Web Application Vulnerability Assessment Essentials Your First Step to A Highly Secure Web Site","year":"0","author":"shima","key":"12"}],"event":{"name":"2011 International Conference on Electrical Engineering and Informatics (ICEEI)","start":{"date-parts":[[2011,7,17]]},"location":"Bandung, Indonesia","end":{"date-parts":[[2011,7,19]]}},"container-title":["Proceedings of the 2011 International Conference on Electrical Engineering and Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6011492\/6021499\/06021795.pdf?arnumber=6021795","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T04:04:17Z","timestamp":1490069057000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6021795\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,7]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/iceei.2011.6021795","relation":{},"subject":[],"published":{"date-parts":[[2011,7]]}}}