{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,6]],"date-time":"2025-05-06T14:23:15Z","timestamp":1746541395928},"reference-count":34,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,5]]},"DOI":"10.1109\/icpc.2016.7503709","type":"proceedings-article","created":{"date-parts":[[2016,7,7]],"date-time":"2016-07-07T17:30:57Z","timestamp":1467912657000},"page":"1-10","source":"Crossref","is-referenced-by-count":3,"title":["Navigating the WordPress plugin landscape"],"prefix":"10.1109","author":[{"given":"Mark","family":"Hills","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368112"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2008.43"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227186"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/1806596.1806598"},{"key":"ref34","first-page":"179","article-title":"Static Detection of Security Vulnerabilities in Scripting Languages","author":"xie","year":"2006","journal-title":"Proceedings of the 15th USENIX Security Symposium"},{"journal-title":"Program Refactoring in the Presence of Preprocessor Directives","year":"2005","author":"garrido","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1181775.1181785"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2015.7081870"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.72"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR-WCRE.2014.6747217"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2483760.2483786"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2642937.2643017"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/988672.988679"},{"key":"ref18","first-page":"258","article-title":"Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities (Short Paper)","author":"jovanovic","year":"0"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-18023-1_6"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2012.6405296"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1002\/spe.776"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2011.6100047"},{"journal-title":"Soft Typing PHP","year":"2009","author":"camphuijsen","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1158288"},{"key":"ref29","first-page":"52","article-title":"The Eval That Men Do - A Large-Scale Study of the Use of Eval in JavaScript Applications","author":"richards","year":"2011","journal-title":"Proceedings of ECOOP 2011"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2678015.2682535"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2015.7081816"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2597008.2597153"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-013-9221-3"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1640089.1640110"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1167473.1167507"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2009.28"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2014.60"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1002\/spe.4380010203"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1595808.1595821"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806819"},{"key":"ref26","first-page":"104","article-title":"Evaluating the Design of the R Language - Objects and Functions for Data Analysis","author":"morandat","year":"2012","journal-title":"Proceedings of ECOOP'12"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1060745.1060809"}],"event":{"name":"2016 IEEE 24th International Conference on Program Comprehension (ICPC)","start":{"date-parts":[[2016,5,16]]},"location":"Austin, TX, USA","end":{"date-parts":[[2016,5,17]]}},"container-title":["2016 IEEE 24th International Conference on Program Comprehension (ICPC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7500162\/7503699\/07503709.pdf?arnumber=7503709","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,9,28]],"date-time":"2016-09-28T12:16:23Z","timestamp":1475064983000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7503709\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/icpc.2016.7503709","relation":{},"subject":[],"published":{"date-parts":[[2016,5]]}}}