{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T18:36:04Z","timestamp":1771612564259,"version":"3.50.1"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,9]]},"DOI":"10.1109\/idaacs.2015.7340766","type":"proceedings-article","created":{"date-parts":[[2015,12,3]],"date-time":"2015-12-03T16:11:59Z","timestamp":1449159119000},"page":"399-402","source":"Crossref","is-referenced-by-count":41,"title":["Evaluation of web vulnerability scanners"],"prefix":"10.1109","author":[{"given":"Yuma","family":"Makino","sequence":"first","affiliation":[]},{"given":"Vitaly","family":"Klyuev","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","author":"wichers","year":"2010","journal-title":"OWASP Top-10 2013"},{"key":"ref11","author":"willis","year":"2010","journal-title":"OWASP Broken Web Applications Project"},{"key":"ref12","article-title":"Damn vulnerable web application (dvwa)","year":"0"},{"key":"ref13","article-title":"The web application vulnerability scanner evaluation project (wavsep)","year":"0"},{"key":"ref14","article-title":"The owasp zed attack proxy (zap)","year":"0"},{"key":"ref4","author":"suteva","year":"2013","journal-title":"Evaluation and Testing of Several Free\/Open Source Web Vulnerability Scanners"},{"key":"ref3","year":"2013","journal-title":"Introduction of vulnerability testing in web site"},{"key":"ref6","first-page":"19","article-title":"Evaluation of automated testing tools for web application vulnerability detection","volume":"110","author":"nakai","year":"2010"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/PRDC.2007.55"},{"key":"ref8","author":"zalewski","year":"2011","journal-title":"Skipfish Web Application Security Scanner"},{"key":"ref7","article-title":"Owasp zed attack proxy","author":"bennetts","year":"2013","journal-title":"AppSec USA 2013"},{"key":"ref2","author":"sutton","year":"2007","journal-title":"Fuzzing Brute Force Vulnerability Discovery"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1135777.1135817"},{"key":"ref9","author":"ghezzi","year":"2002","journal-title":"Fundamentals of Software Engineering"}],"event":{"name":"2015 IEEE 8th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)","location":"Warsaw, Poland","start":{"date-parts":[[2015,9,24]]},"end":{"date-parts":[[2015,9,26]]}},"container-title":["2015 IEEE 8th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7324044\/7340677\/07340766.pdf?arnumber=7340766","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T22:44:17Z","timestamp":1490395457000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7340766\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/idaacs.2015.7340766","relation":{},"subject":[],"published":{"date-parts":[[2015,9]]}}}