{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T19:00:15Z","timestamp":1771700415306,"version":"3.50.1"},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,9,7]],"date-time":"2023-09-07T00:00:00Z","timestamp":1694044800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,9,7]],"date-time":"2023-09-07T00:00:00Z","timestamp":1694044800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,9,7]]},"DOI":"10.1109\/idaacs58523.2023.10348784","type":"proceedings-article","created":{"date-parts":[[2023,12,21]],"date-time":"2023-12-21T14:20:33Z","timestamp":1703168433000},"page":"400-407","source":"Crossref","is-referenced-by-count":5,"title":["Exploring the Vulnerabilities and Countermeasures of SSL\/TLS Protocols in Secure Data Transmission Over Computer Networks"],"prefix":"10.1109","author":[{"given":"Fidan","family":"Bozkurt","sequence":"first","affiliation":[{"name":"National Defence University,Department of Computer Engineering,Istanbul,Turkey"}]},{"given":"Mustafa","family":"Kara","sequence":"additional","affiliation":[{"name":"National Defence University,Air Force Academy,Department of Computer Engineering,Istanbul,Turkey"}]},{"given":"Muhammed Ali","family":"Ayd\u0131n","sequence":"additional","affiliation":[{"name":"Istanbul University-Cerrahpa&#x015F;a,Department of Computer Engineering,Istanbul,Turkey"}]},{"given":"Hasan H\u00fcseyin","family":"Balik","sequence":"additional","affiliation":[{"name":"&#x0130;stanbul Ayd&#x0131;n University,Department of Computer Engineering,Istanbul,Turkey"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2016.123"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-22479-0_11"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.47839\/ijc.15.1.827"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICIEM54221.2022.9853153"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMMST.2018.8632026"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/NGCT.2016.7877537"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/DESSERT.2018.8409116"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.5121\/csit.2016.60620"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC51644.2023.10059989"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICMT52455.2021.9502818"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1080\/02522667.2021.1968579"},{"key":"ref12","article-title":"Transport Layer Security Protocol","year":"2022","journal-title":"Microsoft.com"},{"key":"ref13","first-page":"1","article-title":"Cipher suite rollback: a misuse pattern for the SSL\/TLS client\/server authentication handshake protocol","volume-title":"Proceedings of the 21st Conference on Pattern Languages of Programs","author":"Alkazimi"},{"key":"ref14","article-title":"TLS 1.3 Nedir? I Neden TLS 1.3 Kullanilmali?","year":"2022","journal-title":"Natro.com."},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/APNOMS.2015.7275373"},{"key":"ref16","volume-title":"Web g\u00fcvenli\u011finde SSL\/TLS kriptografik protokol\u00fc: a\u00e7ikliklar, saldirilar ve g\u00fcvenlik \u00f6nlemleri","author":"\u00c7akmak","year":"2018"},{"key":"ref17","article-title":"Analysis of recent attacks on SSL\/TLS protocols","volume-title":"Student Rep.","author":"Ozden","year":"2016"},{"key":"ref18","article-title":"The Complete Guide to Securely Using SSL\/TLS and PKI in Infrastructure Deployment and Web Application Development","volume-title":"Bulletproof SSL\/TLS and PKI","author":"Ristic","year":"2014"},{"issue":"4","key":"ref19","first-page":"159","article-title":"Comparative analysis of Open-SSL vulnerabilities & heartbleed exploit detection","volume":"8","author":"Momani","year":"2014","journal-title":"International Journal of Computer Science and Security (IJCSS)"}],"event":{"name":"2023 IEEE 12th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)","location":"Dortmund, Germany","start":{"date-parts":[[2023,9,7]]},"end":{"date-parts":[[2023,9,9]]}},"container-title":["2023 IEEE 12th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10348627\/10348628\/10348784.pdf?arnumber=10348784","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,11]],"date-time":"2024-01-11T20:50:01Z","timestamp":1705006201000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10348784\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,7]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/idaacs58523.2023.10348784","relation":{},"subject":[],"published":{"date-parts":[[2023,9,7]]}}}