{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T10:02:03Z","timestamp":1725789723538},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1109\/indin.2013.6622969","type":"proceedings-article","created":{"date-parts":[[2013,10,17]],"date-time":"2013-10-17T21:49:48Z","timestamp":1382046588000},"page":"701-706","source":"Crossref","is-referenced-by-count":5,"title":["Securing energy metering software with automatic source code correction"],"prefix":"10.1109","author":[{"given":"Iberia","family":"Medeiros","sequence":"first","affiliation":[]},{"given":"Nuno F.","family":"Neves","sequence":"additional","affiliation":[]},{"given":"Miguel","family":"Correia","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"WAP: Automatic detection and correction of web application vulnerabilities","author":"medeiros","year":"2013","journal-title":"INESC Technical report"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.40"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046720"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070521"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/161494.161501"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/988672.988679"},{"year":"0","key":"14"},{"journal-title":"Writing Secure Code","year":"2003","author":"howard","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/775152.775174"},{"journal-title":"The Definitive ANTLR Reference Building Domain-Specific Languages","year":"2007","author":"parr","key":"21"},{"key":"20","article-title":"Php aspis: Using partial taint tracking to protect against injection attacks","author":"papagiannis","year":"2011","journal-title":"Proceedings of the 2nd USENIX Conference on Web Application Development"},{"key":"22","first-page":"124","article-title":"Defending against injection attacks through context-sensitive string evaluation","author":"pietraszek","year":"2005","journal-title":"RAID'05 Proceedings of the 8th International Conference on Recent Advances in Intrusion Detection"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1145\/2046556.2046564"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382246"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2009.5270294"},{"year":"0","key":"26"},{"journal-title":"OWASP Top 10-The Ten Most Critical Web Application Security Risks (2010)","year":"2010","author":"williams","key":"27"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/2168836.2168865"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368118"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70748"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2009.91"},{"year":"0","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-024X(200006)30:7<775::AID-SPE309>3.0.CO;2-H"},{"journal-title":"Building Research Establishment The Government's Standard Assessment Procedure for Energy Rating of Dwellings","year":"2012","key":"5"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1108473.1108496"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1101908.1101935"},{"journal-title":"The Supply Chain Problem","year":"2008","author":"davidson","key":"8"}],"event":{"name":"2013 IEEE 11th International Conference on Industrial Informatics (INDIN)","start":{"date-parts":[[2013,7,29]]},"location":"Bochum, Germany","end":{"date-parts":[[2013,7,31]]}},"container-title":["2013 11th IEEE International Conference on Industrial Informatics (INDIN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6599026\/6622844\/06622969.pdf?arnumber=6622969","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T20:55:24Z","timestamp":1490216124000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6622969\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/indin.2013.6622969","relation":{},"subject":[],"published":{"date-parts":[[2013,7]]}}}