{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T19:50:55Z","timestamp":1725393055990},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,8]]},"DOI":"10.1109\/iri.2014.7051949","type":"proceedings-article","created":{"date-parts":[[2015,3,3]],"date-time":"2015-03-03T15:16:47Z","timestamp":1425395807000},"page":"633-638","source":"Crossref","is-referenced-by-count":0,"title":["Sniper: A framework for detecting attack attempts to open source web applications at the run time"],"prefix":"10.1109","author":[{"given":"Abdullah","family":"Almurayh","sequence":"first","affiliation":[]}],"member":"263","reference":[{"journal-title":"Remote and Local File Inclusion Explained","year":"2008","author":"johnson","key":"ref10"},{"journal-title":"joomla Joomla portfolio","year":"2014","key":"ref11"},{"journal-title":"JoomlaGov Explore government web sites built with joomla!","year":"2014","key":"ref12"},{"journal-title":"Static Code Analysis List","year":"2013","author":"koussa","key":"ref13"},{"key":"ref14","article-title":"The role of intrusion detection systems","author":"mchugh","year":"2000","journal-title":"Washington Post"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2012.219"},{"key":"ref16","first-page":"318","article-title":"Two novel server-side attacks against log file in Shared Web Hosting servers","author":"mirheidari","year":"2012","journal-title":"2012 International Conference for Internet Technology and Secured Transactions ICITST"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1972551.1972553"},{"journal-title":"NIST Source code security analyzers","year":"2007","key":"ref18"},{"journal-title":"The Open Source Definition","year":"2014","key":"ref19"},{"journal-title":"Remote File Inclusion","year":"2010","author":"auger","key":"ref4"},{"journal-title":"Apache Apache http server project","year":"2013","key":"ref3"},{"journal-title":"Uniform Resource Locators (URL)","year":"1994","author":"berners-lee","key":"ref6"},{"journal-title":"Web Application Hacking Incident Database","year":"2013","author":"barnett","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2006.1687588"},{"journal-title":"Developers Guide to Web Application Security","year":"2011","author":"cross","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2010.5593241"},{"journal-title":"Hack-db Search archive of hacktivism database","year":"2013","key":"ref9"},{"journal-title":"Forced Browsing Understanding and Halting Simple Browser Attacks","year":"2012","key":"ref1"},{"journal-title":"OWASP Top 10 2007-malicious file execution","year":"2007","key":"ref20"},{"journal-title":"phpBB phpbb - free and open source forum software","year":"2014","key":"ref22"},{"journal-title":"OWASP Attack","year":"2008","key":"ref21"},{"journal-title":"Hot or Not Web Application Firewalls for Security and Regulatory Compliance","year":"2008","author":"sarwate","key":"ref24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CERMA.2008.60"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2008.73"},{"journal-title":"How to Set Up and Maintain A World Wide Web Site The Guide for Information Providers","year":"1995","author":"stein","key":"ref25"}],"event":{"name":"2014 IEEE International Conference on Information Reuse and Integration (IRI)","start":{"date-parts":[[2014,8,13]]},"location":"Redwood City, CA, USA","end":{"date-parts":[[2014,8,15]]}},"container-title":["Proceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration (IEEE IRI 2014)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7036233\/7051718\/07051949.pdf?arnumber=7051949","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T22:17:41Z","timestamp":1490307461000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7051949\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/iri.2014.7051949","relation":{},"subject":[],"published":{"date-parts":[[2014,8]]}}}