{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,6]],"date-time":"2025-07-06T00:04:52Z","timestamp":1751760292638},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,6]]},"DOI":"10.1109\/iscc.2010.5546813","type":"proceedings-article","created":{"date-parts":[[2010,8,18]],"date-time":"2010-08-18T14:16:52Z","timestamp":1282141012000},"page":"320-325","source":"Crossref","is-referenced-by-count":6,"title":["Towards a practical and effective security testing methodology"],"prefix":"10.1109","author":[{"given":"Marco","family":"Prandini","sequence":"first","affiliation":[]},{"given":"Marco","family":"Ramilli","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/MSECP.2003.1219078"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/MSP.2004.84"},{"year":"2006","journal-title":"Information systems security assessment framework","article-title":"Open Information Systems Security Group","key":"ref10"},{"year":"2009","author":"moser","article-title":"Backtrack","key":"ref6"},{"year":"2009","journal-title":"Open Source Security Testing Methodology Manual","article-title":"Institute for Security and Open Methodologies","key":"ref11"},{"year":"2009","author":"brown","article-title":"Open vulnerability assessment system","key":"ref5"},{"key":"ref12","article-title":"SP 800-42 Guideline on Network Security Testing","author":"wack","year":"2003","journal-title":"National Institute of Standards and Technology"},{"key":"ref8","article-title":"SP 800-115 Technical Guide to Information Security Testing and Assessment","author":"scarfone","year":"2008","journal-title":"National Institute of Standards and Technology"},{"year":"2005","author":"horlick","article-title":"HB 150-20 Information Technology Security Testing: Common Criteria. National Institute of Standards and Technology","key":"ref7"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/MSP.2008.115"},{"year":"2007","journal-title":"U S Election Assistance Commission","article-title":"Technical Guidelines Development Committee, Ed., Voluntary Voting System Guidelines Recommendations to the Election Assistance Commission","key":"ref9"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/MSP.2005.23"}],"event":{"name":"2010 IEEE Symposium on Computers and Communications (ISCC)","start":{"date-parts":[[2010,6,22]]},"location":"Riccione, Italy","end":{"date-parts":[[2010,6,25]]}},"container-title":["The IEEE symposium on Computers and Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5532341\/5546495\/05546813.pdf?arnumber=5546813","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,18]],"date-time":"2017-03-18T16:20:51Z","timestamp":1489854051000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5546813\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,6]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/iscc.2010.5546813","relation":{},"subject":[],"published":{"date-parts":[[2010,6]]}}}