{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,6]],"date-time":"2025-04-06T04:51:27Z","timestamp":1743915087530},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,5]]},"DOI":"10.1109\/iwast.2013.6595794","type":"proceedings-article","created":{"date-parts":[[2013,9,19]],"date-time":"2013-09-19T11:56:19Z","timestamp":1379591779000},"page":"71-74","source":"Crossref","is-referenced-by-count":14,"title":["XSS pattern for attack modeling in testing"],"prefix":"10.1109","author":[{"given":"Josip","family":"Bozic","sequence":"first","affiliation":[]},{"given":"Franz","family":"Wotawa","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"XSS Attacks Cross Site Scripting Exploits and Defense","year":"2007","author":"fogie","key":"17"},{"key":"18","doi-asserted-by":"crossref","DOI":"10.21236\/ADA387544","author":"moore","year":"2001","journal-title":"Attack Modeling for Information Security and Survivability"},{"key":"15","doi-asserted-by":"crossref","first-page":"531","DOI":"10.1109\/ICSTW.2011.9","article-title":"Offset-aware mutation based fuzzing for buffer overflow vulnerabilities: Few preliminary results","author":"rawat","year":"2011","journal-title":"Proceedings of the 2011 IEEE Fourth International Conference on Software Testing Verification and Validation Workshops (ICSTW)"},{"key":"16","article-title":"Fuzzing: The past, the present and the future","author":"takanen","year":"2009","journal-title":"SSTIC'09"},{"key":"13","article-title":"IDATG: An open tool for automated testing of interactive software","author":"beer","year":"1998","journal-title":"Proceedings of the COMPSAC'98-22nd International Computer Software and Applications Conference"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.4204\/EPTCS.80.1"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxm057"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/ECBS.2010.14"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1375581.1375607"},{"journal-title":"Fuzzing for Software Security Testing and Quality Assurance","year":"2008","author":"takanen","key":"2"},{"journal-title":"OWASP Top 10 2010","year":"2010","author":"williams","key":"1"},{"key":"10","first-page":"9","article-title":"Model-based testing-From safety to security","author":"bozic","year":"2012","journal-title":"Proceedings of the 9th Workshop on Systems Testing and Validation (STV'12)"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/ADC.2005.11"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070521"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1049\/ip-sen:19990602"},{"year":"0","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2004.13"},{"year":"2003","author":"gold","key":"8"}],"event":{"name":"2013 8th International Workshop on Automation of Software Test (AST)","start":{"date-parts":[[2013,5,18]]},"location":"San Francisco, CA, USA","end":{"date-parts":[[2013,5,19]]}},"container-title":["2013 8th International Workshop on Automation of Software Test (AST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6588690\/6595779\/06595794.pdf?arnumber=6595794","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,24]],"date-time":"2019-07-24T03:22:50Z","timestamp":1563938570000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6595794\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,5]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/iwast.2013.6595794","relation":{},"subject":[],"published":{"date-parts":[[2013,5]]}}}