{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T22:23:37Z","timestamp":1775082217788,"version":"3.50.1"},"reference-count":41,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T00:00:00Z","timestamp":1768435200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T00:00:00Z","timestamp":1768435200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T00:00:00Z","timestamp":1768435200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"2025 Xiamen Overseas Returnee Research Project"},{"name":"Fujian Provincial Key Technological Innovation Research & Industrialization Project","award":["2024XQ017"],"award-info":[{"award-number":["2024XQ017"]}]},{"name":"Sixth batch of Quanzhou City\u2019s introduction of high-level talent team projects 2"},{"name":"Natural Science Foundation of Fujian Provincial Science and Technology Department","award":["2023H6034"],"award-info":[{"award-number":["2023H6034"]}]},{"name":"2025 College Student Innovation and Entrepreneurship Training Program of Xiamen Medical College","award":["202512631013"],"award-info":[{"award-number":["202512631013"]}]},{"name":"2025 College Student Innovation and Entrepreneurship Training Program of Xiamen Medical College","award":["202512631034"],"award-info":[{"award-number":["202512631034"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2026,1,15]]},"DOI":"10.1109\/jiot.2025.3631562","type":"journal-article","created":{"date-parts":[[2025,11,19]],"date-time":"2025-11-19T18:46:56Z","timestamp":1763578016000},"page":"3038-3054","source":"Crossref","is-referenced-by-count":0,"title":["LLM-Assisted Security Vulnerability Analysis for Educational Websites: Risk Identification via LLM-EduAttackGraph"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5221-7549","authenticated-orcid":false,"given":"Chao","family":"Liu","sequence":"first","affiliation":[{"name":"Department of Public Health and Medical Technology, Xiamen Medical College, Xiamen, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-7799-3161","authenticated-orcid":false,"given":"Jiaxing","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Advanced Manufacturing, Fuzhou University, Quanzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-0702-2558","authenticated-orcid":false,"given":"Boxi","family":"Chen","sequence":"additional","affiliation":[{"name":"Faculty of Applied Sciences, Macao Polytechnic University, Macao, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8060-7368","authenticated-orcid":false,"given":"Daxin","family":"Zhu","sequence":"additional","affiliation":[{"name":"School of Mathematics and Computer Science, Fujian Provincial Key Laboratory of Data-Intensive Computing, Fujian University Laboratory of Intelligent Computing and Information Processing, Quanzhou Normal University, Quanzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7723-4591","authenticated-orcid":false,"given":"Ching-Chun","family":"Chang","sequence":"additional","affiliation":[{"name":"National Institute of Informatics, Tokyo, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7319-5780","authenticated-orcid":false,"given":"Chin-Chen","family":"Chang","sequence":"additional","affiliation":[{"name":"Feng Chia University, Taichung, Taiwan"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/INMIC48123.2019.9022766"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/VTC2020-Spring48590.2020.9129505"},{"key":"ref3","volume-title":"Police Have Launched an Investigation Into the Suspected Leak of Information About Nearly 20,000 Students At a University in Zhengzhou"},{"key":"ref4","volume-title":"Qut Was Attacked By Cyber Hackers and the Identity Information of Tens of Thousands of Students and Teachers Was Leaked","year":"2023"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1186\/s12911-020-01161-7"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-71381-2_10"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-3369-3_61"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.07.003"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3101048"},{"key":"ref10","volume-title":"Stanford University is Warning of a Data Breach Involving 27,000 People and 430gb of Data Being Stolen","year":"2024"},{"key":"ref11","article-title":"Multi-agent penetration testing AI for the web","author":"David","year":"2025","journal-title":"arXiv:2508.20816"},{"key":"ref12","first-page":"847","article-title":"PentestGPT: Evaluating and harnessing large language models for automated penetration testing","volume-title":"Proc. 33rd USENIX Secur. Symp. (USENIX Secur.)","author":"Deng"},{"key":"ref13","article-title":"Towards a novel privacy-preserving distributed multiparty data outsourcing scheme for cloud computing with quantum key distribution","author":"Dhinakaran","year":"2024","journal-title":"arXiv:2407.18923"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijlcj.2021.100484"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/2508693"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2024.3440188"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2018.1432996"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.3390\/app12052404"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.3390\/su9071099"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbusres.2020.05.034"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1057\/s41599-023-01757-0"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/QRS-C.2015.44"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.egyr.2021.08.126"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/IACIS61494.2024.10721851"},{"key":"ref25","volume-title":"Tens of Thousands of Teacher and Student Information is Sold Abroad! a University in Jiangxi Has Been Fined 800,000 Yuan","year":"2023"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3502293"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICoCICs58778.2023.10277377"},{"key":"ref28","article-title":"Web security investigation through penetration tests: A case study of an educational institution portal","author":"Omeiza","year":"2018","journal-title":"arXiv:1811.01388"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.58496\/MJCSC\/2023\/016"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2024.103871"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-34339-2_27"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11010137"},{"issue":"3","key":"ref33","first-page":"4677","article-title":"Analysis on password attacks and its prevention","volume":"5","author":"Reddy","year":"2024","journal-title":"Int. J. Res. Publication Rev."},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3018783"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.3390\/fi16070235"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1770\/1\/012034"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.jmsy.2018.03.006"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3559340"},{"key":"ref39","article-title":"AutoAttacker: A large language model guided system to implement automatic cyber-attacks","author":"Xu","year":"2024","journal-title":"arXiv:2403.01038"},{"key":"ref40","volume-title":"Police Have Launched an Investigation Into the Suspected Leak of Information About Nearly 20,000 Students At a University in Zhengzhou","author":"Yanchao","year":"2020"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606611"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6488907\/11346825\/11258892.pdf?arnumber=11258892","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T20:13:52Z","timestamp":1775074432000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11258892\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,15]]},"references-count":41,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2025.3631562","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1,15]]}}}