{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,10]],"date-time":"2025-05-10T07:06:41Z","timestamp":1746860801772,"version":"3.28.0"},"reference-count":42,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,5]]},"DOI":"10.1109\/mipro.2016.7522359","type":"proceedings-article","created":{"date-parts":[[2016,8,5]],"date-time":"2016-08-05T13:41:29Z","timestamp":1470404489000},"page":"1402-1407","source":"Crossref","is-referenced-by-count":7,"title":["Securing web content and services in open source content management systems"],"prefix":"10.1109","author":[{"given":"H.","family":"Jerkovic","sequence":"first","affiliation":[]},{"given":"P.","family":"Vranesic","sequence":"additional","affiliation":[]},{"given":"S.","family":"Dadic","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/InfoSec.2015.7435522"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813633"},{"article-title":"Create a Faster WordPress Website & Blog","year":"2013","author":"stearns","key":"ref33"},{"journal-title":"Wordpress Multisite Administration","year":"2013","author":"longren","key":"ref32"},{"article-title":"Content delivery network","year":"2015","author":"aikas","key":"ref31"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.17485\/ijst\/2015\/v8iS4\/60375"},{"article-title":"Supporting secure sessions in a cloud-based proxy service","year":"2015","author":"prince","key":"ref37"},{"article-title":"Cloud based firewall system and service","year":"2015","author":"dilley","key":"ref36"},{"key":"ref35","first-page":"347","article-title":"A Responsive Defense Mechanism Against DDoS Attacks","author":"mosharraf","year":"2014","journal-title":"Foundations and Practice of Security"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2015.116"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIC.2014.7238337"},{"article-title":"Does your WordPress Security Plugin really secure your site?","year":"2014","author":"sreedharan","key":"ref40"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2015.16"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34210-3_3"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/FIE.2013.6685057"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1002\/cae.20557"},{"key":"ref15","article-title":"How to Secure Your WordPress Site From Brute Force Attack","author":"singh","year":"2016","journal-title":"Watermarking"},{"article-title":"Detecting security vulnerabilities in web applications","year":"2015","author":"pistoia","key":"ref16"},{"journal-title":"National Vulnerability Database","year":"2016","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1186\/1869-0238-4-5"},{"article-title":"Development Review on Phishing: A Computer Security Threat","year":"2014","author":"chaudhary","key":"ref19"},{"year":"2015","key":"ref28","article-title":"Security Vulnerabilities Published In 2015 (SQL Injection)"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4302-5915-2_10"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.mcm.2011.01.050"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ISSP.2013.6526932"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(15)30112-3"},{"journal-title":"WordPress SEO Success Search Engine Optimization for Your WordPress Website Or Blog","year":"2014","author":"aull","key":"ref29"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s10209-015-0446-8"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SocialCom-PASSAT.2012.31"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2014.20"},{"journal-title":"Usage Statistics and Market Share of Content Management Systems for Websites","year":"2016","key":"ref2"},{"key":"ref9","first-page":"71","article-title":"Software vulnerability markets: Discoverers and buyers","volume":"8","author":"algarni","year":"2014","journal-title":"Journal of Computing and Information Science in Engineering"},{"article-title":"Design and Implementation of the Korean Style Plug-In using the Wordpress","year":"0","author":"ji","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.sbspro.2014.01.711"},{"journal-title":"MariaDB Cookbook","year":"2014","author":"bartholomew","key":"ref22"},{"key":"ref21","first-page":"151","article-title":"Continuous Monitoring System Based on Systems' Environment","author":"weintraub","year":"2015","journal-title":"Proceedings of the Conference on DigitalForensics"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26961-0_29"},{"journal-title":"Vulnerability Details CVE-2015&#x2013;5734","year":"2016","key":"ref24"},{"key":"ref41","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1145\/2857705.2857718","article-title":"Detecting Malicious Exploit Kits using Tree-based Similarity Searches","author":"taylor","year":"2016","journal-title":"Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy"},{"key":"ref23","first-page":"2014","article-title":"MariaDB vs. MySQL","volume":"7","author":"bartholomew","year":"2012","journal-title":"Dostopano"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-81-322-2553-9_3"},{"journal-title":"Wordpress Vulnerability Statistics","year":"2016","key":"ref25"}],"event":{"name":"2016 39th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)","start":{"date-parts":[[2016,5,30]]},"location":"Opatija, Croatia","end":{"date-parts":[[2016,6,3]]}},"container-title":["2016 39th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7513176\/7522093\/07522359.pdf?arnumber=7522359","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,5]],"date-time":"2022-07-05T02:21:48Z","timestamp":1656987708000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7522359\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5]]},"references-count":42,"URL":"https:\/\/doi.org\/10.1109\/mipro.2016.7522359","relation":{},"subject":[],"published":{"date-parts":[[2016,5]]}}}