{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T02:31:30Z","timestamp":1771468290944,"version":"3.50.1"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,6]]},"DOI":"10.1109\/snpd.2015.7176244","type":"proceedings-article","created":{"date-parts":[[2015,8,12]],"date-time":"2015-08-12T18:38:15Z","timestamp":1439404695000},"page":"1-6","source":"Crossref","is-referenced-by-count":25,"title":["Web application security vulnerabilities detection approaches: A systematic mapping study"],"prefix":"10.1109","author":[{"given":"Sajjad","family":"Rafique","sequence":"first","affiliation":[]},{"given":"Mamoona","family":"Humayun","sequence":"additional","affiliation":[]},{"given":"Bushra","family":"Hamid","sequence":"additional","affiliation":[]},{"given":"Ansar","family":"Abbas","sequence":"additional","affiliation":[]},{"given":"Muhammad","family":"Akhtar","sequence":"additional","affiliation":[]},{"given":"Kamil","family":"Iqbal","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"92","volume":"42","author":"goseva-popstojanova","year":"2014","journal-title":"Characterization and Classification of Malicious Web Traffic Computers & Security"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2013.08.001"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.04.007"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.06.005"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.12.013"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2010.10.007"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2013.04.002"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2013.01.002"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.giq.2014.01.012"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2013.06.040"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2013.08.033"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2013.03.022"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.mcm.2011.01.050"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2011.04.038"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.proeng.2012.01.850"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2012.11.007"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.3923\/jse.2014.116.126"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"467","DOI":"10.1016\/j.infsof.2011.12.006","article-title":"Automated removal of cross site scripting vulnerabilities in web applications","volume":"54","author":"shar","year":"2012","journal-title":"Information and Software Technology"}],"event":{"name":"2015 IEEE\/ACIS 16th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel\/Distributed Computing (SNPD)","location":"Takamatsu","start":{"date-parts":[[2015,6,1]]},"end":{"date-parts":[[2015,6,3]]}},"container-title":["2015 IEEE\/ACIS 16th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel\/Distributed Computing (SNPD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7159154\/7176160\/07176244.pdf?arnumber=7176244","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T13:31:38Z","timestamp":1498224698000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7176244\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/snpd.2015.7176244","relation":{},"subject":[],"published":{"date-parts":[[2015,6]]}}}