{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T02:10:37Z","timestamp":1725588637282},"reference-count":18,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T00:00:00Z","timestamp":1598227200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T00:00:00Z","timestamp":1598227200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T00:00:00Z","timestamp":1598227200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,8,24]]},"DOI":"10.1109\/syscon47679.2020.9275932","type":"proceedings-article","created":{"date-parts":[[2020,12,8]],"date-time":"2020-12-08T04:40:26Z","timestamp":1607402426000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Engineering Or Not Engineering? That Is Still The Question"],"prefix":"10.1109","author":[{"given":"Fabiana Figueira Sanches","family":"Flores","sequence":"first","affiliation":[]},{"given":"Silvio Romero","family":"de Lemos Meira","sequence":"additional","affiliation":[]},{"given":"Evandro Curvelo","family":"Hora","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Seguran&#x00E7;a de redes em ambientes corporativos","year":"2014","author":"nakamura","key":"ref10"},{"journal-title":"Advanced Penetration Testing for Highly-Secured Environments The Ultimate Security Guide","year":"2012","author":"allen","key":"ref11"},{"journal-title":"Ethical Hacking and Penetration Testing Guide","year":"2015","author":"baloch","key":"ref12"},{"journal-title":"Web Penetration Testing with Kali Linux a practical guide to implementing penetration testing strategies on websites web applications and standard web protocols with Kali Linux","year":"2013","author":"muniz","key":"ref13"},{"journal-title":"de Penetration Testing A hands on introduction to hacking","year":"2014","author":"weidman","key":"ref14"},{"journal-title":"The OWASP Foundation OWASP Top 10 - 2017 The The Most Critical Web Application Security Risks","year":"2017","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/52.60586"},{"key":"ref17","article-title":"Dilemmas of IS Development","author":"iivari","year":"1996","journal-title":"Proceedings of the Fifth International Conference on Information Systems Development"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MC.1987.1663532"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/S0263-7863(01)00049-7"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2013.11645672"},{"journal-title":"Advances in Safety, Reliability and Risk Management","year":"1998","author":"cox","key":"ref6"},{"journal-title":"Applied Software Risk Management","year":"2007","author":"ravindranath pandian","key":"ref5"},{"journal-title":"Computer Security Principles and Practice","year":"2015","author":"stallings","key":"ref8"},{"journal-title":"The Orange Book Management of Risk - Principles and Concepts","year":"2004","author":"treasury","key":"ref7"},{"journal-title":"Ingeniera Del Software","year":"2005","author":"sommerville","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.4324\/9780080942759"},{"journal-title":"Kali Linux Revealed","year":"2017","author":"hertzog","key":"ref9"}],"event":{"name":"2020 IEEE International Systems Conference (SysCon)","start":{"date-parts":[[2020,8,24]]},"location":"Montreal, QC, Canada","end":{"date-parts":[[2020,9,20]]}},"container-title":["2020 IEEE International Systems Conference (SysCon)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9275655\/9275656\/09275932.pdf?arnumber=9275932","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,30]],"date-time":"2022-06-30T15:15:52Z","timestamp":1656602152000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9275932\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,24]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/syscon47679.2020.9275932","relation":{},"subject":[],"published":{"date-parts":[[2020,8,24]]}}}