{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,20]],"date-time":"2025-11-20T18:25:38Z","timestamp":1763663138832,"version":"3.40.4"},"reference-count":37,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2015,3,1]],"date-time":"2015-03-01T00:00:00Z","timestamp":1425168000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Serv. Comput."],"published-print":{"date-parts":[[2015,3]]},"DOI":"10.1109\/tsc.2014.2310221","type":"journal-article","created":{"date-parts":[[2014,3,11]],"date-time":"2014-03-11T18:03:24Z","timestamp":1394561004000},"page":"269-283","source":"Crossref","is-referenced-by-count":53,"title":["Assessing and Comparing Vulnerability Detection Tools for Web Services: Benchmarking Approach and Examples"],"prefix":"10.1109","volume":"8","author":[{"given":"Nuno","family":"Antunes","sequence":"first","affiliation":[]},{"given":"Marco","family":"Vieira","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/948143.948144"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2008.130"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.23"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/4236.991449"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/SCC.2011.67"},{"article-title":"Benchmarks for Vulnerability Detection tools for Web Services","year":"2013","author":"antunes","key":"ref36"},{"year":"2008","key":"ref35","article-title":"SourceMonitor Version 2.5"},{"journal-title":"Handbook of Software Reliability Engineering","year":"1996","key":"ref34"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/PRDC.2007.55"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2004.1303339"},{"key":"ref12","first-page":"1","article-title":"Bugbench: Benchmarks for Evaluating Bug Detection Tools","author":"lu","year":"2005","journal-title":"Proc Workshop the Evaluation of Software Defect Detection Tools"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1321631.1321702"},{"journal-title":"Information Retrieval","year":"1979","author":"van rijsbergen","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2010.76"},{"year":"2008","key":"ref16","article-title":"Annual Web Application Security Report"},{"year":"2007","key":"ref17","article-title":"Annual Security Report"},{"year":"2011","key":"ref18","article-title":"Annual Web Application Security Report"},{"key":"ref19","first-page":"18","article-title":"Finding Security Vulnerabilities in Java Applications with Static Analysis","volume":"14","author":"livshits","year":"2005","journal-title":"Proc 14th Conf USENIX Security Symp"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/CICSyN.2010.55"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ECOWS.2007.9"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-005-3861-2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2009.173"},{"year":"2014","key":"ref6","article-title":"TPC BenchmarkTM App (Application Server) Standard Specification, Version 1.3"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/LADC.2009.21"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2009.5270294"},{"journal-title":"The Web Application Hacker's Handbook Discovering and Exploiting Security Flaws","year":"2007","author":"stuttard","key":"ref8"},{"key":"ref7","first-page":"169","article-title":"eXist: An Open Source Native XML Database","author":"meier","year":"2003","journal-title":"Revised Papers from the NODe 2002 Web and DatabaseRelated Workshops on Web Web-Services and Database Systems"},{"year":"0","key":"ref2"},{"journal-title":"Web Services Concepts Architectures and Applications","year":"2010","author":"alonso","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/PRDC.2009.54"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1007\/11430230_4","article-title":"Comparing Bug Finding Tools with Reviews and Tests","author":"wagner","year":"2005","journal-title":"Proc 17th IFIP TC6\/WG 6 1 Int?l Conf Testing of Communicating Systems"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134416"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SCC.2009.23"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1002\/9780470370506"},{"journal-title":"The Benchmark Handbook","year":"1993","author":"gray","key":"ref23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.4018\/jdtis.2011040101"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2005.93"}],"container-title":["IEEE Transactions on Services Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4629386\/7080963\/06763052.pdf?arnumber=6763052","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T01:30:43Z","timestamp":1746149443000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6763052\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,3]]},"references-count":37,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tsc.2014.2310221","relation":{},"ISSN":["1939-1374","2372-0204"],"issn-type":[{"type":"electronic","value":"1939-1374"},{"type":"electronic","value":"2372-0204"}],"subject":[],"published":{"date-parts":[[2015,3]]}}}