{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T14:38:57Z","timestamp":1725806337134},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,10,7]],"date-time":"2020-10-07T00:00:00Z","timestamp":1602028800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,10,7]],"date-time":"2020-10-07T00:00:00Z","timestamp":1602028800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,10,7]],"date-time":"2020-10-07T00:00:00Z","timestamp":1602028800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,10,7]]},"DOI":"10.1109\/uyms50627.2020.9247071","type":"proceedings-article","created":{"date-parts":[[2020,11,9]],"date-time":"2020-11-09T22:39:42Z","timestamp":1604961582000},"page":"1-6","source":"Crossref","is-referenced-by-count":9,"title":["A Review of Penetration Testing and Vulnerability Assessment in Cloud Environment"],"prefix":"10.1109","author":[{"given":"Ilke","family":"Yurtseven","sequence":"first","affiliation":[]},{"given":"Selami","family":"Bagriyanik","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/SDS.2017.7939150"},{"key":"ref11","article-title":"A survey of Cloud Computing Security challenges and solutions","author":"hussein","year":"2016","journal-title":"International Journal of Information and Computer Security"},{"year":"2020","journal-title":"Gartner Forecasts Worldwide Public Cloud Revenue to Grow 17% in 2020","key":"ref12"},{"year":"2019","author":"venter","journal-title":"A Taxonomy for Cybercrime Attack in the Public Cloud","key":"ref13"},{"key":"ref14","article-title":"Dynamic & portable vulnerability assessment testbed with Linux containers to ensure the security of MongoDB in Singularity LXCs","author":"dissanayaka","year":"2018","journal-title":"Companion Conference of the Supercomputing-2018 (SC18)"},{"year":"2020","author":"rak","journal-title":"Systematic IoT Penetration Testing Alexa Case Study","key":"ref15"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1016\/j.cosrev.2019.05.002"},{"year":"2020","key":"ref17"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1007\/s10586-017-1176-x"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.3311\/CCC2019-005"},{"year":"2018","author":"marinescu","journal-title":"Cloud Computing Theory and Practice Second Edition","key":"ref4"},{"year":"0","key":"ref3"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/SERE.2013.31"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1016\/j.jnca.2016.09.002"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1145\/2806777.2806935"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.5121\/ijcsit.2013.5306"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1007\/978-1-4842-2635-3_1"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1016\/j.future.2016.11.031"},{"key":"ref9","article-title":"The goals and challenges of click fraud penetration testing systems","author":"kintana","year":"2009","journal-title":"International Symposium on Software Reliability Engineering"}],"event":{"name":"2020 Turkish National Software Engineering Symposium (UYMS)","start":{"date-parts":[[2020,10,7]]},"location":"Istanbul, Turkey","end":{"date-parts":[[2020,10,9]]}},"container-title":["2020 Turkish National Software Engineering Symposium (UYMS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9247008\/9247009\/09247071.pdf?arnumber=9247071","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,30]],"date-time":"2022-06-30T15:17:59Z","timestamp":1656602279000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9247071\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,7]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/uyms50627.2020.9247071","relation":{},"subject":[],"published":{"date-parts":[[2020,10,7]]}}}