{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,28]],"date-time":"2025-08-28T18:40:28Z","timestamp":1756406428764,"version":"3.44.0"},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2010,9,1]],"date-time":"2010-09-01T00:00:00Z","timestamp":1283299200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2010,9,1]],"date-time":"2010-09-01T00:00:00Z","timestamp":1283299200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,9]]},"DOI":"10.1109\/wse.2010.5623567","type":"proceedings-article","created":{"date-parts":[[2010,11,17]],"date-time":"2010-11-17T16:53:27Z","timestamp":1290012807000},"page":"73-81","source":"Crossref","is-referenced-by-count":7,"title":["Investigation and analysis of malware on websites"],"prefix":"10.1109","author":[{"given":"Takeshi","family":"Yagi","sequence":"first","affiliation":[{"name":"NTT Information Sharing Platform Laboratories, NTT Corporation 3-9-11, Midori-cho, Musashino-shi, Tokyo 180-8585, Japan"}]},{"given":"Naoto","family":"Tanimoto","sequence":"additional","affiliation":[{"name":"NTT Information Sharing Platform Laboratories, NTT Corporation 3-9-11, Midori-cho, Musashino-shi, Tokyo 180-8585, Japan"}]},{"given":"Takeo","family":"Hariu","sequence":"additional","affiliation":[{"name":"NTT Information Sharing Platform Laboratories, NTT Corporation 3-9-11, Midori-cho, Musashino-shi, Tokyo 180-8585, Japan"}]},{"given":"Mitsutaka","family":"Itoh","sequence":"additional","affiliation":[{"name":"NTT Information Sharing Platform Laboratories, NTT Corporation 3-9-11, Midori-cho, Musashino-shi, Tokyo 180-8585, Japan"}]}],"member":"263","reference":[{"journal-title":"HIHAT","year":"0","key":"19"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2010.5546700"},{"journal-title":"The Google Hack Honeypot","year":"0","key":"17"},{"journal-title":"On-demand Detection of Malicious Software","year":"0","key":"23"},{"journal-title":"Web Applicaton Honeypot","year":"0","key":"18"},{"journal-title":"Component List","year":"0","key":"24"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1587\/transcom.E93.B.1122"},{"key":"16","article-title":"J-honeypot:a java-based network deception tool with monitoring and intrusion detection","author":"mai","year":"0","journal-title":"International Conference on Information Technology Coding and Computing Apr 2004"},{"journal-title":"Web application firewall","year":"0","key":"13"},{"journal-title":"OWASP Best Practices Use of Web Application Firewalls","year":"0","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2008.35"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2007.43"},{"journal-title":"Running a Reverse Proxy in Apache","year":"0","author":"tutor","key":"21"},{"journal-title":"2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities","year":"0","key":"3"},{"journal-title":"A Generic Toolkit for Converting Web Applications into High-interaction Honeypots","year":"0","author":"muter","key":"20"},{"journal-title":"Sans Institute Infosec Reading Room","year":"0","key":"2"},{"journal-title":"Attacks Increasingly Target Trusted","year":"0","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/CERMA.2008.60"},{"key":"7","article-title":"Advanced sql injection in sql server applications","author":"anley","year":"2002","journal-title":"An NGSSoftware Insight Security Research (NISR) Publication"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/WISTDCS.2008.11"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/ICETET.2008.192"},{"journal-title":"About the Honeynet Project","year":"0","key":"4"},{"journal-title":"Command Injection","year":"0","key":"9"},{"journal-title":"Cross Site Scripting Info","year":"0","key":"8"}],"event":{"name":"2010 12th IEEE International Symposium on Web Systems Evolution (WSE)","start":{"date-parts":[[2010,9,17]]},"location":"Timisoara, Romania","end":{"date-parts":[[2010,9,18]]}},"container-title":["2010 12th IEEE International Symposium on Web Systems Evolution (WSE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5611447\/5623555\/05623567.pdf?arnumber=5623567","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,28]],"date-time":"2025-08-28T18:06:16Z","timestamp":1756404376000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/5623567\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,9]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/wse.2010.5623567","relation":{},"subject":[],"published":{"date-parts":[[2010,9]]}}}