{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,29]],"date-time":"2025-08-29T00:06:32Z","timestamp":1756425992500,"version":"3.44.0"},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2008,6,1]],"date-time":"2008-06-01T00:00:00Z","timestamp":1212278400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2008,6,1]],"date-time":"2008-06-01T00:00:00Z","timestamp":1212278400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,6]]},"DOI":"10.1109\/dsn.2008.4630094","type":"proceedings-article","created":{"date-parts":[[2008,9,26]],"date-time":"2008-09-26T11:10:29Z","timestamp":1222427429000},"page":"257-266","source":"Crossref","is-referenced-by-count":39,"title":["Mapping software faults with web security vulnerabilities"],"prefix":"10.1109","author":[{"given":"Jose","family":"Fonseca","sequence":"first","affiliation":[{"name":"CISUC, University of Coimbra, IPG, Portugal"}]},{"given":"Marco","family":"Vieira","sequence":"additional","affiliation":[{"name":"CISUC, University of Coimbra, Portugal"}]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1147\/sj.291.0004"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/PRDC.2007.55"},{"journal-title":"Nexen net","year":"0","key":"18"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/FTCS.1998.689485"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/32.877848"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/32.177364"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2006.113"},{"year":"0","author":"may","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/FTCS.1996.534615"},{"year":"2007","key":"21"},{"year":"2007","key":"20"},{"year":"2007","key":"22"},{"year":"2007","key":"23"},{"year":"2007","key":"24"},{"year":"2007","key":"25"},{"year":"2007","key":"26"},{"year":"2007","key":"27"},{"year":"0","key":"28"},{"year":"2007","key":"29"},{"key":"3","article-title":"automatic detection of web application security flaws","author":"zanero","year":"2005","journal-title":"Black Hat Briefings"},{"key":"2","article-title":"unforgivable vulnerabilities","author":"christey","year":"2007","journal-title":"Black Hat Briefings"},{"year":"2007","key":"10"},{"year":"0","key":"1"},{"journal-title":"The Privacy Rights Clearinghouse","year":"0","key":"7"},{"year":"2007","key":"6"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1134744.1134751"},{"journal-title":"Conceptual Model and Architecture of MAFTIA","year":"2003","author":"david","key":"4"},{"key":"9","article-title":"vulnerability type distributions in cve","author":"steve","year":"2007","journal-title":"Mitre report"},{"key":"8","volume":"10","author":"stock","year":"2007","journal-title":"OWASP top"}],"event":{"name":"2008 IEEE International Conference on Dependable Systems & Networks With FTCS and DCC (DSN)","start":{"date-parts":[[2008,6,24]]},"location":"Anchorage, AK, USA","end":{"date-parts":[[2008,6,27]]}},"container-title":["2008 IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4610267\/4630050\/04630094.pdf?arnumber=4630094","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,28]],"date-time":"2025-08-28T18:03:15Z","timestamp":1756404195000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/4630094\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,6]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/dsn.2008.4630094","relation":{},"subject":[],"published":{"date-parts":[[2008,6]]}}}