{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T02:59:38Z","timestamp":1773457178409,"version":"3.50.1"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,6]]},"DOI":"10.1109\/dsn.2009.5270294","type":"proceedings-article","created":{"date-parts":[[2009,9,30]],"date-time":"2009-09-30T14:41:36Z","timestamp":1254321696000},"page":"566-571","source":"Crossref","is-referenced-by-count":91,"title":["Using web security scanners to detect vulnerabilities in web services"],"prefix":"10.1109","author":[{"given":"Marco","family":"Vieira","sequence":"first","affiliation":[]},{"given":"Nuno","family":"Antunes","sequence":"additional","affiliation":[]},{"given":"Henrique","family":"Madeira","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","year":"2008"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/PRDC.2007.55"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2010.76"},{"key":"11","year":"2008"},{"key":"12","author":"wsfuzzer","year":"2008"},{"key":"3","volume":"10","author":"stock","year":"2007","journal-title":"OWASP top"},{"key":"2","year":"0"},{"key":"1","author":"chappel","year":"2002","journal-title":"Java Web Services Using Java in Service-Oriented Architectures"},{"key":"10","author":"webinspect","year":"2008"},{"key":"7","year":"0","journal-title":"Pixy"},{"key":"6","year":"0","journal-title":"Ounce"},{"key":"5","year":"0"},{"key":"4","author":"stuttard","year":"2007","journal-title":"The Web Application Hacker's Handbook Discovering and Exploiting Security Flaws"},{"key":"9","year":"2008"},{"key":"8","year":"2008","journal-title":"Acunetix Web Vulnerability Scanner"}],"event":{"name":"Networks (DSN)","location":"Lisbon, Portugal","start":{"date-parts":[[2009,6,29]]},"end":{"date-parts":[[2009,7,2]]}},"container-title":["2009 IEEE\/IFIP International Conference on Dependable Systems &amp; Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5243642\/5270274\/05270294.pdf?arnumber=5270294","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,19]],"date-time":"2017-03-19T01:55:27Z","timestamp":1489888527000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5270294\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,6]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/dsn.2009.5270294","relation":{},"subject":[],"published":{"date-parts":[[2009,6]]}}}