{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:23:39Z","timestamp":1750307019695,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":7,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,3,29]],"date-time":"2012-03-29T00:00:00Z","timestamp":1332979200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000105","name":"Office of Cyberinfrastructure","doi-asserted-by":"publisher","award":["OCI-0959687"],"award-info":[{"award-number":["OCI-0959687"]}],"id":[{"id":"10.13039\/100000105","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000005","name":"U.S. Department of Defense","doi-asserted-by":"publisher","award":["H98230-10-1-0419"],"award-info":[{"award-number":["H98230-10-1-0419"]}],"id":[{"id":"10.13039\/100000005","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,3,29]]},"DOI":"10.1145\/2184512.2184589","type":"proceedings-article","created":{"date-parts":[[2012,4,17]],"date-time":"2012-04-17T12:53:22Z","timestamp":1334667202000},"page":"329-330","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Security fuzzing toolset"],"prefix":"10.1145","author":[{"given":"Christopher","family":"Smith","sequence":"first","affiliation":[{"name":"Jacksonville State University, Jacksonville, AL"}]},{"suffix":"III","given":"Guillermo","family":"Francia","sequence":"additional","affiliation":[{"name":"Jacksonville State University, Jacksonville, AL"}]}],"member":"320","published-online":{"date-parts":[[2012,3,29]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Implementation of the Critical Infrastructure Security and Assessment Laboratory (CISAL),\" Proceedings of the 2011 International Conference on Security and Management (SAM'11) July 18--21","author":"Francia III, G. A.","year":"2011","unstructured":"Francia III, G. A. , Bekhouche , N. , and Marbut , T. , ( 2011 ). \" Implementation of the Critical Infrastructure Security and Assessment Laboratory (CISAL),\" Proceedings of the 2011 International Conference on Security and Management (SAM'11) July 18--21 , 2011, Las Vegas , NV. 2011. Francia III, G. A., Bekhouche, N., and Marbut, T., (2011). \"Implementation of the Critical Infrastructure Security and Assessment Laboratory (CISAL),\" Proceedings of the 2011 International Conference on Security and Management (SAM'11) July 18--21, 2011, Las Vegas, NV. 2011."},{"key":"e_1_3_2_1_2_1","volume-title":"19 Deadly Sins of Software Security (Security One-off)","author":"Howard M.","year":"2005","unstructured":"Howard , M. , LeBlanc , D. and Viega , J. , 19 Deadly Sins of Software Security (Security One-off) . McGraw-Hill Osborne Media , 2005 . Howard, M., LeBlanc, D. and Viega, J., 19 Deadly Sins of Software Security (Security One-off). McGraw-Hill Osborne Media, 2005."},{"key":"e_1_3_2_1_3_1","unstructured":"Open Web Application Security Project (OWASP). Fuzzing. Retrieved October 04 2011 from OWASP: https:\/\/www.owasp.org\/index.php\/Fuzzing  Open Web Application Security Project (OWASP). Fuzzing . Retrieved October 04 2011 from OWASP: https:\/\/www.owasp.org\/index.php\/Fuzzing"},{"key":"e_1_3_2_1_4_1","volume-title":"Grey Hat Python","author":"Seitz J.","year":"2009","unstructured":"Seitz , J. ( 2009 ). Grey Hat Python . San Francisco, CA : No Starch Press, Inc. Seitz, J. (2009). Grey Hat Python. San Francisco, CA: No Starch Press, Inc."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1982185.1982268"},{"key":"e_1_3_2_1_6_1","volume-title":"Fuzzing: Brute Force Vulnerability Discovery","author":"Sutton M.","year":"2007","unstructured":"Sutton , M. , Greene , A. and Amini , P . ( 2007 ) Fuzzing: Brute Force Vulnerability Discovery . Addison-Wesley Professional . 2007. Sutton, M., Greene, A. and Amini, P. (2007) Fuzzing: Brute Force Vulnerability Discovery. Addison-Wesley Professional. 2007."},{"key":"e_1_3_2_1_7_1","volume-title":"Fuzzing: the Past, the Present and the Future. Tutkijantie 4E","author":"Takanen A.","year":"2009","unstructured":"Takanen , A. ( 2009 ). Fuzzing: the Past, the Present and the Future. Tutkijantie 4E , Finland : Codenomicon Ltd . Takanen, A. (2009). Fuzzing: the Past, the Present and the Future. Tutkijantie 4E, Finland: Codenomicon Ltd."}],"event":{"name":"ACM SE '12: ACM Southeast Regional Conference","sponsor":["ACM Association for Computing Machinery"],"location":"Tuscaloosa Alabama","acronym":"ACM SE '12"},"container-title":["Proceedings of the 50th Annual Southeast Regional Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2184512.2184589","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2184512.2184589","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:49:11Z","timestamp":1750236551000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2184512.2184589"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,3,29]]},"references-count":7,"alternative-id":["10.1145\/2184512.2184589","10.1145\/2184512"],"URL":"https:\/\/doi.org\/10.1145\/2184512.2184589","relation":{},"subject":[],"published":{"date-parts":[[2012,3,29]]},"assertion":[{"value":"2012-03-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}