{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:48:48Z","timestamp":1750308528506,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,3,4]],"date-time":"2016-03-04T00:00:00Z","timestamp":1457049600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,3,4]]},"DOI":"10.1145\/2905055.2905357","type":"proceedings-article","created":{"date-parts":[[2016,8,26]],"date-time":"2016-08-26T12:40:09Z","timestamp":1472215209000},"page":"1-4","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["A Review on 0-day Vulnerability Testing in Web Application"],"prefix":"10.1145","author":[{"given":"Pratap","family":"Kumar","sequence":"first","affiliation":[{"name":"Raksha Shakti University, Ahmedabad, India"}]},{"given":"Ravi K.","family":"Sheth","sequence":"additional","affiliation":[{"name":"Raksha Shakti University, Ahmedabad, India"}]}],"member":"320","published-online":{"date-parts":[[2016,3,4]]},"reference":[{"volume-title":"Forth International Conference on e-Technologies and Networks for Development","year":"2015","author":"R.","key":"e_1_3_2_1_1_1"},{"volume-title":"DSN '09","year":"2009","author":"Marco Vieira","key":"e_1_3_2_1_2_1"},{"volume-title":"Evaluation of Web Vulnerability Scanners. 8th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications","year":"2015","key":"e_1_3_2_1_3_1"},{"volume-title":"Webservice Based Vulnerability Testing Framework. International Conference on Green Computing Communication and Electrical Engineering","year":"2014","author":"Selvam R.","key":"e_1_3_2_1_4_1"},{"key":"e_1_3_2_1_5_1","unstructured":"World's Biggest Data Breaches February 2016. http:\/\/www.informationisbeautiful.net\/visualizations\/worlds-biggest-data-breaches-hacks\/.  World's Biggest Data Breaches February 2016. http:\/\/www.informationisbeautiful.net\/visualizations\/worlds-biggest-data-breaches-hacks\/."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Leyla Bilge. and Tudor Dumitras. 2012. Before We Knew It: An Empirical Study of Zero-Day Attacks In The Real World.https:\/\/users.ece.cmu.edu\/~tdumitra\/public_documents\/bilge12_zero_day.pdf  Leyla Bilge. and Tudor Dumitras. 2012. Before We Knew It: An Empirical Study of Zero-Day Attacks In The Real World.https:\/\/users.ece.cmu.edu\/~tdumitra\/public_documents\/bilge12_zero_day.pdf","DOI":"10.1145\/2382196.2382284"},{"key":"e_1_3_2_1_7_1","unstructured":"Current Statistics of different Vulnerabilities Report January 2016. http:\/\/www.cvedetails.com  Current Statistics of different Vulnerabilities Report January 2016. http:\/\/www.cvedetails.com"},{"key":"e_1_3_2_1_8_1","unstructured":"David Hammarberg. The Best Defenses Against Zero-day Exploits for Various-sized Organizations. September 2014. https:\/\/www.sans.org\/readingroom\/whitepapers\/bestprac\/defenses-zero-day-exploits-various-sized-organizations-35562  David Hammarberg. The Best Defenses Against Zero-day Exploits for Various-sized Organizations. September 2014. https:\/\/www.sans.org\/readingroom\/whitepapers\/bestprac\/defenses-zero-day-exploits-various-sized-organizations-35562"},{"key":"e_1_3_2_1_9_1","unstructured":"Vulnerability Statistics Report. March 2015. https:\/\/www.edgescan.com\/assets\/docs\/reports\/2015-edgescan-Stats-Report-%282015%29-v5.pdf  Vulnerability Statistics Report. March 2015. https:\/\/www.edgescan.com\/assets\/docs\/reports\/2015-edgescan-Stats-Report-%282015%29-v5.pdf"},{"key":"e_1_3_2_1_10_1","unstructured":"WhiteHat's Website Security Statistics Report. May 2015. https:\/\/info.whitehatsec.com\/rs\/whitehatsecurity\/images\/2015-Stats-Report.pdf  WhiteHat's Website Security Statistics Report. May 2015. https:\/\/info.whitehatsec.com\/rs\/whitehatsecurity\/images\/2015-Stats-Report.pdf"},{"key":"e_1_3_2_1_11_1","article-title":"Assessing and Comparing Vulnerability Detection Tools for Web Services: Benchmarking Approach and Examples","volume":"11","author":"Antunes Nuno","year":"2014","journal-title":"IEEE Transactions On Services Computing(Coimbra, Portugal"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382284"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2009.186"},{"key":"e_1_3_2_1_14_1","unstructured":"ZERO-DAY DANGER: A Survey of Zero-Day Attacks and What They Say About the Traditional Security Model. June 2015. https:\/\/www2.fireeye.com\/WP-Zero-Day-Danger-LP.html  ZERO-DAY DANGER: A Survey of Zero-Day Attacks and What They Say About the Traditional Security Model. June 2015. https:\/\/www2.fireeye.com\/WP-Zero-Day-Danger-LP.html"},{"key":"e_1_3_2_1_15_1","unstructured":"Trend Micro Discovers New Adobe Flash Zero-Day Exploit. February 2015. http:\/\/trendmicro.com\/trendlabs-security-intelligence\/trend-micro-discovers-new-adobe-flash-zero-day-exploit-used-in-malvertisements  Trend Micro Discovers New Adobe Flash Zero-Day Exploit. February 2015. http:\/\/trendmicro.com\/trendlabs-security-intelligence\/trend-micro-discovers-new-adobe-flash-zero-day-exploit-used-in-malvertisements"},{"key":"e_1_3_2_1_16_1","unstructured":"Millions of WordPress sites open to attack. April 2015. http:\/\/www.scmagazineuk.com\/millions-of-wordpress-sites-open-to-attack\/article\/411725\/  Millions of WordPress sites open to attack. April 2015. http:\/\/www.scmagazineuk.com\/millions-of-wordpress-sites-open-to-attack\/article\/411725\/"},{"key":"e_1_3_2_1_17_1","unstructured":"History and the way of Avoiding Zero-Day Attacks. May 2015. http:\/\/www.zonealarm.com\/blog\/2015\/05\/what-the-heck-are-zero-day-attacks-and-3-ways-to-avoid-them\/  History and the way of Avoiding Zero-Day Attacks. May 2015. http:\/\/www.zonealarm.com\/blog\/2015\/05\/what-the-heck-are-zero-day-attacks-and-3-ways-to-avoid-them\/"}],"event":{"name":"ICTCS '16: Second International Conference on Information and Communication Technology for Competitive Strategies","acronym":"ICTCS '16","location":"Udaipur India"},"container-title":["Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2905055.2905357","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2905055.2905357","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T18:55:49Z","timestamp":1750272949000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2905055.2905357"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3,4]]},"references-count":17,"alternative-id":["10.1145\/2905055.2905357","10.1145\/2905055"],"URL":"https:\/\/doi.org\/10.1145\/2905055.2905357","relation":{},"subject":[],"published":{"date-parts":[[2016,3,4]]},"assertion":[{"value":"2016-03-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}