{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:33:49Z","timestamp":1750221229864,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,6,26]],"date-time":"2018-06-26T00:00:00Z","timestamp":1529971200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,6,26]]},"DOI":"10.1145\/3231053.3231116","type":"proceedings-article","created":{"date-parts":[[2018,8,30]],"date-time":"2018-08-30T14:00:37Z","timestamp":1535637637000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["A comprehensive study of cyber attacks &amp; counter measures for web systems"],"prefix":"10.1145","author":[{"given":"Abid","family":"Jamil","sequence":"first","affiliation":[{"name":"Chiniot Faisalabad Campus, Pakistan"}]},{"given":"Kashif","family":"Asif","sequence":"additional","affiliation":[{"name":"Foundation University Islamabad, Pakistan"}]},{"given":"Rehan","family":"Ashraf","sequence":"additional","affiliation":[{"name":"National Textile University, Faisalabad, Pakistan"}]},{"given":"Sheraz","family":"Mehmood","sequence":"additional","affiliation":[{"name":"National Textile University, Faisalabad, Pakistan"}]},{"given":"Ghulam","family":"Mustafa","sequence":"additional","affiliation":[{"name":"National textile University, Faisalabad, Pakistan"}]}],"member":"320","published-online":{"date-parts":[[2018,6,26]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Internet Security Threat Report,\"","author":"Security I.","year":"2017","unstructured":"I. Security and T. Report , \" Symantec , Internet Security Threat Report,\" vol. 22 , no. April , 2017 . I. Security and T. Report, \"Symantec, Internet Security Threat Report,\" vol. 22, no. April, 2017."},{"issue":"1","key":"e_1_3_2_1_2_1","first-page":"01","article-title":"Penetration Testing in Agile Software Development Projects","volume":"5","author":"Tomanek M.","year":"2015","unstructured":"M. Tomanek and T. Klima , \" Penetration Testing in Agile Software Development Projects ,\" Int. J. Cryptogr. Inf. Secur. , vol. 5 , no. 1 , pp. 01 -- 07 , 2015 . M. Tomanek and T. Klima, \"Penetration Testing in Agile Software Development Projects,\" Int. J. Cryptogr. Inf. Secur., vol. 5, no. 1, pp. 01--07, 2015.","journal-title":"Int. J. Cryptogr. Inf. Secur."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/S2212-5671(15)01077-1"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13173-017-0051-1"},{"key":"e_1_3_2_1_5_1","first-page":"303","volume-title":"2015 Int. Conf. Estim. Detect. Inf. Fusion, ICEDIF 2015, no. 123456","author":"Qian L.","year":"2015","unstructured":"L. Qian , Z. Zhu , J. Hu , and S. Liu , \" Research of SQL injection attack and prevention technology,\" Proc . 2015 Int. Conf. Estim. Detect. Inf. Fusion, ICEDIF 2015, no. 123456 , pp. 303 -- 306 , 2015 . L. Qian, Z. Zhu, J. Hu, and S. Liu, \"Research of SQL injection attack and prevention technology,\" Proc. 2015 Int. Conf. Estim. Detect. Inf. Fusion, ICEDIF 2015, no. 123456, pp. 303--306, 2015."},{"key":"e_1_3_2_1_6_1","first-page":"154","volume-title":"Yangzhou, China, October 12--14","author":"Yan F.","year":"2016","unstructured":"F. Yan and T. Qiao , \" Study on the Detection of Cross-Site Scripting Vulnerabilities Based on Reverse Code Audit,\" in Intelligent Data Engineering and Automated Learning - IDEAL 2016: 17th International Conference , Yangzhou, China, October 12--14 , 2016 , Proceedings, H. Yin, Y. Gao, B. Li, D. Zhang, M. Yang, Y. Li, F. Klawonn, and A. J. Tallon-Ballesteros, Eds . Cham : Springer International Publishing , 2016, pp. 154 -- 163 . F. Yan and T. Qiao, \"Study on the Detection of Cross-Site Scripting Vulnerabilities Based on Reverse Code Audit,\" in Intelligent Data Engineering and Automated Learning - IDEAL 2016: 17th International Conference, Yangzhou, China, October 12--14, 2016, Proceedings, H. Yin, Y. Gao, B. Li, D. Zhang, M. Yang, Y. Li, F. Klawonn, and A. J. Tallon-Ballesteros, Eds. Cham: Springer International Publishing, 2016, pp. 154--163."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/UKSIM.2011.85"},{"key":"e_1_3_2_1_8_1","first-page":"56","volume-title":"2013 3rd Int. Conf. Comput. Sci. Netw. Technol. ICCSNT 2013","author":"Zeng H.","year":"2014","unstructured":"H. Zeng , \"Research on developing a lab environment for cross site request forgery: Attack and defense education in higher vocational colleges,\" Proc . 2013 3rd Int. Conf. Comput. Sci. Netw. Technol. ICCSNT 2013 , pp. 56 -- 60 , 2014 . H. Zeng, \"Research on developing a lab environment for cross site request forgery: Attack and defense education in higher vocational colleges,\" Proc. 2013 3rd Int. Conf. Comput. Sci. Netw. Technol. ICCSNT 2013, pp. 56--60, 2014."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2017.06.010"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2017.04.004"},{"key":"e_1_3_2_1_11_1","first-page":"1","volume-title":"The Journal of Supercomputing","author":"Jabbar Sohail","year":"2016","unstructured":"Sohail Jabbar , Murad Khan , Bhagya Nathali Silva, and Kijun Han, \"REST based Industrial Web of Things' Framework for Smart Warehousing \", The Journal of Supercomputing , pp 1 -- 15 , Springer , 2016 Sohail Jabbar, Murad Khan, Bhagya Nathali Silva, and Kijun Han, \"REST based Industrial Web of Things' Framework for Smart Warehousing\", The Journal of Supercomputing, pp 1--15, Springer, 2016"},{"key":"e_1_3_2_1_12_1","first-page":"1","volume-title":"Student Teacher Engagement Analysis\", Multimedia Tools and Applications","author":"Farhan Muhammad","year":"2016","unstructured":"Muhammad Farhan , Muhammad Aslam , Sohail Jabbar , Shehzad Khalid , \" Multimedia Based Qualitative Assessment Methodology in e Learning : Student Teacher Engagement Analysis\", Multimedia Tools and Applications , pp 1 -- 15 , Springer , 2016 Muhammad Farhan, Muhammad Aslam, Sohail Jabbar, Shehzad Khalid, \"Multimedia Based Qualitative Assessment Methodology in eLearning: Student Teacher Engagement Analysis\", Multimedia Tools and Applications, pp 1--15, Springer, 2016"},{"issue":"6","key":"e_1_3_2_1_13_1","first-page":"81","article-title":"Web Application Security: Threats, Countermeasures, and Pitfalls","volume":"50","author":"Huang H.-C.","year":"2017","unstructured":"H.-C. Huang , Z.-K. Zhang , H.-W. Cheng , and S. W. Shieh , \" Web Application Security: Threats, Countermeasures, and Pitfalls ,\" Computer (Long. Beach. Calif). , vol. 50 , no. 6 , pp. 81 -- 85 , 2017 . H.-C. Huang, Z.-K. Zhang, H.-W. Cheng, and S. W. Shieh, \"Web Application Security: Threats, Countermeasures, and Pitfalls,\" Computer (Long. Beach. Calif)., vol. 50, no. 6, pp. 81--85, 2017.","journal-title":"Computer (Long. Beach. Calif)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.4236\/jcc.2014.28001"},{"issue":"1","key":"e_1_3_2_1_15_1","first-page":"2","article-title":"Analysis of SQL Injection Detection Techniques","volume":"28","author":"Singh J. P.","year":"2017","unstructured":"J. P. Singh , \" Analysis of SQL Injection Detection Techniques ,\" Theor. Appl. Informatics , vol. 28 , no. 1 & 2 , pp. 37--55, 2017 . J. P. Singh, \"Analysis of SQL Injection Detection Techniques,\" Theor. Appl. Informatics, vol. 28, no. 1 & 2, pp. 37--55, 2017.","journal-title":"Theor. Appl. Informatics"},{"issue":"2","key":"e_1_3_2_1_16_1","first-page":"14","article-title":"Articles Additional Authentication Technique : an Efficient Approach To Prevent Cross-Site Request Forgery Attack,\" i-Manager's J","volume":"5","author":"Nagpal N.","year":"2016","unstructured":"N. Nagpal , Bharti; Chauhan, Naresh; Singh , \" Articles Additional Authentication Technique : an Efficient Approach To Prevent Cross-Site Request Forgery Attack,\" i-Manager's J . Inf. Technol. , vol. 5 , no. 2 , pp. 14 -- 18 , 2016 . N. Nagpal, Bharti; Chauhan, Naresh; Singh, \"Articles Additional Authentication Technique : an Efficient Approach To Prevent Cross-Site Request Forgery Attack,\" i-Manager's J. Inf. Technol., vol. 5, no. 2, pp. 14--18, 2016.","journal-title":"Inf. Technol."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/STARTUP.2016.7583912"},{"key":"e_1_3_2_1_18_1","first-page":"37","volume-title":"Conf. Software, Knowledge, Inf. Manag. Appl.","author":"Shabut A. M.","year":"2016","unstructured":"A. M. Shabut , K. T. Lwin , and M. A. Hossain , \" Cyber attacks, countermeasures, and protection schemes - A state of the art survey,\" 2016 10th Int . Conf. Software, Knowledge, Inf. Manag. Appl. , pp. 37 -- 44 , 2016 . A. M. Shabut, K. T. Lwin, and M. A. Hossain, \"Cyber attacks, countermeasures, and protection schemes - A state of the art survey,\" 2016 10th Int. Conf. Software, Knowledge, Inf. Manag. Appl., pp. 37--44, 2016."},{"key":"e_1_3_2_1_19_1","first-page":"51","volume-title":"Proc. - 2016 Cybersecurity Symp. CYBERSEC 2016","author":"Dawson J.","year":"2017","unstructured":"J. Dawson and J. Todd McDonald , \" Improving Penetration Testing Methodologies for Security-Based Risk Assessment,\" Proc. - 2016 Cybersecurity Symp. CYBERSEC 2016 , pp. 51 -- 58 , 2017 . J. Dawson and J. Todd McDonald, \"Improving Penetration Testing Methodologies for Security-Based Risk Assessment,\" Proc. - 2016 Cybersecurity Symp. CYBERSEC 2016, pp. 51--58, 2017."}],"event":{"name":"ICFNDS'18: International Conference on Future Networks and Distributed Systems","acronym":"ICFNDS'18","location":"Amman Jordan"},"container-title":["Proceedings of the 2nd International Conference on Future Networks and Distributed Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3231053.3231116","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3231053.3231116","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:07:01Z","timestamp":1750212421000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3231053.3231116"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6,26]]},"references-count":19,"alternative-id":["10.1145\/3231053.3231116","10.1145\/3231053"],"URL":"https:\/\/doi.org\/10.1145\/3231053.3231116","relation":{},"subject":[],"published":{"date-parts":[[2018,6,26]]},"assertion":[{"value":"2018-06-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}