{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T05:01:12Z","timestamp":1755838872317,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":6,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,7,27]],"date-time":"2019-07-27T00:00:00Z","timestamp":1564185600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,7,27]]},"DOI":"10.1145\/3348445.3348456","type":"proceedings-article","created":{"date-parts":[[2019,9,16]],"date-time":"2019-09-16T12:14:07Z","timestamp":1568636047000},"page":"153-157","source":"Crossref","is-referenced-by-count":5,"title":["A Framework for Website Security Assessment"],"prefix":"10.1145","author":[{"given":"Nguyen Duc","family":"Thai","sequence":"first","affiliation":[{"name":"Ho Chi Minh City University of Technology (VNUHCM), Ho Chi Minh City, Vietnam"}]},{"given":"Nguyen Huu","family":"Hieu","sequence":"additional","affiliation":[{"name":"Ho Chi Minh City University of Technology (VNUHCM), Ho Chi Minh City, Vietnam"}]}],"member":"320","published-online":{"date-parts":[[2019,7,27]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"YASCA official website yasca.org or on Github: https:\/\/github.com\/scovetta\/yasca accessed July 2018.  YASCA official website yasca.org or on Github: https:\/\/github.com\/scovetta\/yasca accessed July 2018."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"J. Bau E. Bursztein D. Gupta and J. Mitchell \"State of the art: Automated black-box web application vulnerability testing \" in Proceedingsof the 2010 IEEE Symposium on Security and Privacy 2010 pp. 332--345. 10.1109\/SP.2010.27   J. Bau E. Bursztein D. Gupta and J. Mitchell \"State of the art: Automated black-box web application vulnerability testing \" in Proceedingsof the 2010 IEEE Symposium on Security and Privacy 2010 pp. 332--345. 10.1109\/SP.2010.27","DOI":"10.1109\/SP.2010.27"},{"key":"e_1_3_2_1_3_1","unstructured":"Esposito Damiano etal \"Exploiting the potential of web application vulnerability scanning.\" in ICIMP Proceeding of The Thirteenth International Conference on Internet Monitoring and Protection Barcelona Spain July 22--26 2018.  Esposito Damiano et al. \"Exploiting the potential of web application vulnerability scanning.\" in ICIMP Proceeding of The Thirteenth International Conference on Internet Monitoring and Protection Barcelona Spain July 22--26 2018."},{"key":"e_1_3_2_1_4_1","unstructured":"OWASP Top 10 Most Critical Web Application Security Risks 2017. https:\/\/www.owasp.org\/index.php\/Category:OWASP_Top_Ten_Project.  OWASP Top 10 Most Critical Web Application Security Risks 2017. https:\/\/www.owasp.org\/index.php\/Category:OWASP_Top_Ten_Project."},{"key":"e_1_3_2_1_5_1","unstructured":"Symantec Internet Security Report Vol.23 2018.  Symantec Internet Security Report Vol.23 2018."},{"issue":"5","key":"e_1_3_2_1_6_1","first-page":"739","volume":"48","author":"Huang Y.W.","year":"2005","journal-title":"in International Journal of Computer and Telecommunications Networking - Web security"}],"event":{"name":"ICCCM 2019: The 7th International Conference on Computer and Communications Management","sponsor":["Chongqing University of Posts and Telecommunications"],"location":"Bangkok Thailand","acronym":"ICCCM 2019"},"container-title":["Proceedings of the 2019 7th International Conference on Computer and Communications Management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3348445.3348456","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/dl.acm.org\/ft_gateway.cfm?id=3348456&ftid=2084070&dwn=1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:22:58Z","timestamp":1750202578000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3348445.3348456"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,27]]},"references-count":6,"alternative-id":["10.1145\/3348445.3348456","10.1145\/3348445"],"URL":"https:\/\/doi.org\/10.1145\/3348445.3348456","relation":{},"subject":[],"published":{"date-parts":[[2019,7,27]]}}}