{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:27:43Z","timestamp":1750220863344,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,1,10]],"date-time":"2020-01-10T00:00:00Z","timestamp":1578614400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,1,10]]},"DOI":"10.1145\/3377049.3377107","type":"proceedings-article","created":{"date-parts":[[2020,3,20]],"date-time":"2020-03-20T20:40:32Z","timestamp":1584736832000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Analyzing Web Application Vulnerabilities"],"prefix":"10.1145","author":[{"given":"Md. Abdur","family":"Rahman","sequence":"first","affiliation":[{"name":"Centre for Advanced Research in Sciences, University of Dhaka, Bangladesh"}]},{"given":"Mahfida","family":"Amjad","sequence":"additional","affiliation":[{"name":"Institute of Information Technology, University of Dhaka, Bangladesh"}]},{"given":"Byezid","family":"Ahmed","sequence":"additional","affiliation":[{"name":"Institute of Information Technology, University of Dhaka, Bangladesh"}]},{"given":"Md. Saeed","family":"Siddik","sequence":"additional","affiliation":[{"name":"Institute of Information Technology, University of Dhaka, Bangladesh"}]}],"member":"320","published-online":{"date-parts":[[2020,3,20]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"458","article-title":"Directory traversal in a scalable multi-node file system cache for a remote cluster file system","volume":"8","author":"Rajagopol","year":"2013","unstructured":"Rajagopol A, Marc M Eshel, Roger L Haskin, Dean Hildebrand, Manoj P Naik, Frank B Schmuck, and Renu Tewari. 2013. Directory traversal in a scalable multi-node file system cache for a remote cluster file system. US Patent 8,458,239.","journal-title":"US Patent"},{"key":"e_1_3_2_1_2_1","first-page":"2009","volume-title":"Retrieved","author":"Acohido Byron","year":"2009","unstructured":"Byron Acohido. 2009. Hackers breach Heartland Payment credit card system. Retrieved October 18, 2011 (2009), 2009-0."},{"volume-title":"Acunetix Vulnerability Scanner. https:\/\/www.acunetix.com\/vulnerability-scanner\/ [Online","year":"2018","key":"e_1_3_2_1_3_1","unstructured":"Acunetix. [n.d.]. Acunetix Vulnerability Scanner. https:\/\/www.acunetix.com\/vulnerability-scanner\/ [Online; last accessed 04-May-2018]."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455782"},{"key":"e_1_3_2_1_5_1","volume-title":"Sony says PlayStation hacker got personal data. The New York Times","author":"Bilton Nick","year":"2011","unstructured":"Nick Bilton and Brian Stelter. 2011. Sony says PlayStation hacker got personal data. The New York Times (2011)."},{"volume-title":"SQL injection attacks and defense","author":"Clarke-Salt Justin","key":"e_1_3_2_1_6_1","unstructured":"Justin Clarke-Salt. 2009. SQL injection attacks and defense. Elsevier."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/PRDC.2011.31"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2015.116"},{"volume-title":"Web application security statistics","author":"Gordeychik S","key":"e_1_3_2_1_9_1","unstructured":"S Gordeychik. 2010. Web application security statistics. The Web Application Security Consortium."},{"key":"e_1_3_2_1_10_1","volume-title":"Challenges and Estimation Process for Secure Web Application Development. In 2016 Second International Conference on Computational Intelligence & Communication Technology (CICT). IEEE, 219--222","author":"Gupta Shivangi","year":"2016","unstructured":"Shivangi Gupta and Saru Dhir. 2016. Issues, Challenges and Estimation Process for Secure Web Application Development. In 2016 Second International Conference on Computational Intelligence & Communication Technology (CICT). IEEE, 219--222."},{"volume-title":"Internet-Technical Developments and Applications 2","author":"Hubczyk Michal","key":"e_1_3_2_1_11_1","unstructured":"Michal Hubczyk, Adam Domanski, and Joanna Domanska. 2012. Local and Remote File Inclusion. In Internet-Technical Developments and Applications 2. Springer, 189--200."},{"key":"e_1_3_2_1_12_1","volume-title":"Data theft believed to be biggest hack. The Washington Post","author":"Jewell M","year":"2007","unstructured":"M Jewell. 2007. Data theft believed to be biggest hack. The Washington Post (2007)."},{"key":"e_1_3_2_1_13_1","unstructured":"J. Kirk. [n.d.]. BitCoin exchange loses $250 0000 after unencrypted keys stolen. ([n. d.]). http:\/\/www.computerworld.com\/s\/article\/9230919\/BitCoin_exc."},{"volume-title":"Nikto Website Scanner. https:\/\/hackertarget.com\/nikto-website-scanner\/ [Online","year":"2018","key":"e_1_3_2_1_14_1","unstructured":"Nikto. [n.d.]. Nikto Website Scanner. https:\/\/hackertarget.com\/nikto-website-scanner\/ [Online; last accessed 04-May-2018]."},{"key":"e_1_3_2_1_15_1","volume-title":"Cost of data breach study: Global analysis","author":"Ponemon L","year":"2013","unstructured":"L Ponemon. 2013. Cost of data breach study: Global analysis. Poneomon Institute sponsored by Symantec (2013)."},{"key":"e_1_3_2_1_16_1","unstructured":"Verizon Enterprise Solutions. 2014. Data Breach Investigations Report (DBIR). (2014)."},{"key":"e_1_3_2_1_17_1","volume-title":"NDSS","volume":"2007","author":"Vogt Philipp","year":"2007","unstructured":"Philipp Vogt, Florian Nentwich, Nenad Jovanovic, Engin Kirda, Christopher Kruegel, and Giovanni Vigna. 2007. Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis.. In NDSS, Vol. 2007. 12."}],"event":{"name":"ICCA 2020: International Conference on Computing Advancements","acronym":"ICCA 2020","location":"Dhaka Bangladesh"},"container-title":["Proceedings of the International Conference on Computing Advancements"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3377049.3377107","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3377049.3377107","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:38Z","timestamp":1750202618000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3377049.3377107"}},"subtitle":["An Empirical Study on E-Commerce Sector in Bangladesh"],"short-title":[],"issued":{"date-parts":[[2020,1,10]]},"references-count":17,"alternative-id":["10.1145\/3377049.3377107","10.1145\/3377049"],"URL":"https:\/\/doi.org\/10.1145\/3377049.3377107","relation":{},"subject":[],"published":{"date-parts":[[2020,1,10]]},"assertion":[{"value":"2020-03-20","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}