{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,8]],"date-time":"2025-11-08T13:20:26Z","timestamp":1762608026956,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":56,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,6,29]],"date-time":"2020-06-29T00:00:00Z","timestamp":1593388800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["MA 5030\/3-1"],"award-info":[{"award-number":["MA 5030\/3-1"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Deutsches Zentrum f\u00fcr Luft- und Raumfahrt","award":["D\/943\/67258261, D\/943\/67262000"],"award-info":[{"award-number":["D\/943\/67258261, D\/943\/67262000"]}]},{"DOI":"10.13039\/100014718","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS:1816845"],"award-info":[{"award-number":["CNS:1816845"]}],"id":[{"id":"10.13039\/100014718","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Bundesministerium f\u00fcr Bildung und Forschung","award":["01IS18074E"],"award-info":[{"award-number":["01IS18074E"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,6,29]]},"DOI":"10.1145\/3379597.3387471","type":"proceedings-article","created":{"date-parts":[[2020,9,19]],"date-time":"2020-09-19T02:12:49Z","timestamp":1600481569000},"page":"232-242","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Did You Remember To Test Your Tokens?"],"prefix":"10.1145","author":[{"given":"Danielle","family":"Gonzalez","sequence":"first","affiliation":[{"name":"Rochester Institute of Technology, Rochester, NY, USA"}]},{"given":"Michael","family":"Rath","sequence":"additional","affiliation":[{"name":"DLR Institute of Data Science, Technical University Ilmenau, Jena \/ Ilmenau, Germany"}]},{"given":"Mehdi","family":"Mirakhorli","sequence":"additional","affiliation":[{"name":"Rochester Institute of Technology, Rochester, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,9,18]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Ben Alex Luke Taylor Rob Winch Gunnar Hillert Joe Grandja and Jay Bryant. 2017. Spring Security Reference 5.1.2.RELEASE. https:\/\/docs.spring.io\/spring-security\/site\/docs\/current\/reference\/htmlsingle\/  Ben Alex Luke Taylor Rob Winch Gunnar Hillert Joe Grandja and Jay Bryant. 2017. Spring Security Reference 5.1.2.RELEASE. https:\/\/docs.spring.io\/spring-security\/site\/docs\/current\/reference\/htmlsingle\/"},{"key":"e_1_3_2_1_2_1","unstructured":"M. Anastasov. 2014. TDD Antipatterns: The Free Ride. https:\/\/semaphoreci.com\/blog\/2014\/06\/24\/tdd-antipatterns-the-free-ride.html.  M. Anastasov. 2014. TDD Antipatterns: The Free Ride. https:\/\/semaphoreci.com\/blog\/2014\/06\/24\/tdd-antipatterns-the-free-ride.html."},{"key":"e_1_3_2_1_3_1","unstructured":"Apache. 2017?. Testing with Apache Shiro. Link: https:\/\/shiro.apache.org\/testing.html.  Apache. 2017?. Testing with Apache Shiro. Link: https:\/\/shiro.apache.org\/testing.html."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2342227"},{"key":"#cr-split#-e_1_3_2_1_5_1.1","doi-asserted-by":"crossref","unstructured":"M.Jones B. Campbell C. Mortimore. 2015. Security Assertion Markup Language (SAML) 2.0 Profile for OAuth 2.0 Client Authentication and Authorization Grants. RFC 7522. RFC Editor. https:\/\/doi.org\/10.17487\/RFC7522 10.17487\/RFC7522","DOI":"10.17487\/RFC7522"},{"key":"#cr-split#-e_1_3_2_1_5_1.2","doi-asserted-by":"crossref","unstructured":"M.Jones B. Campbell C. Mortimore. 2015. Security Assertion Markup Language (SAML) 2.0 Profile for OAuth 2.0 Client Authentication and Authorization Grants. RFC 7522. RFC Editor. https:\/\/doi.org\/10.17487\/RFC7522","DOI":"10.17487\/RFC7522"},{"volume-title":"Practical software testing: a process-oriented approach","author":"Burnstein Ilene","key":"e_1_3_2_1_6_1","unstructured":"Ilene Burnstein . 2006. Practical software testing: a process-oriented approach . Springer Science & Business Media , Berlin\/ Heidelberg, Germany . Ilene Burnstein. 2006. Practical software testing: a process-oriented approach. Springer Science & Business Media, Berlin\/Heidelberg, Germany."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2012.175"},{"key":"e_1_3_2_1_8_1","first-page":"1","volume-title":"OWASP Europe Conference 1","author":"Vries Stephen De","year":"2006","unstructured":"Stephen De Vries . 2006 . Security Testing Web Applications throughout Automated Software Tests . OWASP Europe Conference 1 , 1 (2006), 1--13. Stephen De Vries. 2006. Security Testing Web Applications throughout Automated Software Tests. OWASP Europe Conference 1, 1 (2006), 1--13."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(07)70027-2"},{"key":"e_1_3_2_1_10_1","unstructured":"Julien DuBois Deepu K. Sasidharan and Pascal Grimaud. 2011. JHipster: Open Source application platform for creating Spring Boot + Angular\/React projects in seconds! https:\/\/github.com\/javaparser\/javaparser  Julien DuBois Deepu K. Sasidharan and Pascal Grimaud. 2011. JHipster: Open Source application platform for creating Spring Boot + Angular\/React projects in seconds! https:\/\/github.com\/javaparser\/javaparser"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/1981848.1981915"},{"volume-title":"Security patterns in practice: designing secure architectures using software patterns","author":"Fernandez-Buglioni Eduardo","key":"e_1_3_2_1_12_1","unstructured":"Eduardo Fernandez-Buglioni . 2013. Security patterns in practice: designing secure architectures using software patterns . John Wiley & Sons , New York, NY . Eduardo Fernandez-Buglioni. 2013. Security patterns in practice: designing secure architectures using software patterns. John Wiley & Sons, New York, NY."},{"volume-title":"Refactoring: improving the design of existing code","author":"Fowler Martin","key":"e_1_3_2_1_13_1","unstructured":"Martin Fowler . 2018. Refactoring: improving the design of existing code . Addison-Wesley Professional , Boston, MA, USA . Martin Fowler. 2018. Refactoring: improving the design of existing code. Addison-Wesley Professional, Boston, MA, USA."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2016.30"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2017.12.013"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2010.07.012"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2014.06.009"},{"volume-title":"Basics of grounded theory analysis: Emergence vs forcing","author":"Glaser Barney G","key":"e_1_3_2_1_18_1","unstructured":"Barney G Glaser . 1992. Basics of grounded theory analysis: Emergence vs forcing . Sociology press , CA , USA. Barney G Glaser. 1992. Basics of grounded theory analysis: Emergence vs forcing. Sociology press, CA, USA."},{"key":"e_1_3_2_1_19_1","volume-title":"The discovery of grounded theory","author":"Glaser Barney G","year":"1968","unstructured":"Barney G Glaser , Anselm L Strauss , and Elizabeth Strutzel . 1968. The discovery of grounded theory ; strategies for qualitative research. Nursing research 17, 4 ( 1968 ), 364. Barney G Glaser, Anselm L Strauss, and Elizabeth Strutzel. 1968. The discovery of grounded theory; strategies for qualitative research. Nursing research 17, 4 (1968), 364."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2017.8"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/2487085.2487132"},{"key":"e_1_3_2_1_22_1","volume-title":"null (Dec","author":"International IEEE ISO, IEC.","year":"2010","unstructured":"IEEE ISO, IEC. 2010. ISO\/IEC\/IEEE International Standard - Systems and software engineering - Vocabulary. ISO\/IEC\/ IEEE 24765:2010(E) null , null (Dec 2010 ), 1--418. https:\/\/doi.org\/10.1109\/IEEESTD.2010.5733835 10.1109\/IEEESTD.2010.5733835 IEEE ISO, IEC. 2010. ISO\/IEC\/IEEE International Standard - Systems and software engineering - Vocabulary. ISO\/IEC\/IEEE 24765:2010(E) null, null (Dec 2010), 1--418. https:\/\/doi.org\/10.1109\/IEEESTD.2010.5733835"},{"volume-title":"The State of Developer Ecosystem","year":"2019","key":"e_1_3_2_1_23_1","unstructured":"Jetbrains. 2019. The State of Developer Ecosystem 2019 . https:\/\/www.jetbrains.com\/lp\/devecosystem-2019\/java\/. Jetbrains. 2019. The State of Developer Ecosystem 2019. https:\/\/www.jetbrains.com\/lp\/devecosystem-2019\/java\/."},{"key":"e_1_3_2_1_24_1","unstructured":"L. Koskela. 2013. Developer test anti-patterns. https:\/\/www.youtube.com\/watch?v=3Fa69eQ6XgM.  L. Koskela. 2013. Developer test anti-patterns. https:\/\/www.youtube.com\/watch?v=3Fa69eQ6XgM."},{"key":"e_1_3_2_1_25_1","unstructured":"Erik Kuefler. 2014. Google Testing Blog Testing on the Toilet: Test Behaviors Not Methods. Link: https:\/\/testing.googleblog.com\/2014\/04\/testing-on-toilet-test-behaviors-not.html.  Erik Kuefler. 2014. Google Testing Blog Testing on the Toilet: Test Behaviors Not Methods. Link: https:\/\/testing.googleblog.com\/2014\/04\/testing-on-toilet-test-behaviors-not.html."},{"volume-title":"xUnit test patterns: Refactoring test code. Pearson Education","author":"Meszaros Gerard","key":"e_1_3_2_1_26_1","unstructured":"Gerard Meszaros . 2007. xUnit test patterns: Refactoring test code. Pearson Education , London, UK . Gerard Meszaros. 2007. xUnit test patterns: Refactoring test code. Pearson Education, London, UK."},{"key":"e_1_3_2_1_27_1","first-page":"66","article-title":"OWASP Testing Guide, v4","volume":"4","author":"Meucci Matteo","year":"2013","unstructured":"Matteo Meucci , Andrew Muller , and 2013 . OWASP Testing Guide, v4 . OWASP Foundation 4 (2013), 66 -- 80 . Matteo Meucci, Andrew Muller, and et al. 2013. OWASP Testing Guide, v4. OWASP Foundation 4 (2013), 66--80.","journal-title":"OWASP Foundation"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-017-9512-6"},{"key":"e_1_3_2_1_29_1","unstructured":"Oracle. 2018?. JAAS LoginModule Dev Guide. Link: https:\/\/docs.oracle.com\/javase\/7\/docs\/technotes\/guides\/security.  Oracle. 2018?. JAAS LoginModule Dev Guide. Link: https:\/\/docs.oracle.com\/javase\/7\/docs\/technotes\/guides\/security."},{"volume-title":"Software testing. Pearson Education","author":"Patton Ron","key":"e_1_3_2_1_30_1","unstructured":"Ron Patton . 2006. Software testing. Pearson Education , London, UK . Ron Patton. 2006. Software testing. Pearson Education, London, UK."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.84"},{"key":"#cr-split#-e_1_3_2_1_32_1.1","doi-asserted-by":"crossref","unstructured":"ed. R. Harrison. 2006. Lightweight Directory Access Protocol(LDAP):Authentication Methods and Security Mechanisms. RFC 4513. RFC Editor. https:\/\/doi.org\/10.17487\/RFC4513 10.17487\/RFC4513","DOI":"10.17487\/rfc4513"},{"key":"#cr-split#-e_1_3_2_1_32_1.2","doi-asserted-by":"crossref","unstructured":"ed. R. Harrison. 2006. Lightweight Directory Access Protocol(LDAP):Authentication Methods and Security Mechanisms. RFC 4513. RFC Editor. https:\/\/doi.org\/10.17487\/RFC4513","DOI":"10.17487\/rfc4513"},{"key":"e_1_3_2_1_33_1","volume-title":"Righetto","author":"Dominique","year":"2019","unstructured":"Dominique et al. Righetto . 2019 . OWASP authentication cheatsheet. https:\/\/bit.ly\/353sm2E. Dominique et al. Righetto. 2019. OWASP authentication cheatsheet. https:\/\/bit.ly\/353sm2E."},{"key":"e_1_3_2_1_34_1","unstructured":"Dave Sayer. 2019. Spring Security Architecture. Link: https:\/\/spring.io\/guides\/topicals\/spring-security-architecture.  Dave Sayer. 2019. Spring Security Architecture. Link: https:\/\/spring.io\/guides\/topicals\/spring-security-architecture."},{"key":"e_1_3_2_1_35_1","unstructured":"J. Scruggs. 2009. Smells of Testing (signs your tests are bad). http:\/\/jakescruggs.blogspot.ch\/2009\/04\/smells-of-testing-signs-your-tests-are.html.  J. Scruggs. 2009. Smells of Testing (signs your tests are bad). http:\/\/jakescruggs.blogspot.ch\/2009\/04\/smells-of-testing-signs-your-tests-are.html."},{"key":"e_1_3_2_1_36_1","unstructured":"Chris Sevilleja. 2015. The Ins and Outs of Token Based Authentication. Scotch.io.https:\/\/scotch.io\/tutorials\/the-ins-and-outs-of-token-based-authentication  Chris Sevilleja. 2015. The Ins and Outs of Token Based Authentication. Scotch.io.https:\/\/scotch.io\/tutorials\/the-ins-and-outs-of-token-based-authentication"},{"key":"e_1_3_2_1_38_1","unstructured":"Jayson Smith. 2019. What is cucumber? https:\/\/cucumber.io\/docs\/gherkin\/.  Jayson Smith. 2019. What is cucumber? https:\/\/cucumber.io\/docs\/gherkin\/."},{"key":"e_1_3_2_1_39_1","unstructured":"Spring. 2017. Spring Security Testing. Link: https:\/\/docs.spring.io\/spring-security\/site\/docs\/current\/reference\/html\/test.html.  Spring. 2017. Spring Security Testing. Link: https:\/\/docs.spring.io\/spring-security\/site\/docs\/current\/reference\/html\/test.html."},{"key":"e_1_3_2_1_40_1","unstructured":"Spring. 2018. Spring Security API Documentation. Link: https:\/\/docs.spring.io\/spring-security\/site\/docs\/5.2.1.RELEASE\/api\/.  Spring. 2018. Spring Security API Documentation. Link: https:\/\/docs.spring.io\/spring-security\/site\/docs\/5.2.1.RELEASE\/api\/."},{"key":"e_1_3_2_1_41_1","unstructured":"stackoverflow.com. 2014. Unit testing Anti-patterns catalogue. https:\/\/stackoverflow.com\/questions\/333682\/unit- testing-anti-patterns-catalogue.  stackoverflow.com. 2014. Unit testing Anti-patterns catalogue. https:\/\/stackoverflow.com\/questions\/333682\/unit- testing-anti-patterns-catalogue."},{"key":"e_1_3_2_1_42_1","unstructured":"William Stallings Lawrie Brown Michael D Bauer and Arup Kumar Bhattacharjee. 2012. Computer security: principles and practice. Pearson Education Upper Saddle River New Jersey USA.  William Stallings Lawrie Brown Michael D Bauer and Arup Kumar Bhattacharjee. 2012. Computer security: principles and practice. Pearson Education Upper Saddle River New Jersey USA."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884833"},{"key":"e_1_3_2_1_44_1","volume-title":"Are unit and integration test definitions still valid for modern Java projects? An empirical study on open-source projects. Journal of Systems and Software 159 (jan","author":"Trautsch Fabian","year":"2020","unstructured":"Fabian Trautsch , Steffen Herbold , and Jens Grabowski . 2020. Are unit and integration test definitions still valid for modern Java projects? An empirical study on open-source projects. Journal of Systems and Software 159 (jan 2020 ), 110421. https:\/\/doi.org\/10.1016\/J.JSS.2019.110421 10.1016\/J.JSS.2019.110421 Fabian Trautsch, Steffen Herbold, and Jens Grabowski. 2020. Are unit and integration test definitions still valid for modern Java projects? An empirical study on open-source projects. Journal of Systems and Software 159 (jan 2020), 110421. https:\/\/doi.org\/10.1016\/J.JSS.2019.110421"},{"key":"e_1_3_2_1_45_1","unstructured":"A. Trenk. 2013. Testing on the Toilet: Dont Overuse Mocks. http:\/\/googletesting.blogspot.com.tr\/2013\/05\/testing-on-toilet-dont-overuse-mocks.html.  A. Trenk. 2013. Testing on the Toilet: Dont Overuse Mocks. http:\/\/googletesting.blogspot.com.tr\/2013\/05\/testing-on-toilet-dont-overuse-mocks.html."},{"key":"e_1_3_2_1_46_1","volume-title":"Amin Milani Fard, and Ali Mesbah","author":"Vahabzadeh Arash","year":"2015","unstructured":"Arash Vahabzadeh , Amin Milani Fard, and Ali Mesbah . 2015 . An empirical study of bugs in test code. In ICSME. IEEE Computer Society , NY, USA, 101--110. Arash Vahabzadeh, Amin Milani Fard, and Ali Mesbah. 2015. An empirical study of bugs in test code. In ICSME. IEEE Computer Society, NY, USA, 101--110."},{"key":"e_1_3_2_1_47_1","unstructured":"Danny van Bruggen and Federico Tomassetti. 2013. JavaParser: Java 1-13 Parser and Abstract Syntax Tree for Java. https:\/\/github.com\/jhipster\/generator-jhipster  Danny van Bruggen and Federico Tomassetti. 2013. JavaParser: Java 1-13 Parser and Abstract Syntax Tree for Java. https:\/\/github.com\/jhipster\/generator-jhipster"},{"key":"e_1_3_2_1_48_1","volume-title":"OWASP Top 10 2017: The Ten Most Critical Web Application Security Risks","author":"van der Stock Andrew","year":"2017","unstructured":"Andrew van der Stock , Brian Glas , and T Gigler . 2017. OWASP Top 10 2017: The Ten Most Critical Web Application Security Risks . OWASP Foundation null, null ( 2017 ), 23. Andrew van der Stock, Brian Glas, and T Gigler. 2017. OWASP Top 10 2017: The Ten Most Critical Web Application Security Risks. OWASP Foundation null, null (2017), 23."},{"key":"e_1_3_2_1_49_1","volume-title":"Article 20 (June","author":"van Deursen Arie","year":"2015","unstructured":"Arie van Deursen . 2015. Beyond Page Objects: Testing Web Applications with State Objects. Queue 13, 6 , Article 20 (June 2015 ), 18 pages. https:\/\/doi.org\/10.1145\/2791301.2793039 10.1145\/2791301.2793039 Arie van Deursen. 2015. Beyond Page Objects: Testing Web Applications with State Objects. Queue 13, 6, Article 20 (June 2015), 18 pages. https:\/\/doi.org\/10.1145\/2791301.2793039"},{"key":"e_1_3_2_1_50_1","volume-title":"Proceedings of the 2nd international conference on extreme programming and flexible processes in software engineering (XP2001)","author":"Deursen Arie Van","year":"2001","unstructured":"Arie Van Deursen , Leon Moonen , Alex Van Den Bergh , and Gerard Kok . 2001 . Refactoring test code . In Proceedings of the 2nd international conference on extreme programming and flexible processes in software engineering (XP2001) . CWI (Centre for Mathematics and Computer Science), Amsterdam, Netherlands, 92--95. Arie Van Deursen, Leon Moonen, Alex Van Den Bergh, and Gerard Kok. 2001. Refactoring test code. In Proceedings of the 2nd international conference on extreme programming and flexible processes in software engineering (XP2001). CWI (Centre for Mathematics and Computer Science), Amsterdam, Netherlands, 92--95."},{"volume-title":"Building Secure Software: How to Avoid Security Problems the Right Way","author":"Viega John","key":"e_1_3_2_1_51_1","unstructured":"John Viega and Gary McGraw . 2011. Building Secure Software: How to Avoid Security Problems the Right Way (Paperback) (Addison-Wesley Professional Computing Series) (1st ed.). Addison-Wesley Professional , Boston, MA, USA. John Viega and Gary McGraw. 2011. Building Secure Software: How to Avoid Security Problems the Right Way (Paperback) (Addison-Wesley Professional Computing Series) (1st ed.). Addison-Wesley Professional, Boston, MA, USA."},{"volume-title":"Design Science Methodology for Information Systems and Software Engineering","author":"Wieringa Roel J.","key":"e_1_3_2_1_52_1","unstructured":"Roel J. Wieringa . 2014. Design Science Methodology for Information Systems and Software Engineering . Springer Berlin Heidelberg , Berlin, DE . https:\/\/doi.org\/10.1007\/978-3-662-43839-8 10.1007\/978-3-662-43839-8 Roel J. Wieringa. 2014. Design Science Methodology for Information Systems and Software Engineering. Springer Berlin Heidelberg, Berlin, DE. https:\/\/doi.org\/10.1007\/978-3-662-43839-8"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.5555\/2349018"},{"volume-title":"The art of software security testing: identifying software security flaws. Pearson Education","author":"Wysopal Chris","key":"e_1_3_2_1_54_1","unstructured":"Chris Wysopal , Lucas Nelson , Elfriede Dustin , and Dino Dai Zovi . 2006. The art of software security testing: identifying software security flaws. Pearson Education , London, UK . Chris Wysopal, Lucas Nelson, Elfriede Dustin, and Dino Dai Zovi. 2006. The art of software security testing: identifying software security flaws. Pearson Education, London, UK."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970342"}],"event":{"name":"MSR '20: 17th International Conference on Mining Software Repositories","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS","SIGAI ACM Special Interest Group on Artificial Intelligence","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"],"location":"Seoul Republic of Korea","acronym":"MSR '20"},"container-title":["Proceedings of the 17th International Conference on Mining Software Repositories"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3379597.3387471","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3379597.3387471","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:20Z","timestamp":1750200080000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3379597.3387471"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,29]]},"references-count":56,"alternative-id":["10.1145\/3379597.3387471","10.1145\/3379597"],"URL":"https:\/\/doi.org\/10.1145\/3379597.3387471","relation":{},"subject":[],"published":{"date-parts":[[2020,6,29]]},"assertion":[{"value":"2020-09-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}