{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T00:08:25Z","timestamp":1755907705809,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":7,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,9,24]],"date-time":"2023-09-24T00:00:00Z","timestamp":1695513600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,9,24]]},"DOI":"10.1145\/3630138.3630461","type":"proceedings-article","created":{"date-parts":[[2024,1,18]],"date-time":"2024-01-18T02:04:17Z","timestamp":1705543457000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Hospital Website Penetration Analysis and Vulnerability Reproduction Method"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-3623-7071","authenticated-orcid":false,"given":"Yujing","family":"Yu","sequence":"first","affiliation":[{"name":"Center for Information Technology and Statistics, The First Affiliated Hospital,Sun Yat-sen University, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-2670-5505","authenticated-orcid":false,"given":"Yan","family":"Wei","sequence":"additional","affiliation":[{"name":"China Industrial Control Systems Cyber Emergency Response Team, China"}]}],"member":"320","published-online":{"date-parts":[[2024,1,17]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"56","volume":"2017","author":"Lu Chang","unstructured":"Lu Chang-wei, ZHAO Hao-yu, LI Jing-bo. 2017. Scheme and Measures of Hospital Network Security Management.Chinese Hospital Management.China,2017,37(02):56-57.","journal-title":"Hospital Network Security Management.Chinese Hospital Management.China"},{"key":"e_1_3_2_1_2_1","unstructured":"Liao Xiang-qing Yang Xue-mei ZHANG Jin. 2014. Medical Equipment Management Based on the Internet of Things Technology.Chinese Hospital Management.China 2014 34(09):55-56."},{"key":"e_1_3_2_1_3_1","unstructured":"Men Jiaping XIAO Yangwen Ma Tao. 2021. Phishing Email Analysis of Social Engineering Attacks.Journal of Information Security Research.China 2021 7(02):166-170."},{"volume-title":"Information security technology-Baseline for classified protection of cybersecurity.State Administration for Market Regulation\u3001standardization administration.China","year":"2019","key":"e_1_3_2_1_4_1","unstructured":"GB\/T 22239-2019. Information security technology-Baseline for classified protection of cybersecurity.State Administration for Market Regulation\u3001standardization administration.China, 2019."},{"key":"e_1_3_2_1_5_1","unstructured":"Li Chao-feng GAN Feng HU Shan. 2009. Application of Regular Expression in Hospital Information System.China Digital Medicine.China 2009 4(01):43-45."},{"key":"e_1_3_2_1_6_1","unstructured":"Wu Hui-qiang Wu Jin-zhun XU Chao Li Zhenye. 2023. Design and Implem-entation of menopausal women's Health Management System Based on NOSQL.Electronic Technology & Software Engineering.China 2023(05):258-262."},{"key":"e_1_3_2_1_7_1","unstructured":"phith0n.vulnerability environments. Retrieved Aug 1 2023 from https:\/\/vulhub.org\/#\/environm-ents\/ \/flask\/ssti\/"}],"event":{"name":"PCCNT 2023: 2023 International Conference on Power, Communication, Computing and Networking Technologies","acronym":"PCCNT 2023","location":"Wuhan China"},"container-title":["2023 International Conference on Power Communication Computing and Networking Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3630138.3630461","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3630138.3630461","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T17:09:01Z","timestamp":1755882541000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3630138.3630461"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,24]]},"references-count":7,"alternative-id":["10.1145\/3630138.3630461","10.1145\/3630138"],"URL":"https:\/\/doi.org\/10.1145\/3630138.3630461","relation":{},"subject":[],"published":{"date-parts":[[2023,9,24]]},"assertion":[{"value":"2024-01-17","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}