{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T02:35:24Z","timestamp":1771468524464,"version":"3.50.1"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,6,30]],"date-time":"2021-06-30T00:00:00Z","timestamp":1625011200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,6,30]],"date-time":"2021-06-30T00:00:00Z","timestamp":1625011200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,6,30]]},"DOI":"10.23919\/contel52528.2021.9495966","type":"proceedings-article","created":{"date-parts":[[2021,7,30]],"date-time":"2021-07-30T20:55:17Z","timestamp":1627678517000},"page":"142-145","source":"Crossref","is-referenced-by-count":4,"title":["Analyzing Web Security Features using Crawlers: Study of Croatian Web"],"prefix":"10.23919","author":[{"given":"Edi","family":"Stambuk","sequence":"first","affiliation":[{"name":"University of Zagreb,Faculty of Electrical Engineering and Computing,Zagreb,Croatia"}]},{"given":"Stjepan","family":"Gros","sequence":"additional","affiliation":[{"name":"University of Zagreb,Faculty of Electrical Engineering and Computing,Zagreb,Croatia"}]},{"given":"Marin","family":"Vukovic","sequence":"additional","affiliation":[{"name":"University of Zagreb,Faculty of Electrical Engineering and Computing,Zagreb,Croatia"}]}],"member":"263","reference":[{"key":"ref10","first-page":"219","article-title":"Mercator: A scalable, extensible Web crawler","volume":"2","author":"heydon","year":"2004"},{"key":"ref11","year":"2021","journal-title":"Spiders &#x2014; Scrapy 2 5 0 documentation (2021)"},{"key":"ref12","year":"2021","journal-title":"HttpOnly - Set-Cookie HTTP response header | OWASP (2021)"},{"key":"ref13","year":"2021","journal-title":"Transport Layer Protection - OWASP Cheat Sheet Series (2021)"},{"key":"ref14","year":"2021","journal-title":"HTTP Strict Transport Security - OWASP Cheat Sheet Series (2021)"},{"key":"ref15","year":"2021","journal-title":"Content Security Policy - OWASP Cheat Sheet Series (2021)"},{"key":"ref16","year":"2021","journal-title":"OWASP Secure Headers Project (2021)"},{"key":"ref17","year":"2021","journal-title":"Clickjacking Defense - OWASP Cheat Sheet Series (2021)"},{"key":"ref18","article-title":"All your iFRAMEs point to us","author":"provos","year":"2008","journal-title":"Proceedings of the 17th USENIX Security Symposium"},{"key":"ref19","first-page":"98195","author":"hsieh","year":"0","journal-title":"Computational Science and Engineering Department"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313665"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.106960"},{"key":"ref6","year":"2021","journal-title":"Metasploit | Penetration Testing Software Pen Testing Security | Metasploit (2021)"},{"key":"ref5","article-title":"Owasp top-10 2017","author":"wichers","year":"2017","journal-title":"OWASP Foundation"},{"key":"ref8","year":"2021","journal-title":"HTTrack Website Copier - Free Software Offline Browser (GNU GPL) (2021)"},{"key":"ref7","year":"2021"},{"key":"ref2","first-page":"100","article-title":"Automated link tracing for classification of malicious websites in malware distribution networks","volume":"15","author":"choi","year":"2019","journal-title":"Journal of Information Processing Systems"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196542"},{"key":"ref9","year":"2021","journal-title":"README - wget git - GNU Wget (2021)"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1185347.1185360"}],"event":{"name":"2021 16th International Conference on Telecommunications (ConTEL)","location":"Zagreb, Croatia","start":{"date-parts":[[2021,6,30]]},"end":{"date-parts":[[2021,7,2]]}},"container-title":["2021 16th International Conference on Telecommunications (ConTEL)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9495953\/9495954\/09495966.pdf?arnumber=9495966","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,2]],"date-time":"2022-08-02T23:35:28Z","timestamp":1659483328000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9495966\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,30]]},"references-count":20,"URL":"https:\/\/doi.org\/10.23919\/contel52528.2021.9495966","relation":{},"subject":[],"published":{"date-parts":[[2021,6,30]]}}}