{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T08:43:17Z","timestamp":1725698597785},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.23919\/icitst.2017.8356371","type":"proceedings-article","created":{"date-parts":[[2018,5,10]],"date-time":"2018-05-10T19:01:01Z","timestamp":1525978861000},"page":"173-178","source":"Crossref","is-referenced-by-count":8,"title":["Web service injection attack detection"],"prefix":"10.23919","author":[{"given":"Victor","family":"Clincy","sequence":"first","affiliation":[]},{"given":"Hossain","family":"Shahriar","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Wapiti","year":"0","key":"ref10"},{"journal-title":"W3AF","year":"0","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2554850.2555010"},{"journal-title":"WebScarabProject","year":"0","key":"ref13"},{"journal-title":"Wfuzz","year":"0","key":"ref14"},{"journal-title":"XML Security Cheatsheet","year":"0","key":"ref15"},{"journal-title":"Web Service Security Cheatsheet","year":"0","key":"ref16"},{"journal-title":"RESTFul Security Cheatsheet","year":"0","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SCC.2009.23"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1854099.1854147"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2931037.2931042"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2009.28"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.83"},{"journal-title":"Guide to Secure Web Services NIST Special Publication 800-95","year":"2007","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s11761-013-0139-1"},{"key":"ref7","first-page":"1","article-title":"Attacks on web services and mitigation schemes","author":"patel","year":"2010","journal-title":"Security and Cryptography (SECRYPT) Proceedings of the 2010 International Conference"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICECTECH.2011.5941653"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2009.5270294"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2661666"},{"journal-title":"The structure of SOAP message","year":"0","key":"ref20"},{"journal-title":"SoapUI","year":"2016","key":"ref21"}],"event":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","start":{"date-parts":[[2017,12,11]]},"location":"Cambridge","end":{"date-parts":[[2017,12,14]]}},"container-title":["2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8354335\/8356324\/08356371.pdf?arnumber=8356371","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,5,28]],"date-time":"2018-05-28T20:24:11Z","timestamp":1527539051000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8356371\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12]]},"references-count":21,"URL":"https:\/\/doi.org\/10.23919\/icitst.2017.8356371","relation":{},"subject":[],"published":{"date-parts":[[2017,12]]}}}