{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T10:11:11Z","timestamp":1773655871794,"version":"3.50.1"},"reference-count":17,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.3103\/s0146411619080108","type":"journal-article","created":{"date-parts":[[2020,3,4]],"date-time":"2020-03-04T09:03:07Z","timestamp":1583312587000},"page":"963-968","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Detection of Security Threats to Modern Websites"],"prefix":"10.3103","volume":"53","author":[{"given":"D. V.","family":"Ivanov","sequence":"first","affiliation":[]},{"given":"D. A.","family":"Moskvin","sequence":"additional","affiliation":[]},{"given":"G. S.","family":"Kubrin","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2020,3,4]]},"reference":[{"key":"7203_CR1","unstructured":"Statistics of the number of websites on the Internet. https:\/\/news.netcraft.com\/archives\/2018\/02\/13\/february-2018-web-server-survey.html."},{"key":"7203_CR2","doi-asserted-by":"publisher","unstructured":"Zegzhda, P.D., Zegzhda, D.P., and Kalinin, M.O., A new approach to security evaluation of operating systems, International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, 2007, pp. 254\u2013259. https:\/\/doi.org\/10.1007\/978-3-540-73986-9_22","DOI":"10.1007\/978-3-540-73986-9_22"},{"key":"7203_CR3","doi-asserted-by":"crossref","unstructured":"Demidov, R., Pechenkin, A., and Zegzhda, P., Integer overflow vulnerabilities detection in software binary code, Proceedings of the 10th International Conference on Security of Information and Networks. ACM, 2017.","DOI":"10.1145\/3136825.3136872"},{"key":"7203_CR4","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/MITP.2007.78","volume":"9","author":"S. Murugesan","year":"2007","unstructured":"Murugesan, S., Understanding Web 2.0, IT Prof. Mag., 2007, vol. 9, no. 4, p. 34.","journal-title":"IT Prof. Mag."},{"key":"7203_CR5","unstructured":"Anderson, P., What Is Web 2.0?: Ideas, Technologies and Implications for Education, JISC Technical Report, 2007. http:\/\/www.jisc.ac.uk\/media\/documents\/techwatch\/tsw0701b.pdf."},{"issue":"3","key":"7203_CR6","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1109\/MIC.2007.52","volume":"11","author":"Ora Lassila","year":"2007","unstructured":"Lassila, O. and Hendler, J., Embracing web 3.0, IEEE Internet Comput., 2007, vol. 11, no. 3.","journal-title":"IEEE Internet Computing"},{"key":"7203_CR7","doi-asserted-by":"crossref","unstructured":"Lin, Z., et al., Research on web applications using Ajax new technologies, 2008 International Conference on Multimedia and Information Technology, IEEE, 2008, pp. 139\u2013142.","DOI":"10.1109\/MMIT.2008.107"},{"key":"7203_CR8","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1007\/s00450-009-0092-6","volume":"24","author":"M. Jensen","year":"2009","unstructured":"Jensen, M., Gruschka, N., and Herkenh\u00f6ner, R., A survey of attacks on web services, Comput. Sci. Res. Dev., 2009, vol. 24, no. 4, p. 185.","journal-title":"Comput. Sci. Res. Dev."},{"key":"7203_CR9","volume-title":"OWASP Top-10 2013","author":"D. Wichers","year":"2013","unstructured":"Wichers, D., OWASP Top-10 2013, OWASP Foundation, 2013."},{"key":"7203_CR10","unstructured":"Halfond, W.G., et al., A classification of SQL-injection attacks and countermeasures, Proceedings of the IEEE International Symposium on Secure Software Engineering, IEEE, 2006, vol. 1, pp. 13\u201315."},{"key":"7203_CR11","doi-asserted-by":"crossref","unstructured":"Sarhadi, R.M. and Ghafori, V., New approach to mitigate XML-DOS and HTTP-DOS attacks for cloud computing, Int. J. Comput. Appl., 2013, vol. 72, no. 16.","DOI":"10.5120\/12579-9201"},{"key":"7203_CR12","doi-asserted-by":"crossref","unstructured":"Kargl, F., Maier, J., and Weber, M., Protecting web servers from distributed denial of service attacks, Proceedings of the 10th International Conference on WORLD WIDE WEB, ACM, 2001, pp. 514\u2013524.","DOI":"10.1145\/371920.372148"},{"key":"7203_CR13","doi-asserted-by":"crossref","unstructured":"Bau, J., et al., State of the art: Automated black-box web application vulnerability testing, 2010 IEEE Symposium on Security and Privacy, 2010, pp. 332\u2013345.","DOI":"10.1109\/SP.2010.27"},{"key":"7203_CR14","unstructured":"Web Vulnerability Scanner WAScan. https:\/\/github.com\/m4ll0k\/WAScan."},{"key":"7203_CR15","unstructured":"SaaS-scanner of web vulnerabilities BB Scanner. https:\/\/bbs.ptsecurity.com\/en\/sites."},{"key":"7203_CR16","unstructured":"Web vulnerability scanner w3af. https:\/\/github.com\/andresriancho\/w3af."},{"key":"7203_CR17","unstructured":"SaaS web vulnerability scanner detectify. https:\/\/detectify.com\/."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411619080108.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411619080108","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411619080108.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:06:47Z","timestamp":1773612407000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411619080108"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12]]},"references-count":17,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["7203"],"URL":"https:\/\/doi.org\/10.3103\/s0146411619080108","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,12]]},"assertion":[{"value":"10 March 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 April 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 April 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 March 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}