{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T10:28:19Z","timestamp":1725618499881},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,3]]},"DOI":"10.1109\/icstw.2013.56","type":"proceedings-article","created":{"date-parts":[[2013,8,14]],"date-time":"2013-08-14T11:40:32Z","timestamp":1376480432000},"page":"435-440","source":"Crossref","is-referenced-by-count":5,"title":["Kepler -- Raising Browser Security Awareness"],"prefix":"10.1109","author":[{"given":"Thomas","family":"Wahlberg","sequence":"first","affiliation":[]},{"given":"Petri","family":"Paakkola","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Wieser","sequence":"additional","affiliation":[]},{"given":"Marko","family":"Laakso","sequence":"additional","affiliation":[]},{"given":"Juha","family":"Roning","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Twitter Bootstrap","year":"2012","author":"otto","key":"17"},{"journal-title":"JQuery The Write Less Do More","year":"2012","key":"18"},{"year":"2012","key":"15"},{"journal-title":"MaxMind-IP Geolocation and Online Fraud Prevention","year":"2012","key":"16"},{"year":"0","key":"13"},{"journal-title":"Node js","year":"2012","key":"14"},{"year":"2013","key":"11"},{"journal-title":"Google Chrome Plugins - Recx","year":"2013","key":"12"},{"year":"2012","key":"3"},{"year":"2012","key":"2"},{"year":"2012","key":"1"},{"journal-title":"Do Not Track - Online Privacy Tools - Disconnect","year":"2012","key":"10"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/365024.365034"},{"journal-title":"P3P The Platform for Privacy Preferences","year":"2012","author":"cranor","key":"6"},{"key":"5","first-page":"137","article-title":"Gathering evidence: Use of visual security cues in web browsers","author":"whalen","year":"2005","journal-title":"Proceedings of Graphics Interface 2005"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/506443.506577"},{"key":"9","first-page":"46","article-title":"An analysis of private browsing modes in modern browsers","author":"aggarwal","year":"2001","journal-title":"Proceedings of the 19th USENIX Conference on Security"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180426"}],"event":{"name":"2013 IEEE 6th International Conference On Software Testing, Verification and Validation Workshops (ICSTW)","start":{"date-parts":[[2013,3,18]]},"location":"Luxembourg, Luxembourg","end":{"date-parts":[[2013,3,22]]}},"container-title":["2013 IEEE Sixth International Conference on Software Testing, Verification and Validation Workshops"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6570842\/6571592\/06571667.pdf?arnumber=6571667","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T17:05:05Z","timestamp":1490202305000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6571667\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,3]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/icstw.2013.56","relation":{},"subject":[],"published":{"date-parts":[[2013,3]]}}}