{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T16:43:45Z","timestamp":1732034625453,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,3]]},"DOI":"10.1109\/icstw.2013.58","type":"proceedings-article","created":{"date-parts":[[2013,8,14]],"date-time":"2013-08-14T15:40:32Z","timestamp":1376494832000},"page":"445-452","source":"Crossref","is-referenced-by-count":21,"title":["Model-Based Vulnerability Testing for Web Applications"],"prefix":"10.1109","author":[{"given":"Franck","family":"Lebeau","sequence":"first","affiliation":[]},{"given":"Bruno","family":"Legeard","sequence":"additional","affiliation":[]},{"given":"Fabien","family":"Peureux","sequence":"additional","affiliation":[]},{"given":"Alexandre","family":"Vernotte","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"39","article-title":"Model-based behavioural fuzzing","author":"schneider","year":"2012","journal-title":"Proceedings of the 9th International Workshop on Systems Testing and Validation (STV'12)"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2008.11.008"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/SERE.2012.38"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.4204\/EPTCS.80.1"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2011.42"},{"key":"13","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1007\/978-3-642-14215-4_7","article-title":"Why Johnny can't pentest: An analysis of black-box web vulnerability scanners","author":"doupe?","year":"2010","journal-title":"Int Conf on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA'10)"},{"key":"14","first-page":"99","article-title":"Exploring the relationship between web application development tools and security","author":"finifter","year":"2011","journal-title":"Proc of the 2nd USENIX Conference on Web Application Development (WebApps'11)"},{"key":"11","article-title":"Web application security: Automated scanning versus manual penetration testing","author":"allan","year":"2008","journal-title":"IBM Rational Software White Paper January"},{"journal-title":"Web Site on Price and Feature Comparison of Web Application Scanners","year":"2013","key":"12"},{"journal-title":"NBS System-Vulnerability in Magento's Implementation of PayPal","year":"2013","key":"21"},{"key":"3","first-page":"223","article-title":"Model-based testing from UML models","volume":"94","author":"bernard","year":"2006","journal-title":"Proceedings of the Int Workshop on Model-based Testing (MBT'2006) Ser LNCS"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/SESS.2007.2"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/S0065-2458(10)80002-6"},{"key":"1","article-title":"Practical model-based testing-a tools approach, morgan and kaufmann","author":"utting","year":"2006","journal-title":"Elsevier Science"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.27"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2013.42"},{"key":"6","article-title":"Initial security test patterns catalogue","author":"project","year":"2012","journal-title":"DIAMONDS Consortium"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1291535.1291545"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1370042.1370052"},{"journal-title":"Fuzzing for Software Security Testing and Quality Assurance","year":"2008","author":"takanen","key":"9"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1370042.1370051"}],"event":{"name":"2013 IEEE 6th International Conference On Software Testing, Verification and Validation Workshops (ICSTW)","start":{"date-parts":[[2013,3,18]]},"location":"Luxembourg, Luxembourg","end":{"date-parts":[[2013,3,22]]}},"container-title":["2013 IEEE Sixth International Conference on Software Testing, Verification and Validation Workshops"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6570842\/6571592\/06571669.pdf?arnumber=6571669","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T17:49:46Z","timestamp":1498067386000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6571669\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,3]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/icstw.2013.58","relation":{},"subject":[],"published":{"date-parts":[[2013,3]]}}}