{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T05:46:10Z","timestamp":1730267170362,"version":"3.28.0"},"reference-count":53,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,1,3]],"date-time":"2022-01-03T00:00:00Z","timestamp":1641168000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,1,3]],"date-time":"2022-01-03T00:00:00Z","timestamp":1641168000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100002385","name":"Ministry of Higher Education","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002385","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,1,3]]},"DOI":"10.1109\/imcom53663.2022.9721750","type":"proceedings-article","created":{"date-parts":[[2022,2,28]],"date-time":"2022-02-28T21:56:54Z","timestamp":1646085414000},"page":"1-8","source":"Crossref","is-referenced-by-count":3,"title":["Descriptive Analysis of Built-in Security Features in Web Development Frameworks"],"prefix":"10.1109","author":[{"given":"Abdulaziz","family":"Aborujilah","sequence":"first","affiliation":[{"name":"Universiti Kuala Lumpur Universiti,Malaysian Institute Of Information Technology (MIIT),Kuala Lumpur,Malaysia"}]},{"given":"Jibril","family":"Adamu","sequence":"additional","affiliation":[{"name":"Universiti Kuala Lumpur Universiti,Malaysian Institute Of Information Technology (MIIT),Kuala Lumpur,Malaysia"}]},{"given":"Shafiza Mohd","family":"Shariff","sequence":"additional","affiliation":[{"name":"Universiti Kuala Lumpur Universiti,Malaysian Institute Of Information Technology (MIIT),Kuala Lumpur,Malaysia"}]},{"given":"Zalizah","family":"Awang Long","sequence":"additional","affiliation":[{"name":"University of Kuala Lumpur,Malaysian Institute of Information Technology"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.5013\/IJSSST.a.19.02.06"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1002\/spy2.60"},{"key":"ref33","first-page":"1","article-title":"Machine Learning for Web Vulnerability Detection","author":"case","year":"2020"},{"key":"ref32","first-page":"9874","article-title":"A Secure Coding Approach For Prevention of SQL Injection Attacks","volume":"13","author":"gautam","year":"2018","journal-title":"International Journal of Applied Engineering Research"},{"key":"ref31","first-page":"833","article-title":"A hybrid method for detection and prevention of SQL injection attacks","volume":"2018 janua","author":"ghafarian","year":"2018","journal-title":"Proceedings of Computing Conference 2017"},{"key":"ref30","first-page":"1","article-title":"A Detection and Prevention Tectaique on SQL Injection Attacks","author":"hlaing","year":"2020","journal-title":"2020 IEEE Conference on Computer Applications ICCA 2020"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2018.8514180"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.35444\/IJANA.2020.12204"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.14419\/ijet.v7i4.15.21434"},{"key":"ref34","first-page":"1","article-title":"Owasp Top 10 - 2017","author":"wichers","year":"2017","journal-title":"OWASP Foundation"},{"key":"ref28","first-page":"14","article-title":"Minimization of SQL injection in scheduling application development","author":"sendiang","year":"2017","journal-title":"2016 International Conference on Knowledge Creation and Intelligent Computing KCIC 2016"},{"key":"ref27","article-title":"Input Validation Vulnerabilities ( SQLIA ) and Defenses in Web Applications Security","volume":"4","author":"sunkari","year":"2014"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICOSEC49089.2020.9215361"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/FOSE.2007.26"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.08.520"},{"key":"ref20","first-page":"3","article-title":"OWASP Testing Guide 4.0","author":"meucci","year":"2014","journal-title":"OWASP Foundation"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/QRS.2017.46"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.3923\/jse.2014.116.126"},{"key":"ref24","first-page":"960","article-title":"A PROPOSED APPROACH FOR PREVENTING CROSS-SITE SCRIPTING (XSS)","volume":"7","author":"asaad taha","year":"2019","journal-title":"Gobal Scientific Journals"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.11591\/ijece.v9i2.pp1393-1398"},{"key":"ref26","first-page":"6788","article-title":"Combating Cross-Site Scripting Assaults without Proprietary Software","volume":"12","author":"rao","year":"2017","journal-title":"International Journal of Applied Engineering"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/AEEICB.2018.8480945"},{"key":"ref50","first-page":"153","article-title":"How Security and Authentication Work Together. In: Beginning Laravel","author":"sinha","year":"2017","journal-title":"Apress"},{"key":"ref51","first-page":"54","article-title":"A Novel Approach to Secure Microservice Architecture from OWASP vulnerabilities","volume":"10","author":"baker","year":"2019","journal-title":"2019 CITRENZ Conference Proceedings"},{"key":"ref53","first-page":"1","article-title":"Pio ASP.NET Core MVC 2","author":"freeman","year":"2017","journal-title":"Apress"},{"key":"ref52","first-page":"1","article-title":"Mastering Django: Core","author":"george","year":"2016","journal-title":"Packt Publishing"},{"key":"ref10","first-page":"1","article-title":"A Benchmark Approach To Analysis the Security of Web Frameworks","author":"reintjes","year":"2014","journal-title":"Master Computer Science Radboud University Nijmegen"},{"key":"ref11","first-page":"48","article-title":"Toward Secure Web Application Design: Comparative Analysis of Major Languages and Framework Choices","volume":"7","year":"2016","journal-title":"International Journal of Advanced Computer Science and Applications"},{"key":"ref40","first-page":"1","article-title":"Securing e-commerce against SQL injection , cross site scripting and broken authentication","volume":"5","author":"xuan","year":"2021","journal-title":"Technol Innov Appl"},{"key":"ref12","first-page":"849","article-title":"Review of web-based mformation seemly threats in smart grid","author":"dehalwar","year":"2018","journal-title":"2017 7th International Conference on Power Systems ICPS 2017"},{"key":"ref13","first-page":"1","article-title":"Vulnerabilities in the Wild: Detecting Vulnerable Web Applications At Scale","author":"laitinen","year":"2018","journal-title":"University of Jyväskylä"},{"key":"ref14","first-page":"458","article-title":"Use of web application frameworks in the development of small applications","author":"vuksanovic","year":"2011","journal-title":"MIPRO 2011 - 34th International Convention on Information and Communication Technology Electronics and Microelectronics - Proceedings"},{"key":"ref15","first-page":"5734","article-title":"Review Paper on Web Frameworks , Databases and Web Stacks","author":"shetty","year":"2020","journal-title":"International Research Journal of Engineering and Technology (IRJET)"},{"key":"ref16","first-page":"1","article-title":"Evaluation of web application frameworks with regards to rapid development","author":"bj\u00f6remo","year":"2010","journal-title":"Master’s thesis Dept of Comp Sci and Engr Chalmers Univ of Tech Gothenburg Sweden"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1016\/j.procs.2017.01.059","article-title":"Analysis and Practical Application of PHP Frameworks in Development of Web Information Systems","volume":"104","author":"prokofyeva","year":"2016","journal-title":"Procedia Computer Science"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.31784\/zvr.7.1.10"},{"key":"ref19","first-page":"2","article-title":"Security Analysis Methodology for Student Web Applications: A Case Study of the Mills College Computer Science Department Alumni Website","author":"diaz","year":"2018","journal-title":"Master’s thesis Dept of Math and Comp Sci Mills Coll Oakland"},{"key":"ref4","first-page":"35","article-title":"Distinctive Vulnerabilities in Web Applications : A Literature Review","volume":"4","author":"kaur","year":"2016","journal-title":"International Journal of Computer and Information Technologies"},{"key":"ref3","first-page":"87","article-title":"Scalable and Efficient Web Application Architectures","author":"gunnulfsen","year":"2013","journal-title":"University of Oslo"},{"key":"ref6","first-page":"5","article-title":"A Survey on Security and Vulnerabilities of Web Application","volume":"5","author":"chaudhari","year":"2014","journal-title":"International Journal of Computer Science and Information Technologies"},{"key":"ref5","first-page":"2347","article-title":"Ranking and Impact of Web Applications","volume":"3","author":"kaur","year":"2014","journal-title":"Vulnerabilities \" International Journal of Scientific Engineering and Research"},{"key":"ref8","first-page":"1","article-title":"Securing Web Applications: Web Application Flow Whitelisting to Improve Security","author":"alabdulrazzaq","year":"2017","journal-title":"AUB university"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2008.79"},{"key":"ref49","first-page":"1","article-title":"ASP.NET core in Action","author":"lock","year":"2018","journal-title":"Manning Publications"},{"key":"ref9","first-page":"1","article-title":"Development and Implementation of Secure Web Applications","year":"2011","journal-title":"dradis framework"},{"key":"ref46","first-page":"2","article-title":"Easy Laravel 5 A Hands On Introduction Using a Real-World Project","author":"gilmore","year":"2018","journal-title":"Lean Publishing"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4302-4021-1"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/SecDev45635.2020.00024"},{"key":"ref47","first-page":"1","article-title":"Secure Coding Practices in Java: Challenges and Vulnerabilities","author":"meng","year":"2017","journal-title":"Proceedings ACM Conference"},{"key":"ref42","first-page":"1","article-title":"Building a web application with Laravel 5","author":"nguyen","year":"2015","journal-title":"Oulu University of Applied Sciences"},{"key":"ref41","first-page":"1","article-title":"An Object Relational Mapping Technique for Java Framework","volume":"2","author":"erhieyovwe","year":"2013","journal-title":"International Journal of Engineering Science Invension"},{"key":"ref44","first-page":"1","article-title":"OWASP Cheat Sheets","author":"woschek","year":"2015","journal-title":"OWASP Foundation"},{"key":"ref43","first-page":"1","article-title":"A Comparison of Modern Backend Frameworks Protections against Common Web Vulnerabilities","author":"gr","year":"2019","journal-title":"TUFTS University"}],"event":{"name":"2022 16th International Conference on Ubiquitous Information Management and Communication (IMCOM)","start":{"date-parts":[[2022,1,3]]},"location":"Seoul, Korea, Republic of","end":{"date-parts":[[2022,1,5]]}},"container-title":["2022 16th International Conference on Ubiquitous Information Management and Communication (IMCOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9721625\/9721626\/09721750.pdf?arnumber=9721750","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,20]],"date-time":"2022-06-20T21:10:31Z","timestamp":1655759431000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9721750\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,3]]},"references-count":53,"URL":"https:\/\/doi.org\/10.1109\/imcom53663.2022.9721750","relation":{},"subject":[],"published":{"date-parts":[[2022,1,3]]}}}