{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T08:44:57Z","timestamp":1746002697253,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T00:00:00Z","timestamp":1561939200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,7]]},"DOI":"10.1145\/3341325.3342032","type":"proceedings-article","created":{"date-parts":[[2019,9,6]],"date-time":"2019-09-06T13:04:52Z","timestamp":1567775092000},"page":"1-8","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Analysis of Automated Web Application Security Vulnerabilities Testing"],"prefix":"10.1145","author":[{"given":"Pariwish","family":"Touseef","sequence":"first","affiliation":[{"name":"National University of Computer and Emerging Science, Faisalabad-Chiniot Pakistan"}]},{"given":"Khubaib Amjad","family":"Alam","sequence":"additional","affiliation":[{"name":"National University of Computer and Emerging Science, Faisalabad-Chiniot Pakistan"}]},{"given":"Abid","family":"Jamil","sequence":"additional","affiliation":[{"name":"National University of Computer and Emerging Science, Faisalabad-Chiniot Pakistan"}]},{"given":"Hamza","family":"Tauseef","sequence":"additional","affiliation":[{"name":"University of Central Punjab, Faisalabad Pakistan"}]},{"given":"Sahar","family":"Ajmal","sequence":"additional","affiliation":[{"name":"National University of Computer and Emerging Science, Faisalabad-Chiniot Pakistan"}]},{"given":"Rimsha","family":"Asif","sequence":"additional","affiliation":[{"name":"National University of Computer and Emerging Science, Faisalabad-Chiniot Pakistan"}]},{"given":"Bisma","family":"Rehman","sequence":"additional","affiliation":[{"name":"National University of Computer and Emerging Science, Faisalabad-Chiniot Pakistan"}]},{"given":"Sumaira","family":"Mustafa","sequence":"additional","affiliation":[{"name":"National University of Computer and Emerging Science, Faisalabad-Chiniot Pakistan"}]}],"member":"320","published-online":{"date-parts":[[2019,7]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Mudassar Ahmad Sohail Jabbar Awais Ahmad Francesco Piccialli and Gwanggil Jeon. 2018. A sustainable solution to support data security in high bandwidth health care remote locations by using TCP CUBIC mechanism. IEEE Transactions on Sustainable Computing (2018). Mudassar Ahmad Sohail Jabbar Awais Ahmad Francesco Piccialli and Gwanggil Jeon. 2018. A sustainable solution to support data security in high bandwidth health care remote locations by using TCP CUBIC mechanism. IEEE Transactions on Sustainable Computing (2018)."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1186\/1678-4804-20-4"},{"volume-title":"Uncertainty Modelling in Knowledge Engineering and Decision Making: Proceedings of the 12th International FLINS Conference. World Scientific, 334--340","year":"2016","author":"KHUBAIB","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2015.06.003"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCC.2011.67"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCC.2013.28"},{"key":"e_1_3_2_1_7_1","first-page":"420","article-title":"Systems and methods for malware attack prevention by intercepting flows of information","volume":"14","author":"Aziz Ashar","year":"2018","journal-title":"US Patent App."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSNW.2010.5542602"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICoIA.2013.6650259"},{"volume-title":"International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment","year":"2010","author":"Doup\u00c3l' Marco Cova","key":"e_1_3_2_1_10_1"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECON.2013.6567420"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECON.2013.6567420"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SERE.2013.30"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2013.45"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Marco Vieira Fonseca Jose and Henrique Madeira. 2014. Evaluation of web security mechanisms using vulnerability attack injection. In IEEE Transactions on dependable and secure computing). IEEE 440--453. Marco Vieira Fonseca Jose and Henrique Madeira. 2014. Evaluation of web security mechanisms using vulnerability attack injection. In IEEE Transactions on dependable and secure computing). IEEE 440--453.","DOI":"10.1109\/TDSC.2013.45"},{"key":"e_1_3_2_1_16_1","unstructured":"Ibrahim Ghafir Jibran Saleem Mohammad Hammoudeh Hanan Faour Vaclav Prenosil Sardar Jaf Sohail Jabbar and Thar Baker. 2018. Security threats to critical infrastructure: the human factor. The Journal of Supercomputing (2018) 1--17. Ibrahim Ghafir Jibran Saleem Mohammad Hammoudeh Hanan Faour Vaclav Prenosil Sardar Jaf Sohail Jabbar and Thar Baker. 2018. Security threats to critical infrastructure: the human factor. The Journal of Supercomputing (2018) 1--17."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Mohammad Umar Majigi Shafii Abdulhamid Morufu Olalere Idris Ismaila and Saidu Isah Rambo. 2017. Vulnerability Assessment of Some Key Nigeria Government Websites. In International Journal of Digital Information and Wireless Communications 7. Research Gate 143--153. Mohammad Umar Majigi Shafii Abdulhamid Morufu Olalere Idris Ismaila and Saidu Isah Rambo. 2017. Vulnerability Assessment of Some Key Nigeria Government Websites. In International Journal of Digital Information and Wireless Communications 7. Research Gate 143--153.","DOI":"10.17781\/P002309"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3231053.3231116"},{"volume-title":"Computer Symposium (ICS)","year":"2010","author":"Jan-Min Chen","key":"e_1_3_2_1_19_1"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2107581.2107584"},{"volume-title":"Testing and Assessing Web Vulnerability Scanners for Persistent SQL Injection Attacks. In IEEE International Conference on Engineering and Technology (ICETECH)","year":"2016","author":"P. Z. L.","key":"e_1_3_2_1_21_1"},{"key":"e_1_3_2_1_22_1","unstructured":"Barbara Kitchenham and Stuart Charters. 2007. Guidelines for performing systematic literature reviews in software engineering. (2007). Barbara Kitchenham and Stuart Charters. 2007. Guidelines for performing systematic literature reviews in software engineering. (2007)."},{"volume-title":"Science and Information Conference. IEEE, 589--594","year":"2014","author":"Bouhouita Guermeche Lalia Saoudi Salah Eddine","key":"e_1_3_2_1_23_1"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/IDAACS.2015.7340766"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2826225"},{"key":"e_1_3_2_1_26_1","unstructured":"Hamad Naeem. 2019. Detection of Malicious Activities in Internet of Things Environment Based on Binary Visualization and Machine Intelligence. Wireless Personal Communications (2019) 1--21. Hamad Naeem. 2019. Detection of Malicious Activities in Internet of Things Environment Based on Binary Visualization and Machine Intelligence. Wireless Personal Communications (2019) 1--21."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2019.03.015"},{"key":"e_1_3_2_1_28_1","unstructured":"Netwrix. 2019. Top 10 Most Common Types of Cyber Attacks. In https:\/\/blog.netwrix.com\/2018\/05\/15\/top-10-most-common-types-of-cyber-attacks\/. Netwrix. 2019. Top 10 Most Common Types of Cyber Attacks. In https:\/\/blog.netwrix.com\/2018\/05\/15\/top-10-most-common-types-of-cyber-attacks\/."},{"volume-title":"Detecting Vulnerabilities in Web Applications Using Automated Black Box and Manual Penetration Testing. In International Conference on Security of Information and Communication Networks","year":"2013","author":"Oja Awang Nor Fatimah","key":"e_1_3_2_1_29_1"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"crossref","unstructured":"Hayden Wimmer Ojagbule Olajide and Rami J. Haddad. 2018. Vulnerability Analysis of Content Management Systems to SQL Injection Using SQLMAP. In SoutheastCon. IEEE 1--7. Hayden Wimmer Ojagbule Olajide and Rami J. Haddad. 2018. Vulnerability Analysis of Content Management Systems to SQL Injection Using SQLMAP. In SoutheastCon. IEEE 1--7.","DOI":"10.1109\/SECON.2018.8479130"},{"volume-title":"ACM EASE'08 Proceedings of the 12th international conference on Evaluation and Assessment in Software Engineering","year":"2008","author":"Shahid Mujtaba Petersen Robert Feldt","key":"e_1_3_2_1_31_1"},{"key":"e_1_3_2_1_32_1","first-page":"31","article-title":"Mechanism to Secure Sensitive Data Exposure Risk in MVC","volume":"5","author":"Rafiq Ammar","year":"2017","journal-title":"NFC IEFR Journal of Engineering and Scientific Research"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/NCA.2014.53"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2009.191"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/QSIC.2014.50"},{"volume-title":"2010 3rd IEEE International Conference on Broadband Network and Multimedia Technology (IC-BNMT). IEEE, 14--18","year":"2010","author":"Wang Xin","key":"e_1_3_2_1_36_1"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01187-0_12"}],"event":{"name":"ICFNDS '19: 3rd International Conference on Future Networks and Distributed Systems","sponsor":["CNAM Conservatoire des Arts et M\u00e9tiers"],"location":"Paris France","acronym":"ICFNDS '19"},"container-title":["Proceedings of the 3rd International Conference on Future Networks and Distributed Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3341325.3342032","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,13]],"date-time":"2023-01-13T18:44:35Z","timestamp":1673635475000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3341325.3342032"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7]]},"references-count":37,"alternative-id":["10.1145\/3341325.3342032","10.1145\/3341325"],"URL":"https:\/\/doi.org\/10.1145\/3341325.3342032","relation":{},"subject":[],"published":{"date-parts":[[2019,7]]},"assertion":[{"value":"2019-07-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}