{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T10:00:24Z","timestamp":1725444024724},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,11]]},"DOI":"10.1109\/wisa.2013.45","type":"proceedings-article","created":{"date-parts":[[2014,4,8]],"date-time":"2014-04-08T17:55:08Z","timestamp":1396979708000},"page":"195-198","source":"Crossref","is-referenced-by-count":1,"title":["A Detective Tool against SQL Injection Attacks Based on Static Analysis and Dynamic Monitor"],"prefix":"10.1109","author":[{"given":"Zijian","family":"Liu","sequence":"first","affiliation":[]},{"given":"Lei","family":"Xu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/ISCE.2011.5973873"},{"key":"2","first-page":"13","article-title":"A classification of SQL-injection attacks and countermeasures","author":"halfond","year":"2006","journal-title":"Proceedings of the IEEE International Symposium on Secure Software Engineering"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/988672.988679"},{"journal-title":"SQL Injection","year":"2002","author":"labs","key":"1"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/PRDC.2007.55"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1082983.1083250"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1101908.1101935"},{"journal-title":"SQL Injection Modes of Attack Defense and Why It Matters","year":"2002","author":"mcdonald","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2004.1317486"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2004.1317494"}],"event":{"name":"2013 10th Web Information System and Application Conference (WISA)","start":{"date-parts":[[2013,11,10]]},"location":"Yangzhou, China","end":{"date-parts":[[2013,11,15]]}},"container-title":["2013 10th Web Information System and Application Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6777803\/6778588\/06778636.pdf?arnumber=6778636","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T13:56:29Z","timestamp":1490277389000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6778636\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,11]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/wisa.2013.45","relation":{},"subject":[],"published":{"date-parts":[[2013,11]]}}}