{"id":"https://openalex.org/W2754426524","doi":"https://doi.org/10.1007/s10009-017-0472-3","title":"Knowledge-based security testing of web applications by logic programming","display_name":"Knowledge-based security testing of web applications by logic programming","publication_year":2017,"publication_date":"2017-09-13","ids":{"openalex":"https://openalex.org/W2754426524","doi":"https://doi.org/10.1007/s10009-017-0472-3","mag":"2754426524"},"language":"en","primary_location":{"id":"doi:10.1007/s10009-017-0472-3","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10009-017-0472-3","pdf_url":"https://link.springer.com/content/pdf/10.1007%2Fs10009-017-0472-3.pdf","source":{"id":"https://openalex.org/S122567160","display_name":"International Journal on Software Tools for Technology Transfer","issn_l":"1433-2779","issn":["1433-2779","1433-2787"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal on Software Tools for Technology Transfer","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007%2Fs10009-017-0472-3.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5048954946","display_name":"P Zech","orcid":"https://orcid.org/0000-0002-4952-4337"},"institutions":[{"id":"https://openalex.org/I190249584","display_name":"Universit\u00e4t Innsbruck","ror":"https://ror.org/054pv6659","country_code":"AT","type":"education","lineage":["https://openalex.org/I190249584"]}],"countries":["AT"],"is_corresponding":true,"raw_author_name":"Philipp Zech","raw_affiliation_strings":["Institute for Computer Science, University of Innsbruck, Innsbruck, Austria"],"affiliations":[{"raw_affiliation_string":"Institute for Computer Science, University of Innsbruck, Innsbruck, Austria","institution_ids":["https://openalex.org/I190249584"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055476405","display_name":"Michael Felderer","orcid":"https://orcid.org/0000-0003-3818-4442"},"institutions":[{"id":"https://openalex.org/I190249584","display_name":"Universit\u00e4t Innsbruck","ror":"https://ror.org/054pv6659","country_code":"AT","type":"education","lineage":["https://openalex.org/I190249584"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Michael Felderer","raw_affiliation_strings":["Institute for Computer Science, University of Innsbruck, Innsbruck, Austria"],"affiliations":[{"raw_affiliation_string":"Institute for Computer Science, University of Innsbruck, Innsbruck, Austria","institution_ids":["https://openalex.org/I190249584"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5037343322","display_name":"Ruth Breu","orcid":"https://orcid.org/0000-0001-7093-4341"},"institutions":[{"id":"https://openalex.org/I190249584","display_name":"Universit\u00e4t Innsbruck","ror":"https://ror.org/054pv6659","country_code":"AT","type":"education","lineage":["https://openalex.org/I190249584"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Ruth Breu","raw_affiliation_strings":["Institute for Computer Science, University of Innsbruck, Innsbruck, Austria"],"affiliations":[{"raw_affiliation_string":"Institute for Computer Science, University of Innsbruck, Innsbruck, Austria","institution_ids":["https://openalex.org/I190249584"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5048954946"],"corresponding_institution_ids":["https://openalex.org/I190249584"],"apc_list":{"value":2390,"currency":"EUR","value_usd":2990},"apc_paid":{"value":2390,"currency":"EUR","value_usd":2990},"fwci":2.4811,"has_fulltext":true,"cited_by_count":21,"citation_normalized_percentile":{"value":0.90083966,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":98},"biblio":{"volume":"21","issue":"2","first_page":"221","last_page":"246"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8308858871459961},{"id":"https://openalex.org/keywords/theory-of-computation","display_name":"Theory of computation","score":0.6664596796035767},{"id":"https://openalex.org/keywords/logic-programming","display_name":"Logic programming","score":0.6135985851287842},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.5171027183532715},{"id":"https://openalex.org/keywords/web-application-security","display_name":"Web application security","score":0.4759809076786041},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.36915361881256104},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3462839126586914},{"id":"https://openalex.org/keywords/web-development","display_name":"Web development","score":0.188487708568573},{"id":"https://openalex.org/keywords/web-service","display_name":"Web service","score":0.1857433021068573}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8308858871459961},{"id":"https://openalex.org/C24858836","wikidata":"https://www.wikidata.org/wiki/Q844718","display_name":"Theory of computation","level":2,"score":0.6664596796035767},{"id":"https://openalex.org/C128838566","wikidata":"https://www.wikidata.org/wiki/Q275603","display_name":"Logic programming","level":2,"score":0.6135985851287842},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.5171027183532715},{"id":"https://openalex.org/C59241245","wikidata":"https://www.wikidata.org/wiki/Q4781497","display_name":"Web application security","level":4,"score":0.4759809076786041},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.36915361881256104},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3462839126586914},{"id":"https://openalex.org/C79373723","wikidata":"https://www.wikidata.org/wiki/Q386275","display_name":"Web development","level":3,"score":0.188487708568573},{"id":"https://openalex.org/C35578498","wikidata":"https://www.wikidata.org/wiki/Q193424","display_name":"Web service","level":2,"score":0.1857433021068573}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/s10009-017-0472-3","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10009-017-0472-3","pdf_url":"https://link.springer.com/content/pdf/10.1007%2Fs10009-017-0472-3.pdf","source":{"id":"https://openalex.org/S122567160","display_name":"International Journal on Software Tools for Technology Transfer","issn_l":"1433-2779","issn":["1433-2779","1433-2787"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal on Software Tools for Technology Transfer","raw_type":"journal-article"},{"id":"pmh:oai:diglib.uibk.ac.at/:4604322","is_oa":true,"landing_page_url":"https://diglib.uibk.ac.at/doi/10.1007/s10009-017-0472-3","pdf_url":null,"source":{"id":"https://openalex.org/S4306401999","display_name":"Digital Library of the University of Innsbruck (University of Innsbruck)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I143397708","host_organization_name":"Innsbruck Medical University","host_organization_lineage":["https://openalex.org/I143397708"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"}],"best_oa_location":{"id":"doi:10.1007/s10009-017-0472-3","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10009-017-0472-3","pdf_url":"https://link.springer.com/content/pdf/10.1007%2Fs10009-017-0472-3.pdf","source":{"id":"https://openalex.org/S122567160","display_name":"International Journal on Software Tools for Technology Transfer","issn_l":"1433-2779","issn":["1433-2779","1433-2787"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal on Software Tools for Technology Transfer","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.699999988079071,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G8184292771","display_name":null,"funder_award_id":"Project","funder_id":"https://openalex.org/F4320321181","funder_display_name":"Austrian Science Fund"}],"funders":[{"id":"https://openalex.org/F4320321181","display_name":"Austrian Science Fund","ror":"https://ror.org/013tf3c58"},{"id":"https://openalex.org/F4320326164","display_name":"Medizinische Universit\u00e4t Innsbruck","ror":"https://ror.org/03pt86f80"},{"id":"https://openalex.org/F4320327491","display_name":"Universit\u00e4t Innsbruck","ror":"https://ror.org/054pv6659"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2754426524.pdf","grobid_xml":"https://content.openalex.org/works/W2754426524.grobid-xml"},"referenced_works_count":65,"referenced_works":["https://openalex.org/W37955466","https://openalex.org/W116656696","https://openalex.org/W588120939","https://openalex.org/W1420998758","https://openalex.org/W1494704872","https://openalex.org/W1524147119","https://openalex.org/W1547145819","https://openalex.org/W1563423869","https://openalex.org/W1564025144","https://openalex.org/W1567645817","https://openalex.org/W1577504098","https://openalex.org/W1584652999","https://openalex.org/W1602835623","https://openalex.org/W1608087281","https://openalex.org/W1802376559","https://openalex.org/W1966143594","https://openalex.org/W1971958047","https://openalex.org/W1973593263","https://openalex.org/W1996788431","https://openalex.org/W2002934700","https://openalex.org/W2016962213","https://openalex.org/W2020831675","https://openalex.org/W2025304834","https://openalex.org/W2028978693","https://openalex.org/W2032818299","https://openalex.org/W2033988509","https://openalex.org/W2038504775","https://openalex.org/W2045839892","https://openalex.org/W2045974024","https://openalex.org/W2054139354","https://openalex.org/W2055437660","https://openalex.org/W2058235668","https://openalex.org/W2069437433","https://openalex.org/W2075573771","https://openalex.org/W2080458911","https://openalex.org/W2088297136","https://openalex.org/W2103107119","https://openalex.org/W2104846611","https://openalex.org/W2111817662","https://openalex.org/W2125679167","https://openalex.org/W2126513753","https://openalex.org/W2129906605","https://openalex.org/W2130318821","https://openalex.org/W2132796821","https://openalex.org/W2134285176","https://openalex.org/W2143922826","https://openalex.org/W2144503691","https://openalex.org/W2151838301","https://openalex.org/W2153773513","https://openalex.org/W2155390282","https://openalex.org/W2156835762","https://openalex.org/W2164824681","https://openalex.org/W2166381878","https://openalex.org/W2168140364","https://openalex.org/W2170478581","https://openalex.org/W2178843025","https://openalex.org/W2204102791","https://openalex.org/W2337141358","https://openalex.org/W2398051479","https://openalex.org/W2523702803","https://openalex.org/W2625788084","https://openalex.org/W3100908892","https://openalex.org/W3145101847","https://openalex.org/W4237777812","https://openalex.org/W4240785466"],"related_works":["https://openalex.org/W1966767581","https://openalex.org/W1548535723","https://openalex.org/W2093011565","https://openalex.org/W178747793","https://openalex.org/W2061236588","https://openalex.org/W2138577276","https://openalex.org/W2953307851","https://openalex.org/W2038930971","https://openalex.org/W2006928136","https://openalex.org/W2082343098"],"abstract_inverted_index":{"This":[0],"article":[1],"introduces":[2],"a":[3,103],"new":[4],"method":[5,27,108],"for":[6,18,65,94],"knowledge-based":[7],"security":[8,21,51,56,74,79,91,101,104],"testing":[9,22,80,92],"by":[10],"logic":[11],"programming":[12],"and":[13,88,109,130],"the":[14,31,46,68,121],"related":[15],"tool":[16,112],"implementation":[17,113],"model-based":[19,111],"non-functional":[20,39,55,63,78,90],"of":[23,38,50,72],"web":[24,128],"applications.":[25],"Our":[26],"helps":[28],"to":[29],"overcome":[30],"current":[32],"prevalent":[33,84],"focus":[34],"on":[35],"functional":[36],"instead":[37],"(or":[40],"negative)":[41],"requirements":[42,64],"as":[43,45],"well":[44],"required":[47],"high":[48],"level":[49],"knowledge":[52,105],"when":[53],"performing":[54],"testing.":[57],"It":[58],"addresses":[59],"issues":[60],"like":[61],"considering":[62],"testing,":[66],"managing":[67],"virtually":[69],"infinite":[70],"amount":[71],"negative":[73],"test":[75],"cases,":[76],"advancing":[77],"away":[81],"from":[82],"its":[83,110,133],"penetration":[85],"testing-like":[86],"style,":[87],"making":[89,136],"feasible":[93],"testers":[95],"that":[96],"are":[97,114],"not":[98],"experts":[99],"in":[100,116,124,127,135],"via":[102],"base.":[106],"The":[107],"evaluated":[115],"two":[117],"studies,":[118],"which":[119],"show":[120],"method\u2019s":[122],"effectiveness":[123],"detecting":[125],"vulnerabilities":[126],"applications":[129],"thus,":[131],"also":[132],"value":[134],"software":[137],"system":[138],"more":[139],"secure.":[140]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":2}],"updated_date":"2026-03-18T14:38:29.013473","created_date":"2025-10-10T00:00:00"}
