{"id":"https://openalex.org/W2084698206","doi":"https://doi.org/10.1108/13287261011042912","title":"The architecture and industry applications of web security in static and dynamic analysis","display_name":"The architecture and industry applications of web security in static and dynamic analysis","publication_year":2010,"publication_date":"2010-05-04","ids":{"openalex":"https://openalex.org/W2084698206","doi":"https://doi.org/10.1108/13287261011042912","mag":"2084698206"},"language":"en","primary_location":{"id":"doi:10.1108/13287261011042912","is_oa":false,"landing_page_url":"https://doi.org/10.1108/13287261011042912","pdf_url":null,"source":{"id":"https://openalex.org/S39868070","display_name":"Journal of Systems and Information Technology","issn_l":"1328-7265","issn":["1328-7265","1758-8847"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Systems and Information Technology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5113453532","display_name":"Raymond Wu","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Raymond Wu","raw_affiliation_strings":["Department of Research and Development, NST Inc., Aizuwakamatsu, Japan"],"affiliations":[{"raw_affiliation_string":"Department of Research and Development, NST Inc., Aizuwakamatsu, Japan","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5002334316","display_name":"Masayuki Hisada","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Masayuki Hisada","raw_affiliation_strings":["Department of Research and Development, NST Inc., Aizuwakamatsu, Japan"],"affiliations":[{"raw_affiliation_string":"Department of Research and Development, NST Inc., Aizuwakamatsu, Japan","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5113453532"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.6937,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.82961107,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":"12","issue":"2","first_page":"105","last_page":"119"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9929999709129333,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8615931272506714},{"id":"https://openalex.org/keywords/metadata","display_name":"Metadata","score":0.6455882787704468},{"id":"https://openalex.org/keywords/originality","display_name":"Originality","score":0.4755672812461853},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.4312747120857239},{"id":"https://openalex.org/keywords/metadata-modeling","display_name":"Metadata modeling","score":0.4292529821395874},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.3880596458911896},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.37981367111206055},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3419339060783386},{"id":"https://openalex.org/keywords/metadata-repository","display_name":"Metadata repository","score":0.2596399188041687},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.12782731652259827}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8615931272506714},{"id":"https://openalex.org/C93518851","wikidata":"https://www.wikidata.org/wiki/Q180160","display_name":"Metadata","level":2,"score":0.6455882787704468},{"id":"https://openalex.org/C2776950860","wikidata":"https://www.wikidata.org/wiki/Q2914681","display_name":"Originality","level":3,"score":0.4755672812461853},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.4312747120857239},{"id":"https://openalex.org/C110326360","wikidata":"https://www.wikidata.org/wiki/Q17149476","display_name":"Metadata modeling","level":4,"score":0.4292529821395874},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.3880596458911896},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.37981367111206055},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3419339060783386},{"id":"https://openalex.org/C153048206","wikidata":"https://www.wikidata.org/wiki/Q3454922","display_name":"Metadata repository","level":3,"score":0.2596399188041687},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.12782731652259827},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C11012388","wikidata":"https://www.wikidata.org/wiki/Q170658","display_name":"Creativity","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1108/13287261011042912","is_oa":false,"landing_page_url":"https://doi.org/10.1108/13287261011042912","pdf_url":null,"source":{"id":"https://openalex.org/S39868070","display_name":"Journal of Systems and Information Technology","issn_l":"1328-7265","issn":["1328-7265","1758-8847"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Systems and Information Technology","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4300000071525574,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W87331621","https://openalex.org/W1598083179","https://openalex.org/W1809751277","https://openalex.org/W1972258159","https://openalex.org/W2001693166","https://openalex.org/W2003115932","https://openalex.org/W2008857097","https://openalex.org/W2064744073","https://openalex.org/W2126775986","https://openalex.org/W2134646643","https://openalex.org/W2142439564","https://openalex.org/W2147906352","https://openalex.org/W2149232727","https://openalex.org/W2152875642","https://openalex.org/W2160157980","https://openalex.org/W2170830071","https://openalex.org/W2172123381","https://openalex.org/W2519105753","https://openalex.org/W4232808412","https://openalex.org/W6603524715"],"related_works":["https://openalex.org/W2003742646","https://openalex.org/W2366936177","https://openalex.org/W3122624872","https://openalex.org/W1773645839","https://openalex.org/W2380261968","https://openalex.org/W3084772717","https://openalex.org/W2796209520","https://openalex.org/W2050262794","https://openalex.org/W2136226335","https://openalex.org/W2907247951"],"abstract_inverted_index":{"Purpose":[0],"The":[1,23],"purpose":[2],"of":[3,35,89,145,221],"this":[4,125],"paper":[5,85,126,192],"is":[6,78,157],"to":[7,16,28,43,63,81,96,128,136,176,179,199],"propose":[8],"a":[9,59,134],"metadata\u2010driven":[10,94],"approach":[11,24,52,95,165],"and":[12,99,149,169,172,187,232],"the":[13,55,76,87,138,146,173,206,218],"associated":[14],"technologies":[15],"deal":[17],"with":[18],"ever\u2010rising":[19],"web":[20],"security":[21],"issue.":[22],"applies":[25,93],"metadata":[26,74,185,197],"techniques":[27],"envision":[29,200],"semantic":[30,82,103,139,201],"validation":[31],"for":[32,116],"new":[33,219],"types":[34],"vulnerability.":[36],"Design/methodology/approach":[37],"Token":[38],"decomposition":[39],"design":[40],"was":[41],"applied":[42],"move":[44,97],"analysis":[45,69,101],"work":[46],"into":[47,102],"abstract":[48],"level.":[49],"This":[50,84,164,191],"novel":[51],"can":[53,132,223,228],"solve":[54],"issues":[56],"by":[57],"using":[58],"dual":[60,117],"control":[61,118,148],"method":[62],"perform":[64],"vulnerability":[65,77,150,222,235],"validation.":[66,104,140],"Findings":[67],"Current":[68],"has":[70],"been":[71],"lack":[72],"in":[73,113,162,195,209,214],"foundation,":[75],"invisible":[79],"due":[80],"obfuscation.":[83],"reflects":[86],"limitation":[88],"existing":[90],"methods.":[91],"It":[92,203],"physical":[98],"syntax":[100],"Research":[105],"limitations/implications":[106],"Currently,":[107],"certain":[108],"difficulties":[109],"may":[110],"be":[111,133,224],"encountered":[112],"preparing":[114],"benchmarking":[115],"process":[119],"before":[120],"completing":[121],"development":[122,188],"work.":[123],"However,":[124],"tries":[127],"create":[129],"scenarios":[130],"which":[131],"reference,":[135],"evaluate":[137],"Practical":[141],"implications":[142],"In":[143],"consideration":[144],"optimized":[147],"rate,":[151],"Structural":[152],"Query":[153],"Language":[154],"(SQL)":[155],"injection":[156],"taken":[158],"as":[159,184],"an":[160],"example":[161],"demonstration.":[163],"targets":[166],"large":[167],"enterprise":[168],"high":[170],"complexity,":[171],"research":[174],"intends":[175],"impact":[177,231],"industry":[178,208],"generate":[180],"common":[181],"practices":[182],"such":[183],"standards":[186],"tools.":[189],"Originality/value":[190],"contributes":[193],"originality":[194],"applying":[196],"strategy":[198],"structure.":[202],"further":[204],"favours":[205],"service":[207],"building":[210],"up":[211],"portfolio":[212],"foundation":[213],"component\u2010based":[215],"technologies.":[216],"As":[217],"type":[220],"precisely":[225],"specified,":[226],"it":[227],"minimize":[229],"business":[230],"achieve":[233],"efficient":[234],"detection.":[236]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
