{"id":"https://openalex.org/W1994704771","doi":"https://doi.org/10.1145/1723028.1723043","title":"An empirical evaluation of a language-based security testing technique","display_name":"An empirical evaluation of a language-based security testing technique","publication_year":2009,"publication_date":"2009-01-01","ids":{"openalex":"https://openalex.org/W1994704771","doi":"https://doi.org/10.1145/1723028.1723043","mag":"1994704771"},"language":"en","primary_location":{"id":"doi:10.1145/1723028.1723043","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1723028.1723043","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2009 Conference of the Center for Advanced Studies on Collaborative Research - CASCON '09","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5074780122","display_name":"Muhammad H. Aboelfotoh","orcid":null},"institutions":[{"id":"https://openalex.org/I204722609","display_name":"Queen's University","ror":"https://ror.org/02y72wh86","country_code":"CA","type":"education","lineage":["https://openalex.org/I204722609"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Muhammad AboElFotoh","raw_affiliation_strings":["Queen's University"],"affiliations":[{"raw_affiliation_string":"Queen's University","institution_ids":["https://openalex.org/I204722609"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056585498","display_name":"Thomas Dean","orcid":"https://orcid.org/0000-0001-9065-0784"},"institutions":[{"id":"https://openalex.org/I204722609","display_name":"Queen's University","ror":"https://ror.org/02y72wh86","country_code":"CA","type":"education","lineage":["https://openalex.org/I204722609"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Thomas Dean","raw_affiliation_strings":["Queen's University"],"affiliations":[{"raw_affiliation_string":"Queen's University","institution_ids":["https://openalex.org/I204722609"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5085836521","display_name":"Ryan Mayor","orcid":null},"institutions":[{"id":"https://openalex.org/I4210113654","display_name":"IBM (Canada)","ror":"https://ror.org/025sxka56","country_code":"CA","type":"company","lineage":["https://openalex.org/I1341412227","https://openalex.org/I4210113654"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Ryan Mayor","raw_affiliation_strings":["IBM Canada Ltd"],"affiliations":[{"raw_affiliation_string":"IBM Canada Ltd","institution_ids":["https://openalex.org/I4210113654"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5074780122"],"corresponding_institution_ids":["https://openalex.org/I204722609"],"apc_list":null,"apc_paid":null,"fwci":0.9048,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.7473443,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"112","last_page":"112"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7511463165283203},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.358001172542572}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7511463165283203},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.358001172542572}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1723028.1723043","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1723028.1723043","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2009 Conference of the Center for Advanced Studies on Collaborative Research - CASCON '09","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W111256740","https://openalex.org/W1501347099","https://openalex.org/W1503243085","https://openalex.org/W1557583788","https://openalex.org/W1874696862","https://openalex.org/W1910771831","https://openalex.org/W2004929506","https://openalex.org/W2023730632","https://openalex.org/W2060341638","https://openalex.org/W2061819729","https://openalex.org/W2110664127","https://openalex.org/W2125143072","https://openalex.org/W2128466029","https://openalex.org/W2130613507","https://openalex.org/W2131553890","https://openalex.org/W2134349570","https://openalex.org/W2139479820","https://openalex.org/W2162578718","https://openalex.org/W2248064281"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W2382290278","https://openalex.org/W2478288626","https://openalex.org/W4391913857","https://openalex.org/W2350741829","https://openalex.org/W2530322880"],"abstract_inverted_index":{"Security":[0],"testing":[1,44,87],"of":[2,18,34,49,69,79,83],"network":[3],"applications":[4],"is":[5,38],"an":[6,80,94],"essential":[7],"task":[8],"that":[9],"must":[10],"be":[11,65],"carried":[12],"out":[13,42],"prior":[14,45],"to":[15,20,40,46,97],"the":[16,21,30,35,47,50,60,77,98,108],"release":[17,48],"software":[19,61],"market.":[22],"Since":[23],"factors":[24],"such":[25],"as":[26,105],"time-to-market":[27],"constraints":[28],"limit":[29],"scope":[31],"or":[32],"depth":[33],"testing,":[36],"it":[37],"difficult":[39],"carry":[41],"exhaustive":[43],"software.":[51],"As":[52],"a":[53,85],"consequence,":[54],"flaws":[55],"may":[56,64],"remain":[57],"undiscovered":[58],"by":[59,67,107],"vendor,":[62],"which":[63],"discovered":[66],"those":[68],"malicious":[70],"intent.":[71],"In":[72],"this":[73],"paper,":[74],"we":[75],"report":[76],"results":[78],"empirical":[81],"evaluation":[82],"applying":[84],"security":[86],"approach":[88],"and":[89,113],"framework,":[90],"previously":[91],"tested":[92],"in":[93],"academic":[95],"setting,":[96],"Distributed":[99],"Relational":[100],"Database":[101],"Architecture":[102],"(DRDA\u00ae)":[103],"protocol":[104],"implemented":[106],"IBM\u00aeDB2\u00aeDatabase":[109],"for":[110],"Linux\u00ae,":[111],"Unix\u00ae,":[112],"Windows\u00aeproduct.":[114]},"counts_by_year":[{"year":2017,"cited_by_count":1},{"year":2014,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
