{"id":"https://openalex.org/W2090155559","doi":"https://doi.org/10.1145/2554850.2555010","title":"In the wild","display_name":"In the wild","publication_year":2014,"publication_date":"2014-03-24","ids":{"openalex":"https://openalex.org/W2090155559","doi":"https://doi.org/10.1145/2554850.2555010","mag":"2090155559"},"language":"en","primary_location":{"id":"doi:10.1145/2554850.2555010","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2554850.2555010","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 29th Annual ACM Symposium on Applied Computing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5076511609","display_name":"Sushama Karumanchi","orcid":null},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Sushama Karumanchi","raw_affiliation_strings":["Pennsylvania State University"],"affiliations":[{"raw_affiliation_string":"Pennsylvania State University","institution_ids":["https://openalex.org/I130769515"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5062519505","display_name":"Anna Squicciarini","orcid":"https://orcid.org/0000-0002-7396-1895"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Anna Cinzia Squicciarini","raw_affiliation_strings":["Pennsylvania State University"],"affiliations":[{"raw_affiliation_string":"Pennsylvania State University","institution_ids":["https://openalex.org/I130769515"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5076511609"],"corresponding_institution_ids":["https://openalex.org/I130769515"],"apc_list":null,"apc_paid":null,"fwci":3.9446,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.94156609,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1239","last_page":"1246"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9932000041007996,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10679","display_name":"Service-Oriented Architecture and Web Services","score":0.9919000267982483,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7778148651123047},{"id":"https://openalex.org/keywords/web-service","display_name":"Web service","score":0.6939175128936768},{"id":"https://openalex.org/keywords/interoperability","display_name":"Interoperability","score":0.6010018587112427},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.5892621874809265},{"id":"https://openalex.org/keywords/web-application-security","display_name":"Web application security","score":0.5789143443107605},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5589759945869446},{"id":"https://openalex.org/keywords/service-oriented-architecture","display_name":"Service-oriented architecture","score":0.5124202370643616},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.49139705300331116},{"id":"https://openalex.org/keywords/session","display_name":"Session (web analytics)","score":0.46223267912864685},{"id":"https://openalex.org/keywords/sql-injection","display_name":"SQL injection","score":0.46027493476867676},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.4567687213420868},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.44573286175727844},{"id":"https://openalex.org/keywords/vulnerability-assessment","display_name":"Vulnerability assessment","score":0.41798147559165955},{"id":"https://openalex.org/keywords/web-development","display_name":"Web development","score":0.297391414642334}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7778148651123047},{"id":"https://openalex.org/C35578498","wikidata":"https://www.wikidata.org/wiki/Q193424","display_name":"Web service","level":2,"score":0.6939175128936768},{"id":"https://openalex.org/C20136886","wikidata":"https://www.wikidata.org/wiki/Q749647","display_name":"Interoperability","level":2,"score":0.6010018587112427},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.5892621874809265},{"id":"https://openalex.org/C59241245","wikidata":"https://www.wikidata.org/wiki/Q4781497","display_name":"Web application security","level":4,"score":0.5789143443107605},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5589759945869446},{"id":"https://openalex.org/C57041688","wikidata":"https://www.wikidata.org/wiki/Q220644","display_name":"Service-oriented architecture","level":3,"score":0.5124202370643616},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.49139705300331116},{"id":"https://openalex.org/C2779182362","wikidata":"https://www.wikidata.org/wiki/Q17126187","display_name":"Session (web analytics)","level":2,"score":0.46223267912864685},{"id":"https://openalex.org/C150451098","wikidata":"https://www.wikidata.org/wiki/Q506059","display_name":"SQL injection","level":5,"score":0.46027493476867676},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.4567687213420868},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.44573286175727844},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.41798147559165955},{"id":"https://openalex.org/C79373723","wikidata":"https://www.wikidata.org/wiki/Q386275","display_name":"Web development","level":3,"score":0.297391414642334},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C137176749","wikidata":"https://www.wikidata.org/wiki/Q4105337","display_name":"Psychological resilience","level":2,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C97854310","wikidata":"https://www.wikidata.org/wiki/Q19541","display_name":"Search engine","level":2,"score":0.0},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0},{"id":"https://openalex.org/C164120249","wikidata":"https://www.wikidata.org/wiki/Q995982","display_name":"Web search query","level":3,"score":0.0},{"id":"https://openalex.org/C136264566","wikidata":"https://www.wikidata.org/wiki/Q159810","display_name":"Economy","level":1,"score":0.0},{"id":"https://openalex.org/C194222762","wikidata":"https://www.wikidata.org/wiki/Q114486","display_name":"Query by Example","level":4,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2554850.2555010","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2554850.2555010","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 29th Annual ACM Symposium on Applied Computing","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Life below water","score":0.5199999809265137,"id":"https://metadata.un.org/sdg/14"}],"awards":[{"id":"https://openalex.org/G685977179","display_name":null,"funder_award_id":"1250319","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W23242426","https://openalex.org/W125863246","https://openalex.org/W137095110","https://openalex.org/W152287746","https://openalex.org/W1494441120","https://openalex.org/W1533182289","https://openalex.org/W1649481791","https://openalex.org/W2049357384","https://openalex.org/W2060568276","https://openalex.org/W2065420847","https://openalex.org/W2096791889","https://openalex.org/W2103160148","https://openalex.org/W2117141138","https://openalex.org/W2118194901","https://openalex.org/W2506852933","https://openalex.org/W4242372624"],"related_works":["https://openalex.org/W3184859223","https://openalex.org/W2955734438","https://openalex.org/W2167752994","https://openalex.org/W1982746004","https://openalex.org/W2775081089","https://openalex.org/W2504194819","https://openalex.org/W1546980300","https://openalex.org/W2013343621","https://openalex.org/W2407701912","https://openalex.org/W4246898356"],"abstract_inverted_index":{"The":[0],"pervasiveness":[1],"of":[2,61,77,93,106,121],"Web":[3,33,115],"Services,":[4],"compounded":[5],"with":[6,19],"seamless":[7],"interoperability":[8],"characteristics,":[9],"introduces":[10],"security":[11],"concerns":[12],"that":[13,119],"are":[14,126],"to":[15,64,82],"be":[16],"carefully":[17],"considered":[18],"the":[20,78,104,122,129],"envisioned":[21],"internet":[22],"architecture.":[23],"In":[24,71],"this":[25],"paper,":[26],"we":[27,52,74],"propose":[28,91],"a":[29,83,107],"comprehensive":[30],"study":[31,110],"on":[32,96],"Service":[34],"vulnerabilities.":[35],"We":[36,117],"consider":[37],"not":[38],"only":[39],"well":[40],"known":[41],"Web-based":[42],"vulnerabilities":[43,57,125],"such":[44],"as":[45],"SQL":[46],"injection,":[47],"session":[48],"replay":[49],"etc,":[50],"but":[51],"also":[53],"analyze":[54],"Web-Service":[55],"specific":[56],"and":[58,68,88,90],"their":[59],"potential":[60],"attacks":[62],"due":[63],"poor":[65],"service":[66,69],"construction":[67],"maintenance.":[70],"our":[72],"analysis,":[73],"classify":[75],"each":[76],"studied":[79,124],"vulnerability":[80],"according":[81],"new":[84],"taxonomy,":[85],"discuss":[86],"remedies":[87],"impact,":[89],"methods":[92],"detection":[94],"based":[95],"real-time":[97],"analysis.":[98],"Our":[99],"analysis":[100],"is":[101],"supported":[102],"by":[103],"results":[105],"large":[108],"scale":[109],"involving":[111],"over":[112],"2,000":[113],"real-world":[114],"Services.":[116],"note":[118],"many":[120],"least":[123],"present":[127],"in":[128],"wild.":[130]},"counts_by_year":[{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2016-06-24T00:00:00"}
