<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">A Case-Control Study on the Server-Side Bandages Against XSS</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<affiliation key="aff0">
								<orgName type="department">JUKKA RUOHONEN and VILLE LEPP ÄNEN</orgName>
								<orgName type="institution">University of Turku</orgName>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff1">
								<orgName type="institution">University of Turku</orgName>
								<address>
									<postCode>FI-20014</postCode>
									<settlement>Turun yliopisto</settlement>
									<country key="FI">Finland</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">A Case-Control Study on the Server-Side Bandages Against XSS</title>
					</analytic>
					<monogr>
						<idno type="ISSN">1613-0073)</idno>
					</monogr>
					<idno type="MD5">2A6F8F5D978FDD08C9E77C58F84D504C</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T11:28+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>This paper surveys the server-side use of security-related options for protecting websites against cross-site scripting (XSS) attacks. By using data from a bug bounty platform, the use of these header-based options is approached with a case-control study that contrasts popular Internet domains against less popular domains that have explicitly been verified to have been vulnerable to XSS. According to the results based on the analysis of nearly 800 thousand domains, (a) the header-based security options are only infrequently used. However, (b) the domains known to have been vulnerable to XSS have been much less likely to use these options compared to popular domains. Furthermore, (c) the options surveyed tend to statistically form clear latent dimensions, which can be speculated to relate to the effort required to enforce strict security policies for websites.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">INTRODUCTION</head><p>Cross-site scripting vulnerabilities have continued to frequently appear in the top-rankings of the most common security bugs in web applications <ref type="bibr" target="#b10">[OWASP 2018</ref>]. The essence behind these security bugs is simple: an attacker injects malicious executable code to a vulnerable website, and a client's web browser executes this code during rendering of the website. The consequences for clients may range from stealing of web cookies and browsing history to phishing and even key logging.</p><p>If time, resources, and talent are all available, the "best strategy for protecting webservers is to write secure Web applications from scratch" <ref type="bibr">[Stritter et al. 2016]</ref>. Combined with the commonplace lack of time, resources, and talent, the sheer complexity and the chaotic nature of the current Web have prompted the introduction of many countermeasures against XSS. Most of these are bandages that merely patch the symptom-the only real remediation against cross-site scripting is arguably proper input validation. However, as it is deviously difficult to do this in practice <ref type="bibr" target="#b26">[Weinberger et al. 2011]</ref>, different remediation solutions have been considered practically on all sides of the current Web <ref type="bibr">[Stritter et al. 2016</ref>]. On the infrastructure side, remediation is deep-rooted in the fundamental issues affecting web standards, encryption of hypertext transfer protocol (HTTP) traffic, the global public key infrastructure, the domain name system, the so-called same-origin policy, and ultimately the whole client-server paradigm. On the client-side, the mitigation solutions include sandboxes, blacklists, and different heuristics to profile the execution of JavaScript. On the server-side, the remediation solutions include web application firewalls, algorithmic solutions, and different options that can be set in HTTP header responses for instructing browsers about intended behavior. Although much of existing research has focused on the detection and prevention of XSS vulnerabilities with algorithms and heuristics <ref type="bibr" target="#b4">[Hydara et al. 2015]</ref>, the header options are noteworthy for a couple of important reasons.</p><p>First, many of these satisfy the desirable property of bandages: these are easy to apply to fix bleeding in existing implementations, and these are recognized by most browsers due to (implicit) stan-dardization <ref type="bibr" target="#b11">[Ross et al. 2013;</ref><ref type="bibr" target="#b24">W3C 2016;</ref><ref type="bibr">2017]</ref>. Second, these have enlarged the scholarly intersection between web application security research and the increasingly popular large-scale Internet measurement research <ref type="bibr" target="#b6">[Lekies et al. 2013;</ref><ref type="bibr" target="#b20">Tajalizadehkhoob et al. 2017;</ref><ref type="bibr" target="#b23">Vasek et al. 2016;</ref><ref type="bibr" target="#b27">Weissbacher et al. 2014</ref>]. This intersection is also the area to which this paper contributes. The contribution stems from the data used. While numerous studies have collected data based on blacklists and related collections about domains and websites associated with spam, phishing, and malware <ref type="bibr" target="#b17">[Ruohonen et al. 2016;</ref><ref type="bibr" target="#b20">Tajalizadehkhoob et al. 2017;</ref><ref type="bibr" target="#b23">Vasek et al. 2016</ref>], these are only implicitly related to web vulnerabilities. In contrast, this paper uses data from a so-called bug bounty specialized to the discovery and disclosure of XSS vulnerabilities in particular. In other words, a part of the data used is explicitly about websites that have been verified to have been vulnerable to security bugs the headers surveyed are meant to partially address. Equipped with this improvement to the always difficult ground truth problem, the paper sets to answer to the following three research questions (RQs):</p><p>-RQ 1 : How common is the use of HTTP headers for XSS prevention? -RQ 2 : Are different HTTP header fields used in conjunction with other fields designed to mitigate XSS? -RQ 3 : Is there a difference in the use of XSS-related HTTP header fields between popular Internet domains and less popular domains that have been vulnerable to XSS according to data from a bug bounty?</p><p>To answer to these three questions, the paper proceeds by introducing the materials and methods in Section 2. The empirical results are presented in Section 3 and further discussed in the final Section 4.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">MATERIALS AND METHODS</head><p>The following discussion will outline the headers surveyed, the empirical materials, and the methods used.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1">Header Fields</head><p>The header fields surveyed are listed in Table <ref type="table" target="#tab_0">I</ref>. The listing is not comprehensive; only well-known fields either explicitly or at least implicitly related to XSS are surveyed. Even with this narrowing of the scope, it is not easy to demarcate between fields related to cross-site scripting and those not related to it. In other words: in many attack scenarios, XSS can be used to facilitate other attacks, or cross-site scripting can be facilitated by other attacks. The header fields surveyed can be further elaborated as follows:</p><p>-The HttpOnly field can be set for cookies to prevent these from being accessible by scripts executed by a client's browser <ref type="bibr" target="#b15">[Ruohonen and Lepp änen 2017b]</ref>. Setting this flag is generally recommended for session cookies in order to mitigate theft of session information via XSS. -A value nosniff can be set to prevent some browsers from deducing about media types and file formats (i.e., MIME types) that do not match the declared Content-Type. The rationale for sniffing MIME types relates to the lack of universally accepted meta-data for web content and the common occurrence of incorrectly defined types. Unfortunately, this sniffing exposes XSS attacks <ref type="bibr" target="#b1">[Barth et al. 2009</ref>]. -X-Frame-Options are not directly related to XSS per se, although the so-called clickjacking can be used in conjunction with XSS, cross-site request forgery (CSRF), and related attacks <ref type="bibr" target="#b5">[Kim and Kim 2015;</ref><ref type="bibr" target="#b21">Takamatsu and Kono 2014]</ref>. The values specified for X-Frame-Options can mitigate some of these attacks by either preventing or restricting a client's browser from displaying web content through &lt;frame&gt; and &lt;iframe&gt; elements <ref type="bibr" target="#b11">[Ross et al. 2013</ref>]. The three available values forbid framing altogether, restrict it to the same origin than the content itself, or allow framing only from explicitly specified origins. -Referrer-Policy governs the information a client sends along with the Referer header to the landing page. A certain class of XSS attacks are known to be possible with the Referer information <ref type="bibr" target="#b3">[Gremwell BVBA 2010]</ref>, although privacy and other security concerns (including CSRF) have been more pressing <ref type="bibr" target="#b2">[Barth et al. 2008;</ref><ref type="bibr" target="#b25">W3C 2017]</ref>. Some of these attacks and related concerns can be remedied by forbidding referrer information to be sent with a no-referrer value. In addition, more fine-grained control is possible with other values [W3C 2017]. The metric labeled REFERRER-ORIGIN groups values that tighten the default client-side policy, excluding the strictest no-referrer policy. -X-XSS-Protection is a HTTP response header field that can be set to instruct some web browsers to enable either sanitization or filtering of reflected XSS attacks <ref type="bibr">[Mozilla Foundation et al. 2017</ref>]. The main targets of the field are inline resources, such as inline event handlers and inline &lt;script&gt; or &lt;style&gt; elements. In general, this field has been augmented by the more comprehensive Content-Security-Policy. -Content-Security-Policy (CSP) is currently the most comprehensive header-based mitigation solution against cross-site scripting. The basic idea behind CSP is to use a policy document for listing those domains that are allowed to execute scripts, load web resources, or embed cross-domain functionality [W3C 2016]. The explicitly defined policy directives are grouped into the metric CSP-SRC.</p><p>The metric CSP-URI, in turn, captures the presence of policy restrictions based on uniform resource identifiers. Reflecting CSP's complexity, there are numerous additional directives that can be set for further restrictions. These are grouped into CSP-MISC. Finally, it is worth remarking that the deprecated reflected-xss has similar functionality to X-XSS-Protection. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>REFERRER-ORIGIN</head><p>A value origin, same-origin, strict-origin, origin-whencross-origin, or strict-origin-when-cross-origin is defined.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>X-XSS-Protection</head><p>X-XSS-FILTER X-XSS-Protection: 1 is present. X-XSS-BLOCK X-XSS-Protection: 1; mode=block is present.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Content-Security-Policy</head><p>CSP-SRC A value default-src, script-src, object-src, style-src, img-src, media-src, frame-src, child-src, font-src, connect-src, or manifest-src is defined.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>CSP-URI</head><p>A base-uri, form-action, or frame-ancestors is set.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>CSP-MISC</head><p>A value sandbox, script-nonce, referrer, plugin-types, block-all-mixed-content, or upgrade-insecure-requests is present.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>CSP-XSS</head><p>A CSP contains reflected-xss.</p><p>Much of the current XSS-related standardization work concentrates on CSP. Because the current (v.3) revision [W3C 2016] is detailed and complex, applying a strict CSP successfully requires careful fine-tuning on per-site basis. Due to the complexity, it should be also stressed that the four simple metrics in Table I only probe CSP's surface by counting the policy directives themselves; the actual 17:4</p><p>• J. Ruohonen and V. Lepp änen values specified for these directives differentiate a secure policy from an insecure one <ref type="bibr" target="#b7">[Liu et al. 2016;</ref><ref type="bibr" target="#b27">Weissbacher et al. 2014</ref>].</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2">Data</head><p>The dataset is based on two sources. The first source is the Alexa's conventional list of top-million most popular Internet domains <ref type="bibr">[Alexa Internet, Inc. 2017]</ref>. Although generalizability remains an open question, Alexa's popularity lists have been the de facto benchmark sources for different Internet measurement studies <ref type="bibr" target="#b6">[Lekies et al. 2013;</ref><ref type="bibr" target="#b7">Liu et al. 2016;</ref><ref type="bibr" target="#b14">Ruohonen and Lepp änen 2017a;</ref><ref type="bibr" target="#b22">Tyson et al. 2017;</ref><ref type="bibr" target="#b27">Weissbacher et al. 2014</ref>]. The second source comes from the web vulnerabilities disseminated through the Open Bug Bounty (OBB) <ref type="bibr">[2017]</ref> platform. This bug bounty is a community-based platform for dissemination of XSS and CSRF vulnerabilities in particular <ref type="bibr" target="#b13">[Ruohonen and Allodi 2018]</ref>. Unlike some other bug bounties, OBB neither pays for vulnerabilities nor targets some particular vendors or websites.</p><p>Given the two data sources, the retrieval of the headers was implemented by following the simple scheme illustrated in Fig. <ref type="figure">1</ref>. Before continuing further, it should be noted that a success is defined as a query that returned a status code starting either with a number 2 or with a number 3. A failure, in turn, includes all other status codes as well as queries failed for undefined or unknown reasons. Despite of these disqualification criteria, it should be emphasized that initial redirections (status code 301) were followed during the retrieval.</p><p>Each domain in both samples was queried three times in order to rule out timeouts, domain name resolution failures, and other temporary errors. Although OBB provides uniform resource locators (URLs) pointing to the vulnerable web applications, Alexa's list only contains domain names. To maintain a uniform retrieval scenario for both samples, also the entries in the OBB sample were queried based on the host field in the URLs (hence, a domain that has been exposed to multiple vulnerabilities is counted only once). The host field was further restricted to cover only fully qualified domain names. In other words, Internet protocol (IPv4) addresses were excluded during pre-processing of the OBB sample. Like in previous empirical research <ref type="bibr" target="#b22">[Tyson et al. 2017</ref>], the actual retrieval was done with the conventional HTTP/1.1 via which the headers were retrieved based on GET requests. If an HTTP query failed, however, another GET request was attempted over the transport layer security protocol. If both requests failed for three times for a given domain during the retrieval in November 2017, the domain was finally excluded from the empirical analysis. This retrieval scenario could be further extended (for instance, by querying the domains also with www-prefixes; see Weissbacher14), but some limitations would still be present <ref type="bibr" target="#b28">[Ying and Li 2016]</ref>. While acknowledging the imperfection of the retrieval routine, more than enough data was retrieved from both sources (see Fig. <ref type="figure">2</ref>). Finally, a few words are required about the parsing required for the metrics listed in Table <ref type="table" target="#tab_0">I</ref>. The header fields are delivered as case-insensitive key-value pairs. As the details for standards-compliant parsing are fairly detailed, the headers were parsed line-by-line with simple string searches after both the keys and the values had been transformed to lower-case letters. As an example: to construct the X-XSS-BLOCK metric, a character 1 and a string block were searched from the value delivered via the transformed x-xss-protection key. These heuristic searches avoid some ambiguities (such as those related to semicolons and white-space). Nevertheless, it should be remarked that some outlying domains observed may be interpreted as having set an option-even though actual web browsers may interpret the option as incorrectly specified.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.3">Methods</head><p>The following three methods are used:</p><p>(1) To answer to RQ 1 , the first "method" simply plots the relative share of all metrics enumerated in Table <ref type="table" target="#tab_0">I</ref>. For this plotting, a symmetric difference (i.e., a union without an intersection) of the two sources is used. To determine the intersection, Alexa's popularity ranks are used. A domain is classified as belonging to both sets in Fig. <ref type="figure">2</ref> when: (a) the domain is present in both samples, or (b) a popularity rank is provided for the domain indirectly through OBB. This twofold detection is necessary because OBB provides its own historical Alexa-ranks <ref type="bibr" target="#b13">[Ruohonen and Allodi 2018]</ref>. In other words, some of the domains in the OBB sample may have appeared in some older ranking that is no longer publicly available from Alexa.</p><p>(2) To answer to RQ 2 , the principal component analysis (PCA) is used by examining whether the metrics can be reduced into smaller dimensions. As all metrics have the same scale, a sample covariance matrix is used as the input to PCA, and the number of components is approximated with a so-called scree plot (for the details refer to <ref type="bibr" target="#b29">Zuur et al. [2007]</ref>, i.a.). The symmetric difference is again used for the two samples.</p><p>(3) To answer to RQ 3 , a small case-control study is computed. Case-control studies are classical ways to conduct experimental studies in fields such as medicine and epidemiology <ref type="bibr" target="#b12">[Rundle et al. 2012</ref>], but these have recently gained traction also in security research <ref type="bibr" target="#b23">[Vasek et al. 2016]</ref>. By removing the intersection in Fig. <ref type="figure">2</ref>, the case is composed of the vulnerable domains in the OBB subsample, while the domains in the Alexa subsample constitute the control. Due to the definition given for the intersection of the two samples, the case refers also to less popular domains, which are compared against the control group of popular domains. Given the 1 ≤ i ≤ 13 metrics, the resulting casecontrol setup is illustrated in Table <ref type="table" target="#tab_0">II</ref>.</p><p>Table <ref type="table" target="#tab_0">II</ref>. The Case-Control Setup (frequencies nij)</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>OBB Alexa</head><p>Odds ratio</p><formula xml:id="formula_0">METRIC i = 1 (present) n 11 n 12 n 11 × n 22 n 12 × n 21 METRIC i = 0 (absent) n 21 n<label>22</label></formula><p>Thus: if the nonintersecting OBB and Alexa subsamples do not differ in terms of the i:th metric, the corresponding odds ratio equals unity. A value smaller (larger) than one indicates that the vulnerable OBB domains are less (more) likely to have had a header-based XSS protection in place compared to the control domains. Given the unequal sample sizes (see Fig. <ref type="figure">2</ref>), a simple resampling computation <ref type="bibr" target="#b12">[Rundle et al. 2012</ref>] is used by drawing 1000 random subsets from the Alexa subsample, the size of each subset equaling n 11 + n 21 . Arithmetic mean is used to report the odds ratios from the thousand draws. 17:6</p><p>• J. Ruohonen and V. Lepp änen</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">RESULTS</head><p>The answer to RQ 1 is clear: the HTTP header fields related to security are only infrequently used. The most common use case is to restrict the accessibility of session cookies (see Fig. <ref type="figure">3</ref>). Roughly around one tenth of the domains observed have also restricted MIME sniffing, enforced the same-origin policy for framing, and adopted X-XSS-Protection. The use of CSP is strikingly rare. The top-5 metrics in Fig. <ref type="figure">3</ref> explain as much as about 90% of the total variation in the sample (see Fig. <ref type="figure">5</ref>). When looking at the relevant PCA loadings (see Figure <ref type="figure" target="#fig_2">6</ref>), it seems that there are three latent dimensions: cookie restriction (PC2), XSS protection (PC1), and partial enforcement of the same-origin policy (PC3). The answer to RQ 2 is positive: the easily enforced XSS restrictions are used in conjunction with the other fields requiring little effort. The answer to RQ 3 is also clear: the less popular OBB domains (without Alexa's ranks) have been much less likely to use HTTP header fields for security improvements. The odds ratios are equal or greater than one only for two metrics (see Fig. <ref type="figure">4</ref>), which are only infrequently used in general (see Fig. <ref type="figure">3</ref>). The fields explicitly related to cross-site scriptingincluding NOSNIFF and the X-XSS-Protection options-attain odds ratios clearly smaller than unity. Thus, when compared to popular domains, the less popular domains that have explicitly been known to be vulnerable to XSS have failed to enforce basic protections-or, alternatively, these domains may have been vulnerable due to the lack of the protections. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">DISCUSSION</head><p>This paper surveyed the use of HTTP header options designed to mitigate XSS and related attacks. According to the results, the use of these headers is still at a modest level even among popular Internet domains (RQ 1 ). This result supports recent empirical observations; even simple techniques such as JavaScript-restricted cookies and X-XSS-Protection are only infrequently used on the server-side of the current Web <ref type="bibr" target="#b15">[Ruohonen and Lepp änen 2017b;</ref><ref type="bibr" target="#b20">Tajalizadehkhoob et al. 2017</ref>]. However, not all websites are equal.</p><p>The results clearly show that less popular domains that have been verified to have been vulnerable to XSS are much less likely to use header-based protections (RQ 3 ). Although the statistical computations are exceptionally clear in this regard, this result should be still taken only tentatively. The reason for this caution is well-known. The most challenging part in the design of a case-control study is the selection of a control group <ref type="bibr" target="#b12">[Rundle et al. 2012;</ref><ref type="bibr" target="#b23">Vasek et al. 2016]</ref>. Even with the careful subsetting of the two subsamples, the Alexa's top-million list can hardly be taken as a bulletproof control group. Furthermore, the results are only approximations because it is impossible to deduce whether the domains in the OBB subsample used header-based mitigation at the time when the vulnerabilities were disclosed through the bug bounty <ref type="bibr" target="#b13">[Ruohonen and Allodi 2018]</ref>. A third limitation relates to the sampling strategy (see Fig. <ref type="figure">1</ref>), which only probes a domain's main page <ref type="bibr" target="#b28">[Ying and Li 2016]</ref>. While acknowledging these three limitations-which largely apply also to many related Internet measurement studies in general, the case-control study presented demonstrates that data from bug bounties can sharpen the assumptions about vulnerable websites.</p><p>Finally, the results further show that the XSS-related header tend to statistically parcel into distinct latent dimensions (RQ 2 ). If these dimensions are interpreted to reflect effort <ref type="bibr" target="#b20">[Tajalizadehkhoob et al. 2017]</ref>, it seems that the dimensions that require little effort are more frequently enforced. A plausible explanation relates to the ever increasing amount of dependencies to external websites <ref type="bibr">[Ruohonen et al. 2018]</ref>. As the empirical results also support the existing observations about CSP's adoption problems <ref type="bibr" target="#b27">[Weissbacher et al. 2014]</ref>, it seems fair to conclude with a remark that web developers may have difficulties to implement and enforce security policies when third-party domains or URLs must be explicitly stated.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head></head><label></label><figDesc>Fig. 1. A Simple Routine for Header Retrieval</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Fig. 6 .</head><label>6</label><figDesc>Fig. 3. Relative Share of Header Field Metrics</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>Table I .</head><label>I</label><figDesc>Metrics and Header Fields</figDesc><table><row><cell>Field</cell><cell>METRIC</cell><cell>Description / operationalization</cell></row><row><cell>Set-Cookie</cell><cell>HTTPONLY</cell><cell>A cookie with HttpOnly.</cell></row><row><cell cols="2">X-Content-Type-Options NOSNIFF</cell><cell>A value nosniff is present.</cell></row><row><cell>X-Frame-Options</cell><cell>X-FRAME-DENY</cell><cell>X-Frame-Options: deny is set.</cell></row><row><cell></cell><cell>X-FRAME-SAMEO</cell><cell>X-Frame-Options: sameorigin is set.</cell></row><row><cell></cell><cell>X-FRAME-AFROM</cell><cell>X-Frame-Options: allow-from is set.</cell></row><row><cell>Referrer-Policy</cell><cell>REFERRER-NO</cell><cell>A value no-referrer is present.</cell></row></table></figure>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<monogr>
		<ptr target="http://s3.amazonaws.com/alexa-static/top-1m.csv.zip" />
		<title level="m">The Top Million Websites</title>
				<imprint>
			<publisher>Alexa Internet, Inc</publisher>
			<date type="published" when="2017">2017. 2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Secure Content Sniffing for Web Browsers, or How to Stop Papers from Reviewing Themselves</title>
		<author>
			<persName><forename type="first">Adam</forename><surname>Barth</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Juan</forename><surname>Caballero</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Dawn</forename><surname>Song</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 30th IEEE Symposium on Security and Privacy (S&amp;P 2009)</title>
				<meeting>the 30th IEEE Symposium on Security and Privacy (S&amp;P 2009)<address><addrLine>Berkeley</addrLine></address></meeting>
		<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2009">2009</date>
			<biblScope unit="page" from="360" to="371" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Robust Defenses for Cross-Site Request Forgery</title>
		<author>
			<persName><forename type="first">Adam</forename><surname>Barth</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Collin</forename><surname>Jackson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">John</forename><forename type="middle">C</forename><surname>Mitchell</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 15th ACM conference on Computer and Communications Security (CCS 2008)</title>
				<meeting>the 15th ACM conference on Computer and Communications Security (CCS 2008)<address><addrLine>Alexandria</addrLine></address></meeting>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="2008">2008</date>
			<biblScope unit="page" from="75" to="88" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<monogr>
		<title level="m" type="main">Exploiting Cross-Site Scripting in Referer Header</title>
		<author>
			<persName><forename type="first">Bvba</forename><surname>Gremwell</surname></persName>
		</author>
		<ptr target="https://www.gremwell.com/exploitingxssinrefererheader" />
		<imprint>
			<date type="published" when="2010-01">2010. 2010. January 2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Current State of Research on Cross-Site Scripting (XSS) -A Systematic Literature Review</title>
		<author>
			<persName><forename type="first">Isatou</forename><surname>Hydara</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Abu</forename><surname>Bakar Md</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Hazura</forename><surname>Sultan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Novia</forename><surname>Zulzalil</surname></persName>
		</author>
		<author>
			<persName><surname>Admodisastro</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Information and Software Technology</title>
		<imprint>
			<biblScope unit="volume">58</biblScope>
			<biblScope unit="page" from="170" to="186" />
			<date type="published" when="2015">2015. 2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Performing Clickjacking Attacks in the Wild: 99% are Still Vulnerable!</title>
		<author>
			<persName><forename type="first">Daehyun</forename><surname>Kim</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Hyoungshick</forename><surname>Kim</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 1st International Conference on Software Security and Assurance (ICSSA 2015)</title>
				<meeting>the 1st International Conference on Software Security and Assurance (ICSSA 2015)<address><addrLine>Suwon</addrLine></address></meeting>
		<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2015">2015</date>
			<biblScope unit="page" from="25" to="29" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">25 Million Flows Later: Large-Scale Detection of DOM-Based XSS</title>
		<author>
			<persName><forename type="first">Sebastian</forename><surname>Lekies</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Ben</forename><surname>Stock</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Martin</forename><surname>Johns</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 2013 ACM SIGSAC Conference on Computer &amp; Communications Security (CCS 2013)</title>
				<meeting>the 2013 ACM SIGSAC Conference on Computer &amp; Communications Security (CCS 2013)<address><addrLine>Berlin</addrLine></address></meeting>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="2013">2013</date>
			<biblScope unit="page" from="1193" to="1204" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">A Systematic Study of Content Security Policy in Web Applications</title>
		<author>
			<persName><forename type="first">Shukai</forename><surname>Liu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Xuexiong</forename><surname>Yan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Qingxian</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Qi</forename><surname>Xi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Security and Communication Networks</title>
		<editor>J. Ruohonen and V. Lepp änen</editor>
		<imprint>
			<biblScope unit="volume">9</biblScope>
			<biblScope unit="page" from="3570" to="3584" />
			<date type="published" when="2016">2016. 2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<monogr>
		<author>
			<persName><surname>Others</surname></persName>
			<affiliation>
				<orgName type="collaboration">Mozilla Foundation</orgName>
			</affiliation>
		</author>
		<ptr target="https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-XSS-Protection" />
		<title level="m">X-XSS-Protection</title>
				<imprint>
			<date type="published" when="2017-01">2017. 2017. January 2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<monogr>
		<ptr target="https://www.openbugbounty.org/." />
		<title level="m">Open Bug Bounty</title>
				<meeting><address><addrLine>OBB</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2017">2017. 2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<monogr>
		<author>
			<persName><surname>Owasp</surname></persName>
		</author>
		<idno>Top 10-2017 Top 10</idno>
		<ptr target="https://www.owasp.org/index.php/Top10-2017Top10" />
		<title level="m">The Open Web Application Security Project (OWASP)</title>
				<imprint>
			<date type="published" when="2017">2018. 2018. October 2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<monogr>
		<author>
			<persName><forename type="first">David</forename><surname>Ross</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Tobias</forename><surname>Gondrom</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Thames</forename><surname>Stanley</surname></persName>
		</author>
		<ptr target="https://www.ietf.org/rfc/rfc7034.txt" />
		<title level="m">Internet Engineering Task Force (IETF)</title>
				<imprint>
			<date type="published" when="2013-01">2013. 7034. 2013. January 2018</date>
		</imprint>
	</monogr>
	<note>HTTP Header Field X-Frame-Options</note>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Better Cancer Biomarker Discovery Through Better Study Design</title>
		<author>
			<persName><forename type="first">Andrew</forename><surname>Rundle</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Habibul</forename><surname>Ahsan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Paolo</forename><surname>Vineis</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">European Journal of Clinical Investigation</title>
		<imprint>
			<biblScope unit="volume">42</biblScope>
			<biblScope unit="page" from="1350" to="1359" />
			<date type="published" when="2012">2012. 2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">A Bug Bounty Perspective on the Disclosure of Web Vulnerabilities</title>
		<author>
			<persName><forename type="first">Jukka</forename><surname>Ruohonen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Luca</forename><surname>Allodi</surname></persName>
		</author>
		<ptr target="https://weis2018.econinfosec.org/wp-content/uploads/sites/5/2018/05/WEIS2018paper33.pdf" />
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 17th Annual Workshop on the Economics of Information Security (WEIS 2018)</title>
				<meeting>the 17th Annual Workshop on the Economics of Information Security (WEIS 2018)<address><addrLine>Innsbruck</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2018">2018</date>
			<biblScope unit="page" from="1" to="14" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">How PHP Releases Are Adopted in the Wild?</title>
		<author>
			<persName><forename type="first">Jukka</forename><surname>Ruohonen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Ville</forename><surname>Lepp Änen</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 24th Asia-Pacific Software Engineering Conference (APSEC 2017)</title>
				<meeting>the 24th Asia-Pacific Software Engineering Conference (APSEC 2017)<address><addrLine>Nanjing</addrLine></address></meeting>
		<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2017">2017a</date>
			<biblScope unit="page" from="71" to="80" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Whose Hands Are in the Finnish Cookie Jar?</title>
		<author>
			<persName><forename type="first">Jukka</forename><surname>Ruohonen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Ville</forename><surname>Lepp Änen</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the European Intelligence and Security Informatics Conference (EISIC 2017)</title>
				<meeting>the European Intelligence and Security Informatics Conference (EISIC 2017)<address><addrLine>Athens</addrLine></address></meeting>
		<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2017">2017b</date>
			<biblScope unit="page" from="127" to="130" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Crossing Cross-Domain Paths in the Current Web</title>
		<author>
			<persName><forename type="first">Jukka</forename><surname>Ruohonen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Joonas</forename><surname>Salovaara</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Ville</forename><surname>Lepp Änen</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 16th Annual Conference on Privacy</title>
				<meeting>the 16th Annual Conference on Privacy<address><addrLine>Belfast</addrLine></address></meeting>
		<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2018">2018. PST 2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Correlating File-Based Malware Graphs Against the Empirical Ground Truth of DNS Graphs</title>
		<author>
			<persName><forename type="first">Jukka</forename><surname>Ruohonen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Sanja</forename><surname>Šćepanović</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Sami</forename><surname>Hyrynsalmi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Igor</forename><surname>Mishkovski</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Tuomas</forename><surname>Aura</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Ville</forename><surname>Lepp Änen</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 10th European Conference on Software Architecture Workshops (ECSAW 2016)</title>
				<meeting>the 10th European Conference on Software Architecture Workshops (ECSAW 2016)<address><addrLine>Copenhagen</addrLine></address></meeting>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="2016">2016</date>
			<biblScope unit="volume">30</biblScope>
			<biblScope unit="page">6</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<monogr>
		<title/>
		<author>
			<persName><forename type="first">Benjamin</forename><surname>Stritter</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Felix</forename><surname>Freiling</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Hartmut</forename><surname>König</surname></persName>
		</author>
		<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">Cleaning up Web 2.0&apos;s Security Mess-at Least Partly</title>
		<author>
			<persName><forename type="first">René</forename><surname>Rietz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Steffen</forename><surname>Ullrich</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Felix</forename><surname>Alexander Von Gernler</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Falko</forename><surname>Erlacher</surname></persName>
		</author>
		<author>
			<persName><surname>Dressler</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Security &amp; Privacy</title>
		<imprint>
			<biblScope unit="volume">14</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="48" to="57" />
			<date type="published" when="2016">2016. 2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">Herding Vulnerable Cats: A Statistical Approach to Disentangle Joint Responsibility for Web Security in Shared Hosting</title>
		<author>
			<persName><forename type="first">Samaneh</forename><surname>Tajalizadehkhoob</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Maciej</forename><surname>Tom Van Goethem</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Arman</forename><surname>Korczy Ński</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Rainer</forename><surname>Noroozian</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Tyler</forename><surname>Böhme</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Wouter</forename><surname>Moore</surname></persName>
		</author>
		<author>
			<persName><surname>Joosen</surname></persName>
		</author>
		<author>
			<persName><surname>Michel Van Eeten</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (CCS 2017)</title>
				<meeting>the 2017 ACM SIGSAC Conference on Computer and Communications Security (CCS 2017)<address><addrLine>Dallas</addrLine></address></meeting>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="2017">2017</date>
			<biblScope unit="page" from="553" to="567" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<analytic>
		<title level="a" type="main">Clickjuggler: Checking for Incomplete Defenses Against Clickjacking</title>
		<author>
			<persName><forename type="first">Yusuke</forename><surname>Takamatsu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Kenji</forename><surname>Kono</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the Twelfth Annual International Conference on Privacy</title>
				<meeting>the Twelfth Annual International Conference on Privacy<address><addrLine>Toronto</addrLine></address></meeting>
		<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2014">2014. PST 2014</date>
			<biblScope unit="page" from="224" to="231" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<analytic>
		<title level="a" type="main">Exploring HTTP Header Manipulation In-The-Wild</title>
		<author>
			<persName><forename type="first">Gareth</forename><surname>Tyson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Shan</forename><surname>Huang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Felix</forename><surname>Cuadrado</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Ignacio</forename><surname>Castro</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Vasile</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Arjuna</forename><surname>Perta</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Steve</forename><surname>Sathiaseelan</surname></persName>
		</author>
		<author>
			<persName><surname>Uhlig</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 26th International Conference on World Wide Web (WWW 2017)</title>
				<meeting>the 26th International Conference on World Wide Web (WWW 2017)<address><addrLine>Perth</addrLine></address></meeting>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="2017">2017</date>
			<biblScope unit="page" from="451" to="458" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<analytic>
		<title level="a" type="main">Hacking Is Not Random: A Case-Control Study on Webserver-Compromise Risk</title>
		<author>
			<persName><forename type="first">Marie</forename><surname>Vasek</surname></persName>
		</author>
		<author>
			<persName><forename type="first">John</forename><surname>Wadleigh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Tyler</forename><surname>Moore</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Dependable and Secure Computing</title>
		<imprint>
			<biblScope unit="volume">13</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="206" to="219" />
			<date type="published" when="2016">2016. 2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b24">
	<monogr>
		<author>
			<persName><surname>W3c</surname></persName>
		</author>
		<ptr target="https://www.w3.org/TR/CSP/" />
		<title level="m">Content Security Policy Level 3, W3C Working Draft</title>
				<imprint>
			<date type="published" when="2016-01">2016. 2016. January 2018</date>
		</imprint>
	</monogr>
	<note>World Wide Web Consortium (W3C)</note>
</biblStruct>

<biblStruct xml:id="b25">
	<monogr>
		<author>
			<persName><surname>W3c</surname></persName>
		</author>
		<ptr target="https://www.w3.org/TR/referrer-policy/" />
		<title level="m">Referrer Policy, W3C Candidate Recommendation</title>
				<imprint>
			<date type="published" when="2017-01">2017. 2017. January 2018</date>
		</imprint>
	</monogr>
	<note>World Wide Web Consortium (W3C)</note>
</biblStruct>

<biblStruct xml:id="b26">
	<analytic>
		<title level="a" type="main">A Systematic Analysis of XSS Sanitization in Web Application Frameworks</title>
		<author>
			<persName><forename type="first">Joel</forename><surname>Weinberger</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Prateek</forename><surname>Saxena</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Devdatta</forename><surname>Akhawe</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Matthew</forename><surname>Finifter</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Richard</forename><surname>Shin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Dawn</forename><surname>Song</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 16th European Symposium on Research in Computer Security (ESORICS 2011)</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<editor>
			<persName><forename type="first">Vijay</forename><surname>Atluri</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">Claudia</forename><surname>Diaz</surname></persName>
		</editor>
		<meeting>the 16th European Symposium on Research in Computer Security (ESORICS 2011)<address><addrLine>Leuven</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2011">2011</date>
			<biblScope unit="volume">6879</biblScope>
			<biblScope unit="page" from="150" to="171" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b27">
	<analytic>
		<title level="a" type="main">Why Is CSP Failing? Trends and Challenges in CSP Adoption</title>
		<author>
			<persName><forename type="first">Michael</forename><surname>Weissbacher</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Tobias</forename><surname>Lauinger</surname></persName>
		</author>
		<author>
			<persName><forename type="first">William</forename><surname>Robertson</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 17th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2014)</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<editor>
			<persName><forename type="first">Angelos</forename><surname>Stavrou</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">Herbert</forename><surname>Bos</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">Georgios</forename><surname>Portokalidis</surname></persName>
		</editor>
		<meeting>the 17th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2014)<address><addrLine>Gothenburg</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2014">2014</date>
			<biblScope unit="volume">8688</biblScope>
			<biblScope unit="page" from="212" to="233" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b28">
	<analytic>
		<title level="a" type="main">CSP Adoption: Current Status and Future Prospects</title>
		<author>
			<persName><forename type="first">Ming</forename><surname>Ying</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Shu</forename><surname>Qin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Li</forename></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Security and Communication Networks</title>
		<imprint>
			<biblScope unit="volume">9</biblScope>
			<biblScope unit="page" from="4557" to="4573" />
			<date type="published" when="2016">2016. 2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b29">
	<monogr>
		<author>
			<persName><forename type="first">Alain</forename><forename type="middle">F</forename><surname>Zuur</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Elena</forename><forename type="middle">N</forename><surname>Ieno</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Graham</forename><forename type="middle">M</forename><surname>Smith</surname></persName>
		</author>
		<title level="m">Analysing Ecological Data</title>
				<meeting><address><addrLine>New York</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
