{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T21:53:05Z","timestamp":1725573185109},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540330523"},{"type":"electronic","value":"9783540330585"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11689522_23","type":"book-chapter","created":{"date-parts":[[2006,2,25]],"date-time":"2006-02-25T06:47:58Z","timestamp":1140850078000},"page":"248-259","source":"Crossref","is-referenced-by-count":0,"title":["A Design and Implementation of Profile Based Web Application Securing Proxy"],"prefix":"10.1007","author":[{"given":"Youngtae","family":"Yun","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Sangseo","family":"Park","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yosik","family":"Kim","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jaecheol","family":"Ryou","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"23_CR1","unstructured":"Turner, D., Entwisle, S., et al.: Semantec Internet Security Threat Report Volume VII. In: Semantec (March 2005)"},{"key":"23_CR2","unstructured":"http:\/\/www.theregister.co.uk\/2004\/12\/21\/santy_worm\/"},{"key":"23_CR3","unstructured":"http:\/\/isc.sans.org\/diary.php?date=2004-12-25"},{"key":"23_CR4","unstructured":"Williams, J.R., et al.: The Ten Most Critical Web Application Security Vulnerabilities. In: OWASP (2004)"},{"key":"23_CR5","unstructured":"Curphey, M., Scambray, J., Olson, E.: Improving Web Application Security: Threats and Countermeasures. Microsoft Corporation (2003)"},{"key":"23_CR6","unstructured":"Ristic, I.: Web Intrusion Detection with Mod_Security. In: OWASP AppSec Europe"},{"key":"23_CR7","unstructured":"Shah, S.: Defending Web Services using Mod Security(Apache). NetSquare (2004)"},{"key":"23_CR8","unstructured":"Barnett, R.C.: mod_security Web Intrusion Detection And Prevention. In: SANS (December 2003)"},{"key":"23_CR9","doi-asserted-by":"crossref","unstructured":"Scott, D., Sharp, R.: Abstracting Application-Level Web Security. In: Proc. of the World Wide Web Conference (2002)","DOI":"10.1145\/511446.511498"},{"key":"23_CR10","doi-asserted-by":"crossref","unstructured":"Huang, Y.W., et al.: Securing Web Application Code by static Analysis and Runtime Protection. In: Proc. of the World Wide Web Conference (May 2004)","DOI":"10.1145\/988672.988679"},{"key":"23_CR11","unstructured":"Benedikt, M., Freire, J., Godeproid, P.: VeriWeb: Automatically Testing Dynamic Web Sites. In: Proc. of the World Wide Web Conference (2002)"},{"key":"23_CR12","unstructured":"Curphey, M., Endler, D.: A Guide to Building Secure Web Applications. In: OWASP (September 2002)"},{"issue":"5","key":"23_CR13","doi-asserted-by":"publisher","first-page":"717","DOI":"10.1016\/j.comnet.2005.01.009","volume":"48","author":"C. Kruegel","year":"2005","unstructured":"Kruegel, C., Vigna, G., Robertson, W.: A multi-model approach to the detection of web-based attacks. Computer Networks\u00a048(5), 717\u2013738 (2005)","journal-title":"Computer Networks"},{"key":"23_CR14","unstructured":"Auger, R., Barnett, R.: Web Application Security Consortium: Threat Classification Version 1.0. Web Application Security Consortium (2004), \n                    \n                      http:\/\/www.webappsec.org"},{"key":"23_CR15","unstructured":"Segal, O.: Web Application Forensics: The unchatterd Territory. In: SANCTUM (2002)"},{"key":"23_CR16","unstructured":"Huseby, S.H.: Common Security Problems in the Code of Dynamic Web Applications. Web Application Security Consortium (June 2005), \n                    \n                      www.webappsec.org"},{"key":"23_CR17","unstructured":"BugTraq, \n                    \n                      http:\/\/www.securityfocus.com\/archive\/1"}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11689522_23.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:17:54Z","timestamp":1619507874000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11689522_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540330523","9783540330585"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/11689522_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}