{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,9]],"date-time":"2025-05-09T16:31:46Z","timestamp":1746808306360,"version":"3.40.5"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319079943"},{"type":"electronic","value":"9783319079950"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-07995-0_52","type":"book-chapter","created":{"date-parts":[[2014,6,10]],"date-time":"2014-06-10T19:24:31Z","timestamp":1402428271000},"page":"527-535","source":"Crossref","is-referenced-by-count":12,"title":["Modelling HTTP Requests with Regular Expressions for Detection of Cyber Attacks Targeted at Web Applications"],"prefix":"10.1007","author":[{"given":"Rafa\u0142","family":"Kozik","sequence":"first","affiliation":[]},{"given":"Micha\u0142","family":"Chora\u015b","sequence":"additional","affiliation":[]},{"given":"Rafa\u0142","family":"Renk","sequence":"additional","affiliation":[]},{"given":"Witold","family":"Ho\u0142ubowicz","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"52_CR1","series-title":"AISC","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1007\/978-3-642-33018-6_18","volume-title":"International Joint Conference CISIS\u201912-ICEUTE\u00b412-SOCO\u00b412 Special Sessions","author":"M. Chora\u015b","year":"2013","unstructured":"Chora\u015b, M., Kozik, R., Puchalski, D., Ho\u0142ubowicz, W.: Correlation Approach for SQL Injection Attacks Detection. In: Herrero, \u00c1., Sn\u00e1\u0161el, V., Abraham, A., Zelinka, I., Baruque, B., Quinti\u00e1n, H., Calvo, J.L., Sedano, J., Corchado, E., et al. (eds.) Int. Joint Conf. CISIS\u201912-ICEUTE\u201912-SOCO\u201912. AISC, vol.\u00a0189, pp. 177\u2013185. Springer, Heidelberg (2013)"},{"key":"52_CR2","series-title":"AISC","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/978-3-319-00930-8_23","volume-title":"Soft Computing in Industrial Applications","author":"M. Chora\u015b","year":"2013","unstructured":"Chora\u015b, M., Kozik, R.: Real-Time Analysis of Non-stationary and Complex Network Related Data for Injection Attempts Detection. In: Snasel, V., et al. (eds.) Soft Computing in Industrial Applications. AISC, vol.\u00a0223, pp. 257\u2013264. Springer, Heidelberg (2013)"},{"key":"52_CR3","series-title":"AISC","first-page":"751","volume-title":"Proceedings of the 8th International Conference on Computer Recognition Systems CORES 2013","author":"M. Chora\u015b","year":"2013","unstructured":"Chora\u015b, M., Kozik, R.: Evaluation of Various Techniques for SQL Injection Attack Detection. In: Burduk, R., Jackowski, K., Kurzynski, M., Wozniak, M., Zolnierek, A., et al. (eds.) CORES 2013. AISC, vol.\u00a0226, pp. 751\u2013760. Springer, Heidelberg (2013)"},{"key":"52_CR4","series-title":"AISC","first-page":"385","volume-title":"Image Processing and Communications Challenges 5","author":"R. Kozik","year":"2014","unstructured":"Kozik, R., Chora\u015b, M.: Machine Learning Techniques for Cyber Attacks Detection. In: Choras, R.S. (ed.) Image Processing and Communications Challenges 5. AISC, vol.\u00a0233, pp. 385\u2013392. Springer, Heidelberg (2014)"},{"key":"52_CR5","doi-asserted-by":"crossref","unstructured":"Needleman Saul, B., Wunsch Christian, D.: A general method applicable to the search for similarities in the amino acid sequence of two proteins. Journal of Molecular Biology\u00a048 (1970)","DOI":"10.1016\/0022-2836(70)90057-4"},{"key":"52_CR6","doi-asserted-by":"crossref","unstructured":"Kruegel, C., Toth, T., Kirda, E.: Service specific anomaly detection for network intrusion detection. In: Proc. of ACM Symposium on Applied Computing, pp. 201\u2013208 (2002)","DOI":"10.1145\/508791.508835"},{"key":"52_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/978-3-642-21323-6_4","volume-title":"Computational Intelligence in Security for Information Systems","author":"H.T. Nguyen","year":"2011","unstructured":"Nguyen, H.T., Torrano-Gimenez, C., Alvarez, G., Petrovi\u0107, S., Franke, K.: Application of the Generic Feature Selection Measure in Detection of Web Attacks. In: Herrero, \u00c1., Corchado, E. (eds.) CISIS 2011. LNCS, vol.\u00a06694, pp. 25\u201332. Springer, Heidelberg (2011)"},{"key":"52_CR8","doi-asserted-by":"crossref","unstructured":"Felzenszwalb, P.F., Huttenlocher, D.P.: Efficient Graph-Based Image Segmentation. International Journal of Computer Vision\u00a059(2) (September 2004)","DOI":"10.1023\/B:VISI.0000022288.19776.77"},{"issue":"1","key":"52_CR9","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1016\/j.future.2010.12.017","volume":"29","author":"A. Herrero","year":"2013","unstructured":"Herrero, A., Navarro, M., Corchado, E., Juli\u00e1n, V.: RT-MOVICAB-IDS: Addressing real-time intrusion detection. Future Generation Comp. Syst.\u00a029(1), 250\u2013261 (2013)","journal-title":"Future Generation Comp. Syst."},{"key":"52_CR10","unstructured":"SNORT. Project homepage, \n                  \n                    http:\/\/www.snort.org\/"},{"key":"52_CR11","unstructured":"SCALP. Project homepage, \n                  \n                    http:\/\/code.google.com\/p\/apache-scalp\/"},{"key":"52_CR12","unstructured":"PHPIDS. Project homepage, \n                  \n                    https:\/\/phpids.org\/"},{"key":"52_CR13","unstructured":"CSIC 2010 Dataset. Project homepage, \n                  \n                    http:\/\/iec.csic.es\/dataset\/"}],"container-title":["Advances in Intelligent Systems and Computing","International Joint Conference SOCO\u201914-CISIS\u201914-ICEUTE\u201914"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-07995-0_52","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,26]],"date-time":"2019-05-26T21:09:05Z","timestamp":1558904945000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-07995-0_52"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319079943","9783319079950"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-07995-0_52","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2014]]}}}