{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T20:07:27Z","timestamp":1742933247327,"version":"3.40.3"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319106618"},{"type":"electronic","value":"9783319106625"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-10662-5_35","type":"book-chapter","created":{"date-parts":[[2014,8,25]],"date-time":"2014-08-25T11:19:48Z","timestamp":1408965588000},"page":"285-292","source":"Crossref","is-referenced-by-count":1,"title":["Hardening Web Applications against SQL Injection Attacks Using Anomaly Detection Approach"],"prefix":"10.1007","author":[{"given":"Rafa\u0142","family":"Kozik","sequence":"first","affiliation":[]},{"given":"Micha\u0142","family":"Chora\u015b","sequence":"additional","affiliation":[]},{"given":"Witold","family":"Ho\u0142ubowicz","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"35_CR1","unstructured":"Sqlmap project homepage, \n                      http:\/\/sqlmap.org\/"},{"key":"35_CR2","unstructured":"OWASP Top 10 \u2013 2013, \n                      https:\/\/www.owasp.org\/index.php\/Top_10_2013-Top_10"},{"key":"35_CR3","unstructured":"Hakipedia project homepage, \n                      http:\/\/hakipedia.com\/index.php\/SQL_Injection"},{"key":"35_CR4","unstructured":"Source Code Analysis Tools, \n                      https:\/\/www.owasp.org\/index.php\/Source_Code_Analysis_Tools"},{"key":"35_CR5","unstructured":"PHP-IDS project homepage, \n                      https:\/\/phpids.org\/"},{"key":"35_CR6","unstructured":"Apache Scalp Project homepage, \n                      http:\/\/code.google.com\/p\/apache-scalp\/"},{"key":"35_CR7","unstructured":"National Vulnerability Database homepage, \n                      http:\/\/nvd.nist.gov\/"},{"key":"35_CR8","unstructured":"Snort project homepage, \n                      http:\/\/www.snort.org\/"},{"key":"35_CR9","unstructured":"Perl-compatible regular expressions (pcre), \n                      http:\/\/www.pcre.org"},{"key":"35_CR10","unstructured":"GBK char set, \n                      http:\/\/en.wikipedia.org\/wiki\/GBK#Encoding"},{"key":"35_CR11","doi-asserted-by":"crossref","unstructured":"Halfond, W.G., Orso, A.: AMNESIA: analysis and monitoring for NEutralizing SQL-injection attacks. In: Proceedings of the 20th IEEE\/ACM International Conference on Automated Software Engineering, pp. 174\u2013183. ACM (2005)","DOI":"10.1145\/1101908.1101935"},{"key":"35_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1007\/978-3-642-12002-2_13","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"F. Yu","year":"2010","unstructured":"Yu, F., Alkhalaf, M., Bultan, T.: Stranger: An automata-based string analysis tool for PHP. In: Esparza, J., Majumdar, R. (eds.) TACAS 2010. LNCS, vol.\u00a06015, pp. 154\u2013157. Springer, Heidelberg (2010)"},{"key":"35_CR13","doi-asserted-by":"crossref","unstructured":"Shar, L.K., Tan, H.B.K.: Predicting common web application vulnerabilities from input validation and sanitization code patterns. In: 2012 Proceedings of the 27th IEEE\/ACM International Conference on Automated Software Engineering (ASE), pp. 310\u2013313. IEEE (2012)","DOI":"10.1145\/2351676.2351733"}],"container-title":["Advances in Intelligent Systems and Computing","Image Processing &amp; Communications Challenges 6"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-10662-5_35","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,23]],"date-time":"2023-01-23T19:58:19Z","timestamp":1674503899000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-10662-5_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319106618","9783319106625"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-10662-5_35","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2015]]}}}