{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,12]],"date-time":"2025-06-12T04:15:01Z","timestamp":1749701701516,"version":"3.41.0"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319472737"},{"type":"electronic","value":"9783319472744"}],"license":[{"start":{"date-parts":[[2016,10,28]],"date-time":"2016-10-28T00:00:00Z","timestamp":1477612800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-47274-4_27","type":"book-chapter","created":{"date-parts":[[2016,10,27]],"date-time":"2016-10-27T13:33:17Z","timestamp":1477575197000},"page":"226-233","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Extreme Learning Machines for Web Layer Anomaly Detection"],"prefix":"10.1007","author":[{"given":"Rafa\u0142","family":"Kozik","sequence":"first","affiliation":[]},{"given":"Micha\u0142","family":"Chora\u015b","sequence":"additional","affiliation":[]},{"given":"Witold","family":"Ho\u0142ubowicz","sequence":"additional","affiliation":[]},{"given":"Rafa\u0142","family":"Renk","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,28]]},"reference":[{"unstructured":"Owasp top 10 2013 (2016). https:\/\/code.google.com\/p\/apache-scalp\/","key":"27_CR1"},{"unstructured":"Gim\u00e9nez, C.T., Villegas, A.P., Mara\u00f1\u00f3n, G.\u00c1.: The http dataset CSIC 2010 (2010). http:\/\/users.aber.ac.uk\/pds7\/csic_dataset\/csic2010http.html","key":"27_CR2"},{"key":"27_CR3","doi-asserted-by":"publisher","first-page":"753","DOI":"10.1007\/978-3-319-00969-8_74","volume-title":"Proceedings of the 8th International Conference on Computer Recognition Systems CORES 2013","author":"M Chora\u015b","year":"2013","unstructured":"Chora\u015b, M., Kozik, R.: Evaluation of various techniques for SQL injection attack detection. In: Burduk, R., Jackowski, K., Kurzynski, M., Wozniak, M., Zolnierek, A. (eds.) Proceedings of the 8th International Conference on Computer Recognition Systems CORES 2013, vol. 226, pp. 753\u2013762. Springer, Switzerland (2013)"},{"unstructured":"Apache Community: Apache log analyzer for security (2016). https:\/\/code.google.com\/p\/apache-scalp\/","key":"27_CR4"},{"unstructured":"Damele, B., Stampar, M.: SQLMap: automatic SQL injection and database takeover tool (2015)","key":"27_CR5"},{"doi-asserted-by":"crossref","unstructured":"Gaikwad, S., Bogiri, N.: Levenshtein distance algorithm for efficient and effective XML duplicate detection. In: 2015 International Conference on Computer, Communication and Control (IC4), pp. 1\u20135. IEEE (2015)","key":"27_CR6","DOI":"10.1109\/IC4.2015.7375698"},{"doi-asserted-by":"crossref","unstructured":"Huang, G.B., Zhu, Q.Y., Siew, C.K.: Extreme learning machine: a new learning scheme of feedforward neural networks. In: Proceedings of 2004 IEEE International Joint Conference on Neural Networks, vol. 2, pp. 985\u2013990. IEEE (2004)","key":"27_CR7","DOI":"10.1109\/IJCNN.2004.1380068"},{"issue":"1","key":"27_CR8","doi-asserted-by":"publisher","first-page":"489","DOI":"10.1016\/j.neucom.2005.12.126","volume":"70","author":"GB Huang","year":"2006","unstructured":"Huang, G.B., Zhu, Q.Y., Siew, C.K.: Extreme learning machine: theory and applications. Neurocomputing 70(1), 489\u2013501 (2006)","journal-title":"Neurocomputing"},{"key":"27_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1007\/978-3-540-74320-0_3","volume-title":"Recent Advances in Intrusion Detection","author":"KL Ingham","year":"2007","unstructured":"Ingham, K.L., Inoue, H.: Comparing anomaly detection techniques for HTTP. In: Kruegel, C., Lippmann, R., Clark, A. (eds.) RAID 2007. LNCS, vol. 4637, pp. 42\u201362. Springer, Heidelberg (2007). doi: 10.1007\/978-3-540-74320-0_3"},{"key":"27_CR10","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1007\/978-3-319-32034-2_37","volume-title":"Hybrid Artificial Intelligent Systems","author":"R Kozik","year":"2016","unstructured":"Kozik, R., Chora\u015b, M.: Solution to data imbalance problem in application layer anomaly detection systems. In: Mart\u00ednez-\u00c1lvarez, F., Troncoso, A., Quinti\u00e1n, H., Corchado, E. (eds.) HAIS 2016. LNCS (LNAI), vol. 9648, pp. 441\u2013450. Springer, Heidelberg (2016). doi: 10.1007\/978-3-319-32034-2_37"},{"unstructured":"OWASP: project homepage (2016). https:\/\/www.owasp.org\/index.php","key":"27_CR11"},{"unstructured":"PCRE: perl compatible regular expressions (2016). http:\/\/www.pcre.org\/","key":"27_CR12"},{"unstructured":"PHPIDS: project homepage (2016). https:\/\/github.com\/PHPIDS\/PHPIDS","key":"27_CR13"},{"unstructured":"SNORT: project homepage (2016). http:\/\/www.snort.org\/","key":"27_CR14"},{"unstructured":"Owasp Team: Owasp zed attack proxy project (2016). https:\/\/www.owasp.org\/index.php","key":"27_CR15"},{"unstructured":"TripWire: the talktalk breach (2016). http:\/\/www.tripwire.com\/state-of-security\/security-data-protection\/cyber-security\/the-talktalk-breach-timeline-of-a-hack\/","key":"27_CR16"},{"doi-asserted-by":"crossref","unstructured":"Wang, N., Han, J., Fang, J.: An anomaly detection algorithm based on lossless compression. In: 2012 IEEE 7th International Conference on Networking, Architecture and Storage (NAS), pp. 31\u201338. IEEE (2012)","key":"27_CR17","DOI":"10.1109\/NAS.2012.8"},{"unstructured":"PC World: Havex malware variants target industrial control system and scada users (2016). http:\/\/www.pcworld.com\/article\/2367240\/new-havex-malware-variants-target-industrial-control-system-and-scada-users.html","key":"27_CR18"}],"container-title":["Advances in Intelligent Systems and Computing","Image Processing and Communications Challenges 8"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-47274-4_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,11]],"date-time":"2025-06-11T21:55:11Z","timestamp":1749678911000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-47274-4_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,28]]},"ISBN":["9783319472737","9783319472744"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-47274-4_27","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2016,10,28]]},"assertion":[{"value":"28 October 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IP&C","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Image Processing and Communications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bydgoszcz","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 September 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 September 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icipc2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}