{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,2]],"date-time":"2025-06-02T11:28:13Z","timestamp":1748863693603,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642330179"},{"type":"electronic","value":"9783642330186"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-33018-6_18","type":"book-chapter","created":{"date-parts":[[2012,8,23]],"date-time":"2012-08-23T09:14:19Z","timestamp":1345713259000},"page":"177-185","source":"Crossref","is-referenced-by-count":19,"title":["Correlation Approach for SQL Injection Attacks Detection"],"prefix":"10.1007","author":[{"given":"Micha\u0142","family":"Chora\u015b","sequence":"first","affiliation":[]},{"given":"Rafa\u0142","family":"Kozik","sequence":"additional","affiliation":[]},{"given":"Damian","family":"Puchalski","sequence":"additional","affiliation":[]},{"given":"Witold","family":"Ho\u0142ubowicz","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1007\/978-3-642-24755-2_9","volume-title":"Towards a Service-Based Internet","author":"M. Chora\u015b","year":"2011","unstructured":"Chora\u015b, M., Kozik, R., Piotrowski, R., Brzostek, J., Ho\u0142ubowicz, W.: Network Events Correlation for Federated Networks Protection System. In: Abramowicz, W., Llorente, I.M., Surridge, M., Zisman, A., Vayssi\u00e8re, J. (eds.) ServiceWave 2011. LNCS, vol.\u00a06994, pp. 100\u2013111. Springer, Heidelberg (2011)"},{"issue":"1","key":"18_CR2","first-page":"16","volume":"2","author":"T.K. Rao","year":"2012","unstructured":"Rao, T.K., Kum, G.Y., Reddy, E.K., Sharma, M.: Major Issues of Web Applications: A Case Study of SQL Injection. Journal of Current Computer Science and Technology\u00a02(1), 16\u201320 (2012)","journal-title":"Journal of Current Computer Science and Technology"},{"key":"18_CR3","doi-asserted-by":"crossref","unstructured":"Halfond, W., Orso, A.: AMNESIA: Analysis and Monitoring for Neutralizing SQL-Injection Attacks. In: Proceedings of the 20th IEEEACM International Conference on Automated Software Engineering (2005)","DOI":"10.1145\/1101908.1101935"},{"key":"18_CR4","unstructured":"https:\/\/paulsparrows.wordpress.com\/2011-cyber-attacks-timeline-master-index\/"},{"key":"18_CR5","unstructured":"OWASP Top 10 \u2013 2010, The Ten Most Critical Web Application Security Risks (2010)"},{"key":"18_CR6","unstructured":"Royal Navy Website Attacked by Romanian Hacker (2008), \n                    http:\/\/www.bbc.co.uk\/news\/technology-11711478"},{"key":"18_CR7","unstructured":"Mills, E.: DSL Reports Says Member Information Stolen (2011)"},{"key":"18_CR8","unstructured":"Keizer, G.: Huge Web Hack Attack Infects 500,000 pages (2008)"},{"key":"18_CR9","doi-asserted-by":"crossref","unstructured":"Tajpour, A., JorJor Zade Shooshtari, M.: Evaluation of SQL Injection Detection and Prevention Techniques. In: CICSyN 2010 Second International Conference on Computational Intelligence, Communication Systems and Networks (2010)","DOI":"10.1109\/CICSyN.2010.55"},{"key":"18_CR10","doi-asserted-by":"crossref","unstructured":"Amirtahmasebi, K., Jalalinia, S.R., Khadem, S.: A Survey of SQL Injection Defense Mechanisms. In: ICITST International Conference for Internet Technology and Secured Transactions (2009)","DOI":"10.1109\/ICITST.2009.5402604"},{"key":"18_CR11","doi-asserted-by":"crossref","unstructured":"Elia, I.A., Fonseca, J., Vieira, M.: Comparing SQL Injection Detection Tools Using Attack Injection: An Experimental Study. In: 2010 IEEE 21st International Symposium on Software Reliability Engineering (2010)","DOI":"10.1109\/ISSRE.2010.32"},{"key":"18_CR12","doi-asserted-by":"crossref","unstructured":"Needleman, S.B., Wunsch, C.D.: A General Method Applicable to the Search for Similarities in the Amino Acid Sequence of Two Proteins. Journal of Molecular Biology (1970)","DOI":"10.1016\/0022-2836(70)90057-4"},{"key":"18_CR13","unstructured":"Conrad, E.: Detecting Spam with Genetic Regular Expressions. SANS Institute InfoSec Reading Room (2007)"},{"key":"18_CR14","doi-asserted-by":"crossref","unstructured":"Kruegel, C., Toth, T., Kirda, E.: Service specific anomaly detection for network intrusion detection. In: Proc. of ACM Symposium on Applied Computing, pp. 201\u2013208 (2002)","DOI":"10.1145\/508791.508835"}],"container-title":["Advances in Intelligent Systems and Computing","International Joint Conference CISIS\u201912-ICEUTE\u00b412-SOCO\u00b412 Special Sessions"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33018-6_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,17]],"date-time":"2023-02-17T11:47:15Z","timestamp":1676634435000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-33018-6_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642330179","9783642330186"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33018-6_18","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2013]]}}}