{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T22:25:30Z","timestamp":1743114330734,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662452363"},{"type":"electronic","value":"9783662452370"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-45237-0_61","type":"book-chapter","created":{"date-parts":[[2014,10,25]],"date-time":"2014-10-25T10:37:20Z","timestamp":1414233440000},"page":"680-687","source":"Crossref","is-referenced-by-count":16,"title":["A Proposal of Algorithm for Web Applications Cyber Attack Detection"],"prefix":"10.1007","author":[{"given":"Rafa\u0142","family":"Kozik","sequence":"first","affiliation":[]},{"given":"Micha\u0142","family":"Chora\u015b","sequence":"additional","affiliation":[]},{"given":"Rafa\u0142","family":"Renk","sequence":"additional","affiliation":[]},{"given":"Witold","family":"Ho\u0142ubowicz","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"61_CR1","series-title":"LNCS (LNAI)","doi-asserted-by":"publisher","first-page":"671","DOI":"10.1007\/978-3-642-13022-9_67","volume-title":"Trends in Applied Intelligent Systems","author":"M. Chora\u015b","year":"2010","unstructured":"Chora\u015b, M., Kozik, R., Flizikowski, A., Ho\u0142ubowicz, W.: Ontology Applied in Decision Support System for Critical Infrastructures Protection. In: Garc\u00eda-Pedrajas, N., Herrera, F., Fyfe, C., Ben\u00edtez, J.M., Ali, M. (eds.) IEA\/AIE 2010, Part I. LNCS (LNAI), vol.\u00a06096, pp. 671\u2013680. Springer, Heidelberg (2010)"},{"key":"61_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1007\/978-3-642-24755-2_9","volume-title":"Towards a Service-Based Internet","author":"M. Chora\u015b","year":"2011","unstructured":"Chora\u015b, M., Kozik, R., Piotrowski, R., Brzostek, J., Ho\u0142ubowicz, W.: Network Events Correlation for Federated Networks Protection System. In: Abramowicz, W., Llorente, I.M., Surridge, M., Zisman, A., Vayssi\u00e8re, J. (eds.) ServiceWave 2011. LNCS, vol.\u00a06994, pp. 100\u2013111. Springer, Heidelberg (2011)"},{"key":"61_CR3","series-title":"CCIS","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1007\/978-3-642-27245-5_8","volume-title":"Computer Information Systems \u2013 Analysis and Technologies","author":"M. Chora\u015b","year":"2011","unstructured":"Chora\u015b, M., Kozik, R.: Network Event Correlation and Semantic Reasoning for Federated Networks Protection System. In: Chaki, N., Cortesi, A., et al. (eds.) CISIM 2011. CCIS, vol.\u00a0245, pp. 48\u201354. Springer, Heidelberg (2011)"},{"key":"61_CR4","unstructured":"OWASP Top 10 2010, The Ten Most Critical Web Application Security Risks (2010)"},{"key":"61_CR5","unstructured":"Application Vulnerability Trends Report, \n                    \n                      http:\/\/www.cenzic.com\/downloads\/Cenzic_Vulnerability_Report_2014.pdf"},{"key":"61_CR6","doi-asserted-by":"crossref","unstructured":"Shar, L., Tan, H.: Predicting common web application vulnerabilities from input validation and sanitization code patterns. In: 2012 Proceedings of the 27th IEEE\/ACM International Conference on Automated Software Engineering (ASE), IEEE (2012)","DOI":"10.1145\/2351676.2351733"},{"key":"61_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1007\/978-3-642-12002-2_13","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"F. Yu","year":"2010","unstructured":"Yu, F., Alkhalaf, M., Bultan, T.: Stranger: An automata-based string analysis tool for PHP. In: Esparza, J., Majumdar, R. (eds.) TACAS 2010. LNCS, vol.\u00a06015, pp. 154\u2013157. Springer, Heidelberg (2010)"},{"key":"61_CR8","doi-asserted-by":"crossref","unstructured":"Halfond, W.G.J., Orso, A.: AMNESIA: Analysis and monitoring for NEutralizing SQL-injection attacks. In: Proceedings of the 20th IEEE\/ACM International Conference on Automated Software Engineering. ACM (2005)","DOI":"10.1145\/1101908.1101935"},{"key":"61_CR9","unstructured":"Source Code Analysis Tools, \n                    \n                      https:\/\/www.owasp.org\/index.php\/Source_Code_Analysis_Tools"},{"key":"61_CR10","unstructured":"PHP-IDS project homepage, \n                    \n                      https:\/\/phpids.org\/"},{"key":"61_CR11","unstructured":"Apache Scalp Project homepage, \n                    \n                      http:\/\/code.google.com\/p\/apache-scalp\/"},{"key":"61_CR12","unstructured":"Snort project homepage, \n                    \n                      http:\/\/www.snort.org\/"},{"key":"61_CR13","unstructured":"Perl-compatible regular expressions (pcre), \n                    \n                      http:\/\/www.pcre.org"},{"key":"61_CR14","unstructured":"LZW algorithm, \n                    \n                      http:\/\/en.wikipedia.org\/wiki\/LempelZivWelch"},{"key":"61_CR15","unstructured":"CSIC 2010 HTTP Dataset (2010), \n                    \n                      http:\/\/users.aber.ac.uk\/pds7\/csic_dataset\/csic2010http.html"},{"key":"61_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/978-3-642-21323-6_4","volume-title":"Computational Intelligence in Security for Information Systems","author":"H.T. Nguyen","year":"2011","unstructured":"Nguyen, H.T., Torrano-Gimenez, C., Alvarez, G., Petrovi\u0107, S., Franke, K.: Application of the Generic Feature Selection Measure in Detection of Web Attacks. In: Herrero, \u00c1., Corchado, E. (eds.) CISIS 2011. LNCS, vol.\u00a06694, pp. 25\u201332. Springer, Heidelberg (2011)"},{"key":"61_CR17","unstructured":"WEKA tool. ROC curve generation, \n                    \n                      http:\/\/weka.wikispaces.com\/ROC+curves"}],"container-title":["Lecture Notes in Computer Science","Computer Information Systems and Industrial Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-45237-0_61","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,28]],"date-time":"2019-05-28T05:16:47Z","timestamp":1559020607000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-45237-0_61"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783662452363","9783662452370"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-45237-0_61","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}