{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T10:02:37Z","timestamp":1764842557373,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":12,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811680618"},{"type":"electronic","value":"9789811680625"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-981-16-8062-5_6","type":"book-chapter","created":{"date-parts":[[2021,11,13]],"date-time":"2021-11-13T20:02:53Z","timestamp":1636833773000},"page":"89-104","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Improving ModSecurity WAF Using a Structured-Language Classifier"],"prefix":"10.1007","author":[{"given":"Tri-Chan-Hung","family":"Nguyen","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Minh-Khoi","family":"Le-Nguyen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Dinh-Thuan","family":"Le","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Van-Hoa","family":"Nguyen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Long-Phuoc","family":"T\u00f4n","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Khuong","family":"Nguyen-An","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2021,11,14]]},"reference":[{"key":"6_CR1","doi-asserted-by":"publisher","first-page":"548","DOI":"10.1016\/j.procs.2013.06.073","volume":"19","author":"A Boukhtouta","year":"2013","unstructured":"Boukhtouta, A., Lakhdari, N.-E., Mokhov, S.A., Debbabi, M.: Towards fingerprinting malicious traffic. Procedia Comput. Sci. 19, 548\u2013555 (2013)","journal-title":"Procedia Comput. Sci."},{"issue":"5","key":"6_CR2","doi-asserted-by":"publisher","first-page":"1452","DOI":"10.3390\/s20051452","volume":"20","author":"M Gao","year":"2020","unstructured":"Gao, M., Ma, L., Liu, H., Zhang, Z., Ning, Z., Xu, J.: Malicious network traffic detection based on deep neural networks and association analysis. Sensors 20(5), 1452 (2020)","journal-title":"Sensors"},{"doi-asserted-by":"crossref","unstructured":"Shinomiya, K., Goto, S.: Detecting malicious traffic through two-phase machine learning. In: Proceedings of the Asia-Pacific Advanced Network, vol. 40, p. 34 (2015)","key":"6_CR3","DOI":"10.7125\/40.6"},{"unstructured":"Radford, B.J., Apolonio, L.M., Trias, A.J., Simpson, J.A.: Network traffic anomaly detection using recurrent neural networks. CoRR, vol. abs\/1803.10769 (2018)","key":"6_CR4"},{"doi-asserted-by":"crossref","unstructured":"Mar\u00edn, G., Caasas, P., Capdehourat, G.: DeepMAL - deep learning models for malware traffic detection and classification. In: Data Science - Analytics and Applications, pp. 105\u2013112 (2021)","key":"6_CR5","DOI":"10.1007\/978-3-658-32182-6_16"},{"issue":"16","key":"6_CR6","doi-asserted-by":"publisher","first-page":"3414","DOI":"10.3390\/app9163414","volume":"9","author":"R-H Hwang","year":"2019","unstructured":"Hwang, R.-H., Peng, M.-C., Nguyen, V.-L., Chang, Y.-L.: An LSTM-based deep learning approach for classifying malicious traffic at the packet level. Appl. Sci. 9(16), 3414 (2019)","journal-title":"Appl. Sci."},{"unstructured":"Mikolov, T., Yih, W., Zweig, G.: Linguistic regularities in continuous space word representations. In: Human Language Technologies - Proceedings of the Conference of the North American Chapter, pp. 746\u2013751 (2013)","key":"6_CR7"},{"key":"6_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"828","DOI":"10.1007\/978-3-319-70139-4_84","volume-title":"Neural Information Processing","author":"M Zhang","year":"2017","unstructured":"Zhang, M., Xu, B., Bai, S., Lu, S., Lin, Z.: A deep learning method to detect web attacks using a specially designed CNN. In: Liu, D., Xie, S., Li, Y., Zhao, D., El-Alfy, E.-S.M. (eds.) ICONIP 2017. LNCS, vol. 10638, pp. 828\u2013836. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-70139-4_84"},{"doi-asserted-by":"crossref","unstructured":"Betarte, G., Gimenez, E., Martinez, R., Pardo, A.: Improving web application firewalls through anomaly detection. In: 17th IEEE International Conference on Machine Learning and Applications - ICMLA (2018)","key":"6_CR9","DOI":"10.1109\/ICMLA.2018.00124"},{"key":"6_CR10","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/978-981-33-4370-2_7","volume-title":"Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications","author":"N-T Tran","year":"2020","unstructured":"Tran, N.-T., Nguyen, V.-H., Nguyen-Le, T., Nguyen-An, K.: Improving ModSecurity WAF with machine learning methods. In: Dang, T.K., K\u00fcng, J., Takizawa, M., Chung, T.M. (eds.) FDSE 2020. CCIS, vol. 1306, pp. 93\u2013107. Springer, Singapore (2020). https:\/\/doi.org\/10.1007\/978-981-33-4370-2_7"},{"doi-asserted-by":"crossref","unstructured":"Pennington, J., Socher, R., Manning, C.: GloVe: global vectors for word representation. In: Proceedings of the Conference on Empirical Methods in Natural Language Processing - EMNLP (2014)","key":"6_CR11","DOI":"10.3115\/v1\/D14-1162"},{"unstructured":"Kingma, D.P., Ba, J.: Adam: a method for stochastic optimization. In: Proceedings of the 3rd International Conference on Learning Representations - ICLR (2015)","key":"6_CR12"}],"container-title":["Communications in Computer and Information Science","Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-16-8062-5_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,13]],"date-time":"2021-11-13T20:11:47Z","timestamp":1636834307000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-16-8062-5_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9789811680618","9789811680625"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-981-16-8062-5_6","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"14 November 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FDSE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Future Data and Security Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 November 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 November 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fdse2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/thefdse.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"168","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"52","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"31% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}