{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,8]],"date-time":"2026-05-08T22:18:31Z","timestamp":1778278711575,"version":"3.51.4"},"publisher-location":"Singapore","reference-count":60,"publisher":"Springer Singapore","isbn-type":[{"value":"9789813349216","type":"print"},{"value":"9789813349223","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2021,1,19]],"date-time":"2021-01-19T00:00:00Z","timestamp":1611014400000},"content-version":"vor","delay-in-days":384,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Hypertext Transfer Protocol (HTTP) accounts for a large portion of Internet application-layer traffic. Since the payload of HTTP traffic can record website status and user request information, many studies use HTTP protocol traffic for web application attack detection. In this work, we propose DeepHTTP, an HTTP traffic detection framework based on deep learning. Unlike previous studies, this framework not only performs malicious traffic detection but also uses the deep learning model to mine malicious fields of the traffic payload. The detection model is called AT-Bi-LSTM, which is based on Bidirectional Long Short-Term Memory (Bi-LSTM) with attention mechanism. The attention mechanism can improve the discriminative ability and make the result interpretable. To enhance the generalization ability of the model, this paper proposes a novel feature extraction method. Experiments show that DeepHTTP has an excellent performance in malicious traffic discrimination and pattern mining.<\/jats:p>","DOI":"10.1007\/978-981-33-4922-3_11","type":"book-chapter","created":{"date-parts":[[2021,1,18]],"date-time":"2021-01-18T11:21:04Z","timestamp":1610968864000},"page":"141-161","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["DeepHTTP: Anomalous HTTP Traffic Detection and Malicious Pattern Mining Based on Deep Learning"],"prefix":"10.1007","author":[{"given":"Yuqi","family":"Yu","sequence":"first","affiliation":[]},{"given":"Hanbing","family":"Yan","sequence":"additional","affiliation":[]},{"given":"Yuan","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Hao","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Hongchao","family":"Guan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,19]]},"reference":[{"key":"11_CR1","unstructured":"China Internet Network Security Report. https:\/\/www.cert.org.cn\/publish\/main\/upload\/File\/2019-year.pdf"},{"issue":"2","key":"11_CR2","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1016\/j.comnet.2003.12.016","volume":"45","author":"JM Est\u00e9vez-Tapiador","year":"2004","unstructured":"Est\u00e9vez-Tapiador, J.M., Garc\u00eda-Teodoro, P., et al.: Measuring normality in HTTP traffic for anomaly-based intrusion detection. Comput. Netw. 45(2), 175\u2013193 (2004)","journal-title":"Comput. Netw."},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"Jamdagni, A., Tan, Z., Nanda, P., He, X., Liu, R.P.: Intrusion detection using GSAD model for HTTP traffic on web services. In: Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, pp. 1193\u20131197. ACM (2010)","DOI":"10.1145\/1815396.1815669"},{"key":"11_CR4","unstructured":"Tombini, E., Debar, H., M\u00e9, L., Ducass\u00e9, M.: A serial combination of anomaly and misuse IDSes applied to HTTP traffic. In: Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC), pp. 428\u2013437. IEEE Computer Society, Washington, DC, USA (2004)"},{"key":"11_CR5","unstructured":"w3techs Homepage. https:\/\/w3techs.com\/technologies\/details\/ce-httpsdefault. Accessed 21 Jan 2020"},{"key":"11_CR6","unstructured":"Tony Messer\u2019s blog published in Pickaweb. https:\/\/www.pickaweb.co.uk\/blog\/local-business-seo-stats-chart-and-infographic\/"},{"key":"11_CR7","unstructured":"Le, H., et al.: URLNet: learning a URL representation with deep learning for malicious URL detection. arXiv preprint arXiv:1802.03162 (2018)"},{"key":"11_CR8","unstructured":"Saxe, J., Berlin, K.: eXpose: a character-level convolutional neural network with embeddings for detecting malicious URLs, file paths and registry keys. arXiv preprint arXiv:1702.08568 (2017)"},{"key":"11_CR9","doi-asserted-by":"crossref","unstructured":"Sundermeyer, M., Schl\u00fcter, R., Ney, H.: LSTM neural networks for language modeling. In: Proceedings of INTERSPEECH, pp. 601\u2013608 (2012)","DOI":"10.21437\/Interspeech.2012-65"},{"key":"11_CR10","unstructured":"Bahdanau, D., Cho, K., Bengio, Y.: Neural machine translation by jointly learning to align and translate. arXiv preprint arXiv:1409.0473 (2014)"},{"issue":"4","key":"11_CR11","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1145\/1090191.1080118","volume":"35","author":"A Lakhina","year":"2005","unstructured":"Lakhina, A., Crovella, M., Diot, C.: Mining anomalies using traffic feature distributions. SIGCOMM Comput. Commun. Rev. 35(4), 217\u2013228 (2005)","journal-title":"SIGCOMM Comput. Commun. Rev."},{"issue":"4","key":"11_CR12","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1111\/0885-9507.00188","volume":"15","author":"A Samant","year":"2010","unstructured":"Samant, A., Adeli, H.: Feature extraction for traffic incident detection using wavelet transform and linear discriminant analysis. Comput.-Aided Civil Infrastruct. Eng. 15(4), 241\u2013250 (2010)","journal-title":"Comput.-Aided Civil Infrastruct. Eng."},{"key":"11_CR13","doi-asserted-by":"publisher","first-page":"330","DOI":"10.1016\/j.eswa.2016.07.036","volume":"64","author":"M Swarnkar","year":"2016","unstructured":"Swarnkar, M., Hubballi, N.: OCPAD: one class Naive Bayes classifier for payload based anomaly detection. Expert Syst. Appl. 64, 330\u2013339 (2016)","journal-title":"Expert Syst. Appl."},{"key":"11_CR14","unstructured":"Nelms, T., Perdisci, R., Ahamad, M.: Execscent: mining for new C&C domains in live networks with adaptive control protocol templates. Presented as part of the 22nd {USENIX} Security Symposium ({USENIX} Security 2013), pp. 589\u2013604 (2013)"},{"key":"11_CR15","doi-asserted-by":"crossref","unstructured":"Ma, J., Saul, L.K., Savage, S., et al.: Beyond blacklists: learning to detect malicious web sites from suspicious URLs. In: Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1245\u20131254. ACM (2009)","DOI":"10.1145\/1557019.1557153"},{"key":"11_CR16","doi-asserted-by":"crossref","unstructured":"Ma, J., Saul, L.K., Savage, S., et al.: Identifying suspicious URLs: an application of large-scale online learning. In: Proceedings of the 26th Annual International Conference on Machine Learning, pp. 681\u2013688. ACM (2009)","DOI":"10.1145\/1553374.1553462"},{"key":"11_CR17","doi-asserted-by":"crossref","unstructured":"Bortolameotti, R., van Ede, T., et al.: DECANTeR: DEteCtion of anomalous outbouNd HTTP TRaffic by passive application fingerprinting. In: Proceedings of the 33rd Annual Computer Security Applications Conference (ACSAC 2017), pp. 373\u2013386. ACM, New York (2017)","DOI":"10.1145\/3134600.3134605"},{"key":"11_CR18","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.comnet.2015.07.019","volume":"91","author":"A Juvonen","year":"2015","unstructured":"Juvonen, A., Sipola, T., H\u00e4m\u00e4l\u00e4inen, T.: Online anomaly detection using dimensionality reduction techniques for HTTP log analysis. Comput. Netw. 91, 46\u201356 (2015)","journal-title":"Comput. Netw."},{"issue":"1","key":"11_CR19","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1145\/1269899.1254895","volume":"35","author":"H Ringberg","year":"2007","unstructured":"Ringberg, H., Soule, A., et al.: Sensitivity of PCA for traffic anomaly detection. SIGMETRICS Perform. Eval. Rev. 35(1), 109\u2013120 (2007)","journal-title":"SIGMETRICS Perform. Eval. Rev."},{"key":"11_CR20","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1016\/j.procs.2014.07.037","volume":"34","author":"ESM El-Alfy","year":"2014","unstructured":"El-Alfy, E.S.M., Al-Obeidat, F.N.: A multicriterion fuzzy classification method with greedy attribute selection for anomaly-based intrusion detection. Procedia Comput. Sci. 34, 55\u201362 (2014)","journal-title":"Procedia Comput. Sci."},{"issue":"2","key":"11_CR21","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1016\/j.comnet.2003.12.016","volume":"45","author":"JM Est\u00e9vez-Tapiador","year":"2004","unstructured":"Est\u00e9vez-Tapiador, J.M., et al.: Measuring normality in HTTP traffic for anomaly-based intrusion detection. Comput. Netw. 45(2), 175\u2013193 (2004)","journal-title":"Comput. Netw."},{"key":"11_CR22","doi-asserted-by":"crossref","unstructured":"Mahoney, M.V., Chan, P.K.: Learning rules for anomaly detection of hostile network traffic. In: Third IEEE International Conference on Data Mining, pp. 601\u2013604 (2003)","DOI":"10.1109\/ICDM.2003.1250987"},{"key":"11_CR23","unstructured":"Radford, B.J., Apolonio, L.M., et al.: Network Traffic Anomaly Detection Using Recurrent Neural Networks. CoRR abs\/1803.10769 (2018)"},{"key":"11_CR24","doi-asserted-by":"crossref","unstructured":"Du, M., Li, F., et al.: DeepLog: anomaly detection and diagnosis from system logs through deep learning. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (CCS 2017), pp. 1285\u20131298. ACM, New York (2017)","DOI":"10.1145\/3133956.3134015"},{"key":"11_CR25","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1016\/j.patcog.2016.03.028","volume":"58","author":"SM Erfani","year":"2016","unstructured":"Erfani, S.M., et al.: High-dimensional and large-scale anomaly detection using a linear one-class SVM with deep learning. Pattern Recogn. 58, 121\u2013134 (2016)","journal-title":"Pattern Recogn."},{"issue":"9","key":"11_CR26","doi-asserted-by":"publisher","first-page":"1757","DOI":"10.1007\/s00500-013-1218-0","volume":"18","author":"T-W Chiou","year":"2014","unstructured":"Chiou, T.-W., Tsai, S.-C., Lin, Y.-B.: Network security management with traffic pattern clustering. Soft Comput. 18(9), 1757\u20131770 (2014)","journal-title":"Soft Comput."},{"key":"11_CR27","doi-asserted-by":"crossref","unstructured":"Le, T.T., Millaire, A., Asseman, P., De, G.P., ThA\u010cA\u013ery, C., Ducloux, G.: Novel approach for network traffic pattern analysis using clustering based collective anomaly detection. Ann. Data Sci. 2(1), 111\u2013130 (2015)","DOI":"10.1007\/s40745-015-0035-y"},{"key":"11_CR28","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1007\/978-3-319-23802-9_17","volume-title":"International Conference on Security and Privacy in Communication Networks","author":"M Ahmed","year":"2015","unstructured":"Ahmed, M., Mahmood, A.N.: Network traffic pattern analysis using improved information theoretic co-clustering based collective anomaly detection. In: Tian, J., Jing, J., Srivatsa, M. (eds.) SecureComm 2014. LNICST, vol. 153, pp. 204\u2013219. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-23802-9_17"},{"key":"11_CR29","unstructured":"Ren, J.T., Ou, X.L., Zhang, Y., Hu, D.C.: Research on network-level traffic pattern recognition. In: Proceedings of the IEEE 5th International Conference on Intelligent Transportation Systems, pp. 500\u2013504 (2002)"},{"key":"11_CR30","doi-asserted-by":"crossref","unstructured":"Paredes-Oliva, I., Castell-Uroz, I., Barlet-Ros, P., Dimitropoulos, X., SolA\u013e-Pareta, J.: Practical anomaly detection based on classifying frequent traffic patterns. In: 2012 Proceedings IEEE INFOCOM Workshops, pp. 49\u201354 (2012)","DOI":"10.1109\/INFCOMW.2012.6193518"},{"key":"11_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1007\/978-3-642-41284-4_8","volume-title":"Research in Attacks, Intrusions, and Defenses","author":"MZ Rafique","year":"2013","unstructured":"Rafique, M.Z., Caballero, J.: FIRMA: malware clustering and network signature generation with mixed network behaviors. In: Stolfo, S.J., Stavrou, A., Wright, C.V. (eds.) RAID 2013. LNCS, vol. 8145, pp. 144\u2013163. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-41284-4_8"},{"key":"11_CR32","unstructured":"Nelms, T., Perdisci, R., et al.: ExecScent: mining for new C&C domains in live networks with adaptive control protocol templates. In: Presented as part of the 22nd USENIX Security Symposium (2013), pp. 589\u2013604. USENIX, Washington, D.C. (2013)"},{"key":"11_CR33","unstructured":"Xu, K., Ba, J., Kiros, R., et al.: Show, attend and tell: neural image caption generation with visual attention. In: International Conference on Machine Learning, pp. 2048\u20132057 (2015)"},{"key":"11_CR34","unstructured":"Chorowski, J.K., Bahdanau, D., et al.: Attention-based models for speech recognition. In: Advances in Neural Information Processing Systems, pp. 577\u2013585 (2015)"},{"key":"11_CR35","doi-asserted-by":"crossref","unstructured":"Ma, F., Chitta, R., Zhou, J., et al.: Dipole: diagnosis prediction in healthcare via attention-based bidirectional recurrent neural networks. In: Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1903\u20131911. ACM (2017)","DOI":"10.1145\/3097983.3098088"},{"key":"11_CR36","doi-asserted-by":"crossref","unstructured":"Luong, M.T., Pham, H., Manning, C.D.: Effective approaches to attention-based neural machine translation. arXiv preprint arXiv:1508.04025 (2015)","DOI":"10.18653\/v1\/D15-1166"},{"key":"11_CR37","doi-asserted-by":"crossref","unstructured":"Zhou, P., Shi, W., Tian, J., et al.: Attention-based bidirectional long short-term memory networks for relation classification. In: Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics (vol. 2: Short Papers), pp. 207\u2013212 (2016)","DOI":"10.18653\/v1\/P16-2034"},{"key":"11_CR38","doi-asserted-by":"crossref","unstructured":"Ren, P., Chen, Z., Ren, Z., et al.: Leveraging contextual sentence relations for extractive summarization using a neural attention model. In: Proceedings of the 40th International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 95\u2013104 (2017)","DOI":"10.1145\/3077136.3080792"},{"key":"11_CR39","doi-asserted-by":"publisher","first-page":"75268","DOI":"10.1109\/ACCESS.2018.2882517","volume":"6","author":"H Zhang","year":"2018","unstructured":"Zhang, H., et al.: Webshell traffic detection with character-level features based on deep learning. IEEE Access 6, 75268\u201375277 (2018)","journal-title":"IEEE Access"},{"key":"11_CR40","unstructured":"Kali Official Website. https:\/\/www.kali.org\/. Accessed 21 Jan 2020"},{"key":"11_CR41","unstructured":"Chinotec Technologies Company: Paros - for web application security assessment. http:\/\/www.parosproxy.org\/index.shtml. Accessed 21 Jan 2020"},{"key":"11_CR42","unstructured":"Riancho, A.: Web Application Attack and Audit Framework. http:\/\/w3af.sourceforge.net. Accessed 21 Jan 2020"},{"issue":"5199","key":"11_CR43","doi-asserted-by":"publisher","first-page":"843","DOI":"10.1126\/science.267.5199.843","volume":"267","author":"M Damashek","year":"1995","unstructured":"Damashek, M.: Gauging similarity with n-grams: language-independent categorization of text. Science 267(5199), 843\u2013848 (1995)","journal-title":"Science"},{"key":"11_CR44","doi-asserted-by":"crossref","unstructured":"Kloft, M., Brefeld, U., D\u00fcessel, P., Gehl, C., Laskov, P.: Automatic feature selection for anomaly detection. In: Proceedings of the 1st ACM Workshop on Workshop on AISec (AISec 2008), pp. 71\u201376. ACM, New York (2008)","DOI":"10.1145\/1456377.1456395"},{"key":"11_CR45","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1007\/978-3-540-30143-1_11","volume-title":"Recent Advances in Intrusion Detection","author":"K Wang","year":"2004","unstructured":"Wang, K., Stolfo, S.J.: Anomalous payload-based network intrusion detection. In: Jonsson, E., Valdes, A., Almgren, M. (eds.) RAID 2004. LNCS, vol. 3224, pp. 203\u2013222. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-30143-1_11"},{"key":"11_CR46","doi-asserted-by":"crossref","unstructured":"Zolotukhin, M., HA\u010fmA\u010flA\u010finen, T., Kokkonen, T., Siltanen, J.: Analysis of HTTP requests for anomaly detection of web attacks. In: 2014 IEEE 12th International Conference on Dependable, Autonomic and Secure Computing, pp. 406\u2013411 (2014)","DOI":"10.1109\/DASC.2014.79"},{"key":"11_CR47","unstructured":"hashID, a tool written in Python 3. https:\/\/github.com\/psypanda\/hashID"},{"key":"11_CR48","unstructured":"Joachims, T.: A probabilistic analysis of the Rocchio algorithm with TFIDF for text categorization. In: Proceedings of International Conference on Machine Learning, pp. 143\u2013151 (1996)"},{"key":"11_CR49","unstructured":"Ester, M., Kriegel, H.P., Sander, J., et al.: A density-based algorithm for discovering clusters in large spatial databases with noise. In: KDD, vol. 96, no. 34, pp. 226\u2013231 (1996)"},{"key":"11_CR50","unstructured":"Le, Q., Mikolov, T.: Distributed representations of sentences and documents. In: International Conference on Machine Learning (2014)"},{"issue":"3","key":"11_CR51","first-page":"273","volume":"20","author":"C Cortes","year":"1995","unstructured":"Cortes, C., Vapnik, V.: Support-vector networks. Mach. Learn. 20(3), 273\u2013297 (1995)","journal-title":"Mach. Learn."},{"key":"11_CR52","unstructured":"Ho, T.K.: Random decision forests. In: Proceedings of 3rd International Conference on Document Analysis and Recognition, vol. 1. IEEE (1995)"},{"key":"11_CR53","doi-asserted-by":"crossref","unstructured":"Chen, T., Guestrin, C.: Xgboost: a scalable tree boosting system. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM (2016)","DOI":"10.1145\/2939672.2939785"},{"issue":"1","key":"11_CR54","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1109\/72.554195","volume":"8","author":"S Lawrence","year":"1997","unstructured":"Lawrence, S., Giles, C.L., Tsoi, A.C., Back, A.D.: Face recognition: a convolutional neural-network approach. IEEE Trans. Neural Netw. 8(1), 98\u2013113 (1997)","journal-title":"IEEE Trans. Neural Netw."},{"issue":"6088","key":"11_CR55","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1038\/323533a0","volume":"323","author":"DE Rumelhart","year":"1986","unstructured":"Rumelhart, D.E., Hinton, G.E., Williams, R.J.: Learning representations by back-propagating errors. Nature 323(6088), 533\u2013536 (1986)","journal-title":"Nature"},{"issue":"11","key":"11_CR56","doi-asserted-by":"publisher","first-page":"2673","DOI":"10.1109\/78.650093","volume":"45","author":"M Schuster","year":"1997","unstructured":"Schuster, M., Paliwal, K.K.: Bidirectional recurrent neural networks. IEEE Trans. Signal Process. 45(11), 2673\u20132681 (1997)","journal-title":"IEEE Trans. Signal Process."},{"issue":"8","key":"11_CR57","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"S Hochreiter","year":"1997","unstructured":"Hochreiter, S., Schmidhuber, J.: Long short-term memory. Neural Comput. 9(8), 1735\u20131780 (1997)","journal-title":"Neural Comput."},{"key":"11_CR58","doi-asserted-by":"crossref","unstructured":"Lakhina, A., Crovella, M., Diot, C.: Characterization of network-wide anomalies in traffic flows. In: Proceedings of the 4th ACM SIGCOMM Conference on Internet Measurement (IMC 2004), pp. 201\u2013206. ACM, New York (2004)","DOI":"10.1145\/1028788.1028813"},{"key":"11_CR59","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1007\/11856214_12","volume-title":"Recent Advances in Intrusion Detection","author":"K Wang","year":"2006","unstructured":"Wang, K., Parekh, J.J., Stolfo, S.J.: Anagram: a content anomaly detector resistant to mimicry attack. In: Zamboni, D., Kruegel, C. (eds.) RAID 2006. LNCS, vol. 4219, pp. 226\u2013248. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11856214_12"},{"issue":"1\u20133","key":"11_CR60","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/s10994-014-5473-9","volume":"101","author":"F Iglesias","year":"2015","unstructured":"Iglesias, F., Zseby, T.: Analysis of network traffic features for anomaly detection. Mach. Learn. 101(1\u20133), 59\u201384 (2015)","journal-title":"Mach. Learn."}],"container-title":["Communications in Computer and Information Science","Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-33-4922-3_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,12]],"date-time":"2022-12-12T00:59:16Z","timestamp":1670806756000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-33-4922-3_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9789813349216","9789813349223"],"references-count":60,"URL":"https:\/\/doi.org\/10.1007\/978-981-33-4922-3_11","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"19 January 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CNCERT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China Cyber Security Annual Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Beijing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 August 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 August 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cncert2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/conf.cert.org.cn","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}