{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,2,8]],"date-time":"2023-02-08T03:56:02Z","timestamp":1675828562244},"reference-count":7,"publisher":"Oxford University Press (OUP)","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Logic Journal of IGPL"],"published-print":{"date-parts":[[2013,8,1]]},"DOI":"10.1093\/jigpal\/jzs033","type":"journal-article","created":{"date-parts":[[2012,8,23]],"date-time":"2012-08-23T21:06:15Z","timestamp":1345755975000},"page":"560-570","source":"Crossref","is-referenced-by-count":7,"title":["Enhancing the effectiveness of Web Application Firewalls by generic feature selection"],"prefix":"10.1093","volume":"21","author":[{"given":"H. T.","family":"Nguyen","sequence":"first","affiliation":[]},{"given":"C.","family":"Torrano-Gimenez","sequence":"additional","affiliation":[]},{"given":"G.","family":"Alvarez","sequence":"additional","affiliation":[]},{"given":"K.","family":"Franke","sequence":"additional","affiliation":[]},{"given":"S.","family":"Petrovic","sequence":"additional","affiliation":[]}],"member":"286","published-online":{"date-parts":[[2012,8,22]]},"reference":[{"issue":"2","key":"2_39177691","doi-asserted-by":"crossref","first-page":"2042","DOI":"10.1016\/j.asoc.2010.07.002","volume":"11","year":"2011","journal-title":"APPLIED SOFT COMPUTING"},{"key":"7_43456282","doi-asserted-by":"crossref","first-page":"717","DOI":"10.1016\/j.comnet.2005.01.009","volume":"48","year":"2005","journal-title":"COMPUTER NETWORKS"},{"key":"10_43456283","doi-asserted-by":"crossref","first-page":"262","DOI":"10.1145\/382912.382923","volume":"3","year":"2000","journal-title":"ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY TISSEC"},{"key":"12_43456284","doi-asserted-by":"crossref","first-page":"21","DOI":"10.4018\/jmcmc.2011010102","volume":"3","year":"2011","journal-title":"PROCEEDINGS OF THE INTERNATIONAL JOURNAL OF MOBILE COMPUTING AND MULTIMEDIA COMMUNICATION IJMCMC"},{"issue":"8","key":"13_19367115","doi-asserted-by":"publisher","first-page":"1226","DOI":"10.1109\/TPAMI.2005.159","volume":"27","author":"Peng","year":"2005","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence","ISSN":"http:\/\/id.crossref.org\/issn\/0162-8828","issn-type":"print"},{"key":"18_43460247","first-page":"85","volume":"63","year":"2009","journal-title":"PROCEEDINGS OF ND INTERNATIONAL WORKSHOP IN COMPUTATIONAL INTELLIGENCE IN SECURITY FOR INFORMATION SYSTEMS CISIS ADVANCES IN INTELLIGENT AND SOFT COMPUTING"},{"key":"19_43456286","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.asoc.2009.06.019","volume":"10","year":"2010","journal-title":"APPLIED SOFT COMPUTING"}],"container-title":["Logic Journal of IGPL"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/academic.oup.com\/jigpal\/article-pdf\/21\/4\/560\/2106282\/jzs033.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,8,23]],"date-time":"2017-08-23T03:04:07Z","timestamp":1503457447000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/jigpal\/article-lookup\/doi\/10.1093\/jigpal\/jzs033"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,8,22]]},"references-count":7,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2013,7,13]]},"published-print":{"date-parts":[[2013,8,1]]}},"URL":"https:\/\/doi.org\/10.1093\/jigpal\/jzs033","relation":{},"ISSN":["1367-0751","1368-9894"],"issn-type":[{"value":"1367-0751","type":"print"},{"value":"1368-9894","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,8,22]]}}}