{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T02:41:17Z","timestamp":1773110477566,"version":"3.50.1"},"reference-count":10,"publisher":"Oxford University Press (OUP)","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Logic Journal of IGPL"],"published-print":{"date-parts":[[2015,2,1]]},"DOI":"10.1093\/jigpal\/jzu038","type":"journal-article","created":{"date-parts":[[2014,12,31]],"date-time":"2014-12-31T01:25:51Z","timestamp":1419989151000},"page":"45-56","source":"Crossref","is-referenced-by-count":54,"title":["Machine learning techniques applied to detect cyber attacks on web applications"],"prefix":"10.1093","volume":"23","author":[{"given":"M.","family":"Chora\u00a0","sequence":"first","affiliation":[]},{"given":"R.","family":"Kozik","sequence":"additional","affiliation":[]}],"member":"286","published-online":{"date-parts":[[2014,12,29]]},"reference":[{"key":"8_49472107","first-page":"494","volume":"41","year":"2011","journal-title":"TRANSACTIONS ON IEEE"},{"key":"9_49472108","first-page":"1","volume":"50","year":"2011","journal-title":"INTERNATIONAL JOURNAL OF INFORMATION SECURITY"},{"key":"15_36433944","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1023\/B:VISI.0000022288.19776.77","volume":"59","year":"2004","journal-title":"INTERNATIONAL JOURNAL OF COMPUTER VISION"},{"issue":"3","key":"16_11556560","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1016\/0022-2836(70)90057-4","volume":"48","author":"Needleman","year":"1970","journal-title":"Journal of molecular biology","ISSN":"https:\/\/id.crossref.org\/issn\/0022-2836","issn-type":"print"},{"key":"19_49472109","first-page":"60","volume":"2","year":"2008","journal-title":"INTERNATIONAL JOURNAL OF COMPUTING AND ICT RESEARCH"},{"key":"21_49472110","first-page":"245","volume":"189","year":"2012","journal-title":"ADVANCES IN INTELLIGENT SYSTEMS AND COMPUTING"},{"key":"22_49472111","first-page":"303","volume":"1","year":"2003","journal-title":"PROCEEDINGS DARPA INFORMATION SURVIVABILITY CONFERENCE AND EXPOSITION"},{"key":"23_49472112","doi-asserted-by":"crossref","first-page":"232","DOI":"10.1111\/j.1468-0394.2010.00576.x","volume":"29","year":"2012","journal-title":"Expert Systems","ISSN":"https:\/\/id.crossref.org\/issn\/0266-4720","issn-type":"print"},{"key":"25_49472113","doi-asserted-by":"crossref","first-page":"663","DOI":"10.1049\/el:20020467","volume":"38","year":"2002","journal-title":"ELECTRONICS LETTERS"},{"key":"30_49472114","first-page":"177","volume":"189","year":"2012","journal-title":"ADVANCES IN INTELLIGENT AND SOFT COMPUTING"}],"container-title":["Logic Journal of IGPL"],"original-title":[],"language":"en","deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T02:54:24Z","timestamp":1498186464000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/jigpal\/article-lookup\/doi\/10.1093\/jigpal\/jzu038"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12,29]]},"references-count":10,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2015,1,22]]},"published-print":{"date-parts":[[2015,2,1]]}},"URL":"https:\/\/doi.org\/10.1093\/jigpal\/jzu038","relation":{},"ISSN":["1367-0751","1368-9894"],"issn-type":[{"value":"1367-0751","type":"print"},{"value":"1368-9894","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,12,29]]}}}