{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,30]],"date-time":"2024-06-30T04:33:49Z","timestamp":1719722029912},"reference-count":23,"publisher":"Oxford University Press (OUP)","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Logic Jnl IGPL"],"published-print":{"date-parts":[[2017,2]]},"DOI":"10.1093\/jigpal\/jzw044","type":"journal-article","created":{"date-parts":[[2016,8,7]],"date-time":"2016-08-07T00:18:19Z","timestamp":1470529099000},"page":"103-113","source":"Crossref","is-referenced-by-count":7,"title":["Packets tokenization methods for web layer cyber security"],"prefix":"10.1093","volume":"25","author":[{"given":"Rafa\u0142","family":"Kozik","sequence":"first","affiliation":[]},{"given":"Micha\u0142","family":"Chora\u015b","sequence":"additional","affiliation":[]},{"given":"Witold","family":"Ho\u0142ubowicz","sequence":"additional","affiliation":[]}],"member":"286","published-online":{"date-parts":[[2016,8,6]]},"reference":[{"key":"2017010507191885000_25.1.103.1","unstructured":"Bolzoni D. POSEIDON: a 2-tier anomaly-based network intrusion detection system. IWIA 2006: In Proceedings of the 4th IEEE International Workshop on Information Assurance, pp. 144\u2013156, 2006."},{"key":"2017010507191885000_25.1.103.2","doi-asserted-by":"crossref","unstructured":"Gotoh O. Sequence alignments by iterative refinement as assessed by reference to structural alignments. Journal of Molecular Biology, 823\u2013838, 1996.","DOI":"10.1006\/jmbi.1996.0679"},{"key":"2017010507191885000_25.1.103.3","doi-asserted-by":"crossref","unstructured":"Hadziosmanovic D. Simionato L. Bolzoni D. Zambon E. Etalle S. N-gram against the machine: on the feasibility of the n-gram network analysis for binary protocols. In Proceedings of the 15th International Conference on Research in Attacks, Intrusions, and Defenses, pp. 354\u2013373, 2012.","DOI":"10.1007\/978-3-642-33338-5_18"},{"key":"2017010507191885000_25.1.103.4","doi-asserted-by":"crossref","unstructured":"Halfond W. Orso A. Amnesia: analysis and monitoring for neutralizing sql-injection attacks. In Proceedings of the 20th IEEE\/ACM International Conference on Automated Software Engineering, pp. 174\u2013183, 2005.","DOI":"10.1145\/1101908.1101935"},{"key":"2017010507191885000_25.1.103.5","doi-asserted-by":"publisher","DOI":"10.1016\/0378-1119(88)90330-7"},{"key":"2017010507191885000_25.1.103.6","doi-asserted-by":"crossref","unstructured":"Ingham K. L. Inoue H. Kruegel C. Lippmann R. Clark A. Comparing anomaly detection techniques for http. In RAID 2007, pp. 42\u201362. Vol. 4637 of Lecture Notes in Computer Science, 2007.","DOI":"10.1007\/978-3-540-74320-0_3"},{"key":"2017010507191885000_25.1.103.7","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2006.09.016"},{"key":"2017010507191885000_25.1.103.8","doi-asserted-by":"crossref","unstructured":"Kozik R. Modelling http requests with regular expressions for detection of cyber attacks targeted at web applications. In SOCO-CISIS-ICEUTE 2014, pp. 527\u2013535, 2014.","DOI":"10.1007\/978-3-319-07995-0_52"},{"key":"2017010507191885000_25.1.103.9","doi-asserted-by":"crossref","unstructured":"Kruegel C. Toth T. Kirda E. Service specific anomaly detection for network intrusion detection. In Proceedings of ACM Symposium on Applied Computing, pp. 201\u2013208, 2002.","DOI":"10.1145\/508791.508835"},{"key":"2017010507191885000_25.1.103.10","doi-asserted-by":"crossref","unstructured":"Needleman S. Wunsch C. A general method applicable to the search for similarities in the amino acid sequence of two proteins. Journal of Molecular Biology, 443\u2013453, 1970.","DOI":"10.1016\/0022-2836(70)90057-4"},{"key":"2017010507191885000_25.1.103.11","unstructured":"OWASP Stinger. Project Homepags . https:\/\/www.owasp.org\/index.php\/Category:OWASP_Stinger_Project."},{"key":"2017010507191885000_25.1.103.12","unstructured":"OWASP Top 10. The Ten Most Critical Web Application Security Risks. 2013. http:\/\/www.snort.org\/."},{"key":"2017010507191885000_25.1.103.13","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2008.11.011"},{"key":"2017010507191885000_25.1.103.14","unstructured":"PHPIDS Project Homepage . http:\/\/phpids.org\/."},{"key":"2017010507191885000_25.1.103.15","unstructured":"SCALP Project Homepage . http:\/\/code.google.com\/p\/apache-scalp\/."},{"key":"2017010507191885000_25.1.103.16","doi-asserted-by":"crossref","unstructured":"Shar L. K. Tan H. B. K. Predicting common web application vulnerabilities from input validation and sanitization code patterns. In Automated Software Engineering (ASE), Proceedings of the 27th IEEE\/ACM International Conference on Automated Software Engineering (ASE). IEEE, pp. 310\u2013313, 2012.","DOI":"10.1145\/2351676.2351733"},{"key":"2017010507191885000_25.1.103.17","unstructured":"SNORT Project Homepage . http:\/\/www.snort.org."},{"key":"2017010507191885000_25.1.103.18","unstructured":"Source Code Analysis Tools Project Homepage . http:\/\/www.owasp.org\/index.php\/Source_Code_Analysis_Tools."},{"key":"2017010507191885000_25.1.103.19","unstructured":"Sundfeld D. Melo A. MSA-GPU: exact multiple sequence alignment using GPU. In Advances in Bioinformatics and Computational Biology: 8th Brazilian Symposium on Bioinformatics, BSB 2013, pp. 47\u201358, 2013."},{"key":"2017010507191885000_25.1.103.20","unstructured":"Torrano-Gimenez C. Perez-Villegas A. Alvarez G. The HTTP Dataset CSIC 2010. Instituto de Seguridad de la Informaci\u00f3n (ISI), 2010. http:\/\/users.aber.ac.uk\/pds7\/csic_dataset\/csic2010http.html."},{"key":"2017010507191885000_25.1.103.21","doi-asserted-by":"crossref","unstructured":"Wang K. Parekh J. J. Stolfo S. J. Zamboni D. Kruegel C. Anagram: a content anomaly detector resistant to mimicry attack. In RAID 2006, pp. 226\u2013248, Vol. 4219 of Lecture Notes in Computer Science, 2006.","DOI":"10.1007\/11856214_12"},{"key":"2017010507191885000_25.1.103.22","doi-asserted-by":"crossref","unstructured":"Wang K. Stolfo S. J. Jonsson E. Valdes A. Almgren M. Anomalous payload-based network intrusion detection. In RAID 2004 pp. 203\u2013222, Vol. 3224 of Lecture Notes in Computer Science, 2004.","DOI":"10.1007\/978-3-540-30143-1_11"},{"key":"2017010507191885000_25.1.103.23","doi-asserted-by":"crossref","unstructured":"Yu F. Muath A. Tevfik B. Stranger: An automata-based string analysis tool for PHP. In Tools and Algorithms for the Construction and Analysis of Systems, pp. 154\u2013157. Springer, 2010.","DOI":"10.1007\/978-3-642-12002-2_13"}],"container-title":["Logic Journal of IGPL"],"original-title":[],"language":"en","deposited":{"date-parts":[[2019,9,12]],"date-time":"2019-09-12T07:59:33Z","timestamp":1568275173000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/jigpal\/article-lookup\/doi\/10.1093\/jigpal\/jzw044"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8,6]]},"references-count":23,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2017,1,5]]},"published-print":{"date-parts":[[2017,2]]}},"alternative-id":["10.1093\/jigpal\/jzw044"],"URL":"https:\/\/doi.org\/10.1093\/jigpal\/jzw044","relation":{},"ISSN":["1367-0751","1368-9894"],"issn-type":[{"value":"1367-0751","type":"print"},{"value":"1368-9894","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,8,6]]}}}