{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T08:40:31Z","timestamp":1769848831342,"version":"3.49.0"},"reference-count":30,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2018]]},"DOI":"10.1109\/access.2018.2884201","type":"journal-article","created":{"date-parts":[[2018,11,30]],"date-time":"2018-11-30T19:41:50Z","timestamp":1543606910000},"page":"77829-77840","source":"Crossref","is-referenced-by-count":17,"title":["GMSA: Gathering Multiple Signatures Approach to Defend Against Code Injection Attacks"],"prefix":"10.1109","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1805-6849","authenticated-orcid":false,"given":"Hussein","family":"Alnabulsi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8317-5727","authenticated-orcid":false,"given":"Rafiqul","family":"Islam","sequence":"additional","affiliation":[]},{"given":"Majharul","family":"Talukder","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref30","year":"2017","journal-title":"ROC Curve Analysis"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/APWCCSE.2014.7053873"},{"key":"ref11","year":"2017","journal-title":"XSS Filter Evasion Cheat Sheet"},{"key":"ref12","author":"vela","year":"2017","journal-title":"Our Favorite XSS Filters and How to Attack Them"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.eij.2013.10.003"},{"key":"ref14","first-page":"281","article-title":"A novel algorithm to protect code injection attacks","volume":"580","author":"alnabulsi","year":"2018","journal-title":"Proc Int Conf Appl Techn Cybern Secur Intell"},{"key":"ref15","year":"2017","journal-title":"IBM Security Network Intrusion Prevention System"},{"key":"ref16","year":"2017","journal-title":"Testing for Command Injection"},{"key":"ref17","year":"2017","journal-title":"ModSecurity Advanced Topic of the Week Remote File Inclusion Attack Detection"},{"key":"ref18","year":"2017","journal-title":"Reiners Weblog"},{"key":"ref19","year":"2017","journal-title":"Remote File Inclusion (RFI)"},{"key":"ref28","author":"muntner","year":"2017","journal-title":"SecLists"},{"key":"ref4","first-page":"19","article-title":"CIDT: Detection of malicious code injection attacks on Web application","volume":"52","author":"choudhary","year":"2012","journal-title":"Int J Comput Appl"},{"key":"ref27","author":"gim\u00e9nez","year":"2017","journal-title":"HTTP DATASET CSIC 2010"},{"key":"ref3","year":"2017","journal-title":"File inclusion vulnerability"},{"key":"ref6","first-page":"323","article-title":"Using instruction sequence abstraction for shellcode detection and attribution","author":"zhao","year":"2013","journal-title":"Proc IEEE Conf Commun Netw Secur (CNS)"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CBD.2015.48"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2009.5270349"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.4236\/ijcns.2012.56044"},{"key":"ref7","first-page":"1","article-title":"Fragmented query parse tree based SQL injection detection system for Web applications","author":"priyaa","year":"2016","journal-title":"Proc IEEE Int Conf Comput Technol Intell Data Eng (ICCTIDE)"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CCC.2016.26"},{"key":"ref9","first-page":"1","article-title":"New strategy for mitigating of SQL injection attack","volume":"154","author":"alazab","year":"2016","journal-title":"Int J Comput Appl"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2769106"},{"key":"ref20","year":"2007","journal-title":"Hack This Site"},{"key":"ref22","year":"2017","journal-title":"Local file inclusion"},{"key":"ref21","year":"2011","journal-title":"Beyond Negative Security Advanced Methods to Protect Web Applications"},{"key":"ref24","first-page":"89","article-title":"Design of automatic vulnerability detection system for Web application program","author":"qu","year":"2013","journal-title":"Proc IEEE 4th Int Conf Softw Eng Service Sci"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCS.2016.7586332"},{"key":"ref26","first-page":"8","article-title":"Cascading of C4.5 Decision Tree and Support Vector Machine for Rule Based Intrusion Detection System","volume":"8","author":"koshal","year":"2012","journal-title":"MECS Int J Comput Netw Inf Secur"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2012.34"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8274985\/08554270.pdf?arnumber=8554270","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T13:13:51Z","timestamp":1643289231000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8554270\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/access.2018.2884201","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]}}}