{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T06:57:09Z","timestamp":1729666629941,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,5]]},"DOI":"10.1109\/cec.2009.4983190","type":"proceedings-article","created":{"date-parts":[[2009,10,14]],"date-time":"2009-10-14T20:17:46Z","timestamp":1255551466000},"page":"2029-2035","source":"Crossref","is-referenced-by-count":6,"title":["Detecting web application attacks with use of Gene Expression Programming"],"prefix":"10.1109","author":[{"given":"Jaroslaw","family":"Skaruz","sequence":"first","affiliation":[]},{"given":"Franciszek","family":"Seredynski","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"15"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2003.819261"},{"key":"14","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1007\/978-3-540-27772-9_7","article-title":"time series prediction based on gene expression programming","volume":"3129","author":"zuo","year":"2004","journal-title":"Advances in Web-Age Information Management"},{"key":"11","article-title":"prefix gene expression programming","author":"xin","year":"2005","journal-title":"Proc Genetic and Evolutionary Computation Conference"},{"key":"12","first-page":"1355","article-title":"discovery of classification rules by using gene expression programming","author":"zhou","year":"2002","journal-title":"Proc International Conference on Artificial Intelligence"},{"journal-title":"Gene Expression Programming Mathematical Modeling by an Artificial Intelligence","year":"2002","author":"ferreira","key":"3"},{"key":"2","first-page":"87","article-title":"gene expression programming: a new adaptive algorithm for solving problems","volume":"13","author":"ferreira","year":"2001","journal-title":"Complex Systems"},{"key":"1","first-page":"157","article-title":"a lightweight tool for detecting web server attacks","author":"almgren","year":"2000","journal-title":"Proceedings of ISOC Symposium on Network and Distributed System Security Sein"},{"key":"10","doi-asserted-by":"crossref","DOI":"10.1007\/11506881_8","article-title":"a learning-based approach to the detection of sql attacks","author":"valeur","year":"2005","journal-title":"Detection of Intrusions and Malware and Vulnerability Assessment"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/IDAACS.2005.282956"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/948143.948144"},{"journal-title":"Genetic Proramming On the Programming of Computers by Means of Natural Selection","year":"1992","author":"koza","key":"5"},{"key":"4","article-title":"gene expression programming and the evolution of computer programs","author":"ferreira","year":"2004","journal-title":"Handbook of Intelligent Control Neural Fuzzy and Adaptive Approaches (Recent Developments in Biologically Inspired Computing)"},{"key":"9","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1007\/3-540-36084-0_4","article-title":"undermining an anomaly- based intrusion detection system using common exploits","author":"tan","year":"2002","journal-title":"Proc 5th International Symposium on Recent Advances in Intrusion Detection"},{"key":"8","article-title":"a new conceptual approach to teaching the interpretation of clinical tests","volume":"12","author":"linn","year":"2004","journal-title":"Journal of Educational Statistics"}],"event":{"name":"2009 IEEE Congress on Evolutionary Computation (CEC)","start":{"date-parts":[[2009,5,18]]},"location":"Trondheim, Norway","end":{"date-parts":[[2009,5,21]]}},"container-title":["2009 IEEE Congress on Evolutionary Computation"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4939002\/4982922\/04983190.pdf?arnumber=4983190","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T16:17:34Z","timestamp":1602692254000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/4983190"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,5]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/cec.2009.4983190","relation":{},"subject":[],"published":{"date-parts":[[2009,5]]}}}