{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T13:31:54Z","timestamp":1768311114745,"version":"3.49.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,6]]},"DOI":"10.1109\/icc.2009.5199054","type":"proceedings-article","created":{"date-parts":[[2009,8,11]],"date-time":"2009-08-11T20:20:30Z","timestamp":1250022030000},"page":"1-6","source":"Crossref","is-referenced-by-count":24,"title":["HMM-Web: A Framework for the Detection of Attacks Against Web Applications"],"prefix":"10.1109","author":[{"given":"I.","family":"Corona","sequence":"first","affiliation":[]},{"given":"D.","family":"Ariu","sequence":"additional","affiliation":[]},{"given":"G.","family":"Giacinto","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","author":"yoshua bengio","year":"1996","journal-title":"Markovian Models for Sequential Data"},{"key":"15","year":"0","journal-title":"Snort open-source ids"},{"key":"16","year":"0"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2006.165"},{"key":"14","author":"meyer","year":"2008"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/5.18626"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(00)00139-0"},{"key":"3","first-page":"795","article-title":"sensing attacks in computers network with hidden markov models","volume":"4571","author":"ariu","year":"0","journal-title":"LNAI"},{"key":"2","year":"0","journal-title":"Modsecurity"},{"key":"1","year":"0"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1002\/0471660264"},{"key":"7","first-page":"203","article-title":"anomalous payload-based network intrusion detection","volume":"3224","author":"wang","year":"0","journal-title":"LNCS"},{"key":"6","first-page":"21","article-title":"testing network-based intrusion detection signatures using mutant exploits","author":"vigna","year":"2005","journal-title":"ACM CCS"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2003.1199328"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511790492"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2005.01.009"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2006.09.016"}],"event":{"name":"ICC 2009 - 2009 IEEE International Conference on Communications","location":"Dresden, Germany","start":{"date-parts":[[2009,6,14]]},"end":{"date-parts":[[2009,6,18]]}},"container-title":["2009 IEEE International Conference on Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5198563\/5198564\/05199054.pdf?arnumber=5199054","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,17]],"date-time":"2017-03-17T17:00:04Z","timestamp":1489770004000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5199054\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,6]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/icc.2009.5199054","relation":{},"subject":[],"published":{"date-parts":[[2009,6]]}}}