{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T11:45:06Z","timestamp":1725709506439},"reference-count":8,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,11]]},"DOI":"10.1109\/iske.2017.8258723","type":"proceedings-article","created":{"date-parts":[[2018,1,15]],"date-time":"2018-01-15T22:47:01Z","timestamp":1516056421000},"page":"1-3","source":"Crossref","is-referenced-by-count":3,"title":["A intelligent risk detection method in online transactions"],"prefix":"10.1109","author":[{"given":"Min","family":"Xu","sequence":"first","affiliation":[]},{"given":"Yifan","family":"Chu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"2013","author":"rajesh","journal-title":"Eliminating D-Dos Attack Using Packet Score Scheme","key":"ref4"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/SIU.2016.7495951"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/ICSE.2009.5070521"},{"key":"ref5","first-page":"102","article-title":"SQL injection: Study and augmentation","author":"kaur","year":"2016","journal-title":"International Conference on Signal Processing"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/CVPR.2014.338"},{"key":"ref7","article-title":"A Inferential Method of Uncertain Knowledge Based on Bayes-Network","author":"yu-sheng","year":"2001","journal-title":"Computer Integrated Manufacturing Systems"},{"key":"ref2","first-page":"947","article-title":"Finding security bugs in web applications using a catalog of access control patterns","author":"near","year":"2017","journal-title":"International Conference on Software Engineering ACM"},{"key":"ref1","first-page":"130","article-title":"Security Levels for Web Authentication using Mobile Phones","author":"vapen","year":"2017","journal-title":"IFIP Advances in Information and Communication Technology"}],"event":{"name":"2017 12th International Conference on Intelligent Systems and Knowledge Engineering (ISKE)","start":{"date-parts":[[2017,11,24]]},"location":"Nanjing","end":{"date-parts":[[2017,11,26]]}},"container-title":["2017 12th International Conference on Intelligent Systems and Knowledge Engineering (ISKE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8246022\/8258711\/08258723.pdf?arnumber=8258723","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,2,19]],"date-time":"2018-02-19T23:56:01Z","timestamp":1519084561000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8258723\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11]]},"references-count":8,"URL":"https:\/\/doi.org\/10.1109\/iske.2017.8258723","relation":{},"subject":[],"published":{"date-parts":[[2017,11]]}}}