{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T15:18:16Z","timestamp":1777043896442,"version":"3.51.4"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,10,23]],"date-time":"2021-10-23T00:00:00Z","timestamp":1634947200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,10,23]],"date-time":"2021-10-23T00:00:00Z","timestamp":1634947200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,10,23]],"date-time":"2021-10-23T00:00:00Z","timestamp":1634947200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,10,23]]},"DOI":"10.1109\/iwbis53353.2021.9631851","type":"proceedings-article","created":{"date-parts":[[2021,12,28]],"date-time":"2021-12-28T21:32:10Z","timestamp":1640727130000},"page":"87-90","source":"Crossref","is-referenced-by-count":4,"title":["Classification Model of Web Application Attacks"],"prefix":"10.1109","author":[{"given":"Hafidh","family":"Fadhil","sequence":"first","affiliation":[]},{"given":"Arif Rahman","family":"Hakim","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Implementasi Honeypot Sebagai Pemantau Parameter pada HTTP Request Untuk Mengetahui Tujuan Serangan","author":"laksana","year":"2017","journal-title":"The 9th Conference on Information Technology and Electrical Engineering (CITEE 2017)"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-74690-6_20"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-35869-3_10"},{"key":"ref13","year":"2007","journal-title":"Attack Challenge - ECML\/PKDD Workshop"},{"key":"ref14","article-title":"TorpedaTORPEDA: Un Conjunto de Datos Ampliable para la Evaluaci&#x00F3;n de Cortafuegos de Aplicaciones Web","author":"torrano-gimenez","year":"2012","journal-title":"XII Reuni&#x00F3;n Espa&#x00F1;ola sobre Criptolog&#x00ED;a y Seguridad de la Informaci&#x00F3;n (RECSI 2012)"},{"key":"ref15","year":"0","journal-title":"How to detect prevent and mitigate buffer overflow attacks | Synopsys"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-07995-0_52"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0166017"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICIS46139.2019.8940306"},{"key":"ref4","author":"rist","year":"2010","journal-title":"Know your tools Glastopf-a dynamic low-interaction web application honeypot"},{"key":"ref3","author":"spitzner","year":"2002","journal-title":"Honeypots Tracking Hackers"},{"key":"ref6","article-title":"Web application attack statistics: 2017 in review","year":"2018","journal-title":"Positive Technologies"},{"key":"ref5","first-page":"239","article-title":"Design Integrated Honeypot untuk Deteksi dan Identifikasi Serangan Siber","volume":"10","author":"putra","year":"2020","journal-title":"Jurnal IT STMIK Handayani"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2808691"},{"key":"ref7","author":"meyer","year":"2008","journal-title":"Detecting Attacks on Web Applications from Log Files"},{"key":"ref2","article-title":"List of top 15 threats","year":"2020","journal-title":"ENISA"},{"key":"ref1","year":"0","journal-title":"Web Application Attack What Is It and How to Defend Against It?"},{"key":"ref9","article-title":"Classification of Firewall Logs Using Supervised Machine Learning Algorithms","volume":"7","author":"as-suhbani","year":"2019","journal-title":"International Journal of Computational Engineering Science"},{"key":"ref20","year":"2019","journal-title":"GitHub - mushorg\/glastopf Web Application Honeypot"}],"event":{"name":"2021 6th International Workshop on Big Data and Information Security (IWBIS)","location":"Depok, Indonesia","start":{"date-parts":[[2021,10,23]]},"end":{"date-parts":[[2021,10,25]]}},"container-title":["2021 6th International Workshop on Big Data and Information Security (IWBIS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9631759\/9631838\/09631851.pdf?arnumber=9631851","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T16:54:10Z","timestamp":1652201650000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9631851\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,23]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/iwbis53353.2021.9631851","relation":{},"subject":[],"published":{"date-parts":[[2021,10,23]]}}}