{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T02:01:18Z","timestamp":1776391278675,"version":"3.51.2"},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,10]]},"DOI":"10.1109\/kse.2016.7758069","type":"proceedings-article","created":{"date-parts":[[2016,12,1]],"date-time":"2016-12-01T16:43:24Z","timestamp":1480610604000},"page":"291-297","source":"Crossref","is-referenced-by-count":19,"title":["Machine learning techniques for web intrusion detection \u2014 A comparison"],"prefix":"10.1109","author":[{"given":"Truong Son","family":"Pham","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Tuan Hao","family":"Hoang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Vu","family":"Van Canh","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref31","year":"0"},{"key":"ref30","year":"0"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2676585.2676618"},{"key":"ref11","author":"charu","year":"0","journal-title":"Data Classification Algorithms and Applications"},{"key":"ref12","first-page":"212","article-title":"Feature Selection and Feature Extract ion for Text Categorization","author":"david","year":"0"},{"key":"ref13","year":"2010","journal-title":"HTTP dataset"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/WICT.2013.7113149"},{"key":"ref15","first-page":"5","volume":"45","author":"breiman","year":"2001","journal-title":"Random Forests"},{"key":"ref16","first-page":"221","volume":"27","author":"quinlan","year":"1987","journal-title":"Simplifying Decision Tree Asurvey"},{"key":"ref17","author":"hosmer","year":"1989","journal-title":"Applied Logistic Regression"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.2307\/2685469"},{"key":"ref19","first-page":"256","volume":"121","author":"yoav","year":"1995","journal-title":"Boosting a weak learning algorithm by majority"},{"key":"ref28","year":"0"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/32.372146"},{"key":"ref27","author":"jack","year":"0","journal-title":"Google DeepMind Research Engineer"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39235-1_3"},{"key":"ref6","year":"0","journal-title":"OWASP Foundation"},{"key":"ref29","year":"0"},{"key":"ref5","year":"2013"},{"key":"ref8","first-page":"120","article-title":"A data mining framework for building intrusion detection models","author":"lee","year":"0"},{"key":"ref7","first-page":"192","article-title":"A Genetic Algorithm-based Solution for Intrusion Detection","volume":"4","author":"bankovi?","year":"2009","journal-title":"Journal of Information Assurance and Security"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70542-0_6"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2009.05.029"},{"key":"ref1","article-title":"Bypass Antivirus Dynamic Analysis: Limitations of the AV model and how to exploit them","author":"nasi","year":"2014"},{"key":"ref20","first-page":"705","volume":"7","author":"harris","year":"1993","journal-title":"Boosting performance in neural networks"},{"key":"ref22","first-page":"67","volume":"41","author":"michael","year":"1994","journal-title":"Cryptographic limitations on learning Boolean formulae and finite automata"},{"key":"ref21","first-page":"119","volume":"55","author":"yoav","year":"1997","journal-title":"A decision-theoretic generalization of on-line learning and an application to boosting"},{"key":"ref24","first-page":"297","volume":"37","author":"robert","year":"1999","journal-title":"Improving boosting algorithms using confidence-rated predictions"},{"key":"ref23","first-page":"197","volume":"5","author":"robert","year":"1990","journal-title":"The strength of weak learnability"},{"key":"ref26","first-page":"161","article-title":"The Tradeoffs of Large Scale Learning","volume":"20","author":"bottou","year":"2008","journal-title":"In Advances in Neural Information Processing Systems"},{"key":"ref25","first-page":"1134","volume":"27","author":"valiant","year":"1984","journal-title":"A theory of the learnable"}],"event":{"name":"2016 Eighth International Conference on Knowledge and Systems Engineering (KSE)","location":"Hanoi","start":{"date-parts":[[2016,10,6]]},"end":{"date-parts":[[2016,10,8]]}},"container-title":["2016 Eighth International Conference on Knowledge and Systems Engineering (KSE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7749393\/7758010\/07758069.pdf?arnumber=7758069","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,14]],"date-time":"2020-05-14T23:42:03Z","timestamp":1589499723000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7758069\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/kse.2016.7758069","relation":{},"subject":[],"published":{"date-parts":[[2016,10]]}}}