{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T21:59:24Z","timestamp":1777413564566,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,12,8]],"date-time":"2017-12-08T00:00:00Z","timestamp":1512691200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,12,8]]},"DOI":"10.1145\/3171592.3171594","type":"proceedings-article","created":{"date-parts":[[2018,3,16]],"date-time":"2018-03-16T12:53:36Z","timestamp":1521204816000},"page":"80-85","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":59,"title":["Anomaly-Based Web Attack Detection"],"prefix":"10.1145","author":[{"given":"Jingxi","family":"Liang","sequence":"first","affiliation":[{"name":"Peking University, Beijing, China"}]},{"given":"Wen","family":"Zhao","sequence":"additional","affiliation":[{"name":"Peking University, Beijing, China"}]},{"given":"Wei","family":"Ye","sequence":"additional","affiliation":[{"name":"Peking University, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2017,12,8]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"TopOWASP.2017.Top10-2017.TheTenMostCriticalWebApplicationSecurity Risks (2017).  TopOWASP.2017.Top10-2017.TheTenMostCriticalWebApplicationSecurity Risks (2017)."},{"key":"e_1_3_2_1_2_1","volume-title":"SQL Injection Bypassing WAF. (2017). Retrieved","author":"OWASP.","year":"2017","unstructured":"OWASP. 2017. SQL Injection Bypassing WAF. (2017). Retrieved May 6, 2017 fromhttps:\/\/www.owasp.org\/index.php\/SQL_Injection_Bypassing_WAF OWASP. 2017. SQL Injection Bypassing WAF. (2017). Retrieved May 6, 2017 fromhttps:\/\/www.owasp.org\/index.php\/SQL_Injection_Bypassing_WAF"},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of 6th International Scientific Conference on Security and Protection of Information. 79--88","year":"2011","unstructured":"PavolLupt\u00e1k. 2011 . Bypassing Web Application Firewalls . In Proceedings of 6th International Scientific Conference on Security and Protection of Information. 79--88 . PavolLupt\u00e1k. 2011. Bypassing Web Application Firewalls. In Proceedings of 6th International Scientific Conference on Security and Protection of Information. 79--88."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948144"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/IWSCN.2010.5497997"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2006.09.016"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/11790754_5"},{"key":"e_1_3_2_1_8_1","volume-title":"An Unsupervised Learning Approach for Network and System Analysis. Master'sThesis","author":"Duc Le Jr.","unstructured":"Duc Le Jr. 2017. An Unsupervised Learning Approach for Network and System Analysis. Master'sThesis . Dalhousie University Duc Le Jr. 2017. An Unsupervised Learning Approach for Network and System Analysis. Master'sThesis. Dalhousie University"},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings. Presses universitaires de Louvain, 89","unstructured":"PankajMalhotra,LovekeshVig,GautamShroff,andPuneetAgarwal.2015. Long short term memory networks for anomaly detection in time series . In Proceedings. Presses universitaires de Louvain, 89 . PankajMalhotra,LovekeshVig,GautamShroff,andPuneetAgarwal.2015.Long short term memory networks for anomaly detection in time series. In Proceedings. Presses universitaires de Louvain, 89."},{"key":"e_1_3_2_1_11_1","first-page":"1137","article-title":"A neural probabilistic language model","author":"Ducharme R\u00e9jean","year":"2003","unstructured":"YoshuaBengio, R\u00e9jean Ducharme , PascalVincent, and Christian Jauvin . 2003 . A neural probabilistic language model . Journal of machine learning research 3 , Feb (2003), 1137 -- 1155 . YoshuaBengio, R\u00e9jean Ducharme, PascalVincent, and Christian Jauvin. 2003. A neural probabilistic language model. Journal of machine learning research 3, Feb (2003), 1137--1155.","journal-title":"Journal of machine learning research 3"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488598000094"},{"key":"e_1_3_2_1_13_1","volume-title":"Empirical evaluation of gated recurrent neural networks on sequence modeling. arXiv preprint arXiv:1412.3555","author":"Chung Junyoung","year":"2014","unstructured":"Junyoung Chung , CaglarGulcehre, KyungHyun Cho , and YoshuaBengio. 2014. Empirical evaluation of gated recurrent neural networks on sequence modeling. arXiv preprint arXiv:1412.3555 ( 2014 ). Junyoung Chung, CaglarGulcehre, KyungHyun Cho, and YoshuaBengio. 2014. Empirical evaluation of gated recurrent neural networks on sequence modeling. arXiv preprint arXiv:1412.3555 (2014)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"e_1_3_2_1_15_1","volume-title":"Generating sequences with recurrent neural networks. arXiv preprint arXiv:1308.0850","author":"Alex Graves","year":"2013","unstructured":"Graves Alex . 2013. Generating sequences with recurrent neural networks. arXiv preprint arXiv:1308.0850 ( 2013 ). Graves Alex. 2013. Generating sequences with recurrent neural networks. arXiv preprint arXiv:1308.0850 (2013)."},{"key":"e_1_3_2_1_16_1","volume-title":"DzmitryBahdanau, and YoshuaBengio.","author":"Cho Kyunghyun","year":"2014","unstructured":"Kyunghyun Cho , Bart Van Merri\u00ebnboer , DzmitryBahdanau, and YoshuaBengio. 2014 . On the properties of neural machine translation: Encoder-decoder approaches. arXiv preprint arXiv:1409.1259 (2014). Kyunghyun Cho, Bart Van Merri\u00ebnboer, DzmitryBahdanau, and YoshuaBengio. 2014. On the properties of neural machine translation: Encoder-decoder approaches. arXiv preprint arXiv:1409.1259 (2014)."},{"key":"e_1_3_2_1_17_1","volume-title":"Alejandro P\u00e9rez Villegas, and GA Maran\u00f3n","author":"Gimnez CT","year":"2010","unstructured":"CT Gimnez , Alejandro P\u00e9rez Villegas, and GA Maran\u00f3n . 2010 . HTTP data set CSIC 2010. (2010). CT Gimnez, Alejandro P\u00e9rez Villegas, and GA Maran\u00f3n. 2010. HTTP data set CSIC 2010. (2010)."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.25"}],"event":{"name":"ICNCC 2017: 2017 VI International Conference on Network, Communication and Computing","location":"Kunming China","acronym":"ICNCC 2017"},"container-title":["Proceedings of the 2017 VI International Conference on Network, Communication and Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3171592.3171594","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3171592.3171594","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:02:53Z","timestamp":1750215773000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3171592.3171594"}},"subtitle":["A Deep Learning Approach"],"short-title":[],"issued":{"date-parts":[[2017,12,8]]},"references-count":17,"alternative-id":["10.1145\/3171592.3171594","10.1145\/3171592"],"URL":"https:\/\/doi.org\/10.1145\/3171592.3171594","relation":{},"subject":[],"published":{"date-parts":[[2017,12,8]]},"assertion":[{"value":"2017-12-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}