{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:12:23Z","timestamp":1750306343994,"version":"3.41.0"},"publisher-location":"New York, New York, USA","reference-count":6,"publisher":"ACM Press","license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1145\/2948992.2949001","type":"proceedings-article","created":{"date-parts":[[2016,7,25]],"date-time":"2016-07-25T15:17:25Z","timestamp":1469459845000},"page":"129-130","source":"Crossref","is-referenced-by-count":1,"title":["Testing Snort with SQL Injection Attacks"],"prefix":"10.1145","author":[{"given":"Rui","family":"Silva","sequence":"first","affiliation":[{"name":"Polytechnic Institute of Coimbra, ISEC -- Coimbra Institute of Engineering, Rua Pedro Nunes, Coimbra, Portugal"}]},{"given":"Raul","family":"Barbosa","sequence":"additional","affiliation":[{"name":"University of Coimbra - UC, Center for Informatics and Systems of University of Coimbra, Rua S\u00edlvio Lima, Coimbra, Portugal"}]},{"given":"Jorge","family":"Bernardino","sequence":"additional","affiliation":[{"name":"Polytechnic of Coimbra -- ISEC, Center for Informatics and Systems of University of Coimbra, Rua Pedro Nunes, Coimbra, Portugal"}]}],"member":"320","reference":[{"key":"key-10.1145\/2948992.2949001-1","doi-asserted-by":"crossref","unstructured":"R. Santos, J. Bernardino, and M. Vieira, \"Approaches and Challenges in Database Intrusion Detection\", SIGMOD Record, vol. 43, no. 3, pp 36--47, 2014.","DOI":"10.1145\/2694428.2694435"},{"key":"key-10.1145\/2948992.2949001-2","doi-asserted-by":"crossref","unstructured":"W. Park, and S. Ahn, \"Performance Comparison and Detection Analysis in Snort and Suricata Environment\", Springer Science+Business Media New York 2016, 2016.","DOI":"10.1007\/s11277-016-3209-9"},{"key":"key-10.1145\/2948992.2949001-3","doi-asserted-by":"crossref","unstructured":"A. Milenkoski, M. Vieira, S. Kounev, A. Avritzer, and B. D. Payne, \"Evaluating Computer Intrusion Detection Systems: A Survey of Common Practices\", ACM Computing Surveys, vol. 48, no. 1, pp. 12--61, 2015.","DOI":"10.1145\/2808691"},{"key":"key-10.1145\/2948992.2949001-4","unstructured":"D. Singh, D. Patel, B. Borisaniya, and C. Modi, \"Collaborative IDS Framework for Cloud\", International Journal of Network Security, vol.18, no. 4, pp. 699--709, 2016"},{"key":"key-10.1145\/2948992.2949001-5","unstructured":"Victor, Truica. Understanding the Snort architecture, 2014. Available: http:\/\/truica-victor.com\/snort-architecture\/. [Accessed: 28-March-2016]."},{"key":"key-10.1145\/2948992.2949001-6","unstructured":"D. Kindy, and A. Pathan, \"A Detailed Survey on Various Aspects of SQL Injection in Web Applications: Vulnerabilities, Innovative Attacks, and Remedies\", International Journal, pp. 1--13, 2012"}],"event":{"number":"9","sponsor":["BytePress","ISEP"],"acronym":"C3S2E '16","name":"the Ninth International C* Conference","start":{"date-parts":[[2016,7,20]]},"location":"Porto, Portugal","end":{"date-parts":[[2016,7,22]]}},"container-title":["Proceedings of the Ninth International C* Conference on Computer Science &amp; Software Engineering - C3S2E '16"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2948992.2949001","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/dl.acm.org\/ft_gateway.cfm?id=2949001&amp;ftid=1766665&amp;dwn=1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:55:46Z","timestamp":1750222546000},"score":1,"resource":{"primary":{"URL":"http:\/\/dl.acm.org\/citation.cfm?doid=2948992.2949001"}},"subtitle":[],"proceedings-subject":"Computer Science & Software Engineering","short-title":[],"issued":{"date-parts":[[2016]]},"references-count":6,"URL":"https:\/\/doi.org\/10.1145\/2948992.2949001","relation":{},"subject":[],"published":{"date-parts":[[2016]]}}}