{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,31]],"date-time":"2024-10-31T03:18:01Z","timestamp":1730344681131,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.23919\/wac.2018.8430446","type":"proceedings-article","created":{"date-parts":[[2018,8,9]],"date-time":"2018-08-09T18:09:52Z","timestamp":1533838192000},"page":"1-5","source":"Crossref","is-referenced-by-count":3,"title":["An Approach to Malicious Payload Detection"],"prefix":"10.23919","author":[{"given":"Z.","family":"Zhang","sequence":"first","affiliation":[]},{"given":"R.","family":"George","sequence":"additional","affiliation":[]},{"given":"K.","family":"Shujaee","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Integrating Fuzzy Logic with Data Mining Methods for Intrusion Detection","year":"1999","author":"jianxiong","key":"ref10"},{"key":"ref11","first-page":"199","article-title":"Minds-minnesota intrusion detection system","author":"levent","year":"2004","journal-title":"Next Generation Data Mining"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1987.232894"},{"key":"ref13","first-page":"15","article-title":"The NIDES statistical component: Description and justification","volume":"39","author":"javitz","year":"1993","journal-title":"Contract"},{"key":"ref14","article-title":"Layered higher order n-grams for hardening payload based anomaly intrusion detection","author":"neminath","year":"0","journal-title":"Availability Reliability and Security 2010 ARES'10 International Conference on"},{"key":"ref15","article-title":"Anomalous payload-based worm detection and signature generation","author":"ke","year":"2005","journal-title":"Recent Advances in Intrusion Detection"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2007.02.001"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1999.766911"},{"journal-title":"Multi Level Anomaly based autonomic intrusion detection system","year":"2008","author":"youssif","key":"ref3"},{"key":"ref6","first-page":"229","article-title":"Snort: Lightweight Intrusion Detection for Networks","volume":"99","author":"roesch","year":"1999","journal-title":"LISA"},{"key":"ref5","article-title":"A database of computer attacks for the evaluation of intrusion detection systems","author":"kristopher","year":"1999","journal-title":"MASSACHUSETTS INST OF TECH CAMBRIDGE DEPT OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCE"},{"key":"ref8","article-title":"Data mining approaches for intrusion detection","author":"wenke","year":"1998","journal-title":"Usenix Security"},{"key":"ref7","article-title":"NetSTAT: A network-based intrusion detection approach","author":"giovanni","year":"0","journal-title":"Computer Security Applications Conference 1998 Proceedings 14th Annual"},{"key":"ref2","first-page":"16","volume":"6","author":"kay","year":"2005","journal-title":"Low volume viruses new tools for criminals Network Security"},{"year":"2007","key":"ref1","article-title":"CERT Statistics"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"597","DOI":"10.1016\/S1389-1286(00)00140-7","article-title":"Improving intrusion detection performance using keyword selection and neural networks","volume":"34","author":"richard","year":"2000","journal-title":"Computer Networks"}],"event":{"name":"2018 World Automation Congress (WAC)","start":{"date-parts":[[2018,6,3]]},"location":"Stevenson, WA","end":{"date-parts":[[2018,6,6]]}},"container-title":["2018 World Automation Congress (WAC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8410978\/8430291\/08430446.pdf?arnumber=8430446","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T07:12:55Z","timestamp":1643181175000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8430446\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6]]},"references-count":16,"URL":"https:\/\/doi.org\/10.23919\/wac.2018.8430446","relation":{},"subject":[],"published":{"date-parts":[[2018,6]]}}}