{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T01:15:12Z","timestamp":1764897312224,"version":"3.46.0"},"reference-count":0,"publisher":"Canadian Center of Science and Education","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CIS"],"DOI":"10.5539\/cis.v4n4p123","type":"journal-article","created":{"date-parts":[[2011,7,1]],"date-time":"2011-07-01T01:15:48Z","timestamp":1309482948000},"source":"Crossref","is-referenced-by-count":8,"title":["Web Server Logs Preprocessing for Web Intrusion Detection"],"prefix":"10.5539","volume":"4","author":[{"given":"Shaimaa Ezzat","family":"Salama","sequence":"first","affiliation":[]},{"given":"Mohamed","family":"I. Marie","sequence":"additional","affiliation":[]},{"given":"Laila M.","family":"El-Fangary","sequence":"additional","affiliation":[]},{"given":"Yehia","family":"K. Helmy","sequence":"additional","affiliation":[]}],"member":"3486","published-online":{"date-parts":[[2011,6,30]]},"container-title":["Computer and Information Science"],"original-title":[],"link":[{"URL":"https:\/\/www.ccsenet.org\/journal\/index.php\/CIS\/article\/download\/10909\/7966","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T01:12:31Z","timestamp":1764897151000},"score":1,"resource":{"primary":{"URL":"http:\/\/ccsenet.org\/journal\/index.php\/cis\/article\/view\/10909"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,6,30]]},"references-count":0,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2011,6,30]]}},"URL":"https:\/\/doi.org\/10.5539\/cis.v4n4p123","relation":{},"ISSN":["1913-8997","1913-8989"],"issn-type":[{"type":"electronic","value":"1913-8997"},{"type":"print","value":"1913-8989"}],"subject":[],"published":{"date-parts":[[2011,6,30]]}}}