{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T16:40:50Z","timestamp":1743007250513,"version":"3.40.3"},"publisher-location":"Cham","reference-count":10,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319104218"},{"type":"electronic","value":"9783319104225"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-10422-5_21","type":"book-chapter","created":{"date-parts":[[2014,9,2]],"date-time":"2014-09-02T15:50:57Z","timestamp":1409673057000},"page":"195-200","source":"Crossref","is-referenced-by-count":5,"title":["Anomalous Web Payload Detection: Evaluating the Resilience of 1-Grams Based Classifiers"],"prefix":"10.1007","author":[{"given":"Sergio","family":"Pastrana","sequence":"first","affiliation":[]},{"given":"Carmen","family":"Torrano-Gimenez","sequence":"additional","affiliation":[]},{"given":"Hai Than","family":"Nguyen","sequence":"additional","affiliation":[]},{"given":"Agust\u00edn","family":"Orfila","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"21_CR1","unstructured":"The HTTP dataset CSIC 2010 (2010)"},{"key":"21_CR2","unstructured":"Ateniese, G., Felici, G., Mancini, L.V., Spognardi, A., Villani, A., Vitali, D.: Hacking smart machines with smarter ones: How to extract meaningful data from machine learning classifiers. arXiv:1306.4447 (2013)"},{"issue":"PrePrints","key":"21_CR3","first-page":"1","volume":"99","author":"B. Biggio","year":"2013","unstructured":"Biggio, B., Fumera, G., Roli, F.: Security evaluation of pattern classifiers under attack. IEEE Transactions on Knowledge and Data Engineering\u00a099(PrePrints), 1 (2013)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"21_CR4","first-page":"90","volume-title":"ACM Symposium on Information, Computer and Communications Security","author":"G. Gu","year":"2006","unstructured":"Gu, G., Fogla, P., Dagon, D., Lee, W., Skori\u0107, B.: Measuring Intrusion Detection Capability: an Information-theoretic Approach. In: ACM Symposium on Information, Computer and Communications Security, pp. 90\u2013101. ACM, New York (2006)"},{"key":"21_CR5","first-page":"43","volume-title":"Workshop on Security and Artificial Intelligence","author":"L. Huang","year":"2011","unstructured":"Huang, L., Joseph, A.D., Nelson, B., Rubinstein, B.I., Tygar, J.D.: Adversarial machine learning. In: Workshop on Security and Artificial Intelligence, pp. 43\u201358. ACM, NY (2011)"},{"issue":"4","key":"21_CR6","doi-asserted-by":"publisher","first-page":"560","DOI":"10.1093\/jigpal\/jzs033","volume":"21","author":"H.T. Nguyen","year":"2013","unstructured":"Nguyen, H.T., Torrano-Gimenez, C., Alvarez, G., Franke, K., Petrovi\u0107, S.: Enhancing the effectiveness of web application firewalls by generic feature selection. Logic Journal of IGPL\u00a021(4), 560\u2013570 (2013)","journal-title":"Logic Journal of IGPL"},{"key":"21_CR7","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1016\/j.knosys.2012.06.016","volume":"36","author":"S. Pastrana","year":"2012","unstructured":"Pastrana, S., Mitrokotsa, A., Orfila, A., Peris-Lopez, P.: Evaluation of classification algorithms for intrusion detection in MANETs. Knowledge-Based Systems\u00a036, 217\u2013225 (2012)","journal-title":"Knowledge-Based Systems"},{"key":"21_CR8","doi-asserted-by":"crossref","unstructured":"Torrano-Gimenez, C., Nguyen, H.T., Alvarez, G., Franke, K.: Combining expert knowledge with automatic feature extraction for reliable web attack detection. Security and Communication Networks (2012)","DOI":"10.1002\/sec.603"},{"issue":"10","key":"21_CR9","doi-asserted-by":"publisher","first-page":"11994","DOI":"10.1016\/j.eswa.2009.05.029","volume":"36","author":"C.-F. Tsai","year":"2009","unstructured":"Tsai, C.-F., Hsu, Y.-F., Lin, C.-Y., Lin, W.-Y.: Intrusion detection by machine learning: A review. Expert Systems with Applications\u00a036(10), 11994\u201312000 (2009)","journal-title":"Expert Systems with Applications"},{"key":"21_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1007\/11856214_12","volume-title":"Recent Advances in Intrusion Detection","author":"K. Wang","year":"2006","unstructured":"Wang, K., Parekh, J.J., Stolfo, S.J.: Anagram: A content anomaly detector resistant to mimicry attack. In: Zamboni, D., Kruegel, C. (eds.) RAID 2006. LNCS, vol.\u00a04219, pp. 226\u2013248. Springer, Heidelberg (2006)"}],"container-title":["Studies in Computational Intelligence","Intelligent Distributed Computing VIII"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-10422-5_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,8]],"date-time":"2023-02-08T03:32:43Z","timestamp":1675827163000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-10422-5_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319104218","9783319104225"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-10422-5_21","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[],"published":{"date-parts":[[2015]]}}}