{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T13:55:27Z","timestamp":1723038927827},"reference-count":35,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,7]]},"DOI":"10.1109\/compsac48688.2020.0-167","type":"proceedings-article","created":{"date-parts":[[2020,9,22]],"date-time":"2020-09-22T23:44:31Z","timestamp":1600818271000},"source":"Crossref","is-referenced-by-count":19,"title":["Detecting Malicious Web Requests Using an Enhanced TextCNN"],"prefix":"10.1109","author":[{"given":"Lian","family":"Yu","sequence":"first","affiliation":[]},{"given":"Lihao","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Jingtao","family":"Dong","sequence":"additional","affiliation":[]},{"given":"Mengyuan","family":"Li","sequence":"additional","affiliation":[]},{"given":"Lijun","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Bai","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Chen","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","year":"0","journal-title":"Analyzing web traffic Ecml\/pkdd 2007 discovery challenge"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45248-5_13"},{"key":"ref31","author":"zhou","year":"2016","journal-title":"Machine Learning"},{"key":"ref30","author":"ian","year":"2016","journal-title":"Deep Learning"},{"key":"ref35","first-page":"315","article-title":"Deep sparse rectifier neural networks","author":"glorot","year":"0","journal-title":"Proceedings of the Fourteenth International Conference on Artificial Intelligence and Statistics"},{"key":"ref34","year":"0","journal-title":"RFC (Request For Comments) -1738 Unifor m Resource Locators (URL)"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-21373-2_45"},{"key":"ref11","first-page":"283","article-title":"Evaluating CNN and LSTM for Web Att ack Detection","author":"wang","year":"0","journal-title":"Proceedings of the 2018 10th International Conferenc e on Machine Learning and Computing"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CFIS.2018.8336654"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21323-6_4"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10422-5_21"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SECON.2016.7506638"},{"key":"ref16","article-title":"Anomaly-based web application firewall using HTTP-specific features and one-class SV M","author":"epp","year":"0","journal-title":"Workshop Regional de Seguranç a da Informaçã o e de Sistemas C omputacionais"},{"key":"ref17","first-page":"779","article-title":"Improving Web Ap plication Firewalls through Anomaly Detection","author":"betarte","year":"0","journal-title":"2018 17th IEEE Inte rnational Conference on Machine Learning and Applications (ICMLA)"},{"key":"ref18","article-title":"Exact and Approximate Rule Extraction fr om Neural Networks with Boolean Features","author":"mereani","year":"0","journal-title":"Proceedings of the 11th International Joint Conference on Computational Intelligence"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/5826737"},{"key":"ref28","author":"karpathy","year":"0","journal-title":"A Recipe for Training Neural Networks"},{"key":"ref4","year":"0","journal-title":"2017 Statistics about Web-based Attacks Mobile Attacks Data Breaches"},{"key":"ref27","article-title":"Recurrent convolutional neural netwo rks for text classification","author":"lai","year":"0","journal-title":"Twenty-Ninth AAAI Conference on Artificial Intelligence"},{"key":"ref3","author":"rayome","year":"0","journal-title":"Report Web application attacks up 69% in Q3 2017 her e's what to do"},{"key":"ref6","first-page":"1016","article-title":"Streamlined anomaly detection i n web requests using recurrent neural networks","author":"bochem","year":"0","journal-title":"2017 IEEE Conferen ce on Computer Communications Workshops (INFOCOM WKSHPS)"},{"key":"ref29","author":"le","year":"2017","journal-title":"An unsupervised learning approach for network and system analysis"},{"key":"ref5","author":"gim\u00e9nez","year":"2010","journal-title":"HTTP data set CSIC 2010"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3171592.3171594"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70139-4_84"},{"key":"ref2","year":"0","journal-title":"2016 Data Breach Investigations Report"},{"key":"ref9","first-page":"103","article-title":"Web application firewall using character-level c onvolutional neural network","author":"ito","year":"0","journal-title":"2018 IEEE 14th International Colloqui um on Signal Processing & Its Applications (CSPA)"},{"key":"ref1","year":"0","journal-title":"2015 data breach investigations report"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1181"},{"key":"ref22","article-title":"Efficient estimation of w ord representations in vector space","author":"mikolov","year":"0","journal-title":"Workshop at International Conference on Learning Representations (ICLR)"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/BF00994018"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1162\/089976600300015015"},{"key":"ref23","first-page":"2579","article-title":"Visualizing data using t-SNE","author":"maaten","year":"2008","journal-title":"Journal of Machine Learning Research"},{"key":"ref26","author":"xu","year":"2018","journal-title":"Unpaire d sentiment-to-sentiment translation A cycled reinforcement learning ap proach"},{"key":"ref25","first-page":"1480","article-title":"Hierarchica 1 attention networks for document classification","author":"yang","year":"0","journal-title":"Proceedings of the 2 016 conference of the North American chapter of the association for com putational linguistics human language technologies"}],"event":{"name":"2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)","location":"Madrid, Spain","start":{"date-parts":[[2020,7,13]]},"end":{"date-parts":[[2020,7,17]]}},"container-title":["2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9193853\/9201909\/09202428.pdf?arnumber=9202428","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T15:59:58Z","timestamp":1656345598000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9202428\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/compsac48688.2020.0-167","relation":{},"subject":[],"published":{"date-parts":[[2020,7]]}}}