{"id":"https://openalex.org/W2036617119","doi":"https://doi.org/10.1109/services.2010.128","title":"Autonomous Short Latency System for Web Application Layer Firewall","display_name":"Autonomous Short Latency System for Web Application Layer Firewall","publication_year":2010,"publication_date":"2010-07-01","ids":{"openalex":"https://openalex.org/W2036617119","doi":"https://doi.org/10.1109/services.2010.128","mag":"2036617119"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/services.2010.128","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100979423","display_name":"Hironao Takahashi","orcid":null},"institutions":[{"id":"https://openalex.org/I114531698","display_name":"Tokyo Institute of Technology","ror":"https://ror.org/0112mx960","country_code":"JP","type":"funder","lineage":["https://openalex.org/I114531698"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Hironao Takahashi","raw_affiliation_strings":["Department of Computer Science, Tokyo Institute of Technology, Tokyo, Japan#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Tokyo Institute of Technology, Tokyo, Japan#TAB#","institution_ids":["https://openalex.org/I114531698"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102422487","display_name":"Kinji Mori","orcid":null},"institutions":[{"id":"https://openalex.org/I114531698","display_name":"Tokyo Institute of Technology","ror":"https://ror.org/0112mx960","country_code":"JP","type":"funder","lineage":["https://openalex.org/I114531698"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Kinji Mori","raw_affiliation_strings":["Department of Computer Science, Tokyo Institute of Technology, Tokyo, Japan#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Tokyo Institute of Technology, Tokyo, Japan#TAB#","institution_ids":["https://openalex.org/I114531698"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5043544976","display_name":"Hafiz Farooq Ahmad","orcid":"https://orcid.org/0000-0002-8545-9771"},"institutions":[{"id":"https://openalex.org/I312958679","display_name":"National University of Science and Technology","ror":"https://ror.org/02kesvt12","country_code":"ZW","type":"education","lineage":["https://openalex.org/I312958679"]}],"countries":["ZW"],"is_corresponding":false,"raw_author_name":"Hafiz Farooq Ahmad","raw_affiliation_strings":["[Sch. of Electr. Eng. & Comput. Sci., Nat. Univ. of Sci. & Technol., Islamabad, Pakistan]"],"affiliations":[{"raw_affiliation_string":"[Sch. of Electr. Eng. & Comput. Sci., Nat. Univ. of Sci. & Technol., Islamabad, Pakistan]","institution_ids":["https://openalex.org/I312958679"]}]}],"institution_assertions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":1,"citation_normalized_percentile":{"value":0.239813,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":64,"max":71},"biblio":{"volume":null,"issue":null,"first_page":"447","last_page":"452"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9993,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9973,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8085979},{"id":"https://openalex.org/C86444895","wikidata":"https://www.wikidata.org/wiki/Q451816","display_name":"Application firewall","level":4,"score":0.6393069},{"id":"https://openalex.org/C35578498","wikidata":"https://www.wikidata.org/wiki/Q193424","display_name":"Web service","level":2,"score":0.5890916},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.50368685},{"id":"https://openalex.org/C59241245","wikidata":"https://www.wikidata.org/wiki/Q4781497","display_name":"Web application security","level":4,"score":0.4994409},{"id":"https://openalex.org/C82876162","wikidata":"https://www.wikidata.org/wiki/Q17096504","display_name":"Latency (audio)","level":2,"score":0.47376257},{"id":"https://openalex.org/C115537543","wikidata":"https://www.wikidata.org/wiki/Q165596","display_name":"Cache","level":2,"score":0.45124528},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.34042674},{"id":"https://openalex.org/C79373723","wikidata":"https://www.wikidata.org/wiki/Q386275","display_name":"Web development","level":3,"score":0.30870962},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.30011722},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.27246535},{"id":"https://openalex.org/C22927095","wikidata":"https://www.wikidata.org/wiki/Q1784206","display_name":"Stateful firewall","level":3,"score":0.09611052},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/services.2010.128","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.53}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":12,"referenced_works":["https://openalex.org/W192244417","https://openalex.org/W1984638510","https://openalex.org/W1991415168","https://openalex.org/W2013221213","https://openalex.org/W2042954188","https://openalex.org/W2045808511","https://openalex.org/W2112147882","https://openalex.org/W2140136554","https://openalex.org/W2156014142","https://openalex.org/W2189465261","https://openalex.org/W2941725733","https://openalex.org/W654473636"],"related_works":["https://openalex.org/W4313139008","https://openalex.org/W3139770152","https://openalex.org/W2913452075","https://openalex.org/W2809183419","https://openalex.org/W2156201195","https://openalex.org/W2139596909","https://openalex.org/W2064213895","https://openalex.org/W2003662123","https://openalex.org/W1967778478","https://openalex.org/W178471791"],"abstract_inverted_index":{"Real":[0],"time":[1,22,79,214],"application":[2,114,139],"was":[3],"required":[4,44,166],"many":[5,18],"types":[6,19],"of":[7,20,54,72,78,92,132,146,185,213],"industrial":[8],"controllers,":[9],"factory":[10],"machines":[11],"since":[12],"20-century.":[13],"It":[14],"is":[15,75,84,98,108,126,149,164,195,215,227,238],"also":[16],"utilizing":[17],"real":[21],"controllers":[23],"for":[24,241],"vehicle":[25],"such":[26],"as":[27],"train,":[28],"automobile":[29],"and":[30,81,171],"so":[31,57],"on.":[32],"On":[33],"the":[34,49,144,175],"other":[35,82],"hand,":[36],"Web":[37,102,138,242],"services":[38,53,67],"that":[39,118],"are":[40,43,51,56,68,135],"using":[41],"Internet":[42],"short":[45,76,183,234,246],"latency":[46,77,184,212,235],"system.":[47,210,220],"When":[48],"accesses":[50,117],"increased,":[52],"quality":[55],"important":[58],"factors":[59],"to":[60,128,205],"achieve":[61,129,206],"their":[62,147],"requirement.":[63,73],"Thus,":[64,232],"these":[65,158],"web":[66,110,113,123,162,223],"facing":[69],"different":[70],"levels":[71],"One":[74],"service":[80,103,124],"one":[83],"protection":[85],"from":[86],"malicious":[87,109],"access.":[88],"To":[89,156],"support":[90],"two":[91],"both":[93],"at":[94],"same":[95],"time,":[96,186],"it":[97,187],"big":[99],"challenge":[100],"in":[101],"today.":[104],"The":[105,211],"main":[106],"issue":[107],"attacks":[111],"on":[112],"layer":[115],"level":[116,131,140],"came":[119],"up":[120],"recently.":[121],"Today's":[122],"provider":[125],"attempting":[127],"this":[130],"service.":[133],"There":[134],"a":[136],"few":[137],"security":[141],"technology":[142,204],"but":[143],"all":[145],"approach":[148,219],"black":[150],"list":[151,154,169],"or":[152],"white":[153],"base.":[155],"analyze":[157],"HTTP":[159],"protocol":[160],"accesses,":[161],"site":[163],"always":[165],"high":[167,189],"performance":[168,191],"search":[170],"compares":[172],"them.":[173],"From":[174],"analyzing":[176],"processes":[177],"have":[178],"some":[179],"events":[180],"overhead.":[181],"Keeping":[182],"needs":[188],"I/O":[190],"solution.":[192],"This":[193],"paper":[194],"proposing":[196,233],"L3":[197],"block":[198],"cache":[199],"node":[200,236],"with":[201,217,245],"eventually":[202],"consistency":[203],"timeliness":[207],"autonomous":[208],"decentralized":[209],"compared":[216],"traditional":[218],"Jmeter":[221],"based":[222],"access":[224],"response":[225],"evaluation":[226],"shown":[228],"very":[229],"positive":[230],"result.":[231],"system":[237],"great":[239],"solution":[240],"Application":[243],"Firewall":[244],"latency.":[247]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2036617119","counts_by_year":[{"year":2016,"cited_by_count":1}],"updated_date":"2025-04-18T19:10:02.240464","created_date":"2016-06-24"}