{"id":"https://openalex.org/W2891540671","doi":"https://doi.org/10.1093/jigpal/jzy029","title":"Protecting the application layer in the public domain with machine learning methods","display_name":"Protecting the application layer in the public domain with machine learning methods","publication_year":2018,"publication_date":"2018-08-09","ids":{"openalex":"https://openalex.org/W2891540671","doi":"https://doi.org/10.1093/jigpal/jzy029","mag":"2891540671"},"language":"en","primary_location":{"id":"doi:10.1093/jigpal/jzy029","is_oa":false,"landing_page_url":"https://doi.org/10.1093/jigpal/jzy029","pdf_url":null,"source":{"id":"https://openalex.org/S2734381524","display_name":"Logic Journal of IGPL","issn_l":"1367-0751","issn":["1367-0751","1368-9894"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":"public-domain","license_id":"https://openalex.org/licenses/public-domain","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Logic Journal of the IGPL","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5042632349","display_name":"Rafa\u0142 Kozik","orcid":"https://orcid.org/0000-0001-7122-3306"},"institutions":[{"id":"https://openalex.org/I1300393620","display_name":"Bydgoszcz University of Science and Technology","ror":"https://ror.org/049eq0c58","country_code":"PL","type":"education","lineage":["https://openalex.org/I1300393620"]},{"id":"https://openalex.org/I686019","display_name":"AGH University of Krakow","ror":"https://ror.org/00bas1c41","country_code":"PL","type":"education","lineage":["https://openalex.org/I686019"]}],"countries":["PL"],"is_corresponding":true,"raw_author_name":"Rafa\u0142 Kozik","raw_affiliation_strings":["UTP University of Science and Technology, Bydgoszcz, Poland"],"affiliations":[{"raw_affiliation_string":"UTP University of Science and Technology, Bydgoszcz, Poland","institution_ids":["https://openalex.org/I686019","https://openalex.org/I1300393620"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5009283476","display_name":"Micha\u0142 Chora\u015b","orcid":"https://orcid.org/0000-0003-1405-9911"},"institutions":[{"id":"https://openalex.org/I1300393620","display_name":"Bydgoszcz University of Science and Technology","ror":"https://ror.org/049eq0c58","country_code":"PL","type":"education","lineage":["https://openalex.org/I1300393620"]},{"id":"https://openalex.org/I686019","display_name":"AGH University of Krakow","ror":"https://ror.org/00bas1c41","country_code":"PL","type":"education","lineage":["https://openalex.org/I686019"]}],"countries":["PL"],"is_corresponding":false,"raw_author_name":"Micha\u0142 Chora\u015b","raw_affiliation_strings":["UTP University of Science and Technology, Bydgoszcz, Poland"],"affiliations":[{"raw_affiliation_string":"UTP University of Science and Technology, Bydgoszcz, Poland","institution_ids":["https://openalex.org/I686019","https://openalex.org/I1300393620"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5042632349"],"corresponding_institution_ids":["https://openalex.org/I1300393620","https://openalex.org/I686019"],"apc_list":{"value":4151,"currency":"USD","value_usd":4151},"apc_paid":null,"fwci":0.9227,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.78050039,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"27","issue":"2","first_page":"149","last_page":"159"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7046351432800293},{"id":"https://openalex.org/keywords/layer","display_name":"Layer (electronics)","score":0.5744507312774658},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.5311533212661743},{"id":"https://openalex.org/keywords/application-layer","display_name":"Application layer","score":0.45160943269729614},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4216678738594055},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3644777536392212},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.23469823598861694},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.08802452683448792},{"id":"https://openalex.org/keywords/materials-science","display_name":"Materials science","score":0.08667629957199097},{"id":"https://openalex.org/keywords/nanotechnology","display_name":"Nanotechnology","score":0.051150619983673096}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7046351432800293},{"id":"https://openalex.org/C2779227376","wikidata":"https://www.wikidata.org/wiki/Q6505497","display_name":"Layer (electronics)","level":2,"score":0.5744507312774658},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.5311533212661743},{"id":"https://openalex.org/C190793597","wikidata":"https://www.wikidata.org/wiki/Q189768","display_name":"Application layer","level":3,"score":0.45160943269729614},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4216678738594055},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3644777536392212},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.23469823598861694},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.08802452683448792},{"id":"https://openalex.org/C192562407","wikidata":"https://www.wikidata.org/wiki/Q228736","display_name":"Materials science","level":0,"score":0.08667629957199097},{"id":"https://openalex.org/C171250308","wikidata":"https://www.wikidata.org/wiki/Q11468","display_name":"Nanotechnology","level":1,"score":0.051150619983673096},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1093/jigpal/jzy029","is_oa":false,"landing_page_url":"https://doi.org/10.1093/jigpal/jzy029","pdf_url":null,"source":{"id":"https://openalex.org/S2734381524","display_name":"Logic Journal of IGPL","issn_l":"1367-0751","issn":["1367-0751","1368-9894"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":"public-domain","license_id":"https://openalex.org/licenses/public-domain","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Logic Journal of the IGPL","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W45942525","https://openalex.org/W66560603","https://openalex.org/W1488044888","https://openalex.org/W1501594319","https://openalex.org/W1504161274","https://openalex.org/W1594536929","https://openalex.org/W2103378897","https://openalex.org/W2121035740","https://openalex.org/W2126862902","https://openalex.org/W4210947630","https://openalex.org/W6681367062","https://openalex.org/W6727930986"],"related_works":["https://openalex.org/W2961085424","https://openalex.org/W4306674287","https://openalex.org/W3046775127","https://openalex.org/W3107602296","https://openalex.org/W3170094116","https://openalex.org/W4386462264","https://openalex.org/W4364306694","https://openalex.org/W4312192474","https://openalex.org/W4283697347","https://openalex.org/W4210805261"],"abstract_inverted_index":{"Currently,":[0],"we":[1,91,128,157],"can":[2,49,70],"observe":[3],"that":[4,68,106],"vulnerable":[5],"web":[6,20,25,41,51],"pages":[7],"are":[8],"a":[9,59,80,93],"common":[10],"element":[11,31],"in":[12,88,121,139,179],"many":[13,33],"high-profile":[14],"cyberattacks.":[15],"On":[16],"the":[17,40,46,66,114,130,135,140,152,159,172,176],"other":[18,76,83],"hand,":[19],"applications":[21],"(as":[22],"well":[23],"as":[24,73,79],"services)":[26],"have":[27,169],"become":[28],"an":[29],"inherent":[30],"of":[32,45,82,116,134,155,161,175],"supply":[34],"chains.":[35],"In":[36,125],"order":[37],"to":[38,111],"protect":[39],"services":[42],"against":[43],"some":[44],"cyberattacks,":[47],"one":[48],"adapt":[50],"application":[52,98,133],"firewalls":[53],"(WAF)":[54],"solutions.":[55],"However,":[56],"quite":[57],"often":[58],"challenge":[60],"for":[61,96],"typical":[62],"WAF":[63],"software":[64],"is":[65],"fact":[67],"HTTP":[69],"be":[71],"used":[72,120],"transport":[74],"by":[75],"protocols":[77],"or":[78],"mix":[81],"various":[84,162],"encoding":[85],"techniques.":[86,167],"Therefore,":[87],"this":[89,107,122,126],"paper,":[90,127],"propose":[92],"flexible":[94],"schema":[95],"automated":[97],"layer":[99],"request":[100],"structure":[101],"identification.":[102],"Our":[103],"experiments":[104],"show":[105,129],"technique":[108],"allows":[109],"us":[110],"further":[112],"improve":[113],"effectiveness":[115],"known":[117],"detection":[118],"methods":[119],"research":[123],"domain.":[124],"possible":[131,173],"practical":[132],"proposed":[136,177],"cybersecurity":[137],"solution":[138,178],"public":[141,144],"domain,":[142],"namely":[143],"administration":[145],"web-based":[146],"systems":[147],"and":[148,164],"healthcare":[149],"sectors.":[150],"From":[151],"scientific":[153],"point":[154],"view,":[156],"presented":[158],"results":[160],"classifiers":[163],"pattern":[165],"extraction":[166],"We":[168],"also":[170],"addressed":[171],"deployment":[174],"Big":[180],"Data-enabled":[181],"environments.":[182]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
