Art
J-GLOBAL ID:201502257878439406   Reference number:15A0472291

Implementation and Evaluation of Anomaly Detection Using Support Vector Machine for WAF

サポートベクタマシンを用いたWAFへの異常検知機能の実装と評価
Author (2):
Material:
Volume:Issue:Page: 1-13 (WEB ONLY)  Publication year: Mar. 25, 2014 
JST Material Number: U0477A  ISSN: 1882-7829  Document type: Article
Article type: 原著論文  Country of issue: Japan (JPN)  Language: JAPANESE (JA)
Thesaurus term:
Thesaurus term/Semi thesaurus term
Keywords indexed to the article.
All keywords is available on JDreamIII(charged).
On J-GLOBAL, this item will be available after more than half a year after the record posted. In addtion, medical articles require to login to MyJ-GLOBAL.

Semi thesaurus term:
Thesaurus term/Semi thesaurus term
Keywords indexed to the article.
All keywords is available on JDreamIII(charged).
On J-GLOBAL, this item will be available after more than half a year after the record posted. In addtion, medical articles require to login to MyJ-GLOBAL.

JST classification (2):
JST classification
Category name(code) classified by JST.
Data protection  ,  Pattern recognition 
Reference (19):
  • OWASP: Cross-site Scripting (XSS) - OWASP, available from (https://www.owasp.org/index.php/Cross-site_Scripting_(XSS)) (2011).
  • Anley, C.: Advanced SQL injection in SQL Server applications, available from (http://www.nextgenss.com/papers/advanced_sql_injection.pdf) (2002).
  • Anley, C.: (more) advanced SQL injection, available from (http://www.nextgenss.com/papers/more_advanced_sql_injection.pdf) (2002).
  • OWASP: SQL Injection - OWASP, available from (https://www.owasp.org/index.php/SQL_Injection) (2012).
  • 情報処理推進機構:ソフトウェア等の脆弱性関連情報に関する届出状況,入手先〈http://www.ipa.go.jp/security/vuln/report/vuln2012q3.html>(2012).
more...
Terms in the title (4):
Terms in the title
Keywords automatically extracted from the title.

Return to Previous Page