Connections the quarterly journal

Search form

  • Like Connections page on Facebook
  • Follow us on Twitter
  • Find connections on Istagram
  • Connect with us on LinkedIN
  • Subscribe to Connections RSS
  • English
  • Русский
  • Journal
    • Previews
    • Archive
    • Top papers
    • Athena Award
  • Submissions
    • Guidelines
    • Copyright information
    • Conflict of interest
    • Ethics in publishing
    • Themes
    • Calls for articles
    • Submit a paper
  • About
    • Mission
    • Editorial policy
    • Disclaimer
    • Editorial Board
    • Advisers
    • Author Index
    • Indexing & Archiving
    • Contact Us
    • Privacy policy
Share/Save

An adaptive system for detecting malicious queries in web attacks

Publication Type:

Journal Article

Authors:

Ying Dong; Yuqing Zhang; Hua Ma; Qianru Wu; Qixu Liu; Kai Wang; Wenjie Wang

Source:

Science China Information Sciences, Volume 61 (2018)
  • 4430 reads
  • Google Scholar
  • DOI
  • RTF
  • EndNote XML

Active calls for articles

Hybrid Operations

Deadline:
15.09.2025

Check also our Google Scholar profile

  • Downloads
  • Cited in
  • How to cite
No files have yet been downloaded.
Stetsenko, Inna V., and Maksym Demydenko. "Signature-based Intrusion Detection Hardware-Software Complex." Information & Security: An International Journal 47, no. 2 (2020): 221-231.
APA style: Dong, Y., Zhang Y., Ma H., Wu Q., Liu Q., Wang K., et al. (2018).  An adaptive system for detecting malicious queries in web attacks. Science China Information Sciences. 61,
Chicago style: Dong, Ying, Yuqing Zhang, Hua Ma, Qianru Wu, Qixu Liu, Kai Wang, and Wenjie Wang. "An adaptive system for detecting malicious queries in web attacks." Science China Information Sciences 61 (2018).
IEEE style: Dong, Y., Y. Zhang, H. Ma, Q. Wu, Q. Liu, K. Wang, and W. Wang, "An adaptive system for detecting malicious queries in web attacks", Science China Information Sciences, vol. 61, 2018.
DOI https://doi.org/10.1007/s11432-017-9288-4
  • Trending
  • Latest
  • Most cited
  • The Weaponization of Emerging Technologies and Their Impact on Global Risk: A Perspective from the PfPC Emerging Security Challenges Working Group (1,694)
  • Goodbye Globalization? Hello 'Fragmentegration'! - The World Economy and Strategic Competition (1,266)
  • Towards a New Role for the European Union in the South Caucasus? (1,262)
  • Hybrid Threats and Strategic Competition (1,219)
  • The PfP Consortium Regional Stability in South East Europe Working Group at 25: The Transformed Balkans and the Work Ahead (1,170)
view all
  • Communicating (In)Security in Ukraine
  • Hybrid Warfare in the Black Sea Region: Russian Information-Psychological Operations in Georgia
  • Ukraine's Component in the Platform of European Memory and Conscience
  • Kremlin's 'War on Terrorism' in the Northeastern Caucasus: How Chechnya Still 'Saves' Russia
  • A Theory of Change: 25 Years of the Partnership for Peace Consortium
view all
Introduction to Program-based Defense Resource Management (8)
The Art of Shaping Defense Policy: Scope, Components, Relationships (but no Algorithms) (6)
NATO and the South Caucasus: Armenia, Azerbaijan, and Georgia on Different Tracks (5)
Terror-Crime Nexus? Terrorism and Arms, Drug, and Human Trafficking in Georgia (4)
Terrorist Routes in Central Asia: Trafficking Drugs, Humans, and Weapons (4)
view all

© Partnership for Peace Consortium of Defense Academies and Security Studies Institutes, 2012-2025
This site was designed and is maintained by Procon Ltd., Executive publisher of Connections: The Quarterly Journal