Even network devices / server-side applications / Web Attacks William Robertson / cross-site / access to services / web requests / web applications / data-mining techniques / web-based intrusion detection / web servers / anomaly detection systems / clustering techniques to unlabeled network / Web-based applications / event processing / purchase web application / web-based application / web intrusion detection system / web server access log entries / web-based attacks / software infrastructure / intrusion detection systems / web server access logs / web attacks / web application / anomaly-based detection systems / ad hoc web-based applications / web-based interfaces / web request / online shopping catalogs / web-based system / parameterized web requests / suspicious web requests / web server / web server application / application-specific protocols / web-based vulnerabilities / learning-based anomaly detection systems / server-side web-based applications / network-based applications / web server logs / /
Organization
University of California / Santa Barbara / Richard A. Kemmerer Reliable Software Group Department / /
Person
Giovanni Vigna / Richard A. Kemmerer / Christopher Kruegel / /