J. J. Adeva and J. M. Atxa, Intrusion detection in web applications using text mining, Engineering Applications of Artificial Intelligence, vol.20, issue.4, pp.555-566, 2007.
DOI : 10.1016/j.engappai.2006.09.001

M. Cova, D. Balzarotti, V. Felmetsger, and G. Vigna, Swaddler: An Approach for the Anomaly-Based Detection of State Violations in Web Applications, Proceedings of the International Symposium on Recent Advances in Intrusion Detection (RAID), pp.63-86, 2007.
DOI : 10.1007/978-3-540-74320-0_4

D. Denning, An intrusion-detection model, IEEE Transactions on Software Engineering, vol.13, issue.2, pp.222-232, 1987.

T. A. Foundation, Apache http server documentation, 2007.

C. Kruegel and G. Vigna, Anomaly detection of webbased attacks, 10th ACM Conference on Computer and Communications Security (CCS), 2003.

C. Kruegel, G. Vigna, and W. Robertson, A multimodel approach to the detection of web-based attacks, Computer Networks: The International Journal of Computer and Telecommunications Networking, vol.48, issue.5, pp.717-738, 2005.

T. B. Lee, L. Masinter, and M. Mccahill, Uniform resource locator, 1994.

W. Lee, S. J. Stolfo, P. K. Chan, E. Eskin, W. Fan et al., Real time data mining-based intrusion detection. DARPA Information Survivability Conference & Exposition II, DISCEX '01. Proceedings, pp.89-100, 2001.

A. Pereira, G. Franco, L. Silva, and W. M. Jr, A hierarchical characterization of user behavior, WebMedia and LA-Web, 2004. Proceedings, pp.2-9, 2007.
DOI : 10.1109/WEBMED.2004.1348138

T. Pietraszek and A. Tanner, Data mining and machine learning???Towards reducing false positives in intrusion detection, Information Security Technical Report, vol.10, issue.3, 2005.
DOI : 10.1016/j.istr.2005.07.001

W. Robertson, G. Vigna, C. Kruegel, and R. A. Kemmerer, Using generalization and characterization techniques in the anomaly-based detection of web attacks, Proceedings of Network and Distributed System Security Symposium Conference, Internet Society, 2006.

D. Wagner and D. Dean, Intrusion detection via static analysis, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001, p.156, 2001.
DOI : 10.1109/SECPRI.2001.924296

D. Yeung and Y. Ding, Host-based intrusion detection using dynamic and static behavioral models, Pattern Recognition, vol.36, issue.1, pp.229-243, 2003.
DOI : 10.1016/S0031-3203(02)00026-2