Herramienta de chequeo de registro xml obtenido desde SEDICI (UNLP)

XML

<oai_dc:dc xmlns:oai_dc="http://www.openarchives.org/OAI/2.0/oai_dc/" xmlns:doc="http://www.lyncode.com/xoai" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:dc="http://purl.org/dc/elements/1.1/" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/oai_dc/ http://www.openarchives.org/OAI/2.0/oai_dc.xsd"><identifier>I19-R120-10915-24247</identifier><datestamp>2019-01-20T20:01:38Z</datestamp>
<dc:identifier>http://sedici.unlp.edu.ar/handle/10915/24247</dc:identifier>
<dc:identifier>isbn:0-387-34655-4</dc:identifier>
<dc:title>Web attack detection using ID3</dc:title>
<dc:creator>García, Víctor H.</dc:creator>
<dc:creator>Monroy, Raúl</dc:creator>
<dc:creator>Quintana, Maricela</dc:creator>
<dc:date>2006-08</dc:date>
<dc:date>2006-08</dc:date>
<dc:date>2012-11-15T16:55:14Z</dc:date>
<dc:language>en</dc:language>
<dc:subject>Ciencias Informáticas</dc:subject>
<dc:subject>Web-based services</dc:subject>
<dc:subject>Security and protection (e.g., firewalls)</dc:subject>
<dc:description>Decision tree learning algorithms have been successfully used in knowledge discovery. They use induction in order to provide an appropriate classification of objects in terms of their attributes, inferring decision tree rules. This paper reports on the use of ID3 to Web attack detection. Even though simple, ID3 is sufficient to put apart a number of Web attacks, including a large proportion of their variants.&#13;
It also surpasses existing methods: it portrays a higher true-positive detection rate and a lower false-positive one. The ID3 output classification rules that are easy to read and so computer officers are more likely to grasp the root of an attack, as well as extending the capabilities of the classifier.</dc:description>
<dc:description>Applications in Artificial Intelligence - Applications</dc:description>
<dc:description>Red de Universidades con Carreras en Informática (RedUNCI)</dc:description>
<dc:type>Objeto de conferencia</dc:type>
<dc:type>Objeto de conferencia</dc:type>
<dc:rights>http://creativecommons.org/licenses/by-nc-sa/2.5/ar/</dc:rights>
<dc:rights>Creative Commons Attribution-NonCommercial-ShareAlike 2.5 Argentina (CC BY-NC-SA 2.5)</dc:rights>
<dc:format>application/pdf</dc:format>
</oai_dc:dc>

Datos convertidos

{
    "id": "I19-R120-10915-24247",
    "record_format": "dspace",
    "institution": [
        "Universidad Nacional de La Plata"
    ],
    "institution_str": "I-19",
    "repository_str": "R-120",
    "collection": [
        "SEDICI (UNLP)"
    ],
    "language": [
        "Ingl\u00e9s"
    ],
    "topic": [
        "Ciencias Inform\u00e1ticas",
        "Web-based services",
        "Security and protection (e.g., firewalls)"
    ],
    "spellingShingle": [
        "Ciencias Inform\u00e1ticas",
        "Web-based services",
        "Security and protection (e.g., firewalls)",
        "Garc\u00eda, V\u00edctor H.",
        "Monroy, Ra\u00fal",
        "Quintana, Maricela",
        "Web attack detection using ID3"
    ],
    "topic_facet": [
        "Ciencias Inform\u00e1ticas",
        "Web-based services",
        "Security and protection (e.g., firewalls)"
    ],
    "description": "Decision tree learning algorithms have been successfully used in knowledge discovery. They use induction in order to provide an appropriate classification of objects in terms of their attributes, inferring decision tree rules. This paper reports on the use of ID3 to Web attack detection. Even though simple, ID3 is sufficient to put apart a number of Web attacks, including a large proportion of their variants.\r\nIt also surpasses existing methods: it portrays a higher true-positive detection rate and a lower false-positive one. The ID3 output classification rules that are easy to read and so computer officers are more likely to grasp the root of an attack, as well as extending the capabilities of the classifier.",
    "format": [
        "Objeto de conferencia",
        "Objeto de conferencia"
    ],
    "author": [
        "Garc\u00eda, V\u00edctor H.",
        "Monroy, Ra\u00fal",
        "Quintana, Maricela"
    ],
    "author_facet": [
        "Garc\u00eda, V\u00edctor H.",
        "Monroy, Ra\u00fal",
        "Quintana, Maricela"
    ],
    "author_sort": "Garc\u00eda, V\u00edctor H.",
    "title": "Web attack detection using ID3",
    "title_short": "Web attack detection using ID3",
    "title_full": "Web attack detection using ID3",
    "title_fullStr": "Web attack detection using ID3",
    "title_full_unstemmed": "Web attack detection using ID3",
    "title_sort": "web attack detection using id3",
    "publishDate": [
        "2006"
    ],
    "url": [
        "http:\/\/sedici.unlp.edu.ar\/handle\/10915\/24247"
    ],
    "work_keys_str_mv": [
        "AT garciavictorh webattackdetectionusingid3",
        "AT monroyraul webattackdetectionusingid3",
        "AT quintanamaricela webattackdetectionusingid3"
    ],
    "bdutipo_str": "Repositorios",
    "_version_": 1764820466822807552
}