{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T05:59:20Z","timestamp":1726034360926},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030243043"},{"type":"electronic","value":"9783030243050"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-24305-0_37","type":"book-chapter","created":{"date-parts":[[2019,6,28]],"date-time":"2019-06-28T08:02:51Z","timestamp":1561708971000},"page":"496-505","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Prediction of SQL Injection Attacks in Web Applications"],"prefix":"10.1007","author":[{"given":"Chamundeswari","family":"Arumugam","sequence":"first","affiliation":[]},{"given":"Varsha Bhargavi","family":"Dwarakanathan","sequence":"additional","affiliation":[]},{"given":"S.","family":"Gnanamary","sequence":"additional","affiliation":[]},{"given":"Vishalraj Natarajan","family":"Neyveli","sequence":"additional","affiliation":[]},{"given":"Rohit Kanakuppaliyalil","family":"Ramesh","sequence":"additional","affiliation":[]},{"given":"Yeshwanthraa","family":"Kandhavel","sequence":"additional","affiliation":[]},{"given":"Sadhanandhan","family":"Balakrishnan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,29]]},"reference":[{"key":"37_CR1","doi-asserted-by":"crossref","unstructured":"Scholte, T., Robertson, W., Balzarotti, D., Kirda., E.: An empirical analysis of input validation mechanisms in web applications and languages. In: 27th Annual ACM Symposium on Applied Computing, pp. 1419\u20131426 (2012)","DOI":"10.1145\/2245276.2232004"},{"key":"37_CR2","doi-asserted-by":"crossref","unstructured":"Alkhalaf, M., Aydin, A., Bultan, T.: Semantic differential repair for input validation and sanitization. In: ACM International Symposium on Software Testing and Analysis, pp. 225\u2013236 (2014)","DOI":"10.1145\/2610384.2610401"},{"key":"37_CR3","doi-asserted-by":"crossref","unstructured":"Frajt\u00e1k, K., Bure\u0161, M., Jel\u00ednek, I.: Reducing user input validation code in web applications using Pex extension. In: ACM 15th International Conference on Computer Systems and Technologies, pp. 302\u2013308 (2014)","DOI":"10.1145\/2659532.2659633"},{"issue":"4","key":"37_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2541315","volume":"46","author":"Xiaowei Li","year":"2014","unstructured":"Li, X., Xue, Y.: A survey on server-side approaches to securing web applications. ACM Comput. Surv. (CSUR) 46(4), 54:1\u201354:29 (2014)","journal-title":"ACM Computing Surveys"},{"key":"37_CR5","doi-asserted-by":"crossref","unstructured":"Cho, S., Choi, J., Kim, G., Park, M., Cho, S., Han, S.: Runtime input validation for Java web applications using static bytecode instrumentation. In: ACM International Conference on Research in Adaptive and Convergent Systems, pp. 148\u2013152 (2016)","DOI":"10.1145\/2987386.2987432"},{"key":"37_CR6","doi-asserted-by":"crossref","unstructured":"Medeiros, I., Neves, N.F., Correia, M.: Automatic detection and correction of web application vulnerabilities using data mining to predict false positives. In: ACM 23rd International Conference on World Wide Web, pp. 63\u201373 (2014)","DOI":"10.1145\/2566486.2568024"},{"key":"37_CR7","doi-asserted-by":"crossref","unstructured":"Shar, L.K., Tan, H.B.K.: Predicting common web application vulnerabilities from input validation and sanitization code patterns. In: 27th IEEE\/ACM International Conference on Automated Software Engineering, pp. 310\u2013313 (2012)","DOI":"10.1145\/2351676.2351733"},{"key":"37_CR8","doi-asserted-by":"crossref","unstructured":"Shar, L.K., Tan, H.B.K.: Mining input sanitization patterns for predicting SQL injection and cross site scripting vulnerabilities. In: 34th International Conference on Software Engineering, pp. 1293\u20131296 (2012)","DOI":"10.1109\/ICSE.2012.6227096"},{"key":"37_CR9","unstructured":"Solomon, O.U., William, J.B., Lu, F.: Applied machine learning predictive analytics to SQL injection attack detection and prevention. In: IFIP\/IEEE IM 2017 Workshop: 3rd International Workshop on Security for Emerging Distributed Network Technologies, pp. 1087\u20131090 (2017)"},{"key":"37_CR10","doi-asserted-by":"crossref","unstructured":"Fang, Y., Peng, J., Liu, L., Huang, C.: WOVSQLI: detection of SQL injection behaviors using word vector and LSTM. In: Proceedings of the 2nd International Conference on Cryptography, Security and Privacy, pp. 170\u2013174 (2018)","DOI":"10.1145\/3199478.3199503"},{"key":"37_CR11","unstructured":"Haldar, V., Chandra, D., Franz, M.: Dynamic taint propagation for Java. In: Annual Computer Security Applications Conference, pp. 09\u201315 (2005)"},{"key":"37_CR12","doi-asserted-by":"crossref","unstructured":"Halfond, W.G.J., Orso, A.: AMNESIA analysis and monitoring for neutralizing SQL-injection attacks. In: Proceedings of IEEE and ACM International Conference on Automatic Software Engineering, Long Beach, CA, USA, pp. 54\u201359 (2005)","DOI":"10.1145\/1101908.1101935"},{"key":"37_CR13","doi-asserted-by":"crossref","unstructured":"Komiya, R., Paik, I., Hisada, M.: Classification of malicious web code by machine learning. In: 3rd International Conference on Awareness Science and Technology (iCAST), pp. 406\u2013411 (2011)","DOI":"10.1109\/ICAwST.2011.6163109"},{"key":"37_CR14","unstructured":"Jingling, Z., Junxin, Q., Liang, Z., Baojiang, C.: Dynamic taint tracking of Web application based on static code analysis. In: 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, pp. 96\u2013101 (2016)"},{"key":"37_CR15","doi-asserted-by":"crossref","unstructured":"Kumar, S., Mahajan, R., Kumar, N., Khatri, S.K.: A study on web application security and detecting security vulnerabilities. In: 6th International Conference on Reliability, Infocom Technologies and Optimization (ICRITO), pp. 451\u2013455 (2017)","DOI":"10.1109\/ICRITO.2017.8342469"},{"key":"37_CR16","unstructured":"Jane, P.Y., Chaudhari, M.S.: SQLIA: detection and prevention techniques: a survey. IOSR J. Comput. Eng. (IOSR-JCE) 2, 56\u201360 (2009). Second International Conference on Emerging Trends in Engineering (SICETE)"},{"key":"37_CR17","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1080\/00220670209598786","volume":"96","author":"CJ Peng","year":"2002","unstructured":"Peng, C.J., Lee, K.L., Ingersoll, G.M.: An introduction to logistic regression analysis and reporting. J. Educ. Res. 96, 3\u201314 (2002)","journal-title":"J. Educ. Res."}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2019"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-24305-0_37","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,28]],"date-time":"2019-06-28T08:27:52Z","timestamp":1561710472000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-24305-0_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030243043","9783030243050"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-24305-0_37","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"29 June 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCSA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Science and Its Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Saint Petersburg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Russia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccsa2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.iccsa.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}