{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T13:35:18Z","timestamp":1773840918857,"version":"3.50.1"},"reference-count":99,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100006013","name":"United Arab Emirates University","doi-asserted-by":"publisher","award":["12R170"],"award-info":[{"award-number":["12R170"]}],"id":[{"id":"10.13039\/501100006013","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2024,6]]},"DOI":"10.1007\/s11036-024-02367-z","type":"journal-article","created":{"date-parts":[[2024,7,19]],"date-time":"2024-07-19T06:01:56Z","timestamp":1721368916000},"page":"1008-1037","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["A Comprehensive Evaluation of Machine Learning Algorithms for Web Application Attack Detection with Knowledge Graph Integration"],"prefix":"10.1007","volume":"29","author":[{"given":"Muhusina","family":"Ismail","sequence":"first","affiliation":[]},{"given":"Saed","family":"Alrabaee","sequence":"additional","affiliation":[]},{"given":"Kim-Kwang Raymond","family":"Choo","sequence":"additional","affiliation":[]},{"given":"Luqman","family":"Ali","sequence":"additional","affiliation":[]},{"given":"Saad","family":"Harous","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,7,19]]},"reference":[{"issue":"1","key":"2367_CR1","doi-asserted-by":"publisher","first-page":"28","DOI":"10.3390\/software3010002","volume":"3","author":"K Sambhus","year":"2024","unstructured":"Sambhus K, Liu Y (2024) Automating sql injection and cross-site scripting vulnerability remediation in code. Software 3(1):28\u201346","journal-title":"Software"},{"issue":"1","key":"2367_CR2","doi-asserted-by":"publisher","first-page":"1803","DOI":"10.1038\/s41598-023-48845-4","volume":"14","author":"JR Tadhani","year":"2024","unstructured":"Tadhani JR, Vekariya V, Sorathiya V, Alshathri S, El-Shafai W (2024) Securing web applications against xss and sqli attacks using a novel deep learning approach. Scientific Reports 14(1):1803","journal-title":"Scientific Reports"},{"key":"2367_CR3","doi-asserted-by":"crossref","unstructured":"P\u00e9rez-Ant\u00f3n R, L\u00f3pez-S\u00e1nchez JI, Corbi A (2023) The game theory in quantum computers: a review","DOI":"10.9781\/ijimai.2023.09.001"},{"key":"2367_CR4","doi-asserted-by":"crossref","unstructured":"Bobadilla J, Due\u00f1as-Ler\u00edn J, Ortega F, Gutierrez A (2023) Comprehensive evaluation of matrix factorization models for collaborative filtering recommender systems","DOI":"10.9781\/ijimai.2023.04.008"},{"key":"2367_CR5","first-page":"1","volume":"20","author":"Y Gao","year":"2023","unstructured":"Gao Y, Feng Y, Yu X, Mei S (2023) Robust signature-based hyperspectral target detection using dual networks. IEEE Geosci Remote Sens Lett 20:1\u20135","journal-title":"IEEE Geosci Remote Sens Lett"},{"issue":"1","key":"2367_CR6","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1007\/s43926-023-00034-5","volume":"3","author":"M Bhavsar","year":"2023","unstructured":"Bhavsar M, Roy K, Kelly J, Olusola O (2023) Anomaly-based intrusion detection system for iot application. Discover Internet of things 3(1):5","journal-title":"Discover Internet of things"},{"issue":"11","key":"2367_CR7","doi-asserted-by":"publisher","first-page":"13071","DOI":"10.1007\/s10462-023-10465-9","volume":"56","author":"C Peng","year":"2023","unstructured":"Peng C, Xia F, Naseriparsa M, Osborne F (2023) Knowledge graphs: opportunities and challenges. Artif Intell Rev 56(11):13071\u201313102","journal-title":"Artif Intell Rev"},{"issue":"3","key":"2367_CR8","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1016\/j.jksuci.2023.02.009","volume":"35","author":"O Chakir","year":"2023","unstructured":"Chakir O, Rehaimi A, Sadqi Y, Krichen M, Gaba GS, Gurtov A et al (2023) An empirical assessment of ensemble methods and traditional machine learning techniques for web-based attack detection in industry 5.0. Journal of King Saud University-Computer and Information Sciences 35(3):103\u2013119","journal-title":"Journal of King Saud University-Computer and Information Sciences"},{"key":"2367_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2024.101162","volume":"26","author":"MM Inuwa","year":"2024","unstructured":"Inuwa MM, Das R (2024) A comparative analysis of various machine learning methods for anomaly detection in cyber attacks on iot networks. Internet of Things 26:101162","journal-title":"Internet of Things"},{"key":"2367_CR10","doi-asserted-by":"crossref","unstructured":"Ismail M, Alrabaee S, Harous S, Choo K-KR (2023) Empirical evaluations of machine learning effectiveness in detecting web application attacks. In: International conference on future access enablers of ubiquitous and intelligent infrastructures. Springer, pp 99\u2013116","DOI":"10.1007\/978-3-031-50051-0_8"},{"key":"2367_CR11","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1007\/978-3-031-18409-3_20","volume-title":"International joint conference 15th international conference on computational intelligence in security for information systems (CISIS 2022) 13th international conference on european transnational education (ICEUTE 2022)","author":"D Urda","year":"2023","unstructured":"Urda D, Basurto N, Kull M, Herrero \u00c1 (2023) Evaluating classifiers\u2019 performance to detect attacks in website traffic. In: Garc\u00eda Bringas P, P\u00e9rez Garc\u00eda H, Pis\u00f3n FJ, Villar Flecha JR, Troncoso Lora A, Cal EA, Herrero \u00c1, Mart\u00ednez \u00c1lvarez F, Psaila G, Quinti\u00e1n H, Corchado E (eds) International joint conference 15th international conference on computational intelligence in security for information systems (CISIS 2022) 13th international conference on european transnational education (ICEUTE 2022). Springer, Cham, pp 205\u2013215"},{"key":"2367_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102990","volume":"124","author":"T Hu","year":"2023","unstructured":"Hu T, Xu C, Zhang S, Tao S, Li L (2023) Cross-site scripting detection with two-channel feature fusion embedded in self-attention mechanism. Comput Secur 124:102990","journal-title":"Comput Secur"},{"issue":"1","key":"2367_CR13","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1186\/s40537-022-00661-9","volume":"9","author":"R Zuech","year":"2022","unstructured":"Zuech R, Hancock J, Khoshgoftaar TM (2022) A new feature popularity framework for detecting cyberattacks using popular features. Journal of Big Data 9(1):119. https:\/\/doi.org\/10.1186\/s40537-022-00661-9","journal-title":"Journal of Big Data"},{"key":"2367_CR14","doi-asserted-by":"publisher","unstructured":"Sharma S, Zavarsky P, Butakov S (2020) Machine learning based intrusion detection system for web-based attacks. In: 2020 IEEE 6th Intl conference on big data security on cloud (BigDataSecurity), IEEE Intl conference on high performance and smart computing, (HPSC) and IEEE Intl conference on intelligent data and security (IDS), Baltimore, MD, USA. IEEE, pp 227\u2013230. https:\/\/doi.org\/10.1109\/BigDataSecurity-HPSC-IDS49724.2020.00048","DOI":"10.1109\/BigDataSecurity-HPSC-IDS49724.2020.00048"},{"key":"2367_CR15","doi-asserted-by":"publisher","unstructured":"Panigrahi R, Borah S, Pramanik M, Bhoi AK, Barsocchi P, Nayak SR, Alnumay W (2022) Intrusion detection in cyber\u2013physical environment using hybrid na\u00efve bayes\u2014decision table and multi-objective evolutionary feature selection. Comput Commun 188:133\u2013144. https:\/\/doi.org\/10.1016\/j.comcom.2022.02.012","DOI":"10.1016\/j.comcom.2022.02.012"},{"key":"2367_CR16","doi-asserted-by":"publisher","unstructured":"Li X, Ma W, Zhou Z, Zhou Z, Xu C (2020) Xss attack detection model based on semi-supervised learning algorithm with weighted neighbor purity. In: Ad-Hoc, Mobile, and Wireless Networks. Lecture Notes in Computer Science, Bari, Italy. Springer, pp 385\u2013397. https:\/\/doi.org\/10.1007\/978-3-030-60321-5_31","DOI":"10.1007\/978-3-030-60321-5_31"},{"key":"2367_CR17","doi-asserted-by":"publisher","unstructured":"Banerjee R, Baksi A, Singh N, Bishnu SK (2020) Detection of xss in web applications using machine learning classifiers. In: 2020 4th International conference on electronics, materials engineering and nano-technology (IEMENTech), Kolkata, India. IEEE, pp 1\u20135. https:\/\/doi.org\/10.1109\/IEMENTech51367.2020.9270052","DOI":"10.1109\/IEMENTech51367.2020.9270052"},{"key":"2367_CR18","doi-asserted-by":"crossref","unstructured":"Gogoi B, Ahmed T, Saikia HK (2021) Detection of xss attacks in web applications: a machine learning approach. Int J Innov Res Sci Comp Sci and Technol (IJIRCST) 9","DOI":"10.21276\/ijircst.2021.9.1.1"},{"key":"2367_CR19","doi-asserted-by":"publisher","unstructured":"Kascheev S, Olenchikova T (2020) The detecting cross-site scripting (xss) using machine learning methods. In: 2020 Global smart industry conference (GloSIC), Chelyabinsk, Russia. IEEE, pp 265\u2013270. https:\/\/doi.org\/10.1109\/GloSIC50886.2020.9267866","DOI":"10.1109\/GloSIC50886.2020.9267866"},{"key":"2367_CR20","doi-asserted-by":"publisher","unstructured":"Saleem S, Sheeraz M, Hanif M, Farooq U (2020) Web server attack detection using machine learning. In: 2020 International conference on cyber warfare and security (ICCWS), Islamabad, Pakistan. IEEE, pp 1\u20137. https:\/\/doi.org\/10.1109\/ICCWS48432.2020.9292393","DOI":"10.1109\/ICCWS48432.2020.9292393"},{"key":"2367_CR21","doi-asserted-by":"publisher","unstructured":"Albusalih NK, Aljanabi RJ (2022) Xss detection using hybrid machine learning methods. In: 2022 International conference on data science and intelligent computing (ICDSIC), Karbala, Iraq. IEEE, pp 159\u2013163. https:\/\/doi.org\/10.1109\/ICDSIC56987.2022.10075990","DOI":"10.1109\/ICDSIC56987.2022.10075990"},{"key":"2367_CR22","doi-asserted-by":"publisher","unstructured":"Ghannam NB, Salhab N, Rahman MA (2022) Sql injection, cross-site scripting and buffer overflow attacks detection using machine learning. In: 2022 International conference on data analytics for business and industry (ICDABI), Sakhir, Bahrain. IEEE, pp 292\u2013296. https:\/\/doi.org\/10.1109\/ICDABI56818.2022.10041495","DOI":"10.1109\/ICDABI56818.2022.10041495"},{"key":"2367_CR23","doi-asserted-by":"publisher","unstructured":"Chen C, Zhong J, Chen W (2021) Machine learning-based web security intrusion detection system. In: 2021 3rd International academic exchange conference on science and technology innovation (IAECST), pp 173\u2013177. https:\/\/doi.org\/10.1109\/IAECST54258.2021.9695557","DOI":"10.1109\/IAECST54258.2021.9695557"},{"key":"2367_CR24","doi-asserted-by":"publisher","unstructured":"Choudhary RR, Verma S, Meena G (2021) Detection of sql injection attack using machine learning. In: 2021 IEEE International conference on technology, research, and innovation for betterment of society (TRIBES). IEEE, pp 1\u20136. https:\/\/doi.org\/10.1109\/TRIBES52498.2021.9751616","DOI":"10.1109\/TRIBES52498.2021.9751616"},{"key":"2367_CR25","doi-asserted-by":"crossref","unstructured":"Li X, Ma W, Zhou Z, Xu C (2020) Xss attack detection model based on semi-supervised learning algorithm with weighted neighbor purity. In: Ad-Hoc, Mobile, and wireless networks. Springer","DOI":"10.1007\/978-3-030-61746-2_15"},{"key":"2367_CR26","doi-asserted-by":"crossref","unstructured":"Gilliard E, Liu J, Aliyu AA (2024) Knowledge graph reasoning for cyber attack detection. IET Communications","DOI":"10.1049\/cmu2.12736"},{"key":"2367_CR27","doi-asserted-by":"crossref","unstructured":"Kaiser FK, Dardik U, Elitzur A, Zilberman P, Daniel N, Wiens M, Schultmann F, Elovici Y, Puzis R (2023) Attack hypotheses generation based on threat intelligence knowledge graph. IEEE Trans Dependable Secure Comput","DOI":"10.1109\/TDSC.2022.3233703"},{"key":"2367_CR28","unstructured":"Kurniawan K, Ekelhart A, Kiesling E (2021) An attack-kg for linking cybersecurity attacks to adversary tactics and techniques"},{"key":"2367_CR29","doi-asserted-by":"crossref","unstructured":"Chau DHP, Nachenberg C, Wilhelm J et al (2011) Polonium: tera-scale graph mining and inference for malware detection. In: Proceedings of the 2011 SIAM international conference on data mining. Society for Industrial and Applied Mathematics, pp 131\u2013142","DOI":"10.1137\/1.9781611972818.12"},{"key":"2367_CR30","doi-asserted-by":"crossref","unstructured":"Tamersoy A, Roundy K, Chau DH (2014) Guilt by association: large scale malware detection by mining file-relation graphs. In: Proceedings of the 20th ACM SIGKDD international conference on knowledge discovery and data mining, pp 1524\u20131533","DOI":"10.1145\/2623330.2623342"},{"issue":"12","key":"2367_CR31","doi-asserted-by":"publisher","first-page":"2724","DOI":"10.1109\/TKDE.2017.2754499","volume":"29","author":"Q Wang","year":"2017","unstructured":"Wang Q, Mao Z, Wang B, Guo L (2017) Knowledge graph embedding: a survey of approaches and applications. IEEE Trans Knowl Data Eng 29(12):2724\u20132743. https:\/\/doi.org\/10.1109\/TKDE.2017.2754499","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"2367_CR32","doi-asserted-by":"crossref","unstructured":"Simeonovski M, Pellegrino G, Rossow C et al (2017) Who controls the internet? analyzing global threats using property graph traversals. In: Proceedings of the 26th international conference on world wide web, pp 647\u2013656","DOI":"10.1145\/3038912.3052587"},{"key":"2367_CR33","doi-asserted-by":"crossref","unstructured":"Noel S, Harley E, Tam KH et al (2016) Cygraph: graph-based analytics and visualization for cybersecurity. In: Handbook of statistics, vol 35. Elsevier, ???, pp 117\u2013167","DOI":"10.1016\/bs.host.2016.07.001"},{"issue":"1","key":"2367_CR34","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.eng.2018.01.004","volume":"4","author":"Y Jia","year":"2018","unstructured":"Jia Y, Qi Y, Shang H et al (2018) A practical approach to constructing a knowledge graph for cybersecurity. Engineering 4(1):53\u201360","journal-title":"Engineering"},{"key":"2367_CR35","doi-asserted-by":"crossref","unstructured":"Meena S, Pethalakshmi DA (2022) Web attack prediction using stepwise conditional parameter tuning in machine learning algorithms with usage data. International Journal of Computer Networks and Communications (IJCNC) 14","DOI":"10.5121\/ijcnc.2022.14606"},{"issue":"6","key":"2367_CR36","doi-asserted-by":"publisher","first-page":"688","DOI":"10.1109\/TDSC.2014.2373377","volume":"12","author":"LK Shar","year":"2015","unstructured":"Shar LK, Briand LC, Tan HBK (2015) Web application vulnerability prediction using hybrid program analysis and machine learning. IEEE Trans Dependable Secure Comput 12(6):688\u2013707. https:\/\/doi.org\/10.1109\/TDSC.2014.2373377","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"2367_CR37","unstructured":"Feng T, Han T (2018) The research on web vulnerability defense model based on svm. In: 2018 the 8th International workshop on computer science and engineering (WCSE 2018). ACM, pp 545\u2013554"},{"key":"2367_CR38","doi-asserted-by":"publisher","unstructured":"Luo Y (2021) Sqli-fuzzer: a sql injection vulnerability discovery framework based on machine learning. In: 2021 IEEE 21st International conference on communication technology (ICCT). IEEE, pp 846\u2013851. https:\/\/doi.org\/10.1109\/ICCT52962.2021.9657925","DOI":"10.1109\/ICCT52962.2021.9657925"},{"key":"2367_CR39","doi-asserted-by":"crossref","unstructured":"Sheykhkanloo NM (2015) Sql-ids: evaluation of sqli attack detection and classification based on machine learning techniques. In: SIN \u201915 Proceedings of the 8th international conference on security of information and networks","DOI":"10.1145\/2799979.2800011"},{"key":"2367_CR40","doi-asserted-by":"crossref","unstructured":"Surbhi D, Deepak K (2021) Analysis of tree-based classifiers for web attack detection. In: Advances in signal and data processing. Springer, pp 355\u2013367","DOI":"10.1007\/978-981-15-8391-9_31"},{"issue":"5","key":"2367_CR41","doi-asserted-by":"publisher","first-page":"3371","DOI":"10.1109\/TDSC.2021.3095417","volume":"19","author":"M Amouei","year":"2022","unstructured":"Amouei M, Rezvani M, Fateh M (2022) Rat: reinforcement-learning-driven and adaptive testing for vulnerability discovery in web application firewalls. IEEE Trans Dependable Secure Comput 19(5):3371\u20133386. https:\/\/doi.org\/10.1109\/TDSC.2021.3095417","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"2367_CR42","doi-asserted-by":"publisher","unstructured":"Kamtuo K, Soomlek C (2016) Machine learning for sql injection prevention on server-side scripting. In: 2016 International computer science and engineering conference (ICSEC). IEEE, pp 1\u20136. https:\/\/doi.org\/10.1109\/ICSEC.2016.7859950","DOI":"10.1109\/ICSEC.2016.7859950"},{"key":"2367_CR43","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1016\/j.comcom.2022.03.009","volume":"188","author":"R Panigrahi","year":"2022","unstructured":"Panigrahi R, Borah S, Pramanik M, Bhoi AK, Barsocchi P, Nayak SR, Alnumay W (2022) Intrusion detection in cyber\u2013physical environment using hybrid na\u00efve bayes\u2014decision table and multi-objective evolutionary feature selection. Comput Commun 188:133\u2013144. https:\/\/doi.org\/10.1016\/j.comcom.2022.03.009","journal-title":"Comput Commun"},{"key":"2367_CR44","doi-asserted-by":"publisher","unstructured":"A MB, Arock M (2021) Efficient detection of sql injection attack(sqlia) using pattern-based neural network model. In: 2021 International conference on computing, communication, and intelligent systems (ICCCIS), pp 343\u2013347. https:\/\/doi.org\/10.1109\/ICCCIS51004.2021.9397066","DOI":"10.1109\/ICCCIS51004.2021.9397066"},{"key":"2367_CR45","doi-asserted-by":"publisher","unstructured":"Saxena A, Arora A, Saxena S, Kumar A (2022) Detection of web attacks using machine learning based url classification techniques. In: 2022 2nd International conference on intelligent technologies (CONIT), pp 1\u201313. https:\/\/doi.org\/10.1109\/CONIT55038.2022.9847838","DOI":"10.1109\/CONIT55038.2022.9847838"},{"key":"2367_CR46","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2020.105528","volume":"190","author":"P Tang","year":"2020","unstructured":"Tang P, Qiu W, Huang Z, Lian H, Liu G (2020) Detection of sql injection based on artificial neural network. Knowl-Based Syst 190:105528. https:\/\/doi.org\/10.1016\/j.knosys.2020.105528","journal-title":"Knowl-Based Syst"},{"key":"2367_CR47","doi-asserted-by":"publisher","unstructured":"Wang M, Wang C (2022) Detection of sql injection attack based on improved tfidf algorithm. In: International conference on mechanisms and robotics (ICMAR 2022), vol 12331. SPIE, p 1233139. https:\/\/doi.org\/10.1117\/12.2652203","DOI":"10.1117\/12.2652203"},{"key":"2367_CR48","unstructured":"Jagadessan J, Shrivastava A, Ansari A, Kar LK, Kumar M (2019) Detection and prevention approach to sqli and phishing attack using machine learning. Int J Eng Adv Technol (IJEAT) ISSN: 2249\u20138958 8(A)"},{"key":"2367_CR49","doi-asserted-by":"publisher","unstructured":"Hoang D (2020) Detecting common web attacks based on machine learning using web log. In: Lecture notes in networks and systems. Springer, ???, pp 404\u2013415. https:\/\/doi.org\/10.1007\/978-3-030-64719-3_35","DOI":"10.1007\/978-3-030-64719-3_35"},{"key":"2367_CR50","doi-asserted-by":"publisher","unstructured":"Fadhil H, Hakim AR (2021) Classification model of web application attacks. In: 2021 6th International workshop on big data and information security(IWBIS), Depok, Indonesia. IEEE, pp 87\u201390. https:\/\/doi.org\/10.1109\/IWBIS53353.2021.9631851","DOI":"10.1109\/IWBIS53353.2021.9631851"},{"key":"2367_CR51","doi-asserted-by":"publisher","unstructured":"Almourish MH, Abduljalil OAI, Alawi AEB (2022) Anomaly-based web attacks detection using machine learning. In: Pattnaik PK, Sain M, Al-Absi A-SA (eds) Proceedings of 2nd international conference on smart computing and cyber security. Lecture Notes in Networks and Systems, vol 395. Springer, Singapore, pp 336\u2013345. https:\/\/doi.org\/10.1007\/978-981-16-9480-6_29","DOI":"10.1007\/978-981-16-9480-6_29"},{"key":"2367_CR52","doi-asserted-by":"publisher","unstructured":"Sivasangari A, Jyotsna J, Pravalika K (2021) Sql injection attack detection using machine learning algorithm. In: 2021 5th International conference on trends in electronics and informatics (ICOEI), Tirunelveli, India. IEEE, pp 1166\u20131169. https:\/\/doi.org\/10.1109\/ICOEI51242.2021.9452914","DOI":"10.1109\/ICOEI51242.2021.9452914"},{"key":"2367_CR53","doi-asserted-by":"publisher","unstructured":"Misquitta J, Asha S (2023) Sql injection detection using machine learning and convolutional neural networks. In: 2023 5th International conference on smart systems and inventive technology (ICSSIT), Tirunelveli, India. IEEE, pp 1262\u20131266. https:\/\/doi.org\/10.1109\/ICSSIT55814.2023.10061019","DOI":"10.1109\/ICSSIT55814.2023.10061019"},{"key":"2367_CR54","doi-asserted-by":"publisher","unstructured":"Perumal S, Sujatha PK (2021) Stacking ensemble-based xss attack detection strategy using classification algorithms. In: 2021 6th International conference on communication and electronics systems (ICCES), Coimbatore, India. IEEE, pp 897\u2013901. https:\/\/doi.org\/10.1109\/ICCES51350.2021.9489177","DOI":"10.1109\/ICCES51350.2021.9489177"},{"key":"2367_CR55","unstructured":"Qin Y (2019) Research on key technologies of network security knowledge graph construction. PhD thesis, Guizhou University"},{"key":"2367_CR56","unstructured":"Mittal S (2019) Knowledge for cyber threat intelligence. PhD thesis, University of Maryland Baltimore County"},{"key":"2367_CR57","doi-asserted-by":"crossref","unstructured":"Najafi P, M\u00fchle A, P\u00fcnter W et al (2019) Malrank: a measure of maliciousness in siem-based knowledge graphs. In: Proceedings of the 35th annual computer security applications conference, pp 417\u2013429","DOI":"10.1145\/3359789.3359791"},{"key":"2367_CR58","doi-asserted-by":"publisher","unstructured":"Zoubir A, Missaoui B (2024) Integrating graph neural networks with scattering transform for anomaly detection. https:\/\/doi.org\/10.48550\/arXiv.2404.10800","DOI":"10.48550\/arXiv.2404.10800"},{"key":"2367_CR59","doi-asserted-by":"crossref","unstructured":"Senaratne A, Omran PG, Williams G, Christen P (2021) Unsupervised anomaly detection in knowledge graphs. In: Proceedings of the 10th international joint conference on knowledge graphs, pp 161\u2013165","DOI":"10.1145\/3502223.3502246"},{"key":"2367_CR60","doi-asserted-by":"crossref","unstructured":"Jia B, Dong C, Chen Z, Chang K-C, Sullivan N, Chen G (2018) Pattern discovery and anomaly detection via knowledge graph. In: 2018 21st International conference on information fusion (FUSION). IEEE, pp 2392\u20132399","DOI":"10.23919\/ICIF.2018.8455737"},{"key":"2367_CR61","doi-asserted-by":"crossref","unstructured":"Vaska N, Leahy K, Helus V (2022) Context-dependent anomaly detection with knowledge graph embedding models. In: 2022 IEEE 18th International conference on automation science and engineering (CASE). IEEE, pp 2020\u20132027","DOI":"10.1109\/CASE49997.2022.9926631"},{"issue":"4","key":"2367_CR62","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2024.103705","volume":"61","author":"Y Zhou","year":"2024","unstructured":"Zhou Y, Zhu C, Zhu W (2024) Promvsd: towards unsupervised knowledge graph anomaly detection via prior knowledge integration and multi-view semantic-driven estimation. Inf Process Manage 61(4):103705","journal-title":"Inf Process Manage"},{"key":"2367_CR63","doi-asserted-by":"crossref","unstructured":"Lai G, Hu H, Tang H, Zhou H, Chen G, Yuan J (2023) Kg-ads: a log anomaly detection assisted decision-making with support of knowledge graph and reinforcement learning. In: 2023 9th International conference on computer and communications (ICCC). IEEE, pp 2124\u20132129","DOI":"10.1109\/ICCC59590.2023.10507463"},{"key":"2367_CR64","doi-asserted-by":"crossref","unstructured":"Zhao Q, Liu J, Sullivan N, Chang K, Spina J, Blasch E, Chen G (2021) Anomaly detection of unstructured big data via semantic analysis and dynamic knowledge graph construction. In: Signal processing, sensor\/information fusion, and target recognition XXX, vol 11756. SPIE, pp 126\u2013142","DOI":"10.1117\/12.2589047"},{"key":"2367_CR65","doi-asserted-by":"crossref","unstructured":"Moghaddam FB, Lehmann J, Jabeen H (2023) Anomaly detection for numerical literals in knowledge graphs: a short review of approaches. In: 2023 IEEE Sixth international conference on artificial intelligence and knowledge engineering (AIKE). IEEE, pp 46\u201353","DOI":"10.1109\/AIKE59827.2023.00015"},{"issue":"1","key":"2367_CR66","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1007\/s10723-023-09727-1","volume":"22","author":"K Mitropoulou","year":"2024","unstructured":"Mitropoulou K, Kokkinos P, Soumplis P, Varvarigos E (2024) Anomaly detection in cloud computing using knowledge graph embedding and machine learning mechanisms. J Grid Computing 22(1):6","journal-title":"J Grid Computing"},{"key":"2367_CR67","unstructured":"Hoffman A (2024) Web application security. O\u2019Reilly Media, Inc., ???"},{"key":"2367_CR68","doi-asserted-by":"crossref","unstructured":"Fensel D, \u015eim\u015fek U, Angele K, Huaman E, K\u00e4rle E, Panasiuk O, Toma I, Umbrich J, Wahler A, Fensel D et al (2020) Introduction: what is a knowledge graph? Knowledge graphs: methodology, tools and selected use cases, 1\u201310","DOI":"10.1007\/978-3-030-37439-6_1"},{"key":"2367_CR69","doi-asserted-by":"publisher","unstructured":"Huang P, Liu S, Zhang K, Xu T, Yi X (2022) Overview of the application of knowledge graph in anomaly detection and fault diagnosis. In: 2022 4th International conference on system reliability and safety engineering (SRSE), pp 207\u2013213. https:\/\/doi.org\/10.1109\/SRSE56746.2022.10067308","DOI":"10.1109\/SRSE56746.2022.10067308"},{"key":"2367_CR70","doi-asserted-by":"crossref","unstructured":"Yan Z, Liu J (2020) A review on application of knowledge graph in cybersecurity. In: 2020 International signal processing, communications and engineering management conference (ISPCEM). IEEE, pp 240\u2013243","DOI":"10.1109\/ISPCEM52197.2020.00055"},{"key":"2367_CR71","volume-title":"Introducing the knowledge graph","author":"S Amit","year":"2012","unstructured":"Amit S (2012) Introducing the knowledge graph. Technical report, Official Blog of Google, America"},{"issue":"1","key":"2367_CR72","doi-asserted-by":"publisher","first-page":"2485","DOI":"10.1038\/s41598-023-28421-6","volume":"13","author":"T Wu","year":"2023","unstructured":"Wu T, Wei Y, Wu J, Yi B, Li H (2023) Logistic regression technique is comparable to complex machine learning algorithms in predicting cognitive impairment related to post intensive care syndrome. Sci Rep 13(1):2485","journal-title":"Sci Rep"},{"key":"2367_CR73","doi-asserted-by":"publisher","DOI":"10.47893\/IJSSAN.2023.1229","volume-title":"Machine learning algorithms for detection of cyber threats using logistic regression","author":"H Gonaygunta","year":"2023","unstructured":"Gonaygunta H (2023) Machine learning algorithms for detection of cyber threats using logistic regression. University of the Cumberlands, Department of Information Technology"},{"key":"2367_CR74","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2022.105544","volume":"117","author":"BB Hazarika","year":"2023","unstructured":"Hazarika BB, Gupta D (2023) Affinity based fuzzy kernel ridge regression classifier for binary class imbalance learning. Eng Appl Artif Intell 117:105544","journal-title":"Eng Appl Artif Intell"},{"issue":"1","key":"2367_CR75","first-page":"645","volume":"16","author":"A Alomiri","year":"2023","unstructured":"Alomiri A, Mishra S, AlShehri M (2023) Machine learning-based security mechanism to detect and prevent cyber-attack in iot networks. Int J Comput Digit Syst 16(1):645\u2013659","journal-title":"Int J Comput Digit Syst"},{"issue":"2","key":"2367_CR76","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/s11235-022-00981-4","volume":"82","author":"A Mishra","year":"2023","unstructured":"Mishra A, Gupta N, Gupta BB (2023) Defensive mechanism against ddos attack based on feature selection and multi-classifier algorithms. Telecommun Syst 82(2):229\u2013244","journal-title":"Telecommun Syst"},{"key":"2367_CR77","doi-asserted-by":"crossref","unstructured":"Chary GVK, Mahantesh M, Reddy MN, Rohith M, Shanthala P (2023) Evaluating the effectiveness of tree-based machine learning classifiers for cybersecurity threat detection. In: 2023 IEEE International conference on contemporary computing and communications (InC4), vol 1. IEEE, pp 1\u20136","DOI":"10.1109\/InC457730.2023.10262889"},{"key":"2367_CR78","doi-asserted-by":"crossref","unstructured":"Li H (2023) Support vector machine. In: Machine learning methods. Springer, ???, pp 127\u2013177","DOI":"10.1007\/978-981-99-3917-6_7"},{"key":"2367_CR79","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2023.109126","volume":"233","author":"A Roy","year":"2023","unstructured":"Roy A, Chakraborty S (2023) Support vector machine in structural reliability analysis: a review. Reliab Eng Syst Saf 233:109126","journal-title":"Reliab Eng Syst Saf"},{"key":"2367_CR80","doi-asserted-by":"crossref","unstructured":"Manzali Y, Elfar M (2023) Random forest pruning techniques: a recent review. In: Operations research forum, vol 4. Springer, p 43","DOI":"10.1007\/s43069-023-00223-6"},{"key":"2367_CR81","doi-asserted-by":"publisher","DOI":"10.1016\/j.enconman.2024.118076","volume":"301","author":"AF Amiri","year":"2024","unstructured":"Amiri AF, Oudira H, Chouder A, Kichou S (2024) Faults detection and diagnosis of pv systems based on machine learning approach using random forest classifier. Energy Convers Manage 301:118076","journal-title":"Energy Convers Manage"},{"issue":"1","key":"2367_CR82","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1007\/s44196-023-00184-y","volume":"16","author":"MJ Sai","year":"2023","unstructured":"Sai MJ, Chettri P, Panigrahi R, Garg A, Bhoi AK, Barsocchi P (2023) An ensemble of light gradient boosting machine and adaptive boosting for prediction of type-2 diabetes. Int J Comput Intell Syst 16(1):14","journal-title":"Int J Comput Intell Syst"},{"key":"2367_CR83","doi-asserted-by":"crossref","unstructured":"Liu M, Cen L, Ruta D (2023) Gradient boosting models for cybersecurity threat detection with aggregated time series features. In: 2023 18th Conference on computer science and intelligence systems (FedCSIS). IEEE, pp 1311\u20131315","DOI":"10.15439\/2023F4457"},{"key":"2367_CR84","doi-asserted-by":"crossref","unstructured":"Mouatassim T, El\u00a0Ghazi H, Bouzaachane K, El\u00a0Guarmah EM, Lahsen-Cherif I (2023) Cybersecurity analytics: toward an efficient ml-based network intrusion detection system (nids). In: International conference on machine learning for networking. Springer, pp 267\u2013284","DOI":"10.1007\/978-3-031-59933-0_18"},{"issue":"2","key":"2367_CR85","doi-asserted-by":"publisher","first-page":"807","DOI":"10.1007\/s12652-021-03332-4","volume":"14","author":"L Zhang","year":"2023","unstructured":"Zhang L, Wang J, An Z (2023) Vehicle recognition algorithm based on haar-like features and improved adaboost classifier. J Ambient Intell Humaniz Comput 14(2):807\u2013815","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"2367_CR86","doi-asserted-by":"crossref","unstructured":"Sanmorino A, Marnisah L, Sunardi H (2023) Feature selection using extra trees classifier for research productivity framework in indonesia. In: Proceeding of the 3rd international conference on electronics, biomedical engineering, and health informatics: ICEBEHI 2022, 5\u20136 October. Surabaya, Indonesia. Springer, pp 13\u201321","DOI":"10.1007\/978-981-99-0248-4_2"},{"key":"2367_CR87","doi-asserted-by":"crossref","unstructured":"Zhao C, Peng R, Wu D (2023) Bagging and boosting fine-tuning for ensemble learning. IEEE Trans Artif Intell","DOI":"10.1109\/TAI.2023.3296685"},{"key":"2367_CR88","doi-asserted-by":"crossref","unstructured":"Farhan AH, Hasan RF (2023) Detection sql injection attacks against web application by using k-nearest neighbors with principal component analysis. In: Proceedings of data analytics and management: ICDAM 2022. Springer, ???, pp 631\u2013642","DOI":"10.1007\/978-981-19-7615-5_52"},{"key":"2367_CR89","doi-asserted-by":"crossref","unstructured":"Hendawi S, AlZu\u2019bi S, Mughaid A, Alqahtani N (2023) Ensuring cybersecurity while leveraging social media as a data source for internet of things applications. In: International conference on advances in computing research. Springer, pp 587\u2013604","DOI":"10.1007\/978-3-031-33743-7_47"},{"key":"2367_CR90","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2022.109196","volume":"136","author":"S Li","year":"2023","unstructured":"Li S, Zhang H, Ma R, Zhou J, Wen J, Zhang B (2023) Linear discriminant analysis with generalized kernel constraint for robust image classification. Pattern Recogn 136:109196","journal-title":"Pattern Recogn"},{"key":"2367_CR91","doi-asserted-by":"crossref","unstructured":"Shanthi A, Selvakumar P, Gugan I et al (2024) Classification of cognitive impairment using quadratic discriminant analysis based spiral dynamic optimization algorithm. J Electr Eng Technol, 1\u201314","DOI":"10.1007\/s42835-024-01897-6"},{"key":"2367_CR92","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/j.procs.2022.12.401","volume":"218","author":"K Dhanya","year":"2023","unstructured":"Dhanya K, Vajipayajula S, Srinivasan K, Tibrewal A, Kumar TS, Kumar TG (2023) Detection of network attacks using machine learning and deep learning models. Procedia Computer Science 218:57\u201366","journal-title":"Procedia Computer Science"},{"issue":"3","key":"2367_CR93","doi-asserted-by":"publisher","first-page":"971","DOI":"10.1007\/s10994-022-06224-6","volume":"112","author":"MT Smith","year":"2023","unstructured":"Smith MT, Grosse K, Backes M, Alvarez MA (2023) Adversarial vulnerability bounds for gaussian process classification. Mach Learn 112(3):971\u20131009","journal-title":"Mach Learn"},{"issue":"10","key":"2367_CR94","doi-asserted-by":"publisher","first-page":"6297","DOI":"10.1007\/s00500-023-07906-6","volume":"27","author":"AA Alqarni","year":"2023","unstructured":"Alqarni AA (2023) Toward support-vector machine-based ant colony optimization algorithms for intrusion detection. Soft Comput 27(10):6297\u20136305","journal-title":"Soft Comput"},{"key":"2367_CR95","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2023.108660","volume":"108","author":"Y Qi","year":"2023","unstructured":"Qi Y, Gu Z, Li A, Zhang X, Shafiq M, Mei Y, Lin K (2023) Cybersecurity knowledge graph enabled attack chain detection for cyber-physical systems. Comput Electr Eng 108:108660","journal-title":"Comput Electr Eng"},{"issue":"10","key":"2367_CR96","doi-asserted-by":"publisher","first-page":"12049","DOI":"10.1007\/s10489-021-03041-7","volume":"52","author":"IM De Diego","year":"2022","unstructured":"De Diego IM, Redondo AR, Fern\u00e1ndez RR, Navarro J, Moguerza JM (2022) General performance score for classification problems. Appl Intell 52(10):12049\u201312063","journal-title":"Appl Intell"},{"key":"2367_CR97","first-page":"4806","volume":"62","author":"JC Eunaicy","year":"2022","unstructured":"Eunaicy JC, Suguna S (2022) Web attack detection using deep learning models. Materials Today: Proceedings 62:4806\u20134813","journal-title":"Materials Today: Proceedings"},{"key":"2367_CR98","doi-asserted-by":"crossref","unstructured":"Chicco D, Jurman G (2023) The matthews correlation coefficient (mcc) should replace the roc auc as the standard metric for assessing binary classification. BioData Mining 16(1):4","DOI":"10.1186\/s13040-023-00322-4"},{"key":"2367_CR99","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2022.109225","volume":"136","author":"P Del Moral","year":"2023","unstructured":"Del Moral P, Nowaczyk S, Sant\u2019Anna A, Pashami S (2023) Pitfalls of assessing extracted hierarchies for multi-class classification. Pattern Recogn 136:109225","journal-title":"Pattern Recogn"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-024-02367-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11036-024-02367-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-024-02367-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,31]],"date-time":"2024-12-31T19:07:45Z","timestamp":1735672065000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11036-024-02367-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6]]},"references-count":99,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2024,6]]}},"alternative-id":["2367"],"URL":"https:\/\/doi.org\/10.1007\/s11036-024-02367-z","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"value":"1383-469X","type":"print"},{"value":"1572-8153","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,6]]},"assertion":[{"value":"6 July 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 July 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interests"}}]}}