{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T19:54:03Z","timestamp":1776887643732,"version":"3.51.2"},"reference-count":17,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2023,3,24]],"date-time":"2023-03-24T00:00:00Z","timestamp":1679616000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,3,24]],"date-time":"2023-03-24T00:00:00Z","timestamp":1679616000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-022-01626-8","type":"journal-article","created":{"date-parts":[[2023,3,24]],"date-time":"2023-03-24T19:03:41Z","timestamp":1679684621000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["SQLIML: A Comprehensive Analysis for SQL Injection Detection Using Multiple Supervised and Unsupervised Learning Schemes"],"prefix":"10.1007","volume":"4","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0884-4497","authenticated-orcid":false,"given":"Dhruv","family":"Mehta","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3033-9457","authenticated-orcid":false,"given":"Hartik","family":"Suhagiya","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4539-4483","authenticated-orcid":false,"given":"Harvy","family":"Gandhi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5119-1148","authenticated-orcid":false,"given":"Manish","family":"Jha","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6848-2507","authenticated-orcid":false,"given":"Pratik","family":"Kanani","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8774-9318","authenticated-orcid":false,"given":"Aniket","family":"Kore","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,3,24]]},"reference":[{"issue":"11","key":"1626_CR1","doi-asserted-by":"publisher","first-page":"5416","DOI":"10.1016\/j.eswa.2014.02.041","volume":"41","author":"M-Y Kim","year":"2014","unstructured":"Kim M-Y, Lee DH. Data-mining based sql injection attack detection using internal query trees. Expert Syst Appl. 2014;41(11):5416\u201330.","journal-title":"Expert Syst Appl"},{"key":"1626_CR2","unstructured":"D\u2019Hoinne J, Hils A and Neiva C. Magic quadrant for web application firewalls. Technical report, Gartner, Stamford, CT, Tech. Rep., 2014."},{"key":"1626_CR3","doi-asserted-by":"crossref","unstructured":"Minhas J and Kumar R. Blocking of sql injection attacks by comparing static and dynamic queries. Int J Comput Netw Inf Secur. 2013;5(2):p. 1\u20139.","DOI":"10.5815\/ijcnis.2013.02.01"},{"key":"1626_CR4","doi-asserted-by":"crossref","unstructured":"Joshi A and Geetha V. Sql injection detection using machine learning. In: 2014 international conference on control, instrumentation, communication and computational technologies (ICCICCT). IEEE; 2014, p. 1111\u20135.","DOI":"10.1109\/ICCICCT.2014.6993127"},{"key":"1626_CR5","doi-asserted-by":"crossref","unstructured":"Kamtuo K and Soomlek C. Machine learning for sql injection prevention on server-side scripting. In: 2016 International Computer Science and Engineering Conference (ICSEC). IEEE; 2016, p. 1\u20136.","DOI":"10.1109\/ICSEC.2016.7859950"},{"key":"1626_CR6","doi-asserted-by":"crossref","unstructured":"Wu X-R and Chan PP. Sql injection attacks detection in adversarial environments by k-centers. In: 2012 International Conference on Machine Learning and Cybernetics, vol. 1. IEEE; 2012, p. 406\u201310.","DOI":"10.1109\/ICMLC.2012.6358948"},{"key":"1626_CR7","doi-asserted-by":"crossref","unstructured":"Zhao W-D, Dai W-H and Tang C-B. K-centers algorithm for clustering mixed type data. In: Pacific-Asia Conference on Knowledge Discovery and Data Mining. Springer; 2007, p. 1140\u20137.","DOI":"10.1007\/978-3-540-71701-0_129"},{"key":"1626_CR8","unstructured":"Yu P and Wang S. Deep tree: Sql injection detection by the power of deep learning. 2018."},{"key":"1626_CR9","doi-asserted-by":"crossref","unstructured":"Fang Y, Peng J, Liu L and Huang C. Wovsqli: detection of sql injection behaviors using word vector and lstm. In: Proceedings of the 2nd international conference on cryptography, security and privacy; 2018, p. 170\u20134.","DOI":"10.1145\/3199478.3199503"},{"issue":"13","key":"1626_CR10","first-page":"1","volume":"42","author":"R Rawat","year":"2012","unstructured":"Rawat R, Shrivastav SK. Sql injection attack detection using svm. Int J Comput Appl. 2012;42(13):1\u20134.","journal-title":"Int J Comput Appl"},{"key":"1626_CR11","first-page":"610","volume":"4","author":"A Moosa","year":"2010","unstructured":"Moosa A. Artificial neural network based web application firewall for sql injection. Int J Comput Inf Eng. 2010;4:610\u20139.","journal-title":"Int J Comput Inf Eng"},{"key":"1626_CR12","unstructured":"Zhang Z and Sabuncu M. Generalized cross entropy loss for training deep neural networks with noisy labels. Adv Neural Inf Process Syst. 2018; 31.p. 1\u20139."},{"key":"1626_CR13","first-page":"199","volume":"40","author":"PR McWhirter","year":"2018","unstructured":"McWhirter PR, Kifayat K, Shi Q, Askwith B. Sql injection attack classification through the feature extraction of sql query strings using a gap-weighted string subsequence kernel. J Inf Secur Appl. 2018;40:199\u2013216.","journal-title":"J Inf Secur Appl"},{"issue":"2","key":"1626_CR14","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1049\/sfw2.12018","volume":"15","author":"Z Zhuo","year":"2021","unstructured":"Zhuo Z, Cai T, Zhang X, Lv F. Long short-term memory on abstract syntax tree for sql injection detection. IET Software. 2021;15(2):188\u201397.","journal-title":"IET Software"},{"key":"1626_CR15","doi-asserted-by":"crossref","unstructured":"Uwagbole SO, Buchanan WJ, and Fan L. Applied machine learning predictive analytics to sql injection attack detection and prevention. In: 2017 IFIP\/IEEE Symposium on Integrated Network and Service Management (IM). IEEE; 2017, p. 1087\u201390.","DOI":"10.23919\/INM.2017.7987433"},{"key":"1626_CR16","doi-asserted-by":"crossref","unstructured":"Sirinam P, Imani M, Juarez M and Wright M. Deep fingerprinting: Undermining website fingerprinting defenses with deep learning. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security; 2018, p. 1928\u201343.","DOI":"10.1145\/3243734.3243768"},{"key":"1626_CR17","doi-asserted-by":"crossref","unstructured":"Yuan G, Li B, Yao Y and Zhang S. A deep learning enabled subspace spectral ensemble clustering approach for web anomaly detection. In: 2017 International Joint Conference on Neural Networks (IJCNN). IEEE; 2017, p. 3896\u2013903.","DOI":"10.1109\/IJCNN.2017.7966347"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-022-01626-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-022-01626-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-022-01626-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T00:16:22Z","timestamp":1729124182000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-022-01626-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,24]]},"references-count":17,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2023,5]]}},"alternative-id":["1626"],"URL":"https:\/\/doi.org\/10.1007\/s42979-022-01626-8","relation":{},"ISSN":["2661-8907"],"issn-type":[{"value":"2661-8907","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,3,24]]},"assertion":[{"value":"24 October 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 December 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 March 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Authors have considered all the rules and regulations of the journal while doing the research work. Hence, the proposed paper obeys all the ethical standards.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}}],"article-number":"281"}}