{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T23:17:54Z","timestamp":1777504674400,"version":"3.51.4"},"reference-count":83,"publisher":"Elsevier BV","issue":"6","license":[{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2025,9,3]],"date-time":"2025-09-03T00:00:00Z","timestamp":1756857600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["ICT Express"],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.1016\/j.icte.2025.09.001","type":"journal-article","created":{"date-parts":[[2025,9,13]],"date-time":"2025-09-13T15:14:23Z","timestamp":1757776463000},"page":"1110-1119","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":1,"title":["Machine learning models in web applications: A comprehensive review"],"prefix":"10.1016","volume":"11","author":[{"given":"Kshiteesh","family":"Mani","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3995-1826","authenticated-orcid":false,"given":"Ajitha K.B.","family":"Shenoy","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"1","key":"10.1016\/j.icte.2025.09.001_b1","doi-asserted-by":"crossref","DOI":"10.1063\/5.0171097","article-title":"Integration of artificial intelligence\/machine learning in developing and defending web applications","volume":"2736","author":"Tiwari","year":"2023","journal-title":"AIP Conf. Proc."},{"key":"10.1016\/j.icte.2025.09.001_b2","series-title":"How artificial intelligence and machine learning are revolutionizing website development","author":"WebsitePulse","year":"2023"},{"key":"10.1016\/j.icte.2025.09.001_b3","series-title":"The role of artificial intelligence and machine learning in enterprise web applications","author":"Tranxndweb","year":"2023"},{"issue":"1","key":"10.1016\/j.icte.2025.09.001_b4","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s13174-019-0115-x","article-title":"Detecting web attacks with end-to-end deep learning","volume":"10","author":"Pan","year":"2019","journal-title":"J. Internet Serv. Appl."},{"key":"10.1016\/j.icte.2025.09.001_b5","series-title":"Proceedings of the International Conference on Intelligent Technologies and Applications","first-page":"473","article-title":"Predicting web vulnerabilities in web applications based on machine learning","author":"Khalid","year":"2019"},{"issue":"41","key":"10.1016\/j.icte.2025.09.001_b6","article-title":"Cybersecurity data science: an overview from machine learning perspective","volume":"7","author":"Sarker","year":"2020","journal-title":"J. Big Data"},{"key":"10.1016\/j.icte.2025.09.001_b7","series-title":"Iberoamerican Congress on Pattern Recognition","first-page":"227","article-title":"Web application attacks detection using deep learning","author":"Montes","year":"2021"},{"issue":"04","key":"10.1016\/j.icte.2025.09.001_b8","first-page":"363","article-title":"Brain-inspired spiking neural networks for wi-fi based human activity recognition","volume":"07","author":"Yee Leong Tan","year":"2021","journal-title":"Jordanian J. Comput. Inf. Technol. (JJCIT)"},{"issue":"01","key":"10.1016\/j.icte.2025.09.001_b9","first-page":"64","article-title":"Phiboost- a novel phishing detection model using adaptive boosting approach","volume":"07","author":"Ammar Odeh","year":"2021","journal-title":"Jordanian J. Comput. Inf. Technol. (JJCIT)"},{"key":"10.1016\/j.icte.2025.09.001_b10","series-title":"2022 International Conference on Data Analytics for Business and Industry","first-page":"292","article-title":"SQL injection, cross-site scripting and buffer overflow attacks detection using machine learning","author":"Ghannam","year":"2022"},{"key":"10.1016\/j.icte.2025.09.001_b11","doi-asserted-by":"crossref","first-page":"68633","DOI":"10.1109\/ACCESS.2022.3185748","article-title":"An attack detection framework based on BERT and deep learning","volume":"10","author":"Seyyar","year":"2022","journal-title":"IEEE Access"},{"key":"10.1016\/j.icte.2025.09.001_b12","doi-asserted-by":"crossref","first-page":"12725","DOI":"10.1007\/s10462-023-10433-3","article-title":"Detection of cross-site scripting (XSS) attacks using machine learning techniques: a review","volume":"56","author":"Kaur","year":"2023","journal-title":"Artif. Intell. Rev."},{"key":"10.1016\/j.icte.2025.09.001_b13","doi-asserted-by":"crossref","first-page":"15923","DOI":"10.1007\/s10489-022-04278-6","article-title":"Front-end deep learning web apps development and deployment: a review","volume":"53","author":"Goh","year":"2023","journal-title":"Appl. Intell."},{"key":"10.1016\/j.icte.2025.09.001_b14","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1016\/j.procs.2022.12.401","article-title":"Detection of network attacks using machine learning and deep learning models","volume":"218","author":"Dhanya","year":"2023","journal-title":"Procedia Comput. Sci."},{"key":"10.1016\/j.icte.2025.09.001_b15","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2024.103903","article-title":"Vulnerability detection through machine learning-based fuzzing: A systematic review","volume":"143","author":"Bamohabbat Chafjiri","year":"2024","journal-title":"Comput. Secur."},{"key":"10.1016\/j.icte.2025.09.001_b16","doi-asserted-by":"crossref","DOI":"10.1016\/j.iot.2022.100615","article-title":"A comprehensive review on detection of cyber-attacks: Data sets, methods, challenges, and future research directions","volume":"20","author":"Ahmetoglu","year":"2022","journal-title":"Internet Things"},{"key":"10.1016\/j.icte.2025.09.001_b17","first-page":"1","article-title":"A comprehensive evaluation of machine learning algorithms for web application attack detection with knowledge graph integration","volume":"Online published","author":"Muhusina","year":"2024","journal-title":"Mob. Netw. Appl."},{"key":"10.1016\/j.icte.2025.09.001_b18","series-title":"Innovations in Smart Cities Applications Volume 7","first-page":"561","article-title":"A comparative analysis of deep learning approaches for enhancing security in web applications","author":"Kadar","year":"2024"},{"issue":"3","key":"10.1016\/j.icte.2025.09.001_b19","doi-asserted-by":"crossref","first-page":"594","DOI":"10.1016\/j.icte.2023.12.008","article-title":"QUIC website fingerprinting based on automated machine learning","volume":"10","author":"Ha","year":"2024","journal-title":"ICT Express"},{"issue":"3","key":"10.1016\/j.icte.2025.09.001_b20","doi-asserted-by":"crossref","first-page":"632","DOI":"10.1016\/j.icte.2024.03.005","article-title":"A study of the relationship of malware detection mechanisms using artificial intelligence","volume":"10","author":"Song","year":"2024","journal-title":"ICT Express"},{"key":"10.1016\/j.icte.2025.09.001_b21","doi-asserted-by":"crossref","DOI":"10.14311\/NNW.2019.29.013","article-title":"Design and implementation of an artificial intelligence-based web application firewall model","author":"Tekerek","year":"2019","journal-title":"Neural Netw. World"},{"key":"10.1016\/j.icte.2025.09.001_b22","series-title":"2023 First International Conference on Advances in Electrical, Electronics and Computational Intelligence","first-page":"1","article-title":"Securing web application using web application firewall (WAF) and machine learning","author":"J","year":"2023"},{"key":"10.1016\/j.icte.2025.09.001_b23","series-title":"2017 IEEE 9th International Conference on Communication Software and Networks","first-page":"1117","article-title":"A review on signature-based detection for network threats","author":"Li","year":"2017"},{"key":"10.1016\/j.icte.2025.09.001_b24","series-title":"A web developer\u2019s guide to cross-site scripting","author":"Cook","year":"2003"},{"key":"10.1016\/j.icte.2025.09.001_b25","series-title":"2017 International Conference on Engineering and Technology","first-page":"1","article-title":"Understanding of a convolutional neural network","author":"Albawi","year":"2017"},{"key":"10.1016\/j.icte.2025.09.001_b26","doi-asserted-by":"crossref","first-page":"91511","DOI":"10.1109\/ACCESS.2023.3303845","article-title":"Web based anomaly detection using zero-shot learning with CNN","volume":"11","author":"Demirel","year":"2023","journal-title":"IEEE Access"},{"key":"10.1016\/j.icte.2025.09.001_b27","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1023\/A:1010933404324","article-title":"Random forests","volume":"45","author":"Breiman","year":"2001","journal-title":"Mach. Learn."},{"key":"10.1016\/j.icte.2025.09.001_b28","series-title":"2021 2nd International Informatics and Software Engineering Conference","first-page":"1","article-title":"Machine learning based web application firewall","author":"ISiker","year":"2021"},{"issue":"5","key":"10.1016\/j.icte.2025.09.001_b29","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1134\/S0361768820050072","article-title":"Improving efficiency of web application firewall to detect code injection attacks with random forest method","volume":"46","author":"Thang","year":"2020","journal-title":"Program. Comput. Softw."},{"key":"10.1016\/j.icte.2025.09.001_b30","doi-asserted-by":"crossref","DOI":"10.1016\/j.softx.2019.100367","article-title":"WAF-a-mole: An adversarial tool for assessing ML-based WAFs","volume":"11","author":"Valenza","year":"2020","journal-title":"SoftwareX"},{"issue":"446","key":"10.1016\/j.icte.2025.09.001_b31","article-title":"Improving web application firewalls with automatic language detection","volume":"3","author":"Nguyen","year":"2022","journal-title":"SN Comput. Sci."},{"key":"10.1016\/j.icte.2025.09.001_b32","doi-asserted-by":"crossref","first-page":"1688","DOI":"10.18517\/ijaseit.11.4.14608","article-title":"Machine learning based model to identify firewall decisions to improve cyber-defense","volume":"11","author":"Al-Haija","year":"2021","journal-title":"Int. J. Adv. Sci. Eng. Inf. Technol."},{"key":"10.1016\/j.icte.2025.09.001_b33","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2022\/5280158","article-title":"Web application firewall using machine learning and features engineering","volume":"2022","author":"Aref Shaheed","year":"2022","journal-title":"Secur. Commun. Netw."},{"key":"10.1016\/j.icte.2025.09.001_b34","series-title":"2023 IEEE 12th International Conference on Communication Systems and Network Technologies","first-page":"186","article-title":"Detection of payload injection in firewall using machine learning","author":"Surendhar","year":"2023"},{"key":"10.1016\/j.icte.2025.09.001_b35","series-title":"Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications","first-page":"212","article-title":"An efficient machine learning-based web application firewall with deep automated pattern categorization","author":"Trinh","year":"2023"},{"key":"10.1016\/j.icte.2025.09.001_b36","series-title":"Proceedings of Fifth International Conference on Computing, Communications, and Cyber-Security","first-page":"947","article-title":"Optimizing real-time performance in ML-based application layer firewalls","author":"Nayar","year":"2024"},{"issue":"14","key":"10.1016\/j.icte.2025.09.001_b37","doi-asserted-by":"crossref","first-page":"1803","DOI":"10.1038\/s41598-023-48845-4","article-title":"Securing web applications against XSS and SQLi attacks using a novel deep learning approach","volume":"14","author":"Tadhani","year":"2024","journal-title":"Sci. Rep."},{"key":"10.1016\/j.icte.2025.09.001_b38","series-title":"Companion of the 3rd International Conference on Art, Science, and Engineering of Programming (Programming 19)","first-page":"1","article-title":"How artificial intelligence can improve web development and testing","author":"Stocco","year":"2019"},{"key":"10.1016\/j.icte.2025.09.001_b39","series-title":"2021 2nd International Conference on Intelligent Engineering and Management","first-page":"423","article-title":"Web application implementation with machine learning","author":"Verma","year":"2021"},{"key":"10.1016\/j.icte.2025.09.001_b40","series-title":"2019 International Conference on Information Management and Technology","first-page":"525","article-title":"Artificial intelligence model implementation in web-based application for pineapple object counting","volume":"1","author":"Rahutomo","year":"2019"},{"key":"10.1016\/j.icte.2025.09.001_b41","series-title":"The web server gateway interface (WSGI)","first-page":"369","author":"Gardner","year":"2009"},{"key":"10.1016\/j.icte.2025.09.001_b42","article-title":"Crowdsourcing annotation system of object counting dataset for deep learning algorithm","volume":"195","author":"Cenggoro","year":"2018","journal-title":"IOP Conf. Ser.: Earth Environ. Sci."},{"key":"10.1016\/j.icte.2025.09.001_b43","series-title":"2021 Innovations in Power and Ad- vanced Computing Technologies","first-page":"1","article-title":"Loan prediction using machine learning and its deployement on web application","author":"Sujatha","year":"2021"},{"key":"10.1016\/j.icte.2025.09.001_b44","series-title":"2021 International Conference on Advances in Computing, Communication, and Control (ICAC3)","first-page":"1","article-title":"Web application for machine learning based music genre classification","author":"Chauhan","year":"2021"},{"key":"10.1016\/j.icte.2025.09.001_b45","series-title":"Information Computing and Applications","first-page":"179","article-title":"Support vector machine classification algorithm and its application","author":"Zhang","year":"2012"},{"key":"10.1016\/j.icte.2025.09.001_b46","doi-asserted-by":"crossref","unstructured":"X. Li, X. Peng, C. Ma, T. Liu, Z. Li, Research on Software Development Project Implementation Effect Evaluation Based on Support Vector Machine, in: 2021 3rd International Conference on Industrial Artificial Intelligence, IAI, 2021, pp. 1\u20135.","DOI":"10.1109\/IAI53119.2021.9619275"},{"key":"10.1016\/j.icte.2025.09.001_b47","series-title":"2019 International Conference on Intelligent Computing and Control Systems","first-page":"1255","article-title":"A brief review of nearest neighbor algorithm for learning and classification","author":"Taunk","year":"2019"},{"key":"10.1016\/j.icte.2025.09.001_b48","series-title":"2016 IEEE Advanced Information Management, Communicates, Electronic and Automation Control Conference","first-page":"1519","article-title":"A study on deep neural networks framework","author":"Yi","year":"2016"},{"key":"10.1016\/j.icte.2025.09.001_b49","series-title":"2021 International Conference on Advancements in Electrical, Electronics, Communication, Computing and Automation","first-page":"1","article-title":"Web app for business needs","author":"Neminathan","year":"2021"},{"key":"10.1016\/j.icte.2025.09.001_b50","series-title":"2022 2nd International Conference on Advance Computing and Innovative Technologies in Engineering","first-page":"974","article-title":"Flower classifier web app using ml & flask web framework","author":"Singh","year":"2022"},{"key":"10.1016\/j.icte.2025.09.001_b51","series-title":"Google cloud armor adaptive protection: ML-powered anomaly detection and rule generation","author":"Google Cloud","year":"2025"},{"key":"10.1016\/j.icte.2025.09.001_b52","series-title":"Foundation model for personalized recommendation","author":"Blog","year":"2025"},{"key":"10.1016\/j.icte.2025.09.001_b53","series-title":"A privacy preserving system for movie recommendations using federated learning","author":"Neumann","year":"2023"},{"key":"10.1016\/j.icte.2025.09.001_b54","article-title":"A survey on the use of federated learning in privacy-preserving recommender systems","author":"Chronis","year":"2022","journal-title":"IEEE Open J. Comput. Soc."},{"key":"10.1016\/j.icte.2025.09.001_b55","series-title":"Advances in Neural Information Processing Systems","article-title":"Hidden technical debt in machine learning systems","author":"Sculley","year":"2015"},{"key":"10.1016\/j.icte.2025.09.001_b56","article-title":"Scalability issues in large-scale machine learning deployments","volume":"107","author":"Zhang","year":"2020","journal-title":"J. Syst. Archit."},{"issue":"239","key":"10.1016\/j.icte.2025.09.001_b57","first-page":"2","article-title":"Docker: Lightweight linux containers for consistent development and deployment","volume":"2014","author":"Merkel","year":"2014","journal-title":"Linux J."},{"issue":"1","key":"10.1016\/j.icte.2025.09.001_b58","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1145\/2898442.2898444","article-title":"Borg, omega, and kubernetes","volume":"14","author":"Burns","year":"2016","journal-title":"ACM Queue"},{"issue":"4","key":"10.1016\/j.icte.2025.09.001_b59","first-page":"39","article-title":"Accelerating the machine learning lifecycle with mlflow","volume":"41","author":"Zaharia","year":"2018","journal-title":"IEEE Data Eng. Bull."},{"key":"10.1016\/j.icte.2025.09.001_b60","series-title":"Scalability and maintainability challenges and solutions in machine learning: A systematic literature review","author":"Shivashankar","year":"2025"},{"key":"10.1016\/j.icte.2025.09.001_b61","series-title":"ASPLOS 2023","article-title":"Superserve: Fine-grained inference serving for unpredictable workloads","author":"Khare","year":"2023"},{"key":"10.1016\/j.icte.2025.09.001_b62","series-title":"Cascadeserve: Unlocking model cascades for inference serving","author":"Kossmann","year":"2024"},{"key":"10.1016\/j.icte.2025.09.001_b63","doi-asserted-by":"crossref","DOI":"10.1109\/ACCESS.2023.3262138","article-title":"Machine learning operations (mlops): Overview, definition, and architecture","author":"Kreuzberger","year":"2023","journal-title":"IEEE Access"},{"issue":"6","key":"10.1016\/j.icte.2025.09.001_b64","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1109\/MIC.2010.145","article-title":"Node.js: Using JavaScript to build high-performance network programs","volume":"14","author":"Tilkov","year":"2010","journal-title":"IEEE Internet Comput."},{"key":"10.1016\/j.icte.2025.09.001_b65","series-title":"Practical Node.js: Building Real-World Scalable Web Apps","author":"Mardan","year":"2018"},{"issue":"6","key":"10.1016\/j.icte.2025.09.001_b66","doi-asserted-by":"crossref","first-page":"1","DOI":"10.9734\/BJAST\/2016\/30376","article-title":"A design of an automatic web page classification system","volume":"18","author":"Mahmoud","year":"2016","journal-title":"Br. J. Appl. Sci. Technol."},{"key":"10.1016\/j.icte.2025.09.001_b67","series-title":"Flask vs django","author":"Choudhary","year":"2024"},{"key":"10.1016\/j.icte.2025.09.001_b68","series-title":"Why is python the best-suited programming language for machine learning?","author":"Harkiran","year":"2019"},{"key":"10.1016\/j.icte.2025.09.001_b69","series-title":"Why is python used for machine learning?","author":"New Horizons","year":"2023"},{"key":"10.1016\/j.icte.2025.09.001_b70","series-title":"2020 5th International Conference on Communication and Electronics Systems","first-page":"1242","article-title":"Multi disease prediction model by using machine learning and flask API","author":"Yaganteeswarudu","year":"2020"},{"issue":"3","key":"10.1016\/j.icte.2025.09.001_b71","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1016\/j.icte.2020.04.012","article-title":"Identifying machine learning techniques for classification of target advertising","volume":"6","author":"Choi","year":"2020","journal-title":"ICT Express"},{"key":"10.1016\/j.icte.2025.09.001_b72","series-title":"2022 International Conference on Applied Artificial Intelligence and Computing","first-page":"694","article-title":"Leveraging machine learning methods for multiple disease prediction using python ML libraries and flask API","author":"Narayanan","year":"2022"},{"key":"10.1016\/j.icte.2025.09.001_b73","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2023.120736","article-title":"Evaluation of machine learning methods for impostor detection in web applications","volume":"231","author":"Grzenda","year":"2023","journal-title":"Expert Syst. Appl."},{"issue":"2","key":"10.1016\/j.icte.2025.09.001_b74","doi-asserted-by":"crossref","first-page":"425","DOI":"10.1016\/j.icte.2023.10.001","article-title":"Smarthealth: An intelligent framework to secure IoMT service applications using machine learning","volume":"10","author":"Rani","year":"2024","journal-title":"ICT Express"},{"key":"10.1016\/j.icte.2025.09.001_b75","series-title":"Using node.js for machine learning and AI applications","author":"Nodejs","year":"2023"},{"key":"10.1016\/j.icte.2025.09.001_b76","series-title":"An introduction to AI in node.js","author":"IBM","year":"2020"},{"key":"10.1016\/j.icte.2025.09.001_b77","series-title":"Unlocking the power of brain.js: Revolutionizing machine learning in JavaScript","author":"Tudip","year":"2023"},{"key":"10.1016\/j.icte.2025.09.001_b78","unstructured":"D. Smilkov, N. Thorat, Y. Assogba, N. Nicholson, N. Kreeger, P. Yu, S. Zhang, K. Kavukcuoglu, I. Sutskever, D. Mane, TensorFlow.js: Machine Learning for the Web and Beyond, in: SysML (now MLSys) Workshop, 2019."},{"key":"10.1016\/j.icte.2025.09.001_b79","series-title":"Moving deep learning into web browser: How far can we go?","author":"Ma","year":"2019"},{"key":"10.1016\/j.icte.2025.09.001_b80","doi-asserted-by":"crossref","unstructured":"L. Quan, Q. Guo, X. Xie, L. Zhang, Y. Li, Y. Liu, Z. Liu, Towards Understanding the Faults of JavaScript-Based Deep Learning Systems, 2022, arXiv preprint arXiv:2209.04791.","DOI":"10.1145\/3551349.3560427"},{"key":"10.1016\/j.icte.2025.09.001_b81","series-title":"Brain.js \u2014 GPU accelerated neural networks in JavaScript","author":"Brain.js Contributors","year":"2023"},{"key":"10.1016\/j.icte.2025.09.001_b82","series-title":"Genxss: an AI-driven framework for automated detection of XSS attacks in WAFs","author":"Babaey","year":"2025"},{"key":"10.1016\/j.icte.2025.09.001_b83","series-title":"Advsqli: Generating adversarial SQL injections against real-world WAF-as-a-service","author":"Qu","year":"2024"}],"container-title":["ICT Express"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2405959525001304?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2405959525001304?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,12,19]],"date-time":"2025-12-19T19:25:06Z","timestamp":1766172306000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S2405959525001304"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12]]},"references-count":83,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2025,12]]}},"alternative-id":["S2405959525001304"],"URL":"https:\/\/doi.org\/10.1016\/j.icte.2025.09.001","relation":{},"ISSN":["2405-9595"],"issn-type":[{"value":"2405-9595","type":"print"}],"subject":[],"published":{"date-parts":[[2025,12]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Machine learning models in web applications: A comprehensive review","name":"articletitle","label":"Article Title"},{"value":"ICT Express","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.icte.2025.09.001","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2025 The Authors. Published by Elsevier B.V. on behalf of The Korean Institute of Communications and Information Sciences.","name":"copyright","label":"Copyright"}]}}