{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T05:38:43Z","timestamp":1773207523558,"version":"3.50.1"},"reference-count":31,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,7,26]],"date-time":"2021-07-26T00:00:00Z","timestamp":1627257600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,7,26]],"date-time":"2021-07-26T00:00:00Z","timestamp":1627257600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,7,26]],"date-time":"2021-07-26T00:00:00Z","timestamp":1627257600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,7,26]]},"DOI":"10.1109\/csr51186.2021.9527990","type":"proceedings-article","created":{"date-parts":[[2021,9,6]],"date-time":"2021-09-06T21:35:06Z","timestamp":1630964106000},"page":"27-34","source":"Crossref","is-referenced-by-count":10,"title":["Detecting SQL Injection Web Attacks Using Ensemble Learners and Data Sampling"],"prefix":"10.1109","author":[{"given":"Richard","family":"Zuech","sequence":"first","affiliation":[]},{"given":"John","family":"Hancock","sequence":"additional","affiliation":[]},{"given":"Taghi M.","family":"Khoshgoftaar","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.2307\/3001913"},{"key":"ref30","author":"tabachnick","year":"2007","journal-title":"Experimental Designs Using ANOVA"},{"key":"ref10","article-title":"Damn vulnerable web app github website","year":"0"},{"key":"ref11","article-title":"Selenium framework website","year":"0"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.67"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2018.00125"},{"key":"ref14","first-page":"1","article-title":"Towards detecting and classifying network intrusion traffic using deep learning frameworks","volume":"9","author":"basnet","year":"2019","journal-title":"J Internet Serv Inf Secur"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-020-03410-y"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101851"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102564"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1214\/09-SS054"},{"key":"ref19","first-page":"1137","article-title":"A study of cross-validation and bootstrap for accuracy estimation and model selection","volume":"14","author":"kohavi","year":"1995","journal-title":"IJCAI"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(96)00142-2"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CogMI50398.2020.00032"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1002\/isaf.1460"},{"key":"ref3","first-page":"13","article-title":"A classification of sql-injection attacks and countermeasures","volume":"1","author":"halfond","year":"2006","journal-title":"Proceedings of the IEEE International Symposium on Secure Software Engineering"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.5220\/0006639801080116"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-019-0274-4"},{"key":"ref5","article-title":"Machine learning in cyber-security-problems, challenges and data sets","author":"amit","year":"2018"},{"key":"ref8","article-title":"Cse-cic-ids2018 dataset","year":"0"},{"key":"ref7","article-title":"Cicids2017 dataset","year":"0"},{"key":"ref2","article-title":"Owasp top ten webpage","year":"0"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-020-00382-x"},{"key":"ref1","article-title":"Us ecommerce sales grow 14.9% in 2019","author":"young","year":"0"},{"key":"ref20","article-title":"Scikit-learn website","year":"0"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.3389\/fnbot.2013.00021"},{"key":"ref21","first-page":"6638","article-title":"Catboost: unbiased boosting with categorical features","author":"prokhorenkova","year":"2018","journal-title":"Advances in neural information processing systems"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939785"},{"key":"ref23","first-page":"3146","article-title":"Lightgbm: A highly efficient gradient boosting decision tree","author":"ke","year":"2017","journal-title":"Advances in neural information processing systems"},{"key":"ref26","volume":"821","author":"montgomery","year":"2012","journal-title":"Introduction to Linear Regression Analysis"},{"key":"ref25","author":"hartigan","year":"2012","journal-title":"Bayes Theory"}],"event":{"name":"2021 IEEE International Conference on Cyber Security and Resilience (CSR)","location":"Rhodes, Greece","start":{"date-parts":[[2021,7,26]]},"end":{"date-parts":[[2021,7,28]]}},"container-title":["2021 IEEE International Conference on Cyber Security and Resilience (CSR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9527731\/9527900\/09527990.pdf?arnumber=9527990","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T15:45:45Z","timestamp":1652197545000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9527990\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,26]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/csr51186.2021.9527990","relation":{},"subject":[],"published":{"date-parts":[[2021,7,26]]}}}