{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T18:03:32Z","timestamp":1770228212765,"version":"3.49.0"},"reference-count":117,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,5,30]],"date-time":"2024-05-30T00:00:00Z","timestamp":1717027200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,5,30]],"date-time":"2024-05-30T00:00:00Z","timestamp":1717027200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,5,30]]},"DOI":"10.1109\/eit60633.2024.10609847","type":"proceedings-article","created":{"date-parts":[[2024,7,31]],"date-time":"2024-07-31T20:39:16Z","timestamp":1722458356000},"page":"135-144","source":"Crossref","is-referenced-by-count":5,"title":["An Investigation into the Performances of the State-of-the-art Machine Learning Approaches for Various Cyber-attack Detection: A Survey"],"prefix":"10.1109","author":[{"given":"Tosin","family":"Ige","sequence":"first","affiliation":[{"name":"The University of Texas at El Paso,Dept. of Computer Science,Texas,USA"}]},{"given":"Christophet","family":"Kiekintveld","sequence":"additional","affiliation":[{"name":"The University of Texas at El Paso,Dept. of Computer Science,Texas,USA"}]},{"given":"Aritran","family":"Piplai","sequence":"additional","affiliation":[{"name":"The University of Texas at El Paso,Dept. of Computer Science,Texas,USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/AsiaJCIS.2015.17"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICECET52533.2021.9698771"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/iSSSC50941.2020.9358835"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s13042-014-0309-2"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/i-PACT44901.2019.8959961"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SVCC56964.2023.10165344"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.5121\/ijcnc.2020.12607"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.11591\/eei.v12i1.4555"},{"key":"ref9","article-title":"Comparison study for nlp using machine learning techniques to detecting sql injection vulnerabilities","author":"Ali AL-Maliki","year":"2023","journal-title":"International Journal of Nonlinear Analysis and Applications"},{"key":"ref10","article-title":"SCAMM: Detection and prevention of SQL injection attacks using a machine learning approach","volume-title":"PhD thesis, Brac University","author":"Alam","year":"2021"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.3390\/s23094403"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CDMA54072.2022.00034"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.3991\/ijim.v13i12.11411"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.3390\/app13084649"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.3390\/app122312336"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10232919"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CSNT57126.2023.10134735"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-24305-0_37"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.35940\/ijainn.b1019.041221"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.5422"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2023.103553"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/GlobConPT57482.2022.9938367"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-7998-5101-1.ch008"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.3390\/s23239583"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/BigComp.2018.00044"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.4108\/icst.collaboratecom.2014.257749"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/COINS51742.2021.9524269"},{"key":"ref28","author":"Chumachenko","year":"2017","journal-title":"Machine learning methods for malware detection and classification"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCNT54827.2022.9984365"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.15199\/48.2022.07.30"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/UEMCON51285.2020.9298146"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2018.00013"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1016\/B978-0-12-805349-2.00004-2","article-title":"Chapter 4 - exploratory study","volume-title":"Research Methods for Cyber Security","author":"Edgar","year":"2017"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36883-7_10"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ACT.2010.33"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-021-05947-3"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICCRD54409.2022.9730579"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2019.07.052"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/594501"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.23919\/ICACT.2018.8323798"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2019.100059"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ICECTA48151.2019.8959617"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.5120\/ijca2021921428"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/CSCloud.2017.58"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ISCMI53840.2021.9654820"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-020-00059-1"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-4825-3_6"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2022.0130502"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/AIBThings58340.2023.10292485"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2023.0140202"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12030473"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63645-0_23"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/DCOSS.2019.00118"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/3591569.3591576"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-022-09707-w"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2018.02.003"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/ACCAI58221.2023.10200007"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3252366"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.11113\/jt.v77.3558"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/IMIS.2015.71"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/ICAECIS58353.2023.10170095"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.31979\/etd.j5dj-ngvb"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/ICIIECS.2017.8275880"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/ECTI-CON49241.2020.9158230"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1631\/FITEE.1601325"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-023-10713-9"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCP.2019.8882965"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-8711-5_11"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/CCWC54503.2022.9720869"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3152577"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/ISDFS58141.2023.10131884"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/NAECON.2016.7856826"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/ASIANCON58793.2023.10270550"},{"key":"ref74","author":"Okpanachi","year":"2019","journal-title":"Machine learning approach for detection of spam url: Performance evaluation of selected algorithms"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2023.0140945"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-023-00672-4"},{"key":"ref77","author":"Pandey","journal-title":"Detection of malign pages using machine learning techniques: Description and analysis"},{"issue":"11","key":"ref78","first-page":"239","article-title":"Detection of sql injection using machine learning: a survey","volume":"6","author":"Pattewar","year":"2019","journal-title":"Int. Res. J. Eng. Technol.(IRJET)"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1237\/3\/032040"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSA.2015.7166115"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/ICCC.2013.6731668"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCS54159.2022.9785263"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/GECOST55694.2022.10010386"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1051\/itmconf\/20235605011"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/AISP57993.2023.10134944"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.11591\/ijeecs.v32.i1.pp517-529"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/ICCWorkshops57953.2023.10283523"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/RAICS.2015.7488411"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/ICAAIC53929.2022.9792964"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.18517\/ijaseit.13.2.17810"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIT52419.2022.9711555"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-0965-7_39"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.23919\/INDIACom49435.2020.9083716"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2001.924286"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1145\/3154273.3154326"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1007\/s10844-010-0148-x"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2020.03.110"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/ICOEI51242.2021.9452914"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/ICSESS47205.2019.9040851"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/ICAI55435.2022.9773590"},{"issue":"3","key":"ref101","first-page":"39","article-title":"Phishing website detection using machine learning: Model development and django integration","volume":"9","author":"Mayowa Sunday","year":"2023","journal-title":"Journal of Electrical Engineering, Electronics, Control and Computer Science"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22540-6_42"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom\/BigDataSE\/ICESS.2017.213"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/AIPR50011.2020.9425304"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataSecurity-HPSC-IDS49724.2020.00035"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1007\/s12065-019-00310-w"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/ICOEI.2018.8553780"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.53894\/ijirss.v7i3.2957"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.31033\/ijemr.9.6.18"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/ICRASET59632.2023.10420166"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1007\/s10878-023-01038-1"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2947527"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1007\/s13244-018-0639-9"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/ICONSTEM56934.2023.10142349"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-42007-3_9"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/CloudTech.2017.8284731"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2020.106505"}],"event":{"name":"2024 IEEE International Conference on Electro Information Technology (eIT)","location":"Eau Claire, WI, USA","start":{"date-parts":[[2024,5,30]]},"end":{"date-parts":[[2024,6,1]]}},"container-title":["2024 IEEE International Conference on Electro Information Technology (eIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10609838\/10609857\/10609847.pdf?arnumber=10609847","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,10]],"date-time":"2024-08-10T05:13:47Z","timestamp":1723266827000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10609847\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,30]]},"references-count":117,"URL":"https:\/\/doi.org\/10.1109\/eit60633.2024.10609847","relation":{},"subject":[],"published":{"date-parts":[[2024,5,30]]}}}