{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T02:11:38Z","timestamp":1768270298532,"version":"3.49.0"},"reference-count":32,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,7,14]],"date-time":"2021-07-14T00:00:00Z","timestamp":1626220800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,7,14]],"date-time":"2021-07-14T00:00:00Z","timestamp":1626220800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,7,14]],"date-time":"2021-07-14T00:00:00Z","timestamp":1626220800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,7,14]]},"DOI":"10.1109\/icit52682.2021.9491117","type":"proceedings-article","created":{"date-parts":[[2021,7,27]],"date-time":"2021-07-27T01:29:46Z","timestamp":1627349386000},"page":"957-962","source":"Crossref","is-referenced-by-count":29,"title":["A Survey on SQL Injection Attack: Detection and Challenges"],"prefix":"10.1109","author":[{"given":"Zain","family":"Marashdeh","sequence":"first","affiliation":[]},{"given":"Khaled","family":"Suwais","sequence":"additional","affiliation":[]},{"given":"Mohammad","family":"Alia","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref32","first-page":"77","article-title":"Parallel scalable approximate matching algorithm for network intrusion detection systems","volume":"18","author":"hnaif","year":"2021","journal-title":"Int Arab J Inf Technol"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.32604\/iasc.2021.015939"},{"key":"ref30","article-title":"Top-10 threats for web application security &#x2013;2020","year":"0"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICoAC.2015.7562806"},{"key":"ref11","article-title":"Long short-term memory on abstract syntax tree for sql injection detection","author":"zhuo","year":"0","journal-title":"IET Software"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.3390\/s21041133"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-62582-5_7"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2005.10.010"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2012.181"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22555-0_14"},{"key":"ref17","first-page":"474","article-title":"The impact of different botnet flow feature subsets on prediction accuracy using supervised and unsupervised learning methods","volume":"5","author":"miller","year":"2016","journal-title":"International Journal of Internet Technology and Secured Transactions"},{"key":"ref18","first-page":"3","article-title":"Supervised machine learning: A review of classification techniques","volume":"160","author":"kotsiantis","year":"2007","journal-title":"Emerging Artificial Intelligence Applications in Computer Engineering"},{"key":"ref19","first-page":"72","article-title":"Unsupervised learning","author":"ghahramani","year":"2003","journal-title":"Machine Learning Summer School"},{"key":"ref28","article-title":"Poster: Multi-source data analysis for sql injection detection","author":"ross","year":"2017","journal-title":"38th IEEE Symposium on Security and Privacy (IEEE S&P)"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-015-0261-z"},{"key":"ref27","first-page":"1505","article-title":"Sql injection attack and user behavior detection by using query tree, fisher score and svm classification","volume":"3","author":"ladole","year":"2016","journal-title":"International Research Journal of Engineering and Technology"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2015.11.017"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-30668-1_12"},{"key":"ref29","article-title":"Parallel algorithm for smoke image detection","volume":"13","author":"almanasra","year":"2021","journal-title":"Int J Advance Soft Comput Appl"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33018-6_18"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/IACC.2016.141"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1002\/spy2.36"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2019.11.230"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICAwST.2011.6163109"},{"key":"ref1","first-page":"95","article-title":"User centric security models for improving the data security from sql injections and cross site scripting attacks","volume":"21","author":"malik","year":"2019","journal-title":"Journal of The Gujarat Research Society"},{"key":"ref20","first-page":"93","article-title":"Comparative study of k-means and hierarchical clustering techniques","volume":"2","author":"kaushik","year":"2014","journal-title":"International Journal of Software & Hardware Research in Engineering"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2017.19"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2007.43"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2010.12.076"},{"key":"ref23","article-title":"Dynamic analysis tool for detecting sql injection","volume":"14","author":"khalid","year":"2016","journal-title":"International Journal of Computer Science and Information Security (IJCSIS)"},{"key":"ref26","article-title":"Sqlid: Sql injection detection based on static and dynamic analysis","author":"prakash","year":"2016","journal-title":"Transylvanian Review"},{"key":"ref25","article-title":"Sqlunitgen: Sql injection testing using static and dynamic analysis","author":"shin","year":"2006","journal-title":"The 17th IEEE International Symposium on Software Reliability Engineering (ISSRE 2006)"}],"event":{"name":"2021 International Conference on Information Technology (ICIT)","location":"Amman, Jordan","start":{"date-parts":[[2021,7,14]]},"end":{"date-parts":[[2021,7,15]]}},"container-title":["2021 International Conference on Information Technology (ICIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9491111\/9491112\/09491117.pdf?arnumber=9491117","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T15:48:17Z","timestamp":1652197697000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9491117\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,14]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/icit52682.2021.9491117","relation":{},"subject":[],"published":{"date-parts":[[2021,7,14]]}}}