{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T13:45:37Z","timestamp":1730295937080,"version":"3.28.0"},"reference-count":11,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,5,30]],"date-time":"2024-05-30T00:00:00Z","timestamp":1717027200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,5,30]],"date-time":"2024-05-30T00:00:00Z","timestamp":1717027200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,5,30]]},"DOI":"10.1109\/sera61261.2024.10685584","type":"proceedings-article","created":{"date-parts":[[2024,9,26]],"date-time":"2024-09-26T17:41:47Z","timestamp":1727372507000},"page":"352-355","source":"Crossref","is-referenced-by-count":0,"title":["A Multi - Aspect Evaluation of DL-based SQLi Attack Detection Models"],"prefix":"10.1109","author":[{"given":"Pattara","family":"Leelaprute","sequence":"first","affiliation":[{"name":"Kasetsart University,Department of Computer Engineering, Faculty of Engineering,Bangkok,Thailand"}]},{"given":"Yuki","family":"Kase","sequence":"additional","affiliation":[{"name":"Okayama Prefectural University,Department of Systems Engineering,Soja,Japan"}]},{"given":"Sousuke","family":"Amasaki","sequence":"additional","affiliation":[{"name":"Okayama Prefectural University,Department of Systems Engineering,Soja,Japan"}]},{"given":"Hirohisa","family":"Aman","sequence":"additional","affiliation":[{"name":"Center for Information Technology, Ehime University,Matsuyama,Japan"}]},{"given":"Tomoyuki","family":"Yokogawa","sequence":"additional","affiliation":[{"name":"Okayama Prefectural University,Department of Systems Engineering,Soja,Japan"}]}],"member":"263","reference":[{"volume-title":"OWASP top ten 2022","year":"2021","key":"ref1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3266385"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CCC.2016.26"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.23919\/INM.2017.7987433"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2947527"},{"key":"ref6","first-page":"662","article-title":"mURLi: A tool for detection of malicious urls and injection attacks,\u201d Procedia Computer Science","volume-title":"4th International Conference on Innovative Data Communication Technology and Application","volume":"215","author":"Devalla"},{"issue":"5","key":"ref7","doi-asserted-by":"crossref","first-page":"602","DOI":"10.1016\/j.neunet.2005.06.042","article-title":"Framewise phoneme classification with bidirectional lstm and other neural network architectures","volume":"18","author":"Graves","year":"2005","journal-title":"Neural Networks"},{"key":"ref8","first-page":"4171","article-title":"BERT: pre-training of deep bidirectional transformers for language understanding","volume-title":"Proc. of NAACL-HLT","author":"Devlin","year":"2019"},{"volume-title":"Find out how you stack up to new industry benchmarks for mobile page speed","year":"2018","author":"An","key":"ref9"},{"volume-title":"White paper: How web and mobile performance optimize conversion and user experience","year":"2019","key":"ref10"},{"volume-title":"Sql injection kaggle dataset","year":"2024","key":"ref11"}],"event":{"name":"2024 IEEE\/ACIS 22nd International Conference on Software Engineering Research, Management and Applications (SERA)","start":{"date-parts":[[2024,5,30]]},"location":"Honolulu, HI, USA","end":{"date-parts":[[2024,6,1]]}},"container-title":["2024 IEEE\/ACIS 22nd International Conference on Software Engineering Research, Management and Applications (SERA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10685512\/10685554\/10685584.pdf?arnumber=10685584","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,27]],"date-time":"2024-09-27T04:44:07Z","timestamp":1727412247000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10685584\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,30]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/sera61261.2024.10685584","relation":{},"subject":[],"published":{"date-parts":[[2024,5,30]]}}}