{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,4]],"date-time":"2025-04-04T15:24:55Z","timestamp":1743780295310,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,10]]},"DOI":"10.1109\/smc.2016.7844339","type":"proceedings-article","created":{"date-parts":[[2017,2,10]],"date-time":"2017-02-10T15:57:47Z","timestamp":1486742267000},"page":"000802-000807","source":"Crossref","is-referenced-by-count":1,"title":["On the approximate maximum likelihood estimation in stochastic model of SQL injection attacks"],"prefix":"10.1109","author":[{"given":"Michio","family":"Sonoda","sequence":"first","affiliation":[]},{"given":"Takeshi","family":"Matsuda","sequence":"additional","affiliation":[]},{"given":"Daiki","family":"Koizumi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1276933.1276935"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.2011.6083920"},{"key":"ref12","first-page":"10","article-title":"Automatic Detection Model of SQL Injection Attacks and Prediction Error","volume":"6","author":"matsuda","year":"2013","journal-title":"The Information Processing Society of Japan (IPSJ) Transactions on Mathematical Modeling and its Applications"},{"key":"ref13","first-page":"121","article-title":"Exact Soft Confidence-Weighted Learning","author":"jialei","year":"2012","journal-title":"Proceedings of the 29th International Conference on Machine Learning (ICML-12"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/BF00994018"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2070425.2070440"},{"journal-title":"Pattern Recognition and Machine Learning","year":"2006","author":"bishop","key":"ref16"},{"journal-title":"Statistic Modeling Mathematics for Modern Industrial Technology","year":"2008","author":"konishi","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CIMSiM.2010.93"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"522","DOI":"10.1109\/25.752576","article-title":"On the Use of Sigmoid Functions for Multistage Detection in Asynchronous CDMA Systems","volume":"48","author":"ko","year":"1999","journal-title":"IEEE Trans Vehicular Technology"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1181775.1181797"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1111037.1111070"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315249"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70748"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74320-0_4"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1698750.1698754"},{"key":"ref2","article-title":"SQL Injection Detection and Prevention Techniques","volume":"3","author":"tajpour","year":"2011","journal-title":"International Journal of Advancements in Computing Technology"},{"journal-title":"OWASP Top 10","article-title":"The Open Web Application Security Project (OWASP)","year":"0","key":"ref1"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1007\/11506881_8","article-title":"A Learning-Based Approach to the Detection of SQL Attacks","volume":"3548","author":"valeur","year":"2005","journal-title":"Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA 2005) Lecture Notes in Computer Science"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.5120\/5749-7043"}],"event":{"name":"2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC)","start":{"date-parts":[[2016,10,9]]},"location":"Budapest, Hungary","end":{"date-parts":[[2016,10,12]]}},"container-title":["2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7830913\/7844217\/07844339.pdf?arnumber=7844339","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,18]],"date-time":"2019-09-18T15:00:17Z","timestamp":1568818817000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7844339\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/smc.2016.7844339","relation":{},"subject":[],"published":{"date-parts":[[2016,10]]}}}