{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,7]],"date-time":"2026-05-07T11:31:38Z","timestamp":1778153498355,"version":"3.51.4"},"reference-count":61,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:00:00Z","timestamp":1654041600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:00:00Z","timestamp":1654041600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:00:00Z","timestamp":1654041600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Rel."],"published-print":{"date-parts":[[2022,6]]},"DOI":"10.1109\/tr.2021.3124331","type":"journal-article","created":{"date-parts":[[2021,11,23]],"date-time":"2021-11-23T21:26:28Z","timestamp":1637702788000},"page":"1057-1074","source":"Crossref","is-referenced-by-count":41,"title":["Semantic Query-Featured Ensemble Learning Model for SQL-Injection Attack Detection in IoT-Ecosystems"],"prefix":"10.1109","volume":"71","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9743-5358","authenticated-orcid":false,"given":"Gowtham","family":"M","sequence":"first","affiliation":[{"name":"Visvesvaraya Technological University, Belagavi, India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Pramod","family":"H B","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Rajeev Institute of Technology, Hassan, India"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SmartWorld-UIC-ATC-SCALCOM-IOP-SCI.2019.00276"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2015.7389091"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/IDAACS.2017.8095101"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICEMIS.2016.7745338"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.11591\/ijeei.v6i4.543"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/IOTA.2016.7562719"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICCONS.2017.8250546"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MIPRO.2016.7522218"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2015.7389149"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/NGMAST.2015.10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/GIIS.2017.8169799"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/IDAACS.2019.8924262"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2986444"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2019.100059"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2924045"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/EST.2017.8090392"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.23919\/INM.2017.7987433"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2016.7502997"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICCICCT.2014.6993127"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2734681"},{"key":"ref21","first-page":"1","article-title":"SQL injection attack detection using resnet","volume-title":"Proc. 10th Int. Conf. Comput. Comm. Netw. Technol.","author":"Nagasundari"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2014.2310221"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2013.37"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/SAI.2017.8252192"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2924045"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2019.2900007"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1049\/iet-net.2020.0078"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2893675"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2944951"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2017.7966347"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW50294.2020.00083"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2019.2925415"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC48688.2020.00-41"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2013.45"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TLA.2015.7069095"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/CCIS.2018.8691148"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICOMICON.2017.8279028"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2598336"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ICEDIF.2015.7280212"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ITNG.2009.34"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ACT.2009.178"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ICIS46139.2019.8940196"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ICECTA48151.2019.8959617"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/HIS.2010.5600026"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ICT4M.2018.00041"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2013.42"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/SAINT.2010.60"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCS.2016.7586332"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2019.00113"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/IMCEC.2016.7867260"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataSecurity-HPSC-IDS49724.2020.00035"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.23919\/INM.2017.7987433"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/NBiS.2011.104"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/WorldCIS.2013.6751030"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1186\/s13634-016-0355-x"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-019-2906-y"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1097\/jto.0b013e3181ec173d"},{"issue":"2","key":"ref59","first-page":"502","article-title":"Protection against SQL injection attack in cloud computing","volume":"9","author":"Shamuyarira","year":"2020","journal-title":"Int. J. Eng. Res. Technol."},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1007\/s41635-017-0029-7"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2017.11.022"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-017-1558-0"}],"container-title":["IEEE Transactions on Reliability"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/24\/9787285\/09625903.pdf?arnumber=9625903","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T00:49:24Z","timestamp":1705020564000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9625903\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6]]},"references-count":61,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tr.2021.3124331","relation":{},"ISSN":["0018-9529","1558-1721"],"issn-type":[{"value":"0018-9529","type":"print"},{"value":"1558-1721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,6]]}}}