{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:08:54Z","timestamp":1750219734451,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":5,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,5,24]],"date-time":"2023-05-24T00:00:00Z","timestamp":1684886400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,5,24]]},"DOI":"10.1145\/3607720.3607749","type":"proceedings-article","created":{"date-parts":[[2023,11,13]],"date-time":"2023-11-13T17:14:08Z","timestamp":1699895648000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["SQL Injection Detection in Cloud Computing with Machine Learning Algorithms"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-9776-5263","authenticated-orcid":false,"given":"Abdelhakim","family":"Hadji","sequence":"first","affiliation":[{"name":"Department of Mathematics and Computer Science Faculty of Sciences Ain Chock, Computer Sciences and Systems Laboratory Hassan II University of Casablanca, Casablanca, Morocco, NISS23, Morocco and \rDepartment of Mathematics and Computer Science Faculty of Sciences Ain Chock, Computer Sciences and Systems Laboratory, Hassan II University of Casablanca, Morocco"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1911-6583","authenticated-orcid":false,"given":"Brahim","family":"Raouyane","sequence":"additional","affiliation":[{"name":"Department of Mathematics and Computer Science Faculty of Sciences Ain Chock, Computer Sciences and Systems Laboratory, Hassan II University of Casablanca, Morocco"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2590-9072","authenticated-orcid":false,"given":"Mohamed","family":"Rachdi","sequence":"additional","affiliation":[{"name":"Laboratory of Innovation in Management and Engineering for the Company( LIMIE), ISGA Casablanca, Morocco"}]}],"member":"320","published-online":{"date-parts":[[2023,11,13]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Integrative Approach Of Big Data And Network Attacks Analysis In Cloud Environment. 2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184)","author":"Manjunath Reddy C.","year":"2020","unstructured":"Manjunath Reddy , C. balannagari 2020 . Integrative Approach Of Big Data And Network Attacks Analysis In Cloud Environment. 2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184) (Jun. 2020), 314\u2013317. Manjunath Reddy, C. balannagari 2020. Integrative Approach Of Big Data And Network Attacks Analysis In Cloud Environment. 2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184) (Jun. 2020), 314\u2013317."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/CloudTech.2015.7336974"},{"key":"e_1_3_2_1_3_1","volume-title":"Machine Learning based Intrusion Detection System for Web-Based Attacks. 2020 IEEE 6th Intl Conference on Big Data Security on Cloud (BigDataSecurity)","author":"Sharma S.","year":"2020","unstructured":"Sharma , S. 202 0. Machine Learning based Intrusion Detection System for Web-Based Attacks. 2020 IEEE 6th Intl Conference on Big Data Security on Cloud (BigDataSecurity) , IEEE Intl Conference on High Performance and Smart Computing, (HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS) (May 2020 ), 227\u2013230. Sharma, S. 2020. Machine Learning based Intrusion Detection System for Web-Based Attacks. 2020 IEEE 6th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing, (HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS) (May 2020), 227\u2013230."},{"key":"e_1_3_2_1_4_1","volume-title":"Detecting SQL Injection Attacks in Cloud SaaS using Machine Learning. 2020 IEEE 6th Intl Conference on Big Data Security on Cloud (BigDataSecurity)","author":"Tripathy D.","year":"2020","unstructured":"Tripathy , D. 202 0. Detecting SQL Injection Attacks in Cloud SaaS using Machine Learning. 2020 IEEE 6th Intl Conference on Big Data Security on Cloud (BigDataSecurity) , IEEE Intl Conference on High Performance and Smart Computing, (HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS) (May 2020 ), 145\u2013150. Tripathy, D. 2020. Detecting SQL Injection Attacks in Cloud SaaS using Machine Learning. 2020 IEEE 6th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing, (HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS) (May 2020), 145\u2013150."},{"key":"e_1_3_2_1_5_1","volume-title":"Electronic and Automation Control Conference (IMCEC) (Oct.","author":"Wang K.","year":"2016","unstructured":"Wang , K. and Hou, Y . 2016. Detection method of SQL injection attack in cloud computing environment. 2016 IEEE Advanced Information Management, Communicates , Electronic and Automation Control Conference (IMCEC) (Oct. 2016 ), 487\u2013493. Wang, K. and Hou, Y. 2016. Detection method of SQL injection attack in cloud computing environment. 2016 IEEE Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC) (Oct. 2016), 487\u2013493."}],"event":{"name":"NISS 2023: The 6th International Conference on Networking, Intelligent Systems & Security","acronym":"NISS 2023","location":"Larache Morocco"},"container-title":["Proceedings of the 6th International Conference on Networking, Intelligent Systems &amp; Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3607720.3607749","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3607720.3607749","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:36:29Z","timestamp":1750178189000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3607720.3607749"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,24]]},"references-count":5,"alternative-id":["10.1145\/3607720.3607749","10.1145\/3607720"],"URL":"https:\/\/doi.org\/10.1145\/3607720.3607749","relation":{},"subject":[],"published":{"date-parts":[[2023,5,24]]},"assertion":[{"value":"2023-11-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}