{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T16:59:18Z","timestamp":1770742758239,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,10,16]],"date-time":"2023-10-16T00:00:00Z","timestamp":1697414400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,10,16]]},"DOI":"10.1145\/3615366.3625075","type":"proceedings-article","created":{"date-parts":[[2023,10,17]],"date-time":"2023-10-17T18:17:34Z","timestamp":1697566654000},"page":"220-225","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Scalable Detection of SQL Injection in Cyber Physical Systems"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-8251-6065","authenticated-orcid":false,"given":"Michael","family":"Silva","sequence":"first","affiliation":[{"name":"State Univerisity of Ceara (UECE), Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8876-5926","authenticated-orcid":false,"given":"Silvio","family":"Ribeiro","sequence":"additional","affiliation":[{"name":"State Univerisity of Ceara (UECE), Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-4757-3764","authenticated-orcid":false,"given":"Vanessa","family":"Carvalho","sequence":"additional","affiliation":[{"name":"State Univerisity of Ceara (UECE), Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-2687-6450","authenticated-orcid":false,"given":"Francisco","family":"Cardoso","sequence":"additional","affiliation":[{"name":"State Univerisity of Ceara (UECE), Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7922-0695","authenticated-orcid":false,"given":"Rafael Lopes","family":"Gomes","sequence":"additional","affiliation":[{"name":"State Univerisity of Ceara (UECE), Brazil"}]}],"member":"320","published-online":{"date-parts":[[2023,10,17]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/DCOSS52077.2021.00047"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/LATINCOM50620.2020.9282265"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-017-0393-x"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2022.12.068"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE48307.2020.00030"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.2000753"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2016.7444815"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2016.2538821"},{"key":"e_1_3_2_1_9_1","volume-title":"SQL Injection Detection Using Machine Learning Techniques. In 2021 8th International Conference on Soft Computing Machine Intelligence (ISCMI). 15\u201320","author":"Hosam Eman","year":"2021","unstructured":"Eman Hosam , Hagar Hosny , Walaa Ashraf , and Ahmed\u00a0 S. Kaseb . 2021 . SQL Injection Detection Using Machine Learning Techniques. In 2021 8th International Conference on Soft Computing Machine Intelligence (ISCMI). 15\u201320 . https:\/\/doi.org\/10.1109\/ISCMI53840.2021.9654820 10.1109\/ISCMI53840.2021.9654820 Eman Hosam, Hagar Hosny, Walaa Ashraf, and Ahmed\u00a0S. Kaseb. 2021. SQL Injection Detection Using Machine Learning Techniques. In 2021 8th International Conference on Soft Computing Machine Intelligence (ISCMI). 15\u201320. https:\/\/doi.org\/10.1109\/ISCMI53840.2021.9654820"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2944951"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2021.3124331"},{"key":"e_1_3_2_1_12_1","volume-title":"Detection of SQL injection and cross-site scripting attacks. Symantec SecurityFocus","author":"Mookhey KK","year":"2004","unstructured":"KK Mookhey and Nilesh Burghate . 2004. Detection of SQL injection and cross-site scripting attacks. Symantec SecurityFocus ( 2004 ). KK Mookhey and Nilesh Burghate. 2004. Detection of SQL injection and cross-site scripting attacks. Symantec SecurityFocus (2004)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC49032.2021.9369449"},{"key":"e_1_3_2_1_14_1","volume-title":"Modeling Real-Life Urban Sensor Networks Based on Open Data. Sensors 22, 23","author":"Musznicki Bartosz","year":"2022","unstructured":"Bartosz Musznicki , Maciej Piechowiak , and Piotr Zwierzykowski . 2022. Modeling Real-Life Urban Sensor Networks Based on Open Data. Sensors 22, 23 ( 2022 ). https:\/\/doi.org\/10.3390\/s22239264 10.3390\/s22239264 Bartosz Musznicki, Maciej Piechowiak, and Piotr Zwierzykowski. 2022. Modeling Real-Life Urban Sensor Networks Based on Open Data. Sensors 22, 23 (2022). https:\/\/doi.org\/10.3390\/s22239264"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3452383.3452405"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/CENTCON52345.2021.9688059"},{"key":"#cr-split#-e_1_3_2_1_17_1.1","doi-asserted-by":"crossref","unstructured":"Syed Rizvi Andrew Kurtz Joseph Pfeffer and Mohammad Rizvi. 2018. Securing the Internet of Things (IoT): A Security Taxonomy for IoT. In 2018 17th IEEE International Conference On Trust Security And Privacy In Computing And Communications\/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom\/BigDataSE). 163-168. https:\/\/doi.org\/10.1109\/TrustCom\/BigDataSE.2018.00034 10.1109\/TrustCom","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00034"},{"key":"#cr-split#-e_1_3_2_1_17_1.2","doi-asserted-by":"crossref","unstructured":"Syed Rizvi Andrew Kurtz Joseph Pfeffer and Mohammad Rizvi. 2018. Securing the Internet of Things (IoT): A Security Taxonomy for IoT. In 2018 17th IEEE International Conference On Trust Security And Privacy In Computing And Communications\/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom\/BigDataSE). 163-168. https:\/\/doi.org\/10.1109\/TrustCom\/BigDataSE.2018.00034","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00034"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICAAIC53929.2022.9792964"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2018.08.218"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2020.105528"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2947527"},{"key":"e_1_3_2_1_22_1","first-page":"3","article-title":"Review of SQL injection: Problems and prevention","volume":"2","author":"Amin\u00a0Mohd Yunus Mohd","year":"2018","unstructured":"Mohd Amin\u00a0Mohd Yunus , Muhammad\u00a0Zainulariff Brohan , Nazri\u00a0Mohd Nawi , Ely Salwana\u00a0Mat Surin , Nurhakimah Azwani\u00a0Md Najib , and Chan\u00a0Wei Liang . 2018 . Review of SQL injection: Problems and prevention . JOIV: International Journal on Informatics Visualization 2 , 3 - 2 (2018), 215\u2013219. Mohd Amin\u00a0Mohd Yunus, Muhammad\u00a0Zainulariff Brohan, Nazri\u00a0Mohd Nawi, Ely Salwana\u00a0Mat Surin, Nurhakimah Azwani\u00a0Md Najib, and Chan\u00a0Wei Liang. 2018. Review of SQL injection: Problems and prevention. JOIV: International Journal on Informatics Visualization 2, 3-2 (2018), 215\u2013219.","journal-title":"JOIV: International Journal on Informatics Visualization"}],"event":{"name":"LADC 2023: 12th Latin-American Symposium on Dependable and Secure Computing","location":"La Paz Bolivia","acronym":"LADC 2023"},"container-title":["12th Latin-American Symposium on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3615366.3625075","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3615366.3625075","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:36:54Z","timestamp":1750178214000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3615366.3625075"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,16]]},"references-count":23,"alternative-id":["10.1145\/3615366.3625075","10.1145\/3615366"],"URL":"https:\/\/doi.org\/10.1145\/3615366.3625075","relation":{},"subject":[],"published":{"date-parts":[[2023,10,16]]},"assertion":[{"value":"2023-10-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}