{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T16:41:41Z","timestamp":1776357701426,"version":"3.51.2"},"reference-count":17,"publisher":"Tech Science Press","issue":"2","license":[{"start":{"date-parts":[[2024,11,24]],"date-time":"2024-11-24T00:00:00Z","timestamp":1732406400000},"content-version":"vor","delay-in-days":328,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2024]]},"DOI":"10.32604\/cmc.2024.057673","type":"journal-article","created":{"date-parts":[[2024,11,13]],"date-time":"2024-11-13T10:39:00Z","timestamp":1731494340000},"page":"3189-3220","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":64,"title":["Classification of Cybersecurity Threats, Vulnerabilities and Countermeasures in Database Systems"],"prefix":"10.32604","volume":"81","author":[{"given":"Mohammed Amin","family":"Almaiah","sequence":"first","affiliation":[]},{"given":"Leen Mohammad","family":"Saqr","sequence":"additional","affiliation":[]},{"given":"Leen Ahmad","family":"Al-Rawwash","sequence":"additional","affiliation":[]},{"given":"Layan Ahmed","family":"Altellawi","sequence":"additional","affiliation":[]},{"given":"Romel","family":"Al-Ali","sequence":"additional","affiliation":[]},{"given":"Omar","family":"Almomani","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2024]]},"reference":[{"key":"ref1","first-page":"34","article-title":"The overview of database security threats\u2019 solutions: Traditional and machine learning","volume":"12","author":"Wang","year":"2021","journal-title":"J. Inf. Secur."},{"key":"ref2","doi-asserted-by":"crossref","first-page":"30","DOI":"10.58496\/MJCS\/2023\/006","article-title":"SQL injection attack: Quick view","volume":"2023","author":"Abdullayev","year":"2023","journal-title":"Mesopotamian J. Cyber Security"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"115","DOI":"10.58496\/MJCSC\/2023\/016","article-title":"A comprehensive review of security measures in database systems: Assessing authentication, access control, and beyond","volume":"2023","author":"Omotunde","year":"2023","journal-title":"Mesopotamian J. Cyber Security"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"38","DOI":"10.21928\/uhdjst.v5n2y2021.pp38-46","article-title":"A review of database security concepts, risks, and problems","volume":"5","author":"Teimoor","year":"2021","journal-title":"UHD J. Sci. Technol."},{"key":"ref5","first-page":"1","article-title":"Analysis of database security","volume":"11","author":"Pan","year":"2024","journal-title":"Open Access Library J."},{"key":"ref6","doi-asserted-by":"crossref","first-page":"5212","DOI":"10.1109\/ACCESS.2024.3349487","article-title":"Efficient braille transformation for secure password hashing","volume":"12","author":"Touil","year":"2024","journal-title":"IEEE Access"},{"key":"ref7","first-page":"1","article-title":"Enterprise data security measures: A comparative review of effectiveness and risks across different industries and organization types","volume":"6","author":"Bandari","year":"2023","journal-title":"Int. J. Bus. Intell. Big Data Anal."},{"key":"ref8","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2023.103387","article-title":"Mitigation strategies against the phishing attacks: A systematic literature review","volume":"132","author":"Naqvi","year":"2023","journal-title":"Comput. Secur."},{"key":"ref9","series-title":"2024 IEEE Symp. Security and Privacy (SP)","first-page":"4497","article-title":"TCP spoofing: Reliable payload transmission past the spoofed TCP handshake","author":"Pan","year":"2024"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"53408","DOI":"10.1109\/ACCESS.2024.3373662","article-title":"A systematic literature review on the security attacks and countermeasures used in graphical passwords","volume":"12","author":"Por","year":"2024","journal-title":"IEEE Access"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3558001","article-title":"A review on C3I systems\u2019 security: Vulnerabilities, attacks, and countermeasures","volume":"55","author":"Ahmad","year":"2023","journal-title":"ACM Comput. Surv."},{"key":"ref12","doi-asserted-by":"crossref","first-page":"169367","DOI":"10.1109\/ACCESS.2020.3022746","article-title":"Analysis for the evaluation and security management of a database in a public organization to mitigate cyber-attacks","volume":"8","author":"Toapanta","year":"2020","journal-title":"IEEE Access"},{"key":"ref13","doi-asserted-by":"crossref","DOI":"10.3390\/electronics11203330","article-title":"Cybersecurity threats, countermeasures and mitigation techniques on the IoT: Future research directions","volume":"11","author":"Altulaihan","year":"2022","journal-title":"Electronics"},{"key":"ref14","doi-asserted-by":"crossref","DOI":"10.3390\/electronics12061333","article-title":"A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions","volume":"12","author":"Aslan","year":"2023","journal-title":"Electronics"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1007\/978-3-030-74575-2_12","author":"Almaiah","year":"2021","journal-title":"Artificial Intelligence and Blockchain for Future Cybersecurity Applications"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.cosrev.2019.05.002","article-title":"On cloud security requirements, threats, vulnerabilities and countermeasures: A survey","volume":"33","author":"Kumar","year":"2019","journal-title":"Comput. Sci. Rev."},{"key":"ref17","series-title":"2024 6th Int. Conf. Comput. Informat. (ICCI)","first-page":"120","article-title":"Database security: Current challenges and effective protection strategies","author":"Naguib","year":"2024"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.techscience.com\/files\/cmc\/2024\/TSP_CMC-81-2\/TSP_CMC_57673\/TSP_CMC_57673.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T04:23:39Z","timestamp":1741321419000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v81n2\/58679"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":17,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2024]]},"published-print":{"date-parts":[[2024]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2024.057673","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"2024-08-24","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-10-25","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-11-18","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}