{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,13]],"date-time":"2024-09-13T03:36:16Z","timestamp":1726198576157},"publisher-location":"Cham","reference-count":20,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031355066"},{"type":"electronic","value":"9783031355073"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-35507-3_38","type":"book-chapter","created":{"date-parts":[[2023,6,2]],"date-time":"2023-06-02T21:04:13Z","timestamp":1685739853000},"page":"396-406","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Deep Learning Based Natural Language Processing Approach for Detecting SQL Injection Attack"],"prefix":"10.1007","author":[{"given":"Yuvaraj","family":"Natarajan","sequence":"first","affiliation":[]},{"given":"B.","family":"Karthikeyan","sequence":"additional","affiliation":[]},{"given":"Gitanjali","family":"Wadhwa","sequence":"additional","affiliation":[]},{"given":"S. A.","family":"Srinivasan","sequence":"additional","affiliation":[]},{"given":"A. S. Parthiv","family":"Akilesh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,6,3]]},"reference":[{"key":"38_CR1","doi-asserted-by":"crossref","unstructured":"Marchand-Melsom, A., Mai, D.B.N.: Automatic repair of OWASP Top 10 security vulnerabilities: a survey. In: Proceedings of the IEEE\/ACM 42nd International Conference on Software Engineering Workshops, pp. 23\u201330 (2020)","DOI":"10.1145\/3387940.3392200"},{"key":"38_CR2","doi-asserted-by":"crossref","unstructured":"Akbar, M., M.A.F.Ridha: SQL injection and cross site scripting prevention using OWASP ModSecurity web application firewall. JOIV: Int. J. Inform. Visual. 2(4), 286\u2013292 (2018)","DOI":"10.30630\/joiv.2.4.107"},{"volume-title":"Cybercrime and Cyber Terrorism Investigator's Handbook","year":"2014","key":"38_CR3","unstructured":"Akhgar, B., Staniforth, A., Bosco, F. (eds.): Syngress, Oxford (2014)"},{"key":"38_CR4","doi-asserted-by":"crossref","unstructured":"Dhingra, M., Jain, M., Jadon, R.S.: Role of artificial intelligence in enterprise information security: a review. In: 2016 Fourth International Conference on Parallel, Distributed and Grid Computing (PDGC), pp. 188\u2013191. IEEE (2016)","DOI":"10.1109\/PDGC.2016.7913142"},{"issue":"3","key":"38_CR5","doi-asserted-by":"publisher","first-page":"300","DOI":"10.47059\/revistageintec.v11i3.1939","volume":"11","author":"SS Anandha Krishnan","year":"2021","unstructured":"Anandha Krishnan, S.S., Sabu, A.N., Sajan, P.P., Sreedeep, A.L.: SQL injection detection using machine learning. Revista Geintec-Gestao Inovacao e Tecnologias 11(3), 300\u2013310 (2021)","journal-title":"Revista Geintec-Gestao Inovacao e Tecnologias"},{"key":"38_CR6","unstructured":"Kavitha, M.N., Vennila, V., Padmapriya, G., Rajiv Kannan, A.: Prevention of SQL injection attack using unsupervised machine learning approach. Int. J. Aquatic Sci. 12 (2021). ISSN 2008-8019"},{"key":"38_CR7","unstructured":"Xuan, N.Y., Juremi, J., Saad, N.H.M.: Securing e-commerce against SQL injection, cross site scripting and broken authentication. J. Appl. Technol. Innov. 5(2), 73 (2021). (e-ISSN 2600-7304)"},{"volume-title":"Securing SQL Server: Protecting Your Database from Attackers","year":"2015","author":"D Cherry","key":"38_CR8","unstructured":"Cherry, D.: Securing SQL Server: Protecting Your Database from Attackers. Syngress, Oxford (2015)"},{"key":"38_CR9","doi-asserted-by":"crossref","unstructured":"Ahmad, K., Karim, M.: A method to prevent SQL injection attack using an improved parameterized stored procedure. Int. J. Adv. Comput. Sci. Appl. 12(6) (2021)","DOI":"10.14569\/IJACSA.2021.0120636"},{"key":"38_CR10","doi-asserted-by":"crossref","unstructured":"Joshi, A., Geetha, V.: SQL injection detection using machine learning. In: 2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT), pp. 1111\u20131115. IEEE (2014)","DOI":"10.1109\/ICCICCT.2014.6993127"},{"key":"38_CR11","doi-asserted-by":"crossref","unstructured":"Deriba, F., Salau, A.O., Mohammed, S.H., Kassa, T.M., Demilie, W.B.: Development of a compressive framework using machine learning approaches for SQL injection attacks. PRZEGL\u0104D ELEKTROTECHNICZNY 1(7), 183\u2013189 (2022)","DOI":"10.15199\/48.2022.07.30"},{"key":"38_CR12","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1007\/978-981-16-6285-0_24","volume-title":"Proceedings of Data Analytics and Management","author":"A Falor","year":"2022","unstructured":"Falor, A., Hirani, M., Vedant, H., Mehta, P., Krishnan, D.: A deep learning approach for detection of SQL injection attacks using convolutional neural networks. In: Gupta, D., Polkowski, Z., Khanna, A., Bhattacharyya, S., Castillo, O. (eds.) Proceedings of Data Analytics and Management, vol. 91, pp. 293\u2013304. Springer, Singapore (2022). https:\/\/doi.org\/10.1007\/978-981-16-6285-0_24"},{"key":"38_CR13","first-page":"8887","volume":"975","author":"I Hashem","year":"2021","unstructured":"Hashem, I., Islam, M., Haque, S.M., Jabed, Z.I., Sakib, N.: A proposed technique for simultaneously detecting DDoS and SQL injection attacks. Int. J. Comput. Appl. 975, 8887 (2021)","journal-title":"Int. J. Comput. Appl."},{"issue":"6","key":"38_CR14","first-page":"800","volume":"12","author":"B Kranthikumar","year":"2020","unstructured":"Kranthikumar, B., Leela Velusamy, R.: SQL injection detection using REGEX classifier. J. Xi\u2019an Univ. Archit. Technol. 12(6), 800\u2013809 (2020)","journal-title":"J. Xi'an Univ. Archit. Technol."},{"issue":"6","key":"38_CR15","first-page":"569","volume":"15","author":"I Jemal","year":"2020","unstructured":"Jemal, I., Cheikhrouhou, O., Hamam, H., Mahfoudhi, A.: SQL injection attack detection and prevention techniques using machine learning. Int. J. Appl. Eng. Res. 15(6), 569\u2013580 (2020)","journal-title":"Int. J. Appl. Eng. Res."},{"key":"38_CR16","doi-asserted-by":"crossref","unstructured":"Roy, P., Kumar, R., Rani, P.: SQL injection attack detection by machine learning classifier. In: 2022 International Conference on Applied Artificial Intelligence and Computing (ICAAIC), pp. 394\u2013400. IEEE (2022)","DOI":"10.1109\/ICAAIC53929.2022.9792964"},{"key":"38_CR17","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1007\/978-981-16-1249-7_27","volume-title":"Soft Computing and Signal Processing","author":"G Wadhwa","year":"2022","unstructured":"Wadhwa, G., Kaur, A.: Various image modalities used in computer-aided diagnosis system for detection of breast cancer using machine learning techniques: a systematic review. In: Reddy, V.S., Prasad, V.K., Wang, J., Reddy, K.T.V. (eds.) Soft Computing and Signal Processing. Advances in Intelligent Systems and Computing, vol. 1340, pp. 281\u2013292. Springer, Singapore (2022). https:\/\/doi.org\/10.1007\/978-981-16-1249-7_27"},{"issue":"15","key":"38_CR18","doi-asserted-by":"publisher","first-page":"9289","DOI":"10.1007\/s00521-021-05690-8","volume":"33","author":"B Kim","year":"2021","unstructured":"Kim, B., Yuvaraj, N., Sri Preethaa, K.R., Arun Pandian, R.: Surface crack detection using deep learning with shallow Convolutional Neural Network architecture for enhanced computation. Neural Comput. Appl. 33(15), 9289\u20139305 (2021)","journal-title":"Neural Comput. Appl."},{"key":"38_CR19","doi-asserted-by":"crossref","unstructured":"Wadhwa, G., Mathur, M.: A convolutional neural network approach for the diagnosis of breast cancer. In: 2020 Sixth International Conference on Parallel, Distributed and Grid Computing (PDGC), pp. 357\u2013361. IEEE (2020)","DOI":"10.1109\/PDGC50313.2020.9315817"},{"key":"38_CR20","unstructured":"Shah, S.S.H.: SQL injection dataset In: Kaggle Dataset"}],"container-title":["Lecture Notes in Networks and Systems","Intelligent Systems Design and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-35507-3_38","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,2]],"date-time":"2023-06-02T21:28:28Z","timestamp":1685741308000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-35507-3_38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031355066","9783031355073"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-35507-3_38","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"3 June 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISDA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Systems Design and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 December 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 December 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"isda2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.mirlabs.net\/isda22\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}