{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T14:13:09Z","timestamp":1730297589188,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,9,5]],"date-time":"2023-09-05T00:00:00Z","timestamp":1693872000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,9,5]],"date-time":"2023-09-05T00:00:00Z","timestamp":1693872000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,9,5]]},"DOI":"10.1109\/socc58585.2023.10256777","type":"proceedings-article","created":{"date-parts":[[2023,9,22]],"date-time":"2023-09-22T13:45:42Z","timestamp":1695390342000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["An Investigation of Machine Learning Algorithms for High-bandwidth SQL Injection Detection Utilising BlueField-3 DPU Technology"],"prefix":"10.1109","author":[{"given":"Kasim","family":"Tasdemir","sequence":"first","affiliation":[{"name":"Queen’s University Belfast,Centre for Secure Information Technologies,Belfast,United Kingdom"}]},{"given":"Rafiullah","family":"Khan","sequence":"additional","affiliation":[{"name":"NVIDIA Corporation,Belfast,United Kingdom"}]},{"given":"Fahad","family":"Siddiqui","sequence":"additional","affiliation":[{"name":"NVIDIA Corporation,Belfast,United Kingdom"}]},{"given":"Sakir","family":"Sezer","sequence":"additional","affiliation":[{"name":"Queen’s University Belfast,Centre for Secure Information Technologies,Belfast,United Kingdom"}]},{"given":"Fatih","family":"Kurugollu","sequence":"additional","affiliation":[{"name":"University of Sharjah,College of Computing and Informatics,Department of Computer Science"}]},{"given":"Alperen","family":"Bolat","sequence":"additional","affiliation":[{"name":"Queen’s University Belfast,Centre for Secure Information Technologies,Belfast,United Kingdom"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3185748"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/UPCON56432.2022.9986458"},{"key":"ref15","first-page":"707","article-title":"SQL Injection Detection Using Machine Learning with Different TF-IDF Feature Extraction Approaches","author":"oudah","year":"2022","journal-title":"International Conference on Information Systems and Intelligent Applications ICISIA 2022"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.4294593"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/4836289"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1117\/12.2652203"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2021.3124331"},{"year":"0","key":"ref1","article-title":"OWASP Top 10:2021 - A03 Injection"},{"article-title":"Exploring the trade-offs: Unified large language models vs local fine-tuned models for highly-specific radiology nli task","year":"2023","author":"wu","key":"ref17"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/HST56032.2022.10025442"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103093"},{"article-title":"Online passive aggressive algorithms","year":"2006","author":"crammer","key":"ref18"},{"year":"0","key":"ref24","article-title":"SQLiV3: SQL injection dataset, Kaggle"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICAAIC53929.2022.9792964"},{"key":"ref25","first-page":"2825","article-title":"Scikit-learn: Machine Learning in Python","volume":"12","author":"pedregosa","year":"2011","journal-title":"Journal of Machine Learning Research"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s42979-022-01626-8"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s00607-021-01050-5"},{"key":"ref21","first-page":"569","article-title":"SQL injection attack detection and prevention techniques using machine learning","volume":"15","author":"jemal","year":"2020","journal-title":"International Journal of Applied Engineering Research"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-19-2177-3_73"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3395363.3397375"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICINT55083.2022.00010"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIT51783.2020.9392682"},{"key":"ref3","first-page":"12055","article-title":"SQL injection Attack Detection and Prevention Techniques Using Deep Learning","volume":"1757","author":"hatomura","year":"2021","journal-title":"iopscience iop org"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/INDICON52576.2021.9691740"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.29099\/ijair.v6i2.355"}],"event":{"name":"2023 IEEE 36th International System-on-Chip Conference (SOCC)","start":{"date-parts":[[2023,9,5]]},"location":"Santa Clara, CA, USA","end":{"date-parts":[[2023,9,8]]}},"container-title":["2023 IEEE 36th International System-on-Chip Conference (SOCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10256666\/10256705\/10256777.pdf?arnumber=10256777","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,9]],"date-time":"2023-10-09T14:13:30Z","timestamp":1696860810000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10256777\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,5]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/socc58585.2023.10256777","relation":{},"subject":[],"published":{"date-parts":[[2023,9,5]]}}}