{"id":"https://openalex.org/W4390756245","doi":"https://doi.org/10.1007/s10207-023-00791-y","title":"A deep learning approach based on multi-view consensus for SQL injection detection","display_name":"A deep learning approach based on multi-view consensus for SQL injection detection","publication_year":2024,"publication_date":"2024-01-09","ids":{"openalex":"https://openalex.org/W4390756245","doi":"https://doi.org/10.1007/s10207-023-00791-y"},"language":"en","primary_location":{"id":"doi:10.1007/s10207-023-00791-y","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-023-00791-y","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-023-00791-y.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/s10207-023-00791-y.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5086380004","display_name":"Arzu Gorgulu Kakisim","orcid":"https://orcid.org/0000-0001-6169-3486"},"institutions":[{"id":"https://openalex.org/I57913696","display_name":"Istanbul Medeniyet University","ror":"https://ror.org/05j1qpr59","country_code":"TR","type":"education","lineage":["https://openalex.org/I57913696"]}],"countries":["TR"],"is_corresponding":true,"raw_author_name":"Arzu Gorgulu Kakisim","raw_affiliation_strings":["Istanbul Medeniyet University, Computer Engineering, Istanbul, Turkey"],"affiliations":[{"raw_affiliation_string":"Istanbul Medeniyet University, Computer Engineering, Istanbul, Turkey","institution_ids":["https://openalex.org/I57913696"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5086380004"],"corresponding_institution_ids":["https://openalex.org/I57913696"],"apc_list":{"value":2590,"currency":"EUR","value_usd":3190},"apc_paid":{"value":2590,"currency":"EUR","value_usd":3190},"fwci":13.8415,"has_fulltext":false,"cited_by_count":17,"citation_normalized_percentile":{"value":0.98713197,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":"23","issue":"2","first_page":"1541","last_page":"1556"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9702000021934509,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9524999856948853,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/sql-injection","display_name":"SQL injection","score":0.897342324256897},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8880482912063599},{"id":"https://openalex.org/keywords/sql","display_name":"SQL","score":0.7832416892051697},{"id":"https://openalex.org/keywords/stored-procedure","display_name":"Stored procedure","score":0.5776903629302979},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.462078332901001},{"id":"https://openalex.org/keywords/oracle","display_name":"Oracle","score":0.42344290018081665},{"id":"https://openalex.org/keywords/pl/sql","display_name":"PL/SQL","score":0.41814202070236206},{"id":"https://openalex.org/keywords/query-by-example","display_name":"Query by Example","score":0.4121502637863159},{"id":"https://openalex.org/keywords/language-integrated-query","display_name":"Language Integrated Query","score":0.4114140570163727},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3388640284538269},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3331630825996399},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.32378819584846497},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.2899761199951172},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.21997472643852234}],"concepts":[{"id":"https://openalex.org/C150451098","wikidata":"https://www.wikidata.org/wiki/Q506059","display_name":"SQL injection","level":5,"score":0.897342324256897},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8880482912063599},{"id":"https://openalex.org/C510870499","wikidata":"https://www.wikidata.org/wiki/Q47607","display_name":"SQL","level":2,"score":0.7832416892051697},{"id":"https://openalex.org/C154420247","wikidata":"https://www.wikidata.org/wiki/Q846619","display_name":"Stored procedure","level":5,"score":0.5776903629302979},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.462078332901001},{"id":"https://openalex.org/C55166926","wikidata":"https://www.wikidata.org/wiki/Q2892946","display_name":"Oracle","level":2,"score":0.42344290018081665},{"id":"https://openalex.org/C32145003","wikidata":"https://www.wikidata.org/wiki/Q47607","display_name":"PL/SQL","level":5,"score":0.41814202070236206},{"id":"https://openalex.org/C194222762","wikidata":"https://www.wikidata.org/wiki/Q114486","display_name":"Query by Example","level":4,"score":0.4121502637863159},{"id":"https://openalex.org/C179531526","wikidata":"https://www.wikidata.org/wiki/Q595637","display_name":"Language Integrated Query","level":5,"score":0.4114140570163727},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3388640284538269},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3331630825996399},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.32378819584846497},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.2899761199951172},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.21997472643852234},{"id":"https://openalex.org/C164120249","wikidata":"https://www.wikidata.org/wiki/Q995982","display_name":"Web search query","level":3,"score":0.0},{"id":"https://openalex.org/C97854310","wikidata":"https://www.wikidata.org/wiki/Q19541","display_name":"Search engine","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/s10207-023-00791-y","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-023-00791-y","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-023-00791-y.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1007/s10207-023-00791-y","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-023-00791-y","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-023-00791-y.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.6499999761581421}],"awards":[],"funders":[{"id":"https://openalex.org/F4320318304","display_name":"\u0130stanbul Medeniyet \u00dcniversitesi","ror":"https://ror.org/05j1qpr59"}],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4390756245.pdf"},"referenced_works_count":29,"referenced_works":["https://openalex.org/W1689711448","https://openalex.org/W2001693166","https://openalex.org/W2020737857","https://openalex.org/W2037786632","https://openalex.org/W2064703126","https://openalex.org/W2131723927","https://openalex.org/W2137856385","https://openalex.org/W2158267769","https://openalex.org/W2282821441","https://openalex.org/W2527997528","https://openalex.org/W2590205279","https://openalex.org/W2780468994","https://openalex.org/W2800472070","https://openalex.org/W2805465321","https://openalex.org/W2830511950","https://openalex.org/W2908909566","https://openalex.org/W2915009417","https://openalex.org/W2972622000","https://openalex.org/W2978612193","https://openalex.org/W2981809210","https://openalex.org/W2998114121","https://openalex.org/W2998857817","https://openalex.org/W2999058564","https://openalex.org/W3007497615","https://openalex.org/W3091730061","https://openalex.org/W3136440660","https://openalex.org/W4221127083","https://openalex.org/W4224117785","https://openalex.org/W4297901876"],"related_works":["https://openalex.org/W151073879","https://openalex.org/W1890845846","https://openalex.org/W2912795851","https://openalex.org/W4238156210","https://openalex.org/W2240099544","https://openalex.org/W2340883001","https://openalex.org/W2738342198","https://openalex.org/W1520902996","https://openalex.org/W3199663509","https://openalex.org/W4323365709"],"abstract_inverted_index":{"Abstract":[0],"SQL":[1,29,75,93,140,145,150,236],"injection":[2,30,37,237],"(SQLi)":[3,238],"attacks":[4,67],"are":[5,159],"one":[6,214],"of":[7,54,65,215,218,228],"the":[8,18,42,170,182,185,197,216,226,230,235,247],"oldest":[9],"and":[10,59,81,165,194,233],"most":[11],"serious":[12],"security":[13,23],"threats,":[14],"consistently":[15],"ranking":[16],"among":[17],"top":[19],"ten":[20],"critical":[21],"web":[22],"risks.":[24],"Traditional":[25],"defense":[26],"mechanisms":[27],"against":[28],"predominantly":[31],"use":[32],"blacklists":[33],"to":[34,49,101],"disallow":[35],"common":[36],"characters":[38],"or":[39],"terms.":[40],"However,":[41],"major":[43],"challenge":[44],"for":[45,191,225],"these":[46],"systems":[47],"is":[48,223],"create":[50],"a":[51,107,113,132,174,205],"comprehensive":[52],"list":[53],"potential":[55],"SQLi":[56,66,103,117,201],"characters,":[57],"terms,":[58],"multi-terms":[60],"that":[61,135,244],"encompass":[62],"various":[63,74],"types":[64],"(time-based,":[68],"error-based,":[69],"etc.),":[70],"taking":[71],"into":[72,147],"account":[73],"datasets":[76],"(such":[77],"as":[78],"MySQL,":[79],"Oracle,":[80],"NoSQL).":[82],"Recently,":[83],"some":[84,97],"research":[85,111],"studies":[86],"have":[87],"concentrated":[88],"on":[89,124,204],"feature":[90],"learning":[91],"from":[92,139,178],"queries":[94],"by":[95,106,142],"applying":[96],"well-known":[98],"deep":[99,115],"architectures":[100],"detect":[102],"attacks.":[104],"Motivated":[105],"similar":[108],"objective,":[109],"this":[110],"introduces":[112],"novel":[114],"learning-based":[116],"detection":[118,183,252],"system":[119],"named":[120],"\u201cBidirectional":[121],"LSTM-CNN":[122],"based":[123,203],"Multi-View":[125],"Consensus\u201d":[126],"(MVC-BiCNN).":[127],"The":[128,240],"proposed":[129,171,186],"method":[130,172,187],"implements":[131],"pre-processing":[133],"step":[134],"generates":[136],"multiple":[137],"views":[138],"data":[141],"semantically":[143],"encoding":[144],"statements":[146],"their":[148],"corresponding":[149],"tags.":[151],"By":[152],"utilizing":[153],"two":[154],"different":[155],"main":[156],"layers,":[157],"which":[158],"bidirectional":[160],"long":[161],"short-term":[162],"memory":[163],"(LSTM)":[164],"convolutional":[166],"neural":[167],"network":[168],"(CNN),":[169],"learns":[173],"joint":[175],"latent":[176],"space":[177],"multi-view":[179],"representations.":[180],"In":[181],"phase,":[184],"yields":[188],"separate":[189],"predictions":[190],"each":[192],"representation":[193],"assesses":[195],"whether":[196],"query":[198],"constitutes":[199],"an":[200],"attack":[202],"consensus":[206],"function\u2019s":[207],"output.":[208],"Moreover,":[209],"Interpretable":[210],"Model-Agnostic":[211],"Annotations":[212],"(LIME),":[213],"methods":[217],"Explainable":[219],"Artificial":[220],"Intelligence":[221],"(XAI),":[222],"employed":[224],"purpose":[227],"interpreting":[229],"model\u2019s":[231],"results":[232,242],"analyzing":[234],"inputs.":[239],"experimental":[241],"demonstrate":[243],"MVC-BiCNN":[245],"outperforms":[246],"baseline":[248],"methods,":[249],"yielding":[250],"99.96%":[251],"rate.":[253]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":13},{"year":2024,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
