{"id":"https://openalex.org/W7125930678","doi":"https://doi.org/10.1109/commnet68224.2025.11288830","title":"BF-WeakWeb-2025: A Novel Dataset and LLM Benchmark for Web Vulnerability Detection in Burkina Faso","display_name":"BF-WeakWeb-2025: A Novel Dataset and LLM Benchmark for Web Vulnerability Detection in Burkina Faso","publication_year":2025,"publication_date":"2025-12-03","ids":{"openalex":"https://openalex.org/W7125930678","doi":"https://doi.org/10.1109/commnet68224.2025.11288830"},"language":null,"primary_location":{"id":"doi:10.1109/commnet68224.2025.11288830","is_oa":false,"landing_page_url":"https://doi.org/10.1109/commnet68224.2025.11288830","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 8th International Conference on Advanced Communication Technologies and Networking (CommNet)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5124064866","display_name":"Sidwendluian Romaric Nana","orcid":null},"institutions":[{"id":"https://openalex.org/I129628643","display_name":"Universit\u00e9 Joseph Ki-Zerbo","ror":"https://ror.org/00t5e2y66","country_code":"BF","type":"education","lineage":["https://openalex.org/I129628643"]}],"countries":["BF"],"is_corresponding":true,"raw_author_name":"Sidwendluian Romaric Nana","raw_affiliation_strings":["Universit&#x00E9; Joseph KI-ZERBO,Laboratoire de Math&#x00E9;matiques et d&#x2019;Informatique (LAMI),Ouagadougou,Burkina Faso"],"affiliations":[{"raw_affiliation_string":"Universit&#x00E9; Joseph KI-ZERBO,Laboratoire de Math&#x00E9;matiques et d&#x2019;Informatique (LAMI),Ouagadougou,Burkina Faso","institution_ids":["https://openalex.org/I129628643"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5006681181","display_name":"Didier Bassol\u00e9","orcid":"https://orcid.org/0000-0002-0629-5888"},"institutions":[{"id":"https://openalex.org/I129628643","display_name":"Universit\u00e9 Joseph Ki-Zerbo","ror":"https://ror.org/00t5e2y66","country_code":"BF","type":"education","lineage":["https://openalex.org/I129628643"]}],"countries":["BF"],"is_corresponding":false,"raw_author_name":"Didier Bassol\u00e9","raw_affiliation_strings":["Universit&#x00E9; Joseph KI-ZERBO,Laboratoire de Math&#x00E9;matiques et d&#x2019;Informatique (LAMI),Ouagadougou,Burkina Faso"],"affiliations":[{"raw_affiliation_string":"Universit&#x00E9; Joseph KI-ZERBO,Laboratoire de Math&#x00E9;matiques et d&#x2019;Informatique (LAMI),Ouagadougou,Burkina Faso","institution_ids":["https://openalex.org/I129628643"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5106270763","display_name":"D\u00e9sir\u00e9 Guel","orcid":null},"institutions":[{"id":"https://openalex.org/I129628643","display_name":"Universit\u00e9 Joseph Ki-Zerbo","ror":"https://ror.org/00t5e2y66","country_code":"BF","type":"education","lineage":["https://openalex.org/I129628643"]}],"countries":["BF"],"is_corresponding":false,"raw_author_name":"D\u00e9sir\u00e9 Guel","raw_affiliation_strings":["Universit&#x00E9; Joseph KI-ZERBO,Laboratoire de Math&#x00E9;matiques et d&#x2019;Informatique (LAMI),Ouagadougou,Burkina Faso"],"affiliations":[{"raw_affiliation_string":"Universit&#x00E9; Joseph KI-ZERBO,Laboratoire de Math&#x00E9;matiques et d&#x2019;Informatique (LAMI),Ouagadougou,Burkina Faso","institution_ids":["https://openalex.org/I129628643"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5106513196","display_name":"Oumarou Sie","orcid":null},"institutions":[{"id":"https://openalex.org/I129628643","display_name":"Universit\u00e9 Joseph Ki-Zerbo","ror":"https://ror.org/00t5e2y66","country_code":"BF","type":"education","lineage":["https://openalex.org/I129628643"]}],"countries":["BF"],"is_corresponding":false,"raw_author_name":"Oumarou Si\u00e9","raw_affiliation_strings":["Universit&#x00E9; Joseph KI-ZERBO,Laboratoire de Math&#x00E9;matiques et d&#x2019;Informatique (LAMI),Ouagadougou,Burkina Faso"],"affiliations":[{"raw_affiliation_string":"Universit&#x00E9; Joseph KI-ZERBO,Laboratoire de Math&#x00E9;matiques et d&#x2019;Informatique (LAMI),Ouagadougou,Burkina Faso","institution_ids":["https://openalex.org/I129628643"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5124064866"],"corresponding_institution_ids":["https://openalex.org/I129628643"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.85252372,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.7796000242233276,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.7796000242233276,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.06790000200271606,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.020899999886751175,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/identifier","display_name":"Identifier","score":0.44850000739097595},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.43959999084472656},{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.4332999885082245},{"id":"https://openalex.org/keywords/cyberspace","display_name":"Cyberspace","score":0.4255000054836273},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.4171000123023987},{"id":"https://openalex.org/keywords/obsolescence","display_name":"Obsolescence","score":0.37229999899864197},{"id":"https://openalex.org/keywords/web-application-security","display_name":"Web application security","score":0.35899999737739563}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6021999716758728},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.47360000014305115},{"id":"https://openalex.org/C154504017","wikidata":"https://www.wikidata.org/wiki/Q853614","display_name":"Identifier","level":2,"score":0.44850000739097595},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.43959999084472656},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.4332999885082245},{"id":"https://openalex.org/C2781241145","wikidata":"https://www.wikidata.org/wiki/Q204606","display_name":"Cyberspace","level":3,"score":0.4255000054836273},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.4171000123023987},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.39730000495910645},{"id":"https://openalex.org/C30795975","wikidata":"https://www.wikidata.org/wiki/Q282744","display_name":"Obsolescence","level":2,"score":0.37229999899864197},{"id":"https://openalex.org/C59241245","wikidata":"https://www.wikidata.org/wiki/Q4781497","display_name":"Web application security","level":4,"score":0.35899999737739563},{"id":"https://openalex.org/C118643609","wikidata":"https://www.wikidata.org/wiki/Q189210","display_name":"Web application","level":2,"score":0.35269999504089355},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.33160001039505005},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.3312999904155731},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.33090001344680786},{"id":"https://openalex.org/C22680326","wikidata":"https://www.wikidata.org/wiki/Q7444867","display_name":"Secure coding","level":5,"score":0.32339999079704285},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.31630000472068787},{"id":"https://openalex.org/C198531522","wikidata":"https://www.wikidata.org/wiki/Q485146","display_name":"Sample (material)","level":2,"score":0.3059999942779541},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.3034999966621399},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.25949999690055847}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/commnet68224.2025.11288830","is_oa":false,"landing_page_url":"https://doi.org/10.1109/commnet68224.2025.11288830","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 8th International Conference on Advanced Communication Technologies and Networking (CommNet)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6544986367225647,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"In":[0,32],"a":[1,12,23,77,93],"context":[2],"of":[3,6,25,76,79,92,98,118,126,147,153,188,204,217],"increasing":[4],"digitalisation":[5],"administrative":[7],"processes,":[8],"cybersecurity":[9,28],"has":[10],"become":[11],"strategic":[13],"issue":[14],"for":[15,39],"states,":[16],"particularly":[17],"Burkina":[18,30,47,137],"Faso.":[19,31],"Unfortunately,":[20],"there":[21],"is":[22,122],"lack":[24],"research":[26],"into":[27],"in":[29,42,136,150],"this":[33,58,121],"article,":[34],"we":[35],"present":[36],"an":[37,201],"approach":[38,59],"identifying":[40],"vulnerabilities":[41],"applications":[43,68,84],"and":[44,66,82,145,169,174,185,206],"websites":[45,65,81],"from":[46,69],"Faso\u2019s":[48,138],"cyberspace":[49],"according":[50],"to":[51,62,159,172],"the":[52,73,90,99,106,116,123,132,143,151,176,189,193,215,218],"OWASP":[53,133],"Top":[54,109,134],"10":[55,135],"2021.":[56],"Implementing":[57],"enabled":[60],"us":[61],"collect":[63],"241":[64],"web":[67,83,87,127],"various":[70],"fields.":[71],"Analysing":[72],"security":[74],"risks":[75],"sample":[78],"20":[80],"identified":[85],"18,521":[86],"vulnerabilities,":[88],"forming":[89],"basis":[91],"dataset":[94,141,156],"called":[95],"\"BF-WeakWeb-2025\".":[96],"Six":[97],"CWE":[100,108,178,198],"identifiers":[101,199],"found":[102],"are":[103,207],"listed":[104],"among":[105],"2024":[107],"25":[110],"most":[111],"dangerous":[112],"Software":[113],"Weaknesses.":[114],"To":[115],"best":[117],"our":[119],"knowledge,":[120],"first":[124],"study":[125],"vulnerability":[128],"analysis":[129],"based":[130],"on":[131],"cyberspace.":[139],"This":[140,213],"addresses":[142],"inadequacy":[144],"obsolescence":[146],"existing":[148],"datasets":[149],"field":[152],"cybersecurity.":[154],"The":[155],"was":[157],"used":[158],"fine-tune":[160],"three":[161],"Large":[162],"Language":[163],"Models":[164],"(LLMs)":[165],"\u2014":[166,171],"BERT,":[167],"Llama,":[168],"Flan-T5":[170],"detect":[173],"classify":[175,197],"six":[177],"identifiers:":[179],"CWE-693,":[180],"CWE-79,":[181],"CWE-1021,":[182],"CWE-352,":[183],"CWE-264,":[184],"CWE-89.":[186],"Analysis":[187],"results":[190],"shows":[191],"that":[192],"fine-tuned":[194],"models":[195],"correctly":[196],"with":[200],"accuracy":[202],"rate":[203],"98%,":[205],"also":[208],"robust":[209],"against":[210],"unbalanced":[211],"data.":[212],"demonstrates":[214],"quality":[216],"dataset.":[219]},"counts_by_year":[],"updated_date":"2026-01-29T23:17:01.242718","created_date":"2026-01-29T00:00:00"}
