{"id":"https://openalex.org/W4405908938","doi":"https://doi.org/10.1109/wf-iot62078.2024.10811419","title":"Work in Progress: Exploring Generative Modeling for Injection Attack Detection","display_name":"Work in Progress: Exploring Generative Modeling for Injection Attack Detection","publication_year":2024,"publication_date":"2024-11-10","ids":{"openalex":"https://openalex.org/W4405908938","doi":"https://doi.org/10.1109/wf-iot62078.2024.10811419"},"language":"en","primary_location":{"id":"doi:10.1109/wf-iot62078.2024.10811419","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wf-iot62078.2024.10811419","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE 10th World Forum on Internet of Things (WF-IoT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5085036496","display_name":"Sadia Afrin","orcid":"https://orcid.org/0000-0002-3429-3636"},"institutions":[{"id":"https://openalex.org/I129902397","display_name":"Dalhousie University","ror":"https://ror.org/01e6qks80","country_code":"CA","type":"education","lineage":["https://openalex.org/I129902397"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Sadia Afrin","raw_affiliation_strings":["Dalhousie University,Computer Science,Halifax,Canada"],"affiliations":[{"raw_affiliation_string":"Dalhousie University,Computer Science,Halifax,Canada","institution_ids":["https://openalex.org/I129902397"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076125701","display_name":"Marwa Elsayed","orcid":"https://orcid.org/0000-0001-9906-5020"},"institutions":[{"id":"https://openalex.org/I125749732","display_name":"Western University","ror":"https://ror.org/02grkyz14","country_code":"CA","type":"education","lineage":["https://openalex.org/I125749732"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Marwa A. Elsayed","raw_affiliation_strings":["Western University,Computer Science,ontario,Canada"],"affiliations":[{"raw_affiliation_string":"Western University,Computer Science,ontario,Canada","institution_ids":["https://openalex.org/I125749732"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5008462534","display_name":"A. Nur Zincir\u2010Heywood","orcid":"https://orcid.org/0000-0003-2796-7265"},"institutions":[{"id":"https://openalex.org/I129902397","display_name":"Dalhousie University","ror":"https://ror.org/01e6qks80","country_code":"CA","type":"education","lineage":["https://openalex.org/I129902397"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Nur Zincir-Heywood","raw_affiliation_strings":["Dalhousie University,Computer Science,Halifax,Canada"],"affiliations":[{"raw_affiliation_string":"Dalhousie University,Computer Science,Halifax,Canada","institution_ids":["https://openalex.org/I129902397"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5085036496"],"corresponding_institution_ids":["https://openalex.org/I129902397"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.21911651,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"580","last_page":"581"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9861000180244446,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9861000180244446,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9803000092506409,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9383999705314636,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6394827961921692},{"id":"https://openalex.org/keywords/generative-grammar","display_name":"Generative grammar","score":0.634903073310852},{"id":"https://openalex.org/keywords/work","display_name":"Work (physics)","score":0.45411208271980286},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.29171568155288696},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.14732861518859863}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6394827961921692},{"id":"https://openalex.org/C39890363","wikidata":"https://www.wikidata.org/wiki/Q36108","display_name":"Generative grammar","level":2,"score":0.634903073310852},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.45411208271980286},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.29171568155288696},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.14732861518859863},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/wf-iot62078.2024.10811419","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wf-iot62078.2024.10811419","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE 10th World Forum on Internet of Things (WF-IoT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W2559495752","https://openalex.org/W2763773237","https://openalex.org/W2912542183","https://openalex.org/W2978612193","https://openalex.org/W3015185939","https://openalex.org/W3136440660","https://openalex.org/W3217411715","https://openalex.org/W4221127083","https://openalex.org/W4226057877","https://openalex.org/W4389575933"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2380075625","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890"],"abstract_inverted_index":{"This":[0],"research":[1],"explores":[2],"the":[3,37,69,145,149],"pervasive":[4],"threat":[5],"of":[6,11,40,48,135,152,185],"injection":[7,26,49,97,118],"attacks":[8,129],"targeting":[9],"Internet":[10],"Things":[12],"devices.":[13,34,132],"We":[14],"leverage":[15],"a":[16,109],"generative":[17],"modeling":[18],"technique":[19],"to":[20,32,60,96,112,123,140,144,156,166],"effectively":[21],"detect":[22,61],"and":[23,94,107,126,168,183],"prevent":[24,127],"SQL":[25,117],"attacks,":[27],"mitigating":[28],"potential":[29],"cybersecurity":[30,79],"risks":[31],"IoT":[33,131,146,153,170],"By":[35,159],"learning":[36],"normal":[38],"behavior":[39],"data,":[41,73],"our":[42,84,100,163],"model":[43,85],"can":[44,86,177],"identify":[45,125],"deviations":[46],"indicative":[47],"attacks.":[50,98],"Our":[51,120],"approach":[52,111,164],"allows":[53],"for":[54,71],"unsupervised":[55],"learning,":[56],"making":[57],"it":[58],"possible":[59],"zero-day":[62],"or":[63],"previously":[64],"unseen":[65],"attack":[66],"patterns":[67],"without":[68],"need":[70],"labeled":[72],"which":[74],"is":[75],"often":[76],"scarce":[77],"in":[78,89],"contexts.":[80],"In":[81,99],"this":[82,136],"sense,":[83],"process":[87],"data":[88],"real-time,":[90],"enabling":[91,160],"immediate":[92],"detection":[93],"response":[95],"study,":[101],"we":[102],"use":[103],"publicly":[104],"available":[105],"datasets":[106],"develop":[108],"comprehensive":[110],"extract":[113],"valuable":[114],"insights":[115],"from":[116],"data.":[119,187],"study":[121,137],"aims":[122],"proactively":[124],"such":[128],"on":[130],"The":[133],"findings":[134],"are":[138],"poised":[139],"make":[141],"significant":[142],"contributions":[143],"industry,":[147],"recognizing":[148],"intensified":[150],"vulnerability":[151],"devices":[154],"compared":[155],"traditional":[157],"networks.":[158],"real-time":[161],"detection,":[162],"seeks":[165],"monitor":[167],"safeguard":[169],"devices,":[171],"preventing":[172],"unauthorized":[173],"access,":[174],"where":[175],"hackers":[176],"gain":[178],"root-level":[179],"control,":[180],"compromising":[181],"security":[182],"privacy":[184],"users\u2019":[186]},"counts_by_year":[],"updated_date":"2025-12-27T23:08:20.325037","created_date":"2025-10-10T00:00:00"}
