{"id":"https://openalex.org/W4388621296","doi":"https://doi.org/10.1145/3607720.3607749","title":"SQL Injection Detection in Cloud Computing with Machine Learning Algorithms","display_name":"SQL Injection Detection in Cloud Computing with Machine Learning Algorithms","publication_year":2023,"publication_date":"2023-05-24","ids":{"openalex":"https://openalex.org/W4388621296","doi":"https://doi.org/10.1145/3607720.3607749"},"language":"en","primary_location":{"id":"doi:10.1145/3607720.3607749","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3607720.3607749","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 6th International Conference on Networking, Intelligent Systems &amp; Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5093251159","display_name":"Abdelhakim Hadji","orcid":"https://orcid.org/0009-0002-9776-5263"},"institutions":[{"id":"https://openalex.org/I99297268","display_name":"University of Hassan II Casablanca","ror":"https://ror.org/001q4kn48","country_code":"MA","type":"education","lineage":["https://openalex.org/I99297268"]}],"countries":["MA"],"is_corresponding":true,"raw_author_name":"Abdelhakim Hadji","raw_affiliation_strings":["Department of Mathematics and Computer Science Faculty of Sciences Ain Chock, Computer Sciences and Systems Laboratory Hassan II University of Casablanca, Casablanca, Morocco, NISS23, Morocco and \rDepartment of Mathematics and Computer Science Faculty of Sciences Ain Chock, Computer Sciences and Systems Laboratory, Hassan II University of Casablanca, Morocco"],"raw_orcid":"https://orcid.org/0009-0002-9776-5263","affiliations":[{"raw_affiliation_string":"Department of Mathematics and Computer Science Faculty of Sciences Ain Chock, Computer Sciences and Systems Laboratory Hassan II University of Casablanca, Casablanca, Morocco, NISS23, Morocco and \rDepartment of Mathematics and Computer Science Faculty of Sciences Ain Chock, Computer Sciences and Systems Laboratory, Hassan II University of Casablanca, Morocco","institution_ids":["https://openalex.org/I99297268"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067574526","display_name":"Brahim Raouyane","orcid":"https://orcid.org/0000-0003-1911-6583"},"institutions":[{"id":"https://openalex.org/I99297268","display_name":"University of Hassan II Casablanca","ror":"https://ror.org/001q4kn48","country_code":"MA","type":"education","lineage":["https://openalex.org/I99297268"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"Brahim Raouyane","raw_affiliation_strings":["Department of Mathematics and Computer Science Faculty of Sciences Ain Chock, Computer Sciences and Systems Laboratory, Hassan II University of Casablanca, Morocco"],"raw_orcid":"https://orcid.org/0000-0003-1911-6583","affiliations":[{"raw_affiliation_string":"Department of Mathematics and Computer Science Faculty of Sciences Ain Chock, Computer Sciences and Systems Laboratory, Hassan II University of Casablanca, Morocco","institution_ids":["https://openalex.org/I99297268"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5065981297","display_name":"Mohamed Rachdi","orcid":"https://orcid.org/0000-0002-2590-9072"},"institutions":[{"id":"https://openalex.org/I4210110911","display_name":"Institut Sup\u00e9rieur du G\u00e9nie Appliqu\u00e9","ror":"https://ror.org/0170ffh34","country_code":"MA","type":"education","lineage":["https://openalex.org/I4210110911"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"Mohamed Rachdi","raw_affiliation_strings":["Laboratory of Innovation in Management and Engineering for the Company( LIMIE), ISGA Casablanca, Morocco"],"raw_orcid":"https://orcid.org/0000-0002-2590-9072","affiliations":[{"raw_affiliation_string":"Laboratory of Innovation in Management and Engineering for the Company( LIMIE), ISGA Casablanca, Morocco","institution_ids":["https://openalex.org/I4210110911"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5093251159"],"corresponding_institution_ids":["https://openalex.org/I99297268"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.26004864,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9947999715805054,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.984499990940094,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8553392887115479},{"id":"https://openalex.org/keywords/sql-injection","display_name":"SQL injection","score":0.803693413734436},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7501590251922607},{"id":"https://openalex.org/keywords/sql","display_name":"SQL","score":0.5921807289123535},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5530058145523071},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5217695832252502},{"id":"https://openalex.org/keywords/business-intelligence-markup-language","display_name":"Business Intelligence Markup Language","score":0.45175185799598694},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.42226871848106384},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.37975817918777466},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.3607370853424072},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.3408902883529663},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.27672165632247925},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.22770053148269653},{"id":"https://openalex.org/keywords/client\u2013server-model","display_name":"Client\u2013server model","score":0.1075005829334259},{"id":"https://openalex.org/keywords/query-by-example","display_name":"Query by Example","score":0.10462722182273865}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8553392887115479},{"id":"https://openalex.org/C150451098","wikidata":"https://www.wikidata.org/wiki/Q506059","display_name":"SQL injection","level":5,"score":0.803693413734436},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7501590251922607},{"id":"https://openalex.org/C510870499","wikidata":"https://www.wikidata.org/wiki/Q47607","display_name":"SQL","level":2,"score":0.5921807289123535},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5530058145523071},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5217695832252502},{"id":"https://openalex.org/C114724005","wikidata":"https://www.wikidata.org/wiki/Q5001740","display_name":"Business Intelligence Markup Language","level":5,"score":0.45175185799598694},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.42226871848106384},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.37975817918777466},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.3607370853424072},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.3408902883529663},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.27672165632247925},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.22770053148269653},{"id":"https://openalex.org/C152880691","wikidata":"https://www.wikidata.org/wiki/Q146813","display_name":"Client\u2013server model","level":3,"score":0.1075005829334259},{"id":"https://openalex.org/C194222762","wikidata":"https://www.wikidata.org/wiki/Q114486","display_name":"Query by Example","level":4,"score":0.10462722182273865},{"id":"https://openalex.org/C94925161","wikidata":"https://www.wikidata.org/wiki/Q6666854","display_name":"Log shipping","level":4,"score":0.0},{"id":"https://openalex.org/C97854310","wikidata":"https://www.wikidata.org/wiki/Q19541","display_name":"Search engine","level":2,"score":0.0},{"id":"https://openalex.org/C164120249","wikidata":"https://www.wikidata.org/wiki/Q995982","display_name":"Web search query","level":3,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3607720.3607749","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3607720.3607749","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 6th International Conference on Networking, Intelligent Systems &amp; Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.6299999952316284}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":4,"referenced_works":["https://openalex.org/W2175660047","https://openalex.org/W3037421371","https://openalex.org/W3037565679","https://openalex.org/W3042928544"],"related_works":["https://openalex.org/W3107810407","https://openalex.org/W2571113418","https://openalex.org/W2359391484","https://openalex.org/W4206678297","https://openalex.org/W3196457791","https://openalex.org/W2133089983","https://openalex.org/W3202423697","https://openalex.org/W4385682279","https://openalex.org/W4372049114","https://openalex.org/W2915735776"],"abstract_inverted_index":{"Due":[0],"to":[1,47,72,117,143],"the":[2,11,25,36,109,118,171],"coronavirus":[3],"crisis,":[4],"a":[5,14,31,77,97,103,132,162],"lot":[6,32],"of":[7,17,33,50,106,181],"companies":[8,101],"all":[9],"over":[10],"world":[12],"started":[13],"fast":[15],"digitalization":[16],"their":[18],"business":[19],"and":[20,42,94,130,152,155],"became":[21],"more":[22],"comfortable":[23],"with":[24,102],"digital":[26,37],"world.":[27],"In":[28,120],"this":[29,121,167],"way,":[30],"people":[34],"in":[35,179],"domain,":[38],"including":[39],"net":[40],"developers":[41],"system":[43],"engineers,":[44],"are":[45],"exposed":[46],"different":[48,135],"types":[49],"risks":[51],"that":[52,66,87,139,173],"they":[53],"may":[54],"not":[55],"completely":[56],"know":[57],"or":[58],"understand.":[59],"SQL":[60,89,127,145],"injection":[61,128,146],"is":[62],"one":[63],"such":[64,148],"vulnerability":[65],"can":[67,112,140,177],"be":[68,141],"exploited":[69],"by":[70],"attackers":[71],"inject":[73],"malicious":[74],"data":[75],"into":[76],"database":[78],"via":[79],"an":[80],"application":[81],"programming":[82],"interface":[83],"(API)":[84],"call":[85],"request":[86],"uses":[88],"syntax.":[90],"Cloud":[91],"computing":[92],"(IaaS)":[93],"network":[95],"as":[96,149],"service":[98],"(Naas)":[99],"provide":[100],"wide":[104],"range":[105],"advantages.":[107],"However,":[108],"same":[110],"advantages":[111],"also":[113,160],"pose":[114],"certain":[115],"vulnerabilities":[116],"organization.":[119],"paper":[122],"we":[123,158],"will":[124,159,169],"focus":[125],"on":[126],"attacks":[129],"make":[131],"comparison":[133,168],"between":[134],"Machine":[136],"learning":[137,164,175],"algorithms":[138,176],"used":[142],"detect":[144],"attacks,":[147],"\"Naive":[150],"Bayes\"":[151],"\"K-NN\",":[153],"SVN,":[154],"decision":[156],"tree,":[157],"use":[161],"deep":[163],"algorithm":[165],"CNN,":[166],"show":[170],"potential":[172],"machine":[174],"offer":[178],"terms":[180],"cloud":[182],"security.":[183]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
