1. OWASP (2022, June 04). OWASP Top Ten. Available online: https://owasp.org/.
2. Clay Keller (2021, March 20). Vulnerability Dstribution of CVE Security Vulnerabilities by Types. Available online: https://www.cvedetails.com/vulnerabilities-by-types.php.
3. An ensemble classification-based approach to detect attack level of SQL injections;Kasim;J. Inf. Secur. Appl.,2021
4. SQLiGoT: Detecting SQL injection attacks using graph of tokens and SVM;Kar;Comput. Secur.,2016
5. LSTM-based SQL injection detection method for intelligent transportation system;Li;IEEE Trans. Veh. Technol.,2019