LLM-AE-MP: Web Attack Detection Using a Large Language Model with Autoencoder and Multilayer Perceptron

Web applications store sensitive data, making them prime targets for cybercriminals and posing national security risks. This study introduces a new approach to distinguishing legitimate and malicious hypertext transfer protocol (HTTP) requests using an autoencoder (AE). The integration of AE allows...

Celý popis

Uložené v:
Podrobná bibliografia
Vydané v:Expert systems with applications Ročník 274; s. 126982
Hlavní autori: Yang, Jing, Wu, Yuangui, Yuan, Yuping, Xue, Haozhong, Bourouis, Sami, Abdel-Salam, Mahmoud, Prajapat, Sunil, Por, Lip Yee
Médium: Journal Article
Jazyk:English
Vydavateľské údaje: Elsevier Ltd 15.05.2025
Predmet:
ISSN:0957-4174
On-line prístup:Získať plný text
Tagy: Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
Abstract Web applications store sensitive data, making them prime targets for cybercriminals and posing national security risks. This study introduces a new approach to distinguishing legitimate and malicious hypertext transfer protocol (HTTP) requests using an autoencoder (AE). The integration of AE allows for efficient feature distillation, enhancing the sensitivity of the model to anomalies in HTTP traffic. The AE framework is combined with a transductive long short-term memory (TLSTM) network, which is trained with an advanced generative adversarial network (GAN). Using GAN promotes an adaptive learning environment, significantly boosting the robustness and generalizability of our method against evolving web attack vectors. TLSTM uses transductive learning to focus on data points near the test set, improving the adaptability of the model to outperform traditional LSTM models. In our GAN, the generator purposely excludes gradients from the most influential batch elements, improving the ability of the model to generate diverse and generalized outputs. After training the AE, its latent representations are passed to a multilayer perceptron (MLP) for detection tasks. To address the imbalanced classification in MLP, we use a reinforcement learning (RL) strategy. The RL approach strategically adjusts incentives, enhancing the performance of the model in identifying less frequent but critical malicious instances, thereby supporting a balanced security assessment. Our evaluations using the CSIC 2010 (Spanish National Research Council 2010), FWAF (web application firewall), and HttpParams datasets show that our method outperforms existing techniques, achieving (Accuracy, F-measure, geometric mean (G-means), and area under the curve (AUC)) reaching (90.937%, 89.755%, 88.446%, 0.838), (89.055, 90.663%, 88.334%, 0.847) and (92.242%, 93.774%, 91.356%, 0.897), respectively. Moreover, our model achieves efficient runtime and memory usage across the datasets, providing a practical solution for real-time web attack detection. These results confirm the effectiveness of the model in security contexts, representing a substantial advancement in web attack detection and the improvement of investigative strategies.
AbstractList Web applications store sensitive data, making them prime targets for cybercriminals and posing national security risks. This study introduces a new approach to distinguishing legitimate and malicious hypertext transfer protocol (HTTP) requests using an autoencoder (AE). The integration of AE allows for efficient feature distillation, enhancing the sensitivity of the model to anomalies in HTTP traffic. The AE framework is combined with a transductive long short-term memory (TLSTM) network, which is trained with an advanced generative adversarial network (GAN). Using GAN promotes an adaptive learning environment, significantly boosting the robustness and generalizability of our method against evolving web attack vectors. TLSTM uses transductive learning to focus on data points near the test set, improving the adaptability of the model to outperform traditional LSTM models. In our GAN, the generator purposely excludes gradients from the most influential batch elements, improving the ability of the model to generate diverse and generalized outputs. After training the AE, its latent representations are passed to a multilayer perceptron (MLP) for detection tasks. To address the imbalanced classification in MLP, we use a reinforcement learning (RL) strategy. The RL approach strategically adjusts incentives, enhancing the performance of the model in identifying less frequent but critical malicious instances, thereby supporting a balanced security assessment. Our evaluations using the CSIC 2010 (Spanish National Research Council 2010), FWAF (web application firewall), and HttpParams datasets show that our method outperforms existing techniques, achieving (Accuracy, F-measure, geometric mean (G-means), and area under the curve (AUC)) reaching (90.937%, 89.755%, 88.446%, 0.838), (89.055, 90.663%, 88.334%, 0.847) and (92.242%, 93.774%, 91.356%, 0.897), respectively. Moreover, our model achieves efficient runtime and memory usage across the datasets, providing a practical solution for real-time web attack detection. These results confirm the effectiveness of the model in security contexts, representing a substantial advancement in web attack detection and the improvement of investigative strategies.
ArticleNumber 126982
Author Prajapat, Sunil
Bourouis, Sami
Xue, Haozhong
Yuan, Yuping
Yang, Jing
Wu, Yuangui
Abdel-Salam, Mahmoud
Por, Lip Yee
Author_xml – sequence: 1
  givenname: Jing
  surname: Yang
  fullname: Yang, Jing
  email: s2147529@siswa.um.edu.my
  organization: Department of Computer System and Technology, Faculty of Computer Science and Information Technology, Universiti Malaya, 50603 Kuala Lumpur, Malaysia
– sequence: 2
  givenname: Yuangui
  surname: Wu
  fullname: Wu, Yuangui
  email: wuyuangui@meedog.com
  organization: School of Software, Jilin University, Jilin Province 130012, China
– sequence: 3
  givenname: Yuping
  surname: Yuan
  fullname: Yuan, Yuping
  email: Xiao-yin-Shawn.wang@dis.tech
  organization: Information and Network Institute, Radio, Film and Television Design and Research Institute Co., Ltd, Beijing 100045, China
– sequence: 4
  givenname: Haozhong
  surname: Xue
  fullname: Xue, Haozhong
  email: hx2341@nyu.edu
  organization: Tandon School of Engineering, New York University, New York 11101, USA
– sequence: 5
  givenname: Sami
  surname: Bourouis
  fullname: Bourouis, Sami
  email: s.bourouis@tu.edu.sa
  organization: Department of Information Technology , College of Computers and Information Technology, Taif University, P. O. Box 11099, Taif 21944, Saudi Arabia
– sequence: 6
  givenname: Mahmoud
  surname: Abdel-Salam
  fullname: Abdel-Salam, Mahmoud
  email: mahmoud20@mans.edu.eg
  organization: Faculty of Computer and Information Science, Mansoura University, Mansoura 35516, Egypt
– sequence: 7
  givenname: Sunil
  surname: Prajapat
  fullname: Prajapat, Sunil
  email: cuhp21rdmath13@hpcu.ac.in
  organization: Srinivasa Ramanujan Department of Mathematics, Central University of Himachal Pradesh, Dharamshala 176215, India
– sequence: 8
  givenname: Lip Yee
  surname: Por
  fullname: Por, Lip Yee
  email: porlip@um.edu.my
  organization: Department of Computer System and Technology, Faculty of Computer Science and Information Technology, Universiti Malaya, 50603 Kuala Lumpur, Malaysia
BookMark eNp9kLtOwzAUhj0UiRZ4ASa_QILtXJwglqiUi5SIDlSM1olzElxCUjkuVd-eRGVi6HJu0nek_1uQWdd3SMgtZz5nPL7b-jgcwBdMRD4XcZqIGZmzNJJeyGV4SRbDsGWMS8bknDR5XnjZyivW9_QDS5o5B_qLPqJD7Uzf0c1guoYCzcE2ONau2cM4FH2FLT0Y90mzveux0-PBUugqWuxbZ1o4jusarcads313TS5qaAe8-etXZPO0el--ePnb8-syyz0tosR5VQIouRAAMhZhBTJNkZcx1ryqyzCUcRQHqYhijDkvSw1BGVQhygijOuAM0uCKiNNfbfthsFirnTXfYI-KMzXpUVs16VGTHnXSM0LJP0gbB1N8Z8G059GHE4pjqB-DVg3ajDawMnY0qKrenMN_AbN5hMQ
CitedBy_id crossref_primary_10_1016_j_ces_2025_121716
crossref_primary_10_1016_j_compbiomed_2025_110982
crossref_primary_10_1016_j_engappai_2025_112411
crossref_primary_10_1016_j_ejrh_2025_102703
crossref_primary_10_1016_j_jii_2025_100902
crossref_primary_10_3390_biomimetics10080542
crossref_primary_10_1038_s41598_025_08556_4
crossref_primary_10_1016_j_eswa_2025_129555
Cites_doi 10.3390/iot4030016
10.1016/j.csi.2023.103738
10.1609/aaai.v32i1.11449
10.1007/s10723-023-09684-9
10.3390/jtaer19040141
10.1109/TII.2020.2991796
10.1109/JIOT.2024.3369034
10.1049/2024/5565950
10.1016/j.engappai.2022.105805
10.3390/electronics12153349
10.1016/j.dcan.2022.08.012
10.3390/s23208499
10.1016/j.asoc.2023.110361
10.1016/j.cose.2024.104123
10.3390/s23042073
10.1016/j.eij.2024.100450
10.1016/j.comnet.2024.110707
10.1007/s11071-024-09673-x
10.1088/1361-6579/ad46e2
10.3390/technologies11040107
10.3390/app13020825
10.1145/3664655
10.1007/s11042-023-17356-9
10.1016/j.ins.2021.02.064
10.1016/j.procs.2022.12.401
10.5815/ijcnis.2023.01.03
10.1186/s40537-024-00886-w
10.1109/ACCESS.2023.3337645
10.3390/electronics12061344
10.1016/j.inffus.2024.102638
10.1109/TMM.2023.3274990
10.11591/ijeecs.v35.i3.pp1661-1669
10.1109/TNSM.2018.2861717
10.1162/neco.1997.9.8.1735
10.4218/etrij.2023-0283
10.3390/fi15100326
10.1016/j.engappai.2023.107004
10.1109/ACCESS.2022.3185748
10.1109/ACCESS.2023.3313596
10.3390/info14010054
10.1016/j.cose.2022.103015
10.1016/j.cose.2024.104170
10.1109/ACCESS.2024.3363469
10.1109/ACCESS.2024.3457902
10.1063/5.0228015
ContentType Journal Article
Copyright 2025 Elsevier Ltd
Copyright_xml – notice: 2025 Elsevier Ltd
DBID AAYXX
CITATION
DOI 10.1016/j.eswa.2025.126982
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
ExternalDocumentID 10_1016_j_eswa_2025_126982
S0957417425006049
GroupedDBID --K
--M
.DC
.~1
0R~
13V
1B1
1RT
1~.
1~5
4.4
457
4G.
5GY
5VS
7-5
71M
8P~
9JN
9JO
AAAKF
AABNK
AACTN
AAEDT
AAEDW
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AARIN
AATTM
AAXKI
AAXUO
AAYFN
ABBOA
ABFNM
ABJNI
ABMAC
ABMVD
ABUCO
ACDAQ
ACGFS
ACHRH
ACNTT
ACRLP
ACZNC
ADBBV
ADEZE
ADTZH
AEBSH
AECPX
AEIPS
AEKER
AENEX
AFJKZ
AFTJW
AFXIZ
AGCQF
AGHFR
AGUBO
AGUMN
AGYEJ
AHHHB
AHJVU
AHZHX
AIALX
AIEXJ
AIKHN
AITUG
AKRWK
ALEQD
ALMA_UNASSIGNED_HOLDINGS
AMRAJ
ANKPU
AOUOD
APLSM
APXCP
AXJTR
BJAXD
BKOJK
BLXMC
BNPGV
BNSAS
CS3
DU5
EBS
EFJIC
EO8
EO9
EP2
EP3
F5P
FDB
FIRID
FNPLU
FYGXN
G-Q
GBLVA
GBOLZ
HAMUX
IHE
J1W
JJJVA
KOM
LG9
LY1
LY7
M41
MO0
N9A
O-L
O9-
OAUVE
OZT
P-8
P-9
P2P
PC.
PQQKQ
Q38
ROL
RPZ
SDF
SDG
SDP
SDS
SES
SEW
SPC
SPCBC
SSB
SSD
SSH
SSL
SST
SSV
SSZ
T5K
TN5
~G-
29G
9DU
AAAKG
AAQXK
AAYWO
AAYXX
ABKBG
ABUFD
ABWVN
ABXDB
ACLOT
ACNNM
ACRPL
ACVFH
ADCNI
ADJOM
ADMUD
ADNMO
AEUPX
AFPUW
AGQPQ
AIGII
AIIUN
AKBMS
AKYEP
ASPBG
AVWKF
AZFZN
CITATION
EFKBS
EFLBG
EJD
FEDTE
FGOYB
G-2
HLZ
HVGLF
HZ~
R2-
SBC
SET
WUQ
XPP
ZMT
~HD
ID FETCH-LOGICAL-c258t-d8ae7122aa7624da799e1b6ef1dfb44765639256e611bbca3b3d4e75e5f310a93
ISICitedReferencesCount 13
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001433913800001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 0957-4174
IngestDate Sat Nov 29 07:57:26 EST 2025
Tue Nov 18 22:10:19 EST 2025
Sat May 03 15:57:28 EDT 2025
IsPeerReviewed true
IsScholarly true
Keywords Long short-term memory
Anomalous request
Web attack
Autoencoder
Generative adversarial network
Reinforcement learning
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c258t-d8ae7122aa7624da799e1b6ef1dfb44765639256e611bbca3b3d4e75e5f310a93
ParticipantIDs crossref_primary_10_1016_j_eswa_2025_126982
crossref_citationtrail_10_1016_j_eswa_2025_126982
elsevier_sciencedirect_doi_10_1016_j_eswa_2025_126982
PublicationCentury 2000
PublicationDate 2025-05-15
PublicationDateYYYYMMDD 2025-05-15
PublicationDate_xml – month: 05
  year: 2025
  text: 2025-05-15
  day: 15
PublicationDecade 2020
PublicationTitle Expert systems with applications
PublicationYear 2025
Publisher Elsevier Ltd
Publisher_xml – name: Elsevier Ltd
References A. Mirzaee Moghaddam Kasmaee et al., “ELRL-MD: a deep learning approach for myocarditis diagnosis using cardiac magnetic resonance images with ensemble and reinforcement learning integration,” Physiological Measurement, 2024.
Liu (b0140) 2024; 253
Salam, Ullah, Amin, Abrar (b0025) 2023; 11
Lin, Xu, Fang, Liu (b0110) 2023; 13
Jishnu, Arthi (b0130) 2025
Hochreiter, Schmidhuber (b0235) 1997; 9
A. Graves, “Generating sequences with recurrent neural networks,” arXiv preprint arXiv:1308.0850, 2013.
Cao, Cao, Liu, Zhu, Zhang, Hu (b0085) 2023; 26
A. Chan et al., “Transformer-based vulnerability detection in code at EditTime: Zero-shot, few-shot, or fine-tuning?,” arXiv preprint arXiv:2306.01754, 2023.
N. Kodali, J. Abernethy, J. Hays, and Z. Kira, “On convergence and stability of gans,” arXiv preprint arXiv:1705.07215, 2017.
Liu (b0210) 2025; 113
Vallabhaneni, Vaddadi, Pillai, Addula, Ananthan (b0200) 2024; 35
Gao, Pei, Huang (b0295) 2019
Naqvi, Shabaz, Khan, Hassan (b0300) 2023; 21
Xiang, Shi, Zhang (b0160) 2023; 12
Firdous, Din, Assad (b0105) 2023; 126
Dawadi, Adhikari, Srivastava (b0120) 2023; 23
D. Ulyanov, A. Vedaldi, and V. Lempitsky, “It takes (only) two: Adversarial generator-encoder networks,” in Proceedings of the AAAI Conference on Artificial Intelligence, 2018, vol. 32, no. 1.
Raza, Munir, Almutairi, Sehar (b0005) 2023
J. Sasidhar and S. Christy, “Text summarization and question-answer generator for real time transfer of media files using websockets with BERT and DistilBERT algorithm,” in AIP Conference Proceedings, 2024, vol. 2871, no. 1: AIP Publishing.
Deshpande, Singh (b0135) 2024; 83
Yu, Tang, Ergu, Zeng, Ma, Liu (b0190) 2024
Deepan, Saravanan (b0030) 2024
Wongvorachan, He, Bulut (b0090) 2023; 14
Dash (b0055) 2024; 25
Yang (b0100) 2023
Prasad, Dondeti (b0145) 2025; 148
Yang (b0255) 2021; 566
Ferrag (b0205) 2024
Talukder (b0050) 2024; 11
D. Li, Y. Li, and Z. ZHANG, “Automatic Extractive Summarization using GAN Boosted by DistilBERT Word Embedding and Transductive Learning.”.
Seyyar, Yavuz, Ünver (b0015) 2022; 10
Sun, Li, Liao, Chang (b0245) 2018; 15
S. Wang, S. Lin, and R. Yang, “A lightweight convolutional neural network for multipoint displacement measurements on bridge structures,” Nonlinear Dynamics, pp. 1-19, 2024.
Liu, Dai (b0195) 2024; 2024
Sarangi, Tripathy (b0075) 2023; 14
Liu, Fang, Huang, Xu (b0115) 2023; 124
Boppana, Bagade (b0080) 2023; 119
Otieno, Namin, Jones (b0175) 2023
Jeong, Yang, Choi, Lee (b0220) 2024
Dhanya, Vajipayajula, Srinivasan, Tibrewal, Kumar, Kumar (b0010) 2023; 218
Sarhan, Layeghy, Moustafa, Gallagher, Portmann (b0045) 2024; 10
Li (b0260) 2024
Liang, Yang, Xiong, Zhang, Liu (b0060) 2024
Sanh, V., Debut, L., Chaumond, J., & Wolf, T. (2019). DistilBERT, a distilled version of BERT: smaller, faster, cheaper and lighter. arXiv preprint arXiv:1910.01108.
Szabó, Bilicki (b0185) 2023; 15
Pillai, Sharma (b0020) 2023; 86
Thalji, Raza, Islam, Samee, Jamjoom (b0070) 2023; 11
Li, Dib (b0155) 2024; 19
Lu, Fei, Liu (b0125) 2023; 12
Omolara, Alawida (b0150) 2025; 148
Bokolo, Chen, Liu (b0170) 2023
Mao, Li, Xie, Lau, Wang, Paul Smolley (b0290) 2017
Su, Su (b0165) 2023; 23
Zhao, Tian, An, Mi (b0215) 2024
Rosca, Lakshminarayanan, Warde-Farley, Mohamed (b0285) 2017
Ma, Mao (b0240) 2020; 17
Motevalli, Sohrabi, Yaghmaee (b0035) 2024
Dixit, Mani (b0095) 2023; 142
Alaghbari, Lim, Saad, Yong (b0065) 2023; 4
Megahed, Mohammed (b0265) 2024
Li (10.1016/j.eswa.2025.126982_b0260) 2024
10.1016/j.eswa.2025.126982_b0180
Salam (10.1016/j.eswa.2025.126982_b0025) 2023; 11
Prasad (10.1016/j.eswa.2025.126982_b0145) 2025; 148
10.1016/j.eswa.2025.126982_b0225
Szabó (10.1016/j.eswa.2025.126982_b0185) 2023; 15
Otieno (10.1016/j.eswa.2025.126982_b0175) 2023
Lu (10.1016/j.eswa.2025.126982_b0125) 2023; 12
Li (10.1016/j.eswa.2025.126982_b0155) 2024; 19
Gao (10.1016/j.eswa.2025.126982_b0295) 2019
Sarhan (10.1016/j.eswa.2025.126982_b0045) 2024; 10
Ferrag (10.1016/j.eswa.2025.126982_b0205) 2024
Boppana (10.1016/j.eswa.2025.126982_b0080) 2023; 119
10.1016/j.eswa.2025.126982_b0250
Hochreiter (10.1016/j.eswa.2025.126982_b0235) 1997; 9
Talukder (10.1016/j.eswa.2025.126982_b0050) 2024; 11
Dhanya (10.1016/j.eswa.2025.126982_b0010) 2023; 218
Deepan (10.1016/j.eswa.2025.126982_b0030) 2024
Firdous (10.1016/j.eswa.2025.126982_b0105) 2023; 126
Bokolo (10.1016/j.eswa.2025.126982_b0170) 2023
Deshpande (10.1016/j.eswa.2025.126982_b0135) 2024; 83
Jishnu (10.1016/j.eswa.2025.126982_b0130) 2025
Liu (10.1016/j.eswa.2025.126982_b0210) 2025; 113
Lin (10.1016/j.eswa.2025.126982_b0110) 2023; 13
Xiang (10.1016/j.eswa.2025.126982_b0160) 2023; 12
Liu (10.1016/j.eswa.2025.126982_b0140) 2024; 253
Megahed (10.1016/j.eswa.2025.126982_b0265) 2024
Jeong (10.1016/j.eswa.2025.126982_b0220) 2024
10.1016/j.eswa.2025.126982_b0040
Raza (10.1016/j.eswa.2025.126982_b0005) 2023
Thalji (10.1016/j.eswa.2025.126982_b0070) 2023; 11
Omolara (10.1016/j.eswa.2025.126982_b0150) 2025; 148
10.1016/j.eswa.2025.126982_b0280
Liu (10.1016/j.eswa.2025.126982_b0195) 2024; 2024
Dixit (10.1016/j.eswa.2025.126982_b0095) 2023; 142
Wongvorachan (10.1016/j.eswa.2025.126982_b0090) 2023; 14
Seyyar (10.1016/j.eswa.2025.126982_b0015) 2022; 10
Naqvi (10.1016/j.eswa.2025.126982_b0300) 2023; 21
Alaghbari (10.1016/j.eswa.2025.126982_b0065) 2023; 4
Su (10.1016/j.eswa.2025.126982_b0165) 2023; 23
Vallabhaneni (10.1016/j.eswa.2025.126982_b0200) 2024; 35
Pillai (10.1016/j.eswa.2025.126982_b0020) 2023; 86
Dawadi (10.1016/j.eswa.2025.126982_b0120) 2023; 23
Ma (10.1016/j.eswa.2025.126982_b0240) 2020; 17
Liu (10.1016/j.eswa.2025.126982_b0115) 2023; 124
Sun (10.1016/j.eswa.2025.126982_b0245) 2018; 15
Sarangi (10.1016/j.eswa.2025.126982_b0075) 2023; 14
Yu (10.1016/j.eswa.2025.126982_b0190) 2024
Mao (10.1016/j.eswa.2025.126982_b0290) 2017
10.1016/j.eswa.2025.126982_b0230
Rosca (10.1016/j.eswa.2025.126982_b0285) 2017
10.1016/j.eswa.2025.126982_b0270
Cao (10.1016/j.eswa.2025.126982_b0085) 2023; 26
Yang (10.1016/j.eswa.2025.126982_b0100) 2023
10.1016/j.eswa.2025.126982_b0275
Motevalli (10.1016/j.eswa.2025.126982_b0035) 2024
Zhao (10.1016/j.eswa.2025.126982_b0215) 2024
Dash (10.1016/j.eswa.2025.126982_b0055) 2024; 25
10.1016/j.eswa.2025.126982_b0305
Yang (10.1016/j.eswa.2025.126982_b0255) 2021; 566
Liang (10.1016/j.eswa.2025.126982_b0060) 2024
References_xml – year: 2024
  ident: b0060
  article-title: Multi-level intrusion detection based on transformer and wavelet transform for iot data security
  publication-title: IEEE Internet of Things Journal
– year: 2024
  ident: b0220
  article-title: Feature Based Text Search Engine Mitigating Data Diversity Problem Using Pre-Trained Large Language Model for Fast Deployment Services
  publication-title: IEEE Access
– volume: 15
  start-page: 1175
  year: 2018
  end-page: 1191
  ident: b0245
  article-title: Service function chain orchestration across multiple domains: A full mesh aggregation approach
  publication-title: IEEE Transactions on Network and Service Management
– volume: 12
  start-page: 1344
  year: 2023
  ident: b0125
  article-title: A semantic learning-based SQL injection attack detection technology
  publication-title: Electronics
– reference: A. Mirzaee Moghaddam Kasmaee et al., “ELRL-MD: a deep learning approach for myocarditis diagnosis using cardiac magnetic resonance images with ensemble and reinforcement learning integration,” Physiological Measurement, 2024.
– start-page: 1303
  year: 2023
  end-page: 1310
  ident: b0175
  publication-title: IEEE
– reference: A. Chan et al., “Transformer-based vulnerability detection in code at EditTime: Zero-shot, few-shot, or fine-tuning?,” arXiv preprint arXiv:2306.01754, 2023.
– year: 2024
  ident: b0035
  article-title: Aspect-based sentiment analysis: A dual-task learning architecture using imbalanced maximized-area under the curve proximate support vector machine and reinforcement learning
  publication-title: Information Sciences
– year: 2024
  ident: b0260
  article-title: Mobile User Traffic Generation via Multi-Scale Hierarchical GAN
  publication-title: ACM Transactions on Knowledge Discovery from Data
– reference: A. Graves, “Generating sequences with recurrent neural networks,” arXiv preprint arXiv:1308.0850, 2013.
– start-page: 1520
  year: 2024
  end-page: 1524
  ident: b0215
  publication-title: IEEE
– volume: 124
  year: 2023
  ident: b0115
  article-title: MFXSS: An effective XSS vulnerability detection method in JavaScript based on multi-feature model
  publication-title: Computers & Security
– volume: 253
  year: 2024
  ident: b0140
  article-title: TransURL: Improving malicious URL detection with multi-layer Transformer encoding and multi-scale pyramid features
  publication-title: Computer Networks
– volume: 12
  start-page: 3349
  year: 2023
  ident: b0160
  article-title: An APT event extraction method based on BERT-BiGRU-CRF for APT attack detection
  publication-title: Electronics
– volume: 86
  year: 2023
  ident: b0020
  article-title: Hybrid unsupervised web-attack detection and classification–A deep learning approach
  publication-title: Computer Standards & Interfaces
– year: 2024
  ident: b0205
  article-title: Revolutionizing cyber threat detection with large language models: A privacy-preserving bert-based lightweight model for iot/iiot devices
  publication-title: IEEE Access
– reference: D. Li, Y. Li, and Z. ZHANG, “Automatic Extractive Summarization using GAN Boosted by DistilBERT Word Embedding and Transductive Learning.”.
– volume: 4
  start-page: 345
  year: 2023
  end-page: 365
  ident: b0065
  article-title: Deep Autoencoder-Based Integrated Model for Anomaly Detection and Efficient Feature Extraction in IoT Networks
  publication-title: IoT
– year: 2023
  ident: b0005
  article-title: Novel class probability features for optimizing network attack detection with machine learning
  publication-title: IEEE Access
– volume: 23
  start-page: 2073
  year: 2023
  ident: b0120
  article-title: Deep learning technique-enabled web application firewall for the detection of web attacks
  publication-title: Sensors
– start-page: 1
  year: 2023
  end-page: 20
  ident: b0100
  article-title: Deep reinforcement learning for multi-class imbalanced training: Applications in healthcare
  publication-title: Machine Learning
– volume: 126
  year: 2023
  ident: b0105
  article-title: An imbalanced classification approach for establishment of cause-effect relationship between Heart-Failure and Pulmonary Embolism using Deep Reinforcement Learning
  publication-title: Engineering Applications of Artificial Intelligence
– volume: 17
  start-page: 1658
  year: 2020
  end-page: 1667
  ident: b0240
  article-title: Deep-convolution-based LSTM network for remaining useful life prediction
  publication-title: IEEE Transactions on Industrial Informatics
– volume: 11
  start-page: 33
  year: 2024
  ident: b0050
  article-title: Machine learning-based network intrusion detection for big and imbalanced data using oversampling, stacking feature embedding and feature extraction
  publication-title: Journal of big data
– reference: J. Sasidhar and S. Christy, “Text summarization and question-answer generator for real time transfer of media files using websockets with BERT and DistilBERT algorithm,” in AIP Conference Proceedings, 2024, vol. 2871, no. 1: AIP Publishing.
– year: 2017
  ident: b0285
  article-title: Variational approaches for auto-encoding generative adversarial networks
  publication-title: arXiv preprint arXiv:1706.04987
– volume: 148
  year: 2025
  ident: b0150
  article-title: DaE2: Unmasking malicious URLs by leveraging diverse and efficient ensemble machine learning for online security
  publication-title: Computers & Security
– reference: Sanh, V., Debut, L., Chaumond, J., & Wolf, T. (2019). DistilBERT, a distilled version of BERT: smaller, faster, cheaper and lighter. arXiv preprint arXiv:1910.01108.
– volume: 23
  start-page: 8499
  year: 2023
  ident: b0165
  article-title: BERT-Based Approaches to Identifying Malicious URLs
  publication-title: Sensors
– reference: D. Ulyanov, A. Vedaldi, and V. Lempitsky, “It takes (only) two: Adversarial generator-encoder networks,” in Proceedings of the AAAI Conference on Artificial Intelligence, 2018, vol. 32, no. 1.
– volume: 15
  start-page: 326
  year: 2023
  ident: b0185
  article-title: A new approach to web application security: Utilizing gpt language models for source code inspection
  publication-title: Future Internet
– volume: 14
  start-page: 26
  year: 2023
  ident: b0075
  article-title: Outlier detection technique for wireless sensor network using GAN with Autoencoder to increase the network lifetime
  publication-title: International Journal of Computer Network and Information Security
– volume: 11
  start-page: 107
  year: 2023
  ident: b0025
  article-title: Deep Learning techniques for web-based attack detection in industry 5.0: A novel approach
  publication-title: Technologies
– volume: 13
  start-page: 825
  year: 2023
  ident: b0110
  article-title: VulEye: A novel graph neural network vulnerability detection approach for PHP application
  publication-title: Applied Sciences
– volume: 113
  year: 2025
  ident: b0210
  article-title: PMANet: Malicious URL detection via post-trained language model guided multi-level feature attention network
  publication-title: Information Fusion
– year: 2024
  ident: b0265
  article-title: Collaborative-GAN: An approach for stabilizing the training process of generative adversarial network
  publication-title: IEEE Access.
– volume: 83
  start-page: 43983
  year: 2024
  end-page: 44007
  ident: b0135
  article-title: Weighted transformer neural network for web attack detection using request URL
  publication-title: Multimedia Tools and Applications
– start-page: 1
  year: 2023
  end-page: 6
  ident: b0170
  publication-title: IEEE
– volume: 14
  start-page: 54
  year: 2023
  ident: b0090
  article-title: A comparison of undersampling, oversampling, and SMOTE methods for dealing with imbalanced classification in educational data mining
  publication-title: Information
– year: 2024
  ident: b0190
  article-title: Efficient Classification of Malicious URLs: M-BERT-A Modified BERT Variant for Enhanced Semantic Understanding
  publication-title: IEEE Access
– start-page: 2794
  year: 2017
  end-page: 2802
  ident: b0290
  article-title: Least squares generative adversarial networks
  publication-title: in Proceedings of the IEEE international conference on computer vision
– volume: 10
  start-page: 68633
  year: 2022
  end-page: 68644
  ident: b0015
  article-title: An attack detection framework based on BERT and deep learning
  publication-title: IEEE Access
– volume: 2024
  year: 2024
  ident: b0195
  article-title: Deep Learning in Cybersecurity: A Hybrid BERT–LSTM Network for SQL Injection Attack Detection
  publication-title: IET Information Security
– volume: 19
  start-page: 2919
  year: 2024
  end-page: 2960
  ident: b0155
  article-title: Enhancing Online Security: A Novel Machine Learning Framework for Robust Detection of Known and Unknown Malicious URLs
  publication-title: Journal of Theoretical and Applied Electronic Commerce Research
– volume: 11
  start-page: 135507
  year: 2023
  end-page: 135516
  ident: b0070
  article-title: AE-Net: Novel Autoencoder-Based Deep Features for SQL Injection Attack Detection
  publication-title: IEEE Access
– volume: 142
  year: 2023
  ident: b0095
  article-title: Sampling technique for noisy and borderline examples problem in imbalanced classification
  publication-title: Applied Soft Computing
– year: 2024
  ident: b0030
  article-title: Air quality index prediction using seasonal autoregressive integrated moving average transductive long short‐term memory
  publication-title: ETRI Journal
– volume: 10
  start-page: 205
  year: 2024
  end-page: 216
  ident: b0045
  article-title: Feature extraction for machine learning-based intrusion detection in IoT networks
  publication-title: Digital Communications and Networks
– volume: 148
  year: 2025
  ident: b0145
  article-title: PDSMV3-DCRNN: A novel ensemble deep learning framework for enhancing phishing detection and URL extraction
  publication-title: Computers & Security
– volume: 35
  start-page: 1661
  year: 2024
  end-page: 1669
  ident: b0200
  article-title: MobileNet based secured compliance through open web application security projects in cloud system
  publication-title: Indonesian Journal of Electrical Engineering and Computer Science
– reference: S. Wang, S. Lin, and R. Yang, “A lightweight convolutional neural network for multipoint displacement measurements on bridge structures,” Nonlinear Dynamics, pp. 1-19, 2024.
– volume: 9
  start-page: 1735
  year: 1997
  end-page: 1780
  ident: b0235
  article-title: Long short-term memory
  publication-title: Neural computation
– reference: N. Kodali, J. Abernethy, J. Hays, and Z. Kira, “On convergence and stability of gans,” arXiv preprint arXiv:1705.07215, 2017.
– volume: 218
  start-page: 57
  year: 2023
  end-page: 66
  ident: b0010
  article-title: Detection of network attacks using machine learning and deep learning models
  publication-title: Procedia Computer Science
– volume: 21
  start-page: 52
  year: 2023
  ident: b0300
  article-title: Adversarial Attacks on Visual Objects Using the Fast Gradient Sign Method
  publication-title: Journal of Grid Computing
– start-page: 1308
  year: 2019
  end-page: 1316
  ident: b0295
  article-title: Progan: Network embedding via proximity generative adversarial network
  publication-title: in Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining
– volume: 119
  year: 2023
  ident: b0080
  article-title: GAN-AE: An unsupervised intrusion detection system for MQTT networks
  publication-title: Engineering Applications of Artificial Intelligence
– volume: 26
  start-page: 995
  year: 2023
  end-page: 1010
  ident: b0085
  article-title: Autoencoder-Based Collaborative Attention GAN for Multi-Modal Image Synthesis
  publication-title: IEEE Transactions on Multimedia
– start-page: 159
  year: 2025
  end-page: 184
  ident: b0130
  article-title: “Phishing URL Detection Using BiLSTM With Attention Mechanism,” in Machine Intelligence Applications in Cyber-Risk Management
  publication-title: IGI Global Scientific Publishing
– volume: 566
  start-page: 103
  year: 2021
  end-page: 117
  ident: b0255
  article-title: A data-driven structural damage detection framework based on parallel convolutional neural network and bidirectional gated recurrent unit
  publication-title: Information Sciences
– volume: 25
  year: 2024
  ident: b0055
  article-title: Enhancing DDoS attack detection in IoT using PCA
  publication-title: Egyptian Informatics Journal
– volume: 4
  start-page: 345
  issue: 3
  year: 2023
  ident: 10.1016/j.eswa.2025.126982_b0065
  article-title: Deep Autoencoder-Based Integrated Model for Anomaly Detection and Efficient Feature Extraction in IoT Networks
  publication-title: IoT
  doi: 10.3390/iot4030016
– start-page: 1
  year: 2023
  ident: 10.1016/j.eswa.2025.126982_b0170
– volume: 86
  year: 2023
  ident: 10.1016/j.eswa.2025.126982_b0020
  article-title: Hybrid unsupervised web-attack detection and classification–A deep learning approach
  publication-title: Computer Standards & Interfaces
  doi: 10.1016/j.csi.2023.103738
– ident: 10.1016/j.eswa.2025.126982_b0280
  doi: 10.1609/aaai.v32i1.11449
– ident: 10.1016/j.eswa.2025.126982_b0180
– start-page: 2794
  year: 2017
  ident: 10.1016/j.eswa.2025.126982_b0290
  article-title: Least squares generative adversarial networks
– start-page: 159
  year: 2025
  ident: 10.1016/j.eswa.2025.126982_b0130
  article-title: “Phishing URL Detection Using BiLSTM With Attention Mechanism,” in Machine Intelligence Applications in Cyber-Risk Management
  publication-title: IGI Global Scientific Publishing
– volume: 21
  start-page: 52
  issue: 4
  year: 2023
  ident: 10.1016/j.eswa.2025.126982_b0300
  article-title: Adversarial Attacks on Visual Objects Using the Fast Gradient Sign Method
  publication-title: Journal of Grid Computing
  doi: 10.1007/s10723-023-09684-9
– volume: 19
  start-page: 2919
  issue: 4
  year: 2024
  ident: 10.1016/j.eswa.2025.126982_b0155
  article-title: Enhancing Online Security: A Novel Machine Learning Framework for Robust Detection of Known and Unknown Malicious URLs
  publication-title: Journal of Theoretical and Applied Electronic Commerce Research
  doi: 10.3390/jtaer19040141
– volume: 17
  start-page: 1658
  issue: 3
  year: 2020
  ident: 10.1016/j.eswa.2025.126982_b0240
  article-title: Deep-convolution-based LSTM network for remaining useful life prediction
  publication-title: IEEE Transactions on Industrial Informatics
  doi: 10.1109/TII.2020.2991796
– year: 2024
  ident: 10.1016/j.eswa.2025.126982_b0060
  article-title: Multi-level intrusion detection based on transformer and wavelet transform for iot data security
  publication-title: IEEE Internet of Things Journal
  doi: 10.1109/JIOT.2024.3369034
– volume: 2024
  issue: 1
  year: 2024
  ident: 10.1016/j.eswa.2025.126982_b0195
  article-title: Deep Learning in Cybersecurity: A Hybrid BERT–LSTM Network for SQL Injection Attack Detection
  publication-title: IET Information Security
  doi: 10.1049/2024/5565950
– volume: 119
  year: 2023
  ident: 10.1016/j.eswa.2025.126982_b0080
  article-title: GAN-AE: An unsupervised intrusion detection system for MQTT networks
  publication-title: Engineering Applications of Artificial Intelligence
  doi: 10.1016/j.engappai.2022.105805
– volume: 12
  start-page: 3349
  issue: 15
  year: 2023
  ident: 10.1016/j.eswa.2025.126982_b0160
  article-title: An APT event extraction method based on BERT-BiGRU-CRF for APT attack detection
  publication-title: Electronics
  doi: 10.3390/electronics12153349
– ident: 10.1016/j.eswa.2025.126982_b0305
– volume: 10
  start-page: 205
  issue: 1
  year: 2024
  ident: 10.1016/j.eswa.2025.126982_b0045
  article-title: Feature extraction for machine learning-based intrusion detection in IoT networks
  publication-title: Digital Communications and Networks
  doi: 10.1016/j.dcan.2022.08.012
– ident: 10.1016/j.eswa.2025.126982_b0250
– volume: 23
  start-page: 8499
  issue: 20
  year: 2023
  ident: 10.1016/j.eswa.2025.126982_b0165
  article-title: BERT-Based Approaches to Identifying Malicious URLs
  publication-title: Sensors
  doi: 10.3390/s23208499
– ident: 10.1016/j.eswa.2025.126982_b0275
– year: 2024
  ident: 10.1016/j.eswa.2025.126982_b0035
  article-title: Aspect-based sentiment analysis: A dual-task learning architecture using imbalanced maximized-area under the curve proximate support vector machine and reinforcement learning
  publication-title: Information Sciences
– volume: 142
  year: 2023
  ident: 10.1016/j.eswa.2025.126982_b0095
  article-title: Sampling technique for noisy and borderline examples problem in imbalanced classification
  publication-title: Applied Soft Computing
  doi: 10.1016/j.asoc.2023.110361
– volume: 148
  year: 2025
  ident: 10.1016/j.eswa.2025.126982_b0145
  article-title: PDSMV3-DCRNN: A novel ensemble deep learning framework for enhancing phishing detection and URL extraction
  publication-title: Computers & Security
  doi: 10.1016/j.cose.2024.104123
– volume: 23
  start-page: 2073
  issue: 4
  year: 2023
  ident: 10.1016/j.eswa.2025.126982_b0120
  article-title: Deep learning technique-enabled web application firewall for the detection of web attacks
  publication-title: Sensors
  doi: 10.3390/s23042073
– volume: 25
  year: 2024
  ident: 10.1016/j.eswa.2025.126982_b0055
  article-title: Enhancing DDoS attack detection in IoT using PCA
  publication-title: Egyptian Informatics Journal
  doi: 10.1016/j.eij.2024.100450
– volume: 253
  year: 2024
  ident: 10.1016/j.eswa.2025.126982_b0140
  article-title: TransURL: Improving malicious URL detection with multi-layer Transformer encoding and multi-scale pyramid features
  publication-title: Computer Networks
  doi: 10.1016/j.comnet.2024.110707
– ident: 10.1016/j.eswa.2025.126982_b0230
  doi: 10.1007/s11071-024-09673-x
– ident: 10.1016/j.eswa.2025.126982_b0270
  doi: 10.1088/1361-6579/ad46e2
– volume: 11
  start-page: 107
  issue: 4
  year: 2023
  ident: 10.1016/j.eswa.2025.126982_b0025
  article-title: Deep Learning techniques for web-based attack detection in industry 5.0: A novel approach
  publication-title: Technologies
  doi: 10.3390/technologies11040107
– volume: 13
  start-page: 825
  issue: 2
  year: 2023
  ident: 10.1016/j.eswa.2025.126982_b0110
  article-title: VulEye: A novel graph neural network vulnerability detection approach for PHP application
  publication-title: Applied Sciences
  doi: 10.3390/app13020825
– year: 2024
  ident: 10.1016/j.eswa.2025.126982_b0260
  article-title: Mobile User Traffic Generation via Multi-Scale Hierarchical GAN
  publication-title: ACM Transactions on Knowledge Discovery from Data
  doi: 10.1145/3664655
– start-page: 1308
  year: 2019
  ident: 10.1016/j.eswa.2025.126982_b0295
  article-title: Progan: Network embedding via proximity generative adversarial network
– volume: 83
  start-page: 43983
  issue: 15
  year: 2024
  ident: 10.1016/j.eswa.2025.126982_b0135
  article-title: Weighted transformer neural network for web attack detection using request URL
  publication-title: Multimedia Tools and Applications
  doi: 10.1007/s11042-023-17356-9
– volume: 566
  start-page: 103
  year: 2021
  ident: 10.1016/j.eswa.2025.126982_b0255
  article-title: A data-driven structural damage detection framework based on parallel convolutional neural network and bidirectional gated recurrent unit
  publication-title: Information Sciences
  doi: 10.1016/j.ins.2021.02.064
– volume: 218
  start-page: 57
  year: 2023
  ident: 10.1016/j.eswa.2025.126982_b0010
  article-title: Detection of network attacks using machine learning and deep learning models
  publication-title: Procedia Computer Science
  doi: 10.1016/j.procs.2022.12.401
– volume: 14
  start-page: 26
  issue: 1
  year: 2023
  ident: 10.1016/j.eswa.2025.126982_b0075
  article-title: Outlier detection technique for wireless sensor network using GAN with Autoencoder to increase the network lifetime
  publication-title: International Journal of Computer Network and Information Security
  doi: 10.5815/ijcnis.2023.01.03
– volume: 11
  start-page: 33
  issue: 1
  year: 2024
  ident: 10.1016/j.eswa.2025.126982_b0050
  article-title: Machine learning-based network intrusion detection for big and imbalanced data using oversampling, stacking feature embedding and feature extraction
  publication-title: Journal of big data
  doi: 10.1186/s40537-024-00886-w
– year: 2024
  ident: 10.1016/j.eswa.2025.126982_b0220
  article-title: Feature Based Text Search Engine Mitigating Data Diversity Problem Using Pre-Trained Large Language Model for Fast Deployment Services
  publication-title: IEEE Access
– volume: 11
  start-page: 135507
  year: 2023
  ident: 10.1016/j.eswa.2025.126982_b0070
  article-title: AE-Net: Novel Autoencoder-Based Deep Features for SQL Injection Attack Detection
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2023.3337645
– volume: 12
  start-page: 1344
  issue: 6
  year: 2023
  ident: 10.1016/j.eswa.2025.126982_b0125
  article-title: A semantic learning-based SQL injection attack detection technology
  publication-title: Electronics
  doi: 10.3390/electronics12061344
– start-page: 1303
  year: 2023
  ident: 10.1016/j.eswa.2025.126982_b0175
– volume: 113
  year: 2025
  ident: 10.1016/j.eswa.2025.126982_b0210
  article-title: PMANet: Malicious URL detection via post-trained language model guided multi-level feature attention network
  publication-title: Information Fusion
  doi: 10.1016/j.inffus.2024.102638
– volume: 26
  start-page: 995
  year: 2023
  ident: 10.1016/j.eswa.2025.126982_b0085
  article-title: Autoencoder-Based Collaborative Attention GAN for Multi-Modal Image Synthesis
  publication-title: IEEE Transactions on Multimedia
  doi: 10.1109/TMM.2023.3274990
– year: 2017
  ident: 10.1016/j.eswa.2025.126982_b0285
  article-title: Variational approaches for auto-encoding generative adversarial networks
– volume: 35
  start-page: 1661
  issue: 3
  year: 2024
  ident: 10.1016/j.eswa.2025.126982_b0200
  article-title: MobileNet based secured compliance through open web application security projects in cloud system
  publication-title: Indonesian Journal of Electrical Engineering and Computer Science
  doi: 10.11591/ijeecs.v35.i3.pp1661-1669
– volume: 15
  start-page: 1175
  issue: 3
  year: 2018
  ident: 10.1016/j.eswa.2025.126982_b0245
  article-title: Service function chain orchestration across multiple domains: A full mesh aggregation approach
  publication-title: IEEE Transactions on Network and Service Management
  doi: 10.1109/TNSM.2018.2861717
– volume: 9
  start-page: 1735
  issue: 8
  year: 1997
  ident: 10.1016/j.eswa.2025.126982_b0235
  article-title: Long short-term memory
  publication-title: Neural computation
  doi: 10.1162/neco.1997.9.8.1735
– ident: 10.1016/j.eswa.2025.126982_b0040
– year: 2024
  ident: 10.1016/j.eswa.2025.126982_b0190
  article-title: Efficient Classification of Malicious URLs: M-BERT-A Modified BERT Variant for Enhanced Semantic Understanding
  publication-title: IEEE Access
– year: 2024
  ident: 10.1016/j.eswa.2025.126982_b0030
  article-title: Air quality index prediction using seasonal autoregressive integrated moving average transductive long short‐term memory
  publication-title: ETRI Journal
  doi: 10.4218/etrij.2023-0283
– volume: 15
  start-page: 326
  issue: 10
  year: 2023
  ident: 10.1016/j.eswa.2025.126982_b0185
  article-title: A new approach to web application security: Utilizing gpt language models for source code inspection
  publication-title: Future Internet
  doi: 10.3390/fi15100326
– start-page: 1520
  year: 2024
  ident: 10.1016/j.eswa.2025.126982_b0215
– volume: 126
  year: 2023
  ident: 10.1016/j.eswa.2025.126982_b0105
  article-title: An imbalanced classification approach for establishment of cause-effect relationship between Heart-Failure and Pulmonary Embolism using Deep Reinforcement Learning
  publication-title: Engineering Applications of Artificial Intelligence
  doi: 10.1016/j.engappai.2023.107004
– volume: 10
  start-page: 68633
  year: 2022
  ident: 10.1016/j.eswa.2025.126982_b0015
  article-title: An attack detection framework based on BERT and deep learning
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2022.3185748
– year: 2023
  ident: 10.1016/j.eswa.2025.126982_b0005
  article-title: Novel class probability features for optimizing network attack detection with machine learning
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2023.3313596
– start-page: 1
  year: 2023
  ident: 10.1016/j.eswa.2025.126982_b0100
  article-title: Deep reinforcement learning for multi-class imbalanced training: Applications in healthcare
  publication-title: Machine Learning
– volume: 14
  start-page: 54
  issue: 1
  year: 2023
  ident: 10.1016/j.eswa.2025.126982_b0090
  article-title: A comparison of undersampling, oversampling, and SMOTE methods for dealing with imbalanced classification in educational data mining
  publication-title: Information
  doi: 10.3390/info14010054
– volume: 124
  year: 2023
  ident: 10.1016/j.eswa.2025.126982_b0115
  article-title: MFXSS: An effective XSS vulnerability detection method in JavaScript based on multi-feature model
  publication-title: Computers & Security
  doi: 10.1016/j.cose.2022.103015
– volume: 148
  year: 2025
  ident: 10.1016/j.eswa.2025.126982_b0150
  article-title: DaE2: Unmasking malicious URLs by leveraging diverse and efficient ensemble machine learning for online security
  publication-title: Computers & Security
  doi: 10.1016/j.cose.2024.104170
– year: 2024
  ident: 10.1016/j.eswa.2025.126982_b0205
  article-title: Revolutionizing cyber threat detection with large language models: A privacy-preserving bert-based lightweight model for iot/iiot devices
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2024.3363469
– year: 2024
  ident: 10.1016/j.eswa.2025.126982_b0265
  article-title: Collaborative-GAN: An approach for stabilizing the training process of generative adversarial network
  publication-title: IEEE Access.
  doi: 10.1109/ACCESS.2024.3457902
– ident: 10.1016/j.eswa.2025.126982_b0225
  doi: 10.1063/5.0228015
SSID ssj0017007
Score 2.5248635
Snippet Web applications store sensitive data, making them prime targets for cybercriminals and posing national security risks. This study introduces a new approach to...
SourceID crossref
elsevier
SourceType Enrichment Source
Index Database
Publisher
StartPage 126982
SubjectTerms Anomalous request
Autoencoder
Generative adversarial network
Long short-term memory
Reinforcement learning
Web attack
Title LLM-AE-MP: Web Attack Detection Using a Large Language Model with Autoencoder and Multilayer Perceptron
URI https://dx.doi.org/10.1016/j.eswa.2025.126982
Volume 274
WOSCitedRecordID wos001433913800001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVESC
  databaseName: Elsevier SD Freedom Collection Journals 2021
  issn: 0957-4174
  databaseCode: AIEXJ
  dateStart: 19950101
  customDbUrl:
  isFulltext: true
  dateEnd: 99991231
  titleUrlDefault: https://www.sciencedirect.com
  omitProxy: false
  ssIdentifier: ssj0017007
  providerName: Elsevier
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9QwELZgy4ELb0TLQz5wW7mKnThOuEVoUam2VSUKLKfISZzSpcqudpNS8euZie3sqqAKkLhYiWU7keeTPR5_M0PIa2OkVmGomK6LgEWqrlkR1IoFVawMl6Uue_L4p6k6Pk5ms_TE3eCv-3QCqmmSq6t0-V9FDXUgbHSd_QtxD4NCBTyD0KEEsUP5R4KfTo9YNmFHJ3jY_2yKcda2uvwGK0trbF5wSxPQ4ymywKG0Fss-LZrjrGddu8AIlxhoomdiIO3wQoN6jpR5ZMKsnDjnA5XPrFoXF9p7zG3djQ-LizNPH_odE_eDrt8HOvyP86FhZy2zX7rlVtNZ19tfD_Tix9eFq3YmCyHxtt06bVo7mvel2RCXrEFSsYjbnD1-bRb29Zd13poc5vtm_R2DRwm5z0Wc2jRG1-Jnf8CBcVxQ9jBSUHqb7Agl02REdrL3k9nhcOmkAutd73_E-VhZOuD1L_1ej9nSTU4fkHvuUEEzC4aH5JZpHpH7PmEHdev3Y3I2YOMNBWRQiww6IIP2yKCa9sigHhm0RwZFodItZFBABt0gg26Q8YR8fDc5fXvAXKYNVgqZtKxKtFFcCK1hb4wqrdLU8CI2Na_qIooUKP2gR8vYxJwXRanDIqwio6SRNRwPdBo-JaNm0ZhnhMIWATpvVNcVqOqgDWoRRjIQGOetkjoOdwn385aXLgw9ZkO5yD3fcJ7jXOc417md610yHvosbRCWG1tLL47cqZFWPcwBPTf02_vHfs_J3Q3IX5BRu-rMS3KnvGzP16tXDmQ_AQ32lr0
linkProvider Elsevier
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=LLM-AE-MP%3A+Web+Attack+Detection+Using+a+Large+Language+Model+with+Autoencoder+and+Multilayer+Perceptron&rft.jtitle=Expert+systems+with+applications&rft.au=Yang%2C+Jing&rft.au=Wu%2C+Yuangui&rft.au=Yuan%2C+Yuping&rft.au=Xue%2C+Haozhong&rft.date=2025-05-15&rft.pub=Elsevier+Ltd&rft.issn=0957-4174&rft.volume=274&rft_id=info:doi/10.1016%2Fj.eswa.2025.126982&rft.externalDocID=S0957417425006049
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0957-4174&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0957-4174&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0957-4174&client=summon