[1]
F. D. Hafriadi and R. Ardiansyah, “NETWORK’S ACCESS LOG CLASSIFICATION FOR DETECTING SQL INJECTION ATTACKS WITH THE LSTM ALGORITHM”, J. Tek. Inform. (JUTIF), vol. 5, no. 4, pp. 745-752, Sep. 2024.