Journals
Publish with us
Publishing partnerships
About us
Blog
IET Information Security
Journal overview
For authors
For reviewers
For editors
Table of Contents
Special Issues
IET Information Security
/
2024
/
Article
/
Tab 1
/
Research Article
Deep Learning in Cybersecurity: A Hybrid BERT–LSTM Network for SQL Injection Attack Detection
Table 1
Example of embedded word vector.
Words
Vector 1
Vector 2
Vector 3
SELECT
0.51
0.13
−0.15
select
0.50
0.12
−0.13
FROM
1.37
0.94
−0.05
WHERE
1.56
1.23
−0.09