Research Article
Deep Learning in Cybersecurity: A Hybrid BERT–LSTM Network for SQL Injection Attack Detection
Table 3
Rules of word segmentation.
| Category | Examples |
| Function | sleep (int), char (69) | Equation | 1,557 = 1,557, 6,324 = 6,324 | Content inside single quotes | “0 : 0:5”, “otqy” | Others | &, #, (, /, -, || |
|
|