Research Article

Deep Learning in Cybersecurity: A Hybrid BERT–LSTM Network for SQL Injection Attack Detection

Table 3

Rules of word segmentation.

CategoryExamples

Functionsleep (int), char (69)
Equation1,557 = 1,557, 6,324 = 6,324
Content inside single quotes“0 : 0:5”, “otqy”
Others&, #, (, /, -, ||