
SQLiGoT: Detecting SQL injection attacks using graph of tokens and SVM
Keywords: SQL injection attack; SQL injection detection; Query token graph; Graph of tokens; Node centrality; Database firewall; Support vector machine