{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T12:47:28Z","timestamp":1771850848107,"version":"3.50.1"},"publisher-location":"New York, NY","reference-count":57,"publisher":"Springer US","isbn-type":[{"value":"9781071608258","type":"print"},{"value":"9781071608265","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,8,18]],"date-time":"2020-08-18T00:00:00Z","timestamp":1597708800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,8,18]],"date-time":"2020-08-18T00:00:00Z","timestamp":1597708800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-1-0716-0826-5_16","type":"book-chapter","created":{"date-parts":[[2020,8,31]],"date-time":"2020-08-31T12:47:58Z","timestamp":1598878078000},"page":"317-336","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Secure and Scalable Collection of Biomedical Data for Machine Learning Applications"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3230-4415","authenticated-orcid":false,"given":"Charles","family":"Fracchia","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,18]]},"reference":[{"key":"16_CR1","unstructured":"Microsoft (2017) Microsoft Security Bulletin MS17-010\u2014Critical. \nhttps:\/\/docs.microsoft.com\/en-us\/security-updates\/securitybulletins\/2017\/ms17-010\n\n. Accessed 3 Sept 2019"},{"key":"16_CR2","unstructured":"Microsoft (2018) Microsoft SMB Protocol and CIFS Protocol Overview. \nhttps:\/\/docs.microsoft.com\/en-us\/windows\/win32\/fileio\/microsoft-smb-protocol-and-cifs-protocol-overview\n\n. Accessed 29 Aug 2019"},{"key":"16_CR3","unstructured":"Rob Sobers (2019) CIFS vs SMB: What\u2019s the Difference? \nhttps:\/\/www.varonis.com\/blog\/cifs-vs-smb\/\n\n. Accessed 29 Aug 2019"},{"key":"16_CR4","unstructured":"Wikipedia (2019) Network File System. \nhttps:\/\/en.wikipedia.org\/wiki\/Network_File_System\n\n. Accessed 3 Sept 2019"},{"key":"16_CR5","unstructured":"Wikipedia (2019) Andrew File System. \nhttps:\/\/en.wikipedia.org\/wiki\/Andrew_File_System\n\n. Accessed 3 Sept 2019"},{"key":"16_CR6","unstructured":"Paul Rubens (2019) SSD versus HDD Speed. \nhttps:\/\/www.enterprisestorageforum.com\/storage-hardware\/ssd-vs-hdd-speed.html\n\n. Accessed 29 Aug 2019"},{"key":"16_CR7","unstructured":"Microsoft Technet Blog (2010) SHA2 and Windows. \nhttps:\/\/blogs.technet.microsoft.com\/pki\/2010\/09\/30\/sha2-and-windows\/\n\n. Accessed 3 Sept 2019"},{"key":"16_CR8","unstructured":"Python Documentation (2019) Standard errno system symbols. \nhttps:\/\/docs.python.org\/2\/library\/errno.html\n\n. Accessed 3 Sept 2019"},{"key":"16_CR9","unstructured":"Wikipedia (2019) Comparison of file transfer protocols. \nhttps:\/\/en.wikipedia.org\/wiki\/Comparison_of_file_transfer_protocols\n\n. Accessed 5 Sept 2019"},{"key":"16_CR10","unstructured":"Zeiss (2019) CZI Format License Request. \nhttps:\/\/www.zeiss.com\/microscopy\/us\/products\/microscope-software\/czi\/czi-download.html\n\n. Accessed 5 Sept 2019"},{"key":"16_CR11","unstructured":"Wikipedia (2019) bzip2 file compression. \nhttps:\/\/en.wikipedia.org\/wiki\/Bzip2\n\n. Accessed 5 Sept 2019"},{"key":"16_CR12","unstructured":"Wikipedia (2019) gzip file format and software application. \nhttps:\/\/en.wikipedia.org\/wiki\/Gzip\n\n. Accessed 5 Sept 2019"},{"key":"16_CR13","unstructured":"HighSpeedInternet (2018) Why does my internet slow down at night? \nhttps:\/\/www.highspeedinternet.com\/resources\/why-does-my-internet-slow-down-at-night\n\n. Accessed 5 Sept 2019"},{"key":"16_CR14","unstructured":"Amazon Web Services (2019) AWS Snowball: Physically migrate petabyte-scale data sets into and out of AWS. \nhttps:\/\/aws.amazon.com\/snowball\/\n\n. Accessed 5 Sept 2019"},{"key":"16_CR15","unstructured":"Microsoft Azure (2019) Azure Data Box \nhttps:\/\/azure.microsoft.com\/en-us\/services\/databox\/\n\n. Accessed 5 Sept 2019"},{"key":"16_CR16","unstructured":"Google Cloud (2019) Introducing the Transfer Appliance: Sneakernet for the cloud era. \nhttps:\/\/cloud.google.com\/blog\/products\/gcp\/introducing-transfer-appliance-sneakernet-for-the-cloud-era\n\n Accessed 5 Sept 2019"},{"key":"16_CR17","unstructured":"Microsoft (2014) Support for Windows XP ended. \nhttps:\/\/www.microsoft.com\/en-us\/microsoft-365\/windows\/end-of-windows-xp-support\n\n. Accessed 10 Sept 2019"},{"key":"16_CR18","unstructured":"U.S. Department of Health and Human Services Office for Civil Rights (2019) Breach Portal: Notice to the Secretary of HHS Break of Unsecured Protected Health Information. \nhttps:\/\/ocrportal.hhs.gov\/ocr\/breach\/breach_report.jsf\n\n. Accessed 7 Sept 2019"},{"key":"16_CR19","unstructured":"Wikipedia (2019) Transport Layer Security. \nhttps:\/\/en.wikipedia.org\/wiki\/Transport_Layer_Security\n\n. Accessed 10 Sept 2019"},{"key":"16_CR20","unstructured":"Google Security (2015) Maintaining digital certificate security. \nhttps:\/\/security.googleblog.com\/2015\/03\/maintaining-digital-certificate-security.html\n\n. Accessed 12 Sept 2019"},{"key":"16_CR21","unstructured":"Zetter, K. (2013) Google Discovers Fraudulent Digital Certificate Issued for Its Domain. In: Wired Magazine. \nhttps:\/\/www.wired.com\/2013\/01\/google-fraudulent-certificate\/\n\n. Accessed 12 Sept 2019"},{"key":"16_CR22","unstructured":"Wikipedia (2019) Kazakhstan man-in-the-middle attack. \nhttps:\/\/en.wikipedia.org\/wiki\/Kazakhstan_man-in-the-middle_attack\n\n. Accessed 12 Sept 2019"},{"key":"16_CR23","unstructured":"Wikipedia (2019) Forward secrecy. \nhttps:\/\/en.wikipedia.org\/wiki\/Forward_secrecy\n\n. Accessed 12 Sept 2019"},{"key":"16_CR24","unstructured":"Wikipedia (2019) Replay attack: network attack type. \nhttps:\/\/en.wikipedia.org\/wiki\/Replay_attack\n\n. Accessed 14 Sept 2019"},{"key":"16_CR25","unstructured":"Wikipedia (2019) Known-plaintext attacks. \nhttps:\/\/en.wikipedia.org\/wiki\/Known-plaintext_attack\n\n Accessed 14 Sept 2019"},{"key":"16_CR26","unstructured":"Amazon Web Services (2006) Protecting Data Using Server-Side Encryption. \nhttps:\/\/docs.aws.amazon.com\/AmazonS3\/latest\/dev\/serv-side-encryption.html\n\n. Accessed 7 Sept 2019"},{"key":"16_CR27","unstructured":"Google Cloud (2019) Encryption at Rest. \nhttps:\/\/cloud.google.com\/security\/encryption-at-rest\/\n\n. Accessed 7 Sept 2019"},{"key":"16_CR28","unstructured":"Microsoft Azure (2019) Azure Storage encryption for data at rest. \nhttps:\/\/docs.microsoft.com\/en-us\/azure\/storage\/common\/storage-service-encryption\n\n Accessed 7 September 7th, 2019"},{"key":"16_CR29","unstructured":"Wikipedia (2019) BREACH: Browser Reconnaissance and Exfiltration via Adaptive Compression of Hypertext. \nhttps:\/\/en.wikipedia.org\/wiki\/BREACH\n\n. Accessed 7 Sept 2019"},{"key":"16_CR30","unstructured":"Wikipedia (2019) CRIME: Compression Ratio Info-leak Made Easy. \nhttps:\/\/en.wikipedia.org\/wiki\/CRIME\n\n. Accessed 7 Sept 2019"},{"key":"16_CR31","unstructured":"Wikipedia (2019) IEEE-488: short-range digital communications bus specification. \nhttps:\/\/en.wikipedia.org\/wiki\/IEEE-488\n\n. Accessed 7 Sept 2019"},{"issue":"6","key":"16_CR32","doi-asserted-by":"publisher","first-page":"1126","DOI":"10.1093\/jamia\/ocv077","volume":"22","author":"AW Toga","year":"2015","unstructured":"Toga AW, Foster I, Kesselman C et al (2015) Big biomedical data as the key resource for discovery science. J Am Med Information Assoc 22(6):1126\u20131131. \nhttps:\/\/doi.org\/10.1093\/jamia\/ocv077","journal-title":"J Am Med Information Assoc"},{"key":"16_CR33","unstructured":"Allotrope Foundation (2019) The Allotrope Framework and Data Format. \nhttps:\/\/www.allotrope.org\/allotrope-framework\n\n Accessed 8 September 2019"},{"key":"16_CR34","unstructured":"Pistoia Alliance (2019) Unified Data Model. \nhttps:\/\/www.pistoiaalliance.org\/projects\/udm\/\n\n. Accessed 8 Sept 2019"},{"key":"16_CR35","unstructured":"National Center for Advancing Translational Sciences (2013) Biomedical Data Translator. \nhttps:\/\/ncats.nih.gov\/translator\/about\n\n. Accessed 8 Sept 2019"},{"issue":"1","key":"16_CR36","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1002\/cyto.a.20825","volume":"77","author":"J Spidlen","year":"2010","unstructured":"Spidlen J, Moore W, Parks D et al (2010) Data file standard for flow cytometry, Version FCS 3.1. J Cytometry A 77(1):97\u2013100. \nhttps:\/\/doi.org\/10.1002\/cyto.a.20825","journal-title":"J Cytometry A"},{"key":"16_CR37","unstructured":"Python Package Index (2018) FlowCytometryTools python package. \nhttps:\/\/pypi.org\/project\/FlowCytometryTools\/\n\n. Accessed 8 Sept 2019"},{"key":"16_CR38","unstructured":"Teague B (2019) Cytoflow GitHub code repository. \nhttps:\/\/github.com\/bpteague\/cytoflow\n\n. Accessed 8 Sept 2019"},{"key":"16_CR39","unstructured":"FlowPy (2016) FlowPy Code Repository and Documentation. \nhttp:\/\/flowpy.wikidot.com\/\n\n. Accessed 8 Sept 2019"},{"key":"16_CR40","unstructured":"Scott White (2019) FlowIO python library for flow cytometry. \nhttps:\/\/github.com\/whitews\/flowio\n\n. Accessed 8 Sept 2019"},{"key":"16_CR41","unstructured":"Ridiculous Fish (2019) Hex Fiend hexadecimal editor for Mac OS X. \nhttps:\/\/ridiculousfish.com\/hexfiend\/\n\n. Accessed 8 Sept 2019"},{"key":"16_CR42","unstructured":"MH-Nexus (2019) HxD Hexadecimal editor for Windows. \nhttps:\/\/mh-nexus.de\/en\/hxd\/\n\n. Accessed 8 Sept 2019"},{"key":"16_CR43","unstructured":"Zentgraf D (2015) What Every Programmer Absolutely, Positively Needs To Know About Encodings And Character Sets To Work With Text. \nhttp:\/\/kunststube.net\/encoding\/\n\n. Accessed 8 Sept 2019"},{"key":"16_CR44","unstructured":"Wikipedia (2019) FASTQ text based format for storing biological sequences and quality scores. \nhttps:\/\/en.wikipedia.org\/wiki\/FASTQ_format\n\n. Accessed 8 Sept 2019"},{"key":"16_CR45","unstructured":"HUPO Proteomics Standards Initiative (2017) mzML file format specification for raw spectrometer data. \nhttp:\/\/www.psidev.info\/mzML\n\n. Accessed 8 Sept 2019"},{"key":"16_CR46","unstructured":"Samtools (2019) Variant Call Format specification. \nhttps:\/\/samtools.github.io\/hts-specs\/VCFv4.2.pdf\n\n. Accessed 8 Sept 2019"},{"key":"16_CR47","unstructured":"Fracchia C, Dapello J (2016) Reverse engineering biomedical equipment for fun and open science. Presented at DEFCON24\u20146 August 2016"},{"key":"16_CR48","unstructured":"BioBright (2017) Tools Bring Superpowers to the Biology Lab. \nhttps:\/\/www.businesswire.com\/news\/home\/20170314005466\/en\/BioBright-Tools-Bring-%E2%80%98Superpowers%E2%80%99-Biology-Lab\n\n. Accessed 8 Sept 2019"},{"key":"16_CR49","doi-asserted-by":"publisher","unstructured":"Hearst MA et al. (2007) BioText Search Engine: beyond abstract search. Bioinformatics 23(17):2348\u20132351. \nhttps:\/\/doi.org\/10.1093\/bioinformatics\/btm301","DOI":"10.1093\/bioinformatics\/btm301"},{"key":"16_CR50","unstructured":"Amer-Yahia S, Shanmugasundaram J (2005) XML full-text search: challenges and opportunities. Proceedings Hearst MA, Divoli A, Guturu H et al. (2007) BioText Search Engine: beyond abstract search. Bioinformatics 23(17):2348-2351of 31st international conference on Very large databases 1368\u20131368"},{"issue":"17","key":"16_CR51","doi-asserted-by":"publisher","first-page":"1968","DOI":"10.1093\/bioinformatics\/btn340","volume":"24","author":"S Xu","year":"2008","unstructured":"Xu S, McCusker J, Krauthammer M (2008) Yale Image Finder (YIF): a new search engine for retrieving biomedical images. Bioinformatics 24(17):1968\u20131970","journal-title":"Bioinformatics"},{"key":"16_CR52","unstructured":"Amazon Web Services (2019) Elasticsearch Service: Fully managed, scalable, and secure Elasticsearch service. \nhttps:\/\/aws.amazon.com\/elasticsearch-service\/\n\n. Accessed 8 Sept 2019"},{"key":"16_CR53","unstructured":"Microsoft Azure (2019) How full text search works in Azure Cognitive Search. \nhttps:\/\/docs.microsoft.com\/en-us\/azure\/search\/search-lucene-query-architecture\n\n. Accessed 8 Sept 2019"},{"key":"16_CR54","unstructured":"Postgresql (2019) JSON Functions and Operators. \nhttps:\/\/www.postgresql.org\/docs\/current\/functions-json.html\n\n. Accessed 8 Sept 2019"},{"key":"16_CR55","unstructured":"Apache (2019) Lucene text search engine project. \nhttps:\/\/lucene.apache.org\/core\/index.html\n\n Accessed 8 Sept 2019"},{"key":"16_CR56","unstructured":"Elasticsearch (2019) Configuring security in Elasticsearch. \nhttps:\/\/www.elastic.co\/guide\/en\/elasticsearch\/reference\/current\/configuring-security.html\n\n. Accessed 8 Sept 2019"},{"key":"16_CR57","unstructured":"Swagger (2019) OpenAPI specification documentation. \nhttps:\/\/swagger.io\/docs\/specification\/about\/\n\n. Accessed 8 Sept 2019"}],"container-title":["Methods in Molecular Biology","Artificial Neural Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-0716-0826-5_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,31]],"date-time":"2020-08-31T12:49:45Z","timestamp":1598878185000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-1-0716-0826-5_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,18]]},"ISBN":["9781071608258","9781071608265"],"references-count":57,"URL":"https:\/\/doi.org\/10.1007\/978-1-0716-0826-5_16","relation":{},"ISSN":["1064-3745","1940-6029"],"issn-type":[{"value":"1064-3745","type":"print"},{"value":"1940-6029","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,8,18]]},"assertion":[{"value":"18 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}