{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T01:31:53Z","timestamp":1775266313599,"version":"3.50.1"},"publisher-location":"Cham","reference-count":36,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030010539","type":"print"},{"value":"9783030010546","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,11,9]],"date-time":"2018-11-09T00:00:00Z","timestamp":1541721600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-01054-6_5","type":"book-chapter","created":{"date-parts":[[2018,11,8]],"date-time":"2018-11-08T09:47:05Z","timestamp":1541670425000},"page":"62-85","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["The Cognitive Packet Network with QoS and Cybersecurity Deep Learning Clusters"],"prefix":"10.1007","author":[{"given":"Will","family":"Serrano","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,11,9]]},"reference":[{"key":"5_CR1","first-page":"512","volume":"12","author":"SB Danielle","year":"2007","unstructured":"Danielle, S.B., Bullmore, E.: Small-world brain networks. Neurosci. Rev. J. Bringing Neurobiol. Neurol. Psychiatry 12, 512\u2013523 (2007)","journal-title":"Neurosci. Rev. J. Bringing Neurobiol. Neurol. Psychiatry"},{"issue":"3","key":"5_CR2","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1162\/jocn.1992.4.3.232","volume":"4","author":"LR Squire","year":"1992","unstructured":"Squire, L.R.: Declarative and nondeclarative memory: multiple brain systems supporting learning and memory. J. Cogn. Neurosci. 4(3), 232\u2013243 (1992)","journal-title":"J. Cogn. Neurosci."},{"issue":"1","key":"5_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1006\/ccog.1998.0372","volume":"8","author":"S Grossberg","year":"1999","unstructured":"Grossberg, S.: The link between brain learning, attention, and consciousness. Conscious. Cogn. 8(1), 1\u201344 (1999)","journal-title":"Conscious. Cogn."},{"issue":"3","key":"5_CR4","doi-asserted-by":"publisher","first-page":"1501","DOI":"10.1109\/TPWRD.2010.2046654","volume":"25","author":"GN Ericsson","year":"2010","unstructured":"Ericsson, G.N.: Cyber security and power system communication, essential parts of a smart grid infrastructure. IEEE Trans. Power Delivery 25(3), 1501\u20131507 (2010)","journal-title":"IEEE Trans. Power Delivery"},{"issue":"4","key":"5_CR5","doi-asserted-by":"publisher","first-page":"853","DOI":"10.1109\/TSMCA.2010.2048028","volume":"40","author":"C-W Ten","year":"2010","unstructured":"Ten, C.-W., Manimaran, G., Liu, C.-C.: Cybersecurity for critical infrastructures: attack and defense modeling. IEEE Trans. Syst. Man Cybernet. Part A 40(4), 853\u2013865 (2010)","journal-title":"IEEE Trans. Syst. Man Cybernet. Part A"},{"issue":"6","key":"5_CR6","doi-asserted-by":"publisher","first-page":"2236","DOI":"10.1109\/TII.2016.2599841","volume":"12","author":"T Cruz","year":"2016","unstructured":"Cruz, T., et al.: A cybersecurity detection framework for supervisory control and data acquisition systems. IEEE Trans. Ind. Inform. 12(6), 2236\u20132246 (2016)","journal-title":"IEEE Trans. Ind. Inform."},{"key":"5_CR7","unstructured":"Wang, Q., et al.: Learning Adversary-Resistant Deep Neural Networks. CoRR abs\/1612.01401 (2016)"},{"key":"5_CR8","unstructured":"Tuor, A., et al.: Deep learning for unsupervised insider threat detection in structured cybersecurity data streams. In: AAAI, pp. 4993\u20134994 (2017)"},{"key":"5_CR9","doi-asserted-by":"crossref","unstructured":"Wu, M., Song, Z., Moon, Y.B: Detecting cyber-physical attacks in CyberManufacturing systems with machine learning methods. J. Intell. Manufact. (2017)","DOI":"10.1007\/s10845-017-1315-5"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Kim, C.: Cyber \u2013defensive architecture for networked industrial control systems. Int. J. Eng. Appl. Comput. Sci. (2017)","DOI":"10.24032\/IJEACS\/0201\/01"},{"key":"5_CR11","unstructured":"Gelenbe, E.: Cognitive packet network. Patent US 6804201 B1 (2004)"},{"key":"5_CR12","doi-asserted-by":"crossref","unstructured":"Gelenbe, E., Xu, Z., E.: Seref: cognitive packet networks. In: ICTAI 1999, pp. 47\u201354 (1999)","DOI":"10.1109\/TAI.1999.809765"},{"key":"5_CR13","doi-asserted-by":"crossref","unstructured":"Gelenbe, E., Lent, R., Xu, Z.: Networks with cognitive packets. In: MASCOTS 2000, pp. 3\u201310 (2000)","DOI":"10.1109\/MASCOT.2000.876422"},{"issue":"6","key":"5_CR14","doi-asserted-by":"publisher","first-page":"691","DOI":"10.1016\/S1389-1286(01)00253-5","volume":"37","author":"E Gelenbe","year":"2001","unstructured":"Gelenbe, E., Lent, R., Zhiguang, X.: Measurement and performance of a cognitive packet network. Comput. Netw. 37(6), 691\u2013701 (2001)","journal-title":"Comput. Netw."},{"key":"5_CR15","doi-asserted-by":"crossref","unstructured":"Gelenbe, E., Lent, R., Montuori, A., Xu, Z.: Cognitive packet networks: QoS and performance. In: MASCOTS 2002, p. 3 (2002)","DOI":"10.1007\/978-1-4471-0705-7_1"},{"issue":"4","key":"5_CR16","doi-asserted-by":"publisher","first-page":"502","DOI":"10.1162\/neco.1989.1.4.502","volume":"1","author":"E Gelenbe","year":"1989","unstructured":"Gelenbe, E.: Random neural networks with negative and positive signals and product form solution. Neural Comput. 1(4), 502\u2013510 (1989)","journal-title":"Neural Comput."},{"issue":"2","key":"5_CR17","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1162\/neco.1990.2.2.239","volume":"2","author":"E Gelenbe","year":"1990","unstructured":"Gelenbe, E.: Stability of the random neural network model. Neural Comput. 2(2), 239\u2013247 (1990)","journal-title":"Neural Comput."},{"key":"5_CR18","doi-asserted-by":"crossref","unstructured":"Gelenbe, E.: Learning with the recurrent random neural network. In: IFIP Congress (1), pp. 343\u2013349 (1992)","DOI":"10.1016\/B978-0-444-89330-7.50004-1"},{"issue":"12","key":"5_CR19","doi-asserted-by":"publisher","first-page":"3869","DOI":"10.1016\/j.camwa.2012.03.056","volume":"64","author":"E Gelenbe","year":"2012","unstructured":"Gelenbe, E., Fang-Jing, W.: Large scale simulation for human evacuation and rescue. Comput. Math Appl. 64(12), 3869\u20133880 (2012)","journal-title":"Comput. Math Appl."},{"key":"5_CR20","doi-asserted-by":"crossref","unstructured":"Filippoupolitis, A., Hey, L.A., Loukas, G., Gelenbe, E., Timotheou, S.: Emergency response simulation using wireless sensor networks. In: AMBI-SYS, p. 21 (2008)","DOI":"10.4108\/ICST.AMBISYS2008.2903"},{"issue":"1","key":"5_CR21","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1109\/36.823897","volume":"38","author":"E Gelenbe","year":"2000","unstructured":"Gelenbe, E., Ko\u00e7ak, T.: Area-based results for mine detection. IEEE Trans. Geosci. Remote Sens. 38(1), 12\u201324 (2000)","journal-title":"IEEE Trans. Geosci. Remote Sens."},{"issue":"6","key":"5_CR22","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/s005300050037","volume":"4","author":"E Gelenbe","year":"1996","unstructured":"Gelenbe, E., Sungur, M., Cramer, C., Gelenbe, P.: Traffic and video quality with adaptive neural compression. Multimedia Syst. 4(6), 357\u2013369 (1996)","journal-title":"Multimedia Syst."},{"issue":"1","key":"5_CR23","first-page":"131","volume":"6","author":"V Atalay","year":"1992","unstructured":"Atalay, V., Gelenbe, E., Yalabik, N.: The random neural network model for texture generation. IJPRAI 6(1), 131\u2013141 (1992)","journal-title":"IJPRAI"},{"key":"5_CR24","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1016\/j.neunet.2014.09.003","volume":"61","author":"J Schmidhuber","year":"2015","unstructured":"Schmidhuber, J.: Deep learning in neural networks: an overview. Neural Netw. 61, 85\u2013117 (2015)","journal-title":"Neural Netw."},{"key":"5_CR25","unstructured":"Bengio, Y., Courville, A.C.: Pascal Vincent: Unsupervised Feature Learning and Deep Learning: A Review and New Perspectives. CoRR abs\/1206.5538 (2012)"},{"issue":"6","key":"5_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/S1005-8885(16)60063-8","volume":"23","author":"S Jiea","year":"2016","unstructured":"Jiea, S., Zhichenga, Z., Feia, S., Annia, C.: Progressive framework for deep neural networks: from linear to non-linear. J. China Univ. Posts Telecommun. 23(6), 1\u20137 (2016)","journal-title":"J. China Univ. Posts Telecommun."},{"key":"5_CR27","unstructured":"Le, Q.V., Ngiam, J., Coates, A., Lahiri, A., Prochnow, B., Ng, A.Y.: On optimization methods for deep learning. In: ICML, pp. 265\u2013272 (2011)"},{"key":"5_CR28","unstructured":"Ngiam, J., Khosla, A., Kim, M., Nam, J., Lee, H., Ng, A.Y.: Multimodal Deep Learning. In: ICML, pp. 689\u2013696 (2011)"},{"key":"5_CR29","unstructured":"Sutskever, I., Vinyals, O., Le, Q.V.: Sequence to sequence learning with neural networks. In: NIPS, pp. 3104\u20133112 (2014)"},{"key":"5_CR30","doi-asserted-by":"crossref","unstructured":"Bekker, A.J., Opher, I., Lapidot, I., Goldberger, J.: Intra-cluster training strategy for Deep Learning with applications to language identification. In: MLSP, pp. 1\u20136 (2016)","DOI":"10.1109\/MLSP.2016.7738896"},{"key":"5_CR31","doi-asserted-by":"crossref","unstructured":"Gelenbe, E., Yin, Y.: Deep Learning with random neural networks. In: IJCNN, pp. 1633\u20131638 (2016)","DOI":"10.1109\/IJCNN.2016.7727393"},{"key":"5_CR32","unstructured":"Yin, Y., Gelenbe, E.: Deep Learning in Multi-Layer Architectures of Dense Nuclei. CoRR abs\/1609.07160 (2016)"},{"key":"5_CR33","unstructured":"Gelenbe, E.: G-networks: a unifying model for neural nets and queueing networks. In: MASCOTS, pp. 3\u20138 (1993)"},{"key":"5_CR34","doi-asserted-by":"crossref","unstructured":"Fourneau, J.-M., Gelenbe, E., Suros, R.: G-networks with multiple class negative and positive customers. In: MASCOTS, pp. 30\u201334 (1994)","DOI":"10.1109\/MASCOT.1994.284452"},{"issue":"9","key":"5_CR35","doi-asserted-by":"publisher","first-page":"2308","DOI":"10.1162\/neco.2008.04-07-509","volume":"20","author":"E Gelenbe","year":"2008","unstructured":"Gelenbe, E., Timotheou, S.: Random neural networks with synchronized interactions. Neural Comput. 20(9), 2308\u20132324 (2008)","journal-title":"Neural Comput."},{"key":"5_CR36","first-page":"185","volume-title":"Intelligent Decision Technologies 2017","author":"Will Serrano","year":"2017","unstructured":"Serrano, W., Gelenbe, E.: The deep learning random neural network with a management cluster. In: International Conference on Intelligent Decision Technologies, pp. 185\u2013195 (2017)"}],"container-title":["Advances in Intelligent Systems and Computing","Intelligent Systems and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-01054-6_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T00:27:49Z","timestamp":1775262469000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-01054-6_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11,9]]},"ISBN":["9783030010539","9783030010546"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-01054-6_5","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"value":"2194-5357","type":"print"},{"value":"2194-5365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,11,9]]},"assertion":[{"value":"IntelliSys","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Proceedings of SAI Intelligent Systems Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"London","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 September 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 September 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"intellisys2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/saiconference.com\/IntelliSys2018\/CallforPapers","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}