{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,9]],"date-time":"2025-06-09T22:26:41Z","timestamp":1749508001132,"version":"3.40.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030227432"},{"type":"electronic","value":"9783030227449"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-22744-9_20","type":"book-chapter","created":{"date-parts":[[2019,6,7]],"date-time":"2019-06-07T17:29:16Z","timestamp":1559928556000},"page":"263-272","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Recognizing Faults in Software Related Difficult Data"],"prefix":"10.1007","author":[{"given":"Micha\u0142","family":"Chora\u015b","sequence":"first","affiliation":[]},{"given":"Marek","family":"Pawlicki","sequence":"additional","affiliation":[]},{"given":"Rafa\u0142","family":"Kozik","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,8]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Lo, J.: The implementation of artificial neural networks applying to software reliability modeling. In: 2009 Chinese Control and Decision Conference, pp. 4349\u20134354, June 2009","key":"20_CR1","DOI":"10.1109\/CCDC.2009.5192431"},{"doi-asserted-by":"crossref","unstructured":"Chora\u015b, M., Kozik, R., Renk, R., Ho\u0142ubowicz, W.: A practical framework and guidelines to enhance cyber security and privacy. In: International Joint Conference - CISIS 2015 and ICEUTE 2015, 8th International Conference on Computational Intelligence in Security for Information Systems\/6th International Conference on EUropean Transnational Education, 15\u201317 June 2015, Burgos, Spain, pp. 485\u2013495 (2015)","key":"20_CR2","DOI":"10.1007\/978-3-319-19713-5_42"},{"key":"20_CR3","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1007\/978-3-319-32034-2_37","volume-title":"Hybrid Artificial Intelligent Systems","author":"R Kozik","year":"2016","unstructured":"Kozik, R., Chora\u015b, M.: Solution to data imbalance problem in application layer anomaly detection systems. In: Mart\u00ednez-\u00c1lvarez, F., Troncoso, A., Quinti\u00e1n, H., Corchado, E. (eds.) HAIS 2016. LNCS (LNAI), vol. 9648, pp. 441\u2013450. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-32034-2_37"},{"key":"20_CR4","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-09823-4","volume-title":"Data Mining and Knowledge Discovery Handbook","author":"O Maimon","year":"2010","unstructured":"Maimon, O., Rokach, L.: Data Mining and Knowledge Discovery Handbook, 2nd edn. Springer, Boston (2010). https:\/\/doi.org\/10.1007\/978-0-387-09823-4","edition":"2"},{"doi-asserted-by":"publisher","unstructured":"da Silva, I.N., Spatti, D.H., Flauzino, R.A., Liboni, L.H.B., dos Reis Alves, S.F.: Artificial Neural Networks. A Practical Course. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-43162-8","key":"20_CR5","DOI":"10.1007\/978-3-319-43162-8"},{"key":"20_CR6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-33747-0","volume-title":"Advances in Neural Networks","author":"S Bassis","year":"2016","unstructured":"Bassis, S., Esposito, A., Morabito, F.C., Pasero, E.: Advances in Neural Networks. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-33747-0"},{"key":"20_CR7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-94463-0","volume-title":"Neural Networks and Deep Learning. A Textbook","author":"CC Aggarwal","year":"2018","unstructured":"Aggarwal, C.C.: Neural Networks and Deep Learning. A Textbook. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-94463-0"},{"issue":"1","key":"20_CR8","first-page":"321","volume":"16","author":"NV Chawla","year":"2002","unstructured":"Chawla, N.V., Bowyer, K.W., Hall, L.O., Kegelmeyer, W.P.: SMOTE synthetic minority over-sampling technique. J. Artif. Int. Res. 16(1), 321\u2013357 (2002)","journal-title":"J. Artif. Int. Res."},{"doi-asserted-by":"crossref","unstructured":"Pawlicki, M., Chora\u015b, M., Kozik, R.: Recent granular computing implementations and its feasibility in cybersecurity domain. In Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES 2018, 27\u201330 August 2018, Hamburg, Germany, pp. 61:1\u201361:6 (2018)","key":"20_CR9","DOI":"10.1145\/3230833.3233259"},{"key":"20_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2019\/5826737","volume":"2019","author":"R Kozik","year":"2019","unstructured":"Kozik, R., Pawlicki, M., Chora\u015b, M., Pedrycz, W.: Practical employment of granular computing to complex application layer cyberattack detection. Complexity 2019, 1\u20139 (2019)","journal-title":"Complexity"},{"key":"20_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1007\/978-3-319-99954-8_20","volume-title":"Computer Information Systems and Industrial Management","author":"K Borowska","year":"2018","unstructured":"Borowska, K., Stepaniuk, J.: Granular computing and parameters tuning in imbalanced data preprocessing. In: Saeed, K., Homenda, W. (eds.) CISIM 2018. LNCS, vol. 11127, pp. 233\u2013245. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-99954-8_20"},{"doi-asserted-by":"crossref","unstructured":"D\u2019Ambros, M., Lanza, M., Robbes, R.: An extensive comparison of bug prediction approaches. In: Proceedings of MSR 2010 (7th IEEE Working Conference on Mining Software Repositories), pp. 31\u201341. IEEE CS Press (2010)","key":"20_CR12","DOI":"10.1109\/MSR.2010.5463279"},{"doi-asserted-by":"crossref","unstructured":"Moser, R., Pedrycz, W., Succi, G.: A comparative analysis of the efficiency of change metrics and static code attributes for defect prediction. In: Proceedings of the 30th International Conference on Software Engineering, ICSE 2008, pp. 181\u2013190. ACM, New York (2008)","key":"20_CR13","DOI":"10.1145\/1368088.1368114"},{"key":"20_CR14","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/s10111-018-0494-y","volume":"21","author":"M Chora\u015b","year":"2019","unstructured":"Chora\u015b, M., Kozik, R., Puchalski, D., Renk, R.: Increasing product owners\u2019 cognition and decision-making capabilities by data analysis approach. Cogn. Technol. Work 21, 191\u2013200 (2019)","journal-title":"Cogn. Technol. Work"},{"issue":"5","key":"20_CR15","doi-asserted-by":"publisher","first-page":"1927","DOI":"10.1007\/s12652-018-0784-5","volume":"10","author":"R Kozik","year":"2019","unstructured":"Kozik, R., Chora\u015b, M., Puchalski, D., Renk, R.: Q-rapids framework for advanced data analysis to improve rapid software development. J. Ambient Intell. Humaniz. Comput. 10(5), 1927\u20131936 (2019)","journal-title":"J. Ambient Intell. Humaniz. Comput."}],"container-title":["Lecture Notes in Computer Science","Computational Science \u2013 ICCS 2019"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-22744-9_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,7]],"date-time":"2023-06-07T04:03:22Z","timestamp":1686110602000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-22744-9_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030227432","9783030227449"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-22744-9_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"8 June 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Science","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Faro","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Portugal","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 June 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 June 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccs-computsci2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.iccs-meeting.org\/iccs2019\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}