{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,20]],"date-time":"2025-09-20T19:13:34Z","timestamp":1758395614973,"version":"3.40.3"},"publisher-location":"Cham","reference-count":71,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030538286"},{"type":"electronic","value":"9783030538293"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-53829-3_29","type":"book-chapter","created":{"date-parts":[[2020,7,28]],"date-time":"2020-07-28T14:05:10Z","timestamp":1595945110000},"page":"247-255","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["RETRACTED CHAPTER: Proposing to Use Artificial Neural Networks for NoSQL Attack Detection"],"prefix":"10.1007","author":[{"given":"Zakieh","family":"Alizadehsani","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"29_CR1","unstructured":"Xu, Y., Li, W., Wang, D.: Web security attack and defense Guide to infiltration testing. Publishing House of Electronics Industry (2018)"},{"issue":"5","key":"29_CR2","doi-asserted-by":"publisher","first-page":"429","DOI":"10.3233\/IDA-2002-6504","volume":"6","author":"N Japkowicz","year":"2002","unstructured":"Japkowicz, N., Stephen, S.: The class imbalance problem: a systematic study. Intell. Data Anal. 6(5), 429\u2013449 (2002)","journal-title":"Intell. Data Anal."},{"issue":"7","key":"29_CR3","doi-asserted-by":"publisher","first-page":"1561","DOI":"10.1016\/j.neucom.2006.10.146","volume":"70","author":"G Liu","year":"2007","unstructured":"Liu, G., Yi, Z., Yang, S.: A hierarchical intrusion detection model based on the pca neural networks. Neurocomputing 70(7), 1561\u20131568 (2007)","journal-title":"Neurocomputing"},{"issue":"5","key":"29_CR4","first-page":"1780","volume":"4","author":"A Sahasrabuddhe","year":"2017","unstructured":"Sahasrabuddhe, A., et al.: Survey on intrusion detection system using data mining techniques. Int. Res. J. Eng. Technol. 4(5), 1780\u20131784 (2017)","journal-title":"Int. Res. J. Eng. Technol."},{"key":"29_CR5","doi-asserted-by":"crossref","unstructured":"Dali, L., et al.: A survey of intrusion detection system. In: 2nd World Symposium on Web Applications and Networking (WSWAN), pp. 1\u20136. IEEE, Piscataway (2015)","DOI":"10.1109\/WSWAN.2015.7210351"},{"key":"29_CR6","doi-asserted-by":"crossref","unstructured":"Batista, L.O., de Silva, G.A., Ara\u00fajo, V.S., Ara\u00fajo, V.J.S., Rezende, T.S., Guimar\u00e3es, A.J., de Campos Souza, P.V.: Fuzzy neural networks to create an expert system for detecting attacks by SQL Injection. IJoFCS 1, 8\u201321 (2018)","DOI":"10.5769\/J201801001"},{"key":"29_CR7","doi-asserted-by":"crossref","unstructured":"Liu, H., Bo, L.: Machine learning and deep learning methods for intrusion detection systems: a survey. Appl. Sci. 9, 4396 (2019)","DOI":"10.3390\/app9204396"},{"key":"29_CR8","doi-asserted-by":"crossref","unstructured":"Othman, S.M., Ba-Alwi, F.M., Alsohybe, N.T., Al-Hashida, A.Y.: Intrusion detection model using machine learning algorithm on big data environment. J. Big Data 5, 34 (2018)","DOI":"10.1186\/s40537-018-0145-4"},{"key":"29_CR9","volume-title":"Sevcan Ayta\u00e7 Korkmaz","author":"F Karatas","year":"2018","unstructured":"Karatas, F.: Sevcan Ayta\u00e7 Korkmaz. Controlling Fraud by Using Machine Learning Libraries on Spark. Applied Mathematics, Electronics and Computers, IJAMEC (2018)"},{"key":"29_CR10","unstructured":"Owen, S., Anil, R., Dunning, T., Friedman, E.: Mahout in action: Manning Shelter Island (2011)"},{"key":"29_CR11","doi-asserted-by":"crossref","unstructured":"Zhang, J., Jou, Y.-T., Li, X.: Cross-Site Scripting (XSS) Detection Integrating Evidences in Multiple Stages, 08 Jan 2019","DOI":"10.24251\/HICSS.2019.860"},{"key":"29_CR12","doi-asserted-by":"crossref","unstructured":"Uwagbole, S.O., Buchanan, W.J., Lu, F.: Applied machine learning predictive analytics to SQL injection attack detection and prevention. IFIP\/IEEE IM (2017)","DOI":"10.23919\/INM.2017.7987433"},{"key":"29_CR13","unstructured":"https:\/\/github.com\/maurosoria\/dirsearch"},{"key":"29_CR14","unstructured":"http:\/\/www.dvwa.co.uk\/"},{"key":"29_CR15","unstructured":"https:\/\/www.researchgate.net\/publication\/264799665_Employing_Neural_Networks_for_the_Detection_of_SQL_Injection_Attack"},{"key":"29_CR16","doi-asserted-by":"crossref","unstructured":"Teixido, M., Palleja, T., Tresanchez, M., Font, D., Moreno, J., Fern\u00e1ndez, A., Palac\u00edn, J., Rebate, C.: Optimization of the virtual mouse HeadMouse to foster its classroom use by children with physical disabilities. ADCAIJ: Adv. Distrib. Comput. Artif. Intell. J. 2(4) (2013). ISSN 2255\u20132863","DOI":"10.14201\/ADCAIJ20131718"},{"key":"29_CR17","unstructured":"Li, T., Sun, S., Corchado, J.M., Siyau, M.F.: A particle dyeing approach for track continuity for the SMC-PHD filter. In: 17th International Conference on Information Fusion (FUSION), pp. 1\u20138. IEEE, July 2014"},{"key":"29_CR18","doi-asserted-by":"crossref","unstructured":"Costa, A., Heras, S., Palanca, J., Novais, P., Juli\u00e1n, V.: Persuasion and recommendation system applied to a cognitive assistant. ADCAIJ: Adv. Distrib. Comput. Artif. Intell. J. 5(2) (2016). ISSN 2255\u20132863","DOI":"10.14201\/ADCAIJ2016528999"},{"issue":"1","key":"29_CR19","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1016\/j.eswa.2006.04.011","volume":"33","author":"F Fdez-Riverola","year":"2007","unstructured":"Fdez-Riverola, F., Iglesias, E.L., D\u00edaz, F., M\u00e9ndez, J.R., Corchado, J.M.: Applying lazy learning algorithms to tackle concept drift in spam filtering. Expert Syst. Appl. 33(1), 36\u201348 (2007)","journal-title":"Expert Syst. Appl."},{"key":"29_CR20","doi-asserted-by":"crossref","unstructured":"Keyhanipour, A.H., Moshiri, B.: Designing a web spam classifier based on feature fusion in the layered multi-population genetic programming framework. ADCAIJ: Adv. Distrib. Comput. Artif. Intell. J. 2(3) (2013). ISSN 2255-2863","DOI":"10.14201\/ADCAIJ2014261527"},{"key":"29_CR21","doi-asserted-by":"crossref","unstructured":"Ameller, M.A., Gonz\u00e1lez, M.A.: Minutiae filtering using ridge-valley method. ADCAIJ: Adv. Distrib. Comput. Artif. Intell. J. 5(1) (2016). ISSN 2255-2863","DOI":"10.14201\/ADCAIJ201651110"},{"key":"29_CR22","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1016\/j.knosys.2017.09.010","volume":"137","author":"JA Morente-Molinera","year":"2017","unstructured":"Morente-Molinera, J.A., Kou, G., Gonz\u00e1lez-Crespo, R., Corchado, J.M., Herrera-Viedma, E.: Solving multi-criteria group decision making problems under environments with a high number of alternatives using fuzzy ontologies and multi-granular linguistic modelling methods. Knowl.-Based Syst. 137, 54\u201364 (2017)","journal-title":"Knowl.-Based Syst."},{"key":"29_CR23","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1016\/j.sigpro.2015.07.013","volume":"119","author":"T Li","year":"2016","unstructured":"Li, T., Sun, S., Boli\u0107, M., Corchado, J.M.: Algorithm design for parallel implementation of the SMC-PHD filter. Sig. Process. 119, 115\u2013127 (2016)","journal-title":"Sig. Process."},{"issue":"4","key":"29_CR24","doi-asserted-by":"publisher","first-page":"1189","DOI":"10.1016\/j.eswa.2013.08.003","volume":"41","author":"JAG Coria","year":"2014","unstructured":"Coria, J.A.G., Castellanos-Garz\u00f3n, J.A., Corchado, J.M.: Intelligent business processes composition based on multi-agent systems. Expert Syst. Appl. 41(4), 1189\u20131205 (2014)","journal-title":"Expert Syst. Appl."},{"key":"29_CR25","doi-asserted-by":"crossref","unstructured":"Adriana, F.-F., Cristina, C.-P., Leonardo, O.-A.: Energy-aware routing in multiple domains software-defined networks. ADCAIJ: Adv. Distrib. Comput. Artif. Intell. J. 5(3) (2016). ISSN 2255-2863","DOI":"10.14201\/ADCAIJ2016531319"},{"key":"29_CR26","doi-asserted-by":"crossref","unstructured":"Khayati, N., Wided, L.-C.: A distributed and collaborative intelligent system for medical diagnosis. ADCAIJ: Adv. Distrib. Comput. Artif. Intell. J. 2(2) (2013). ISSN 2255-2863","DOI":"10.14201\/ADCAIJ201325116"},{"key":"29_CR27","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1016\/j.ins.2011.05.002","volume":"222","author":"DI Tapia","year":"2013","unstructured":"Tapia, D.I., Fraile, J.A., Rodr\u00edguez, S., Alonso, R.S., Corchado, J.M.: Integrating hardware agents into an enhanced multi-agent architecture for Ambient Intelligence systems. Inf. Sci. 222, 47\u201365 (2013)","journal-title":"Inf. Sci."},{"key":"29_CR28","doi-asserted-by":"crossref","unstructured":"Corchado, J.M., Pav\u00f3n, J., Corchado, E.S., Castillo, L.F.: Development of CBR-BDI agents: a tourist guide application. In: European Conference on Case-based Reasoning, pp. 547\u2013559. Springer, Heidelberg (2004)","DOI":"10.1007\/978-3-540-28631-8_40"},{"key":"29_CR29","first-page":"756","volume":"270","author":"ACE Lima","year":"2015","unstructured":"Lima, A.C.E., de Castro, L.N., Corchado, J.M.: A polarity analysis framework for Twitter messages. Appl. Math. Comput. 270, 756\u2013767 (2015)","journal-title":"Appl. Math. Comput."},{"issue":"3","key":"29_CR30","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1023\/B:APIN.0000043558.52701.b1","volume":"21","author":"F Fdez-Riverola","year":"2004","unstructured":"Fdez-Riverola, F., Corchado, J.M.: FSfRT: forecasting system for red tides. Appl. Intell. 21(3), 251\u2013264 (2004)","journal-title":"Appl. Intell."},{"issue":"3","key":"29_CR31","doi-asserted-by":"publisher","first-page":"722","DOI":"10.1016\/j.dss.2006.11.012","volume":"43","author":"F Fdez-Riverola","year":"2007","unstructured":"Fdez-Riverola, F., Iglesias, E.L., D\u00edaz, F., M\u00e9ndez, J.R., Corchado, J.M.: SpamHunting: an instance-based reasoning system for spam labelling and filtering. Decis. Support Syst. 43(3), 722\u2013736 (2007)","journal-title":"Decis. Support Syst."},{"key":"29_CR32","doi-asserted-by":"publisher","first-page":"965","DOI":"10.1016\/j.future.2019.09.042","volume":"102","author":"R Casado-Vara","year":"2020","unstructured":"Casado-Vara, R., Martin-del Rey, A., Affes, S., Prieto, J., Corchado, J.M.: IoT network slicing on virtual layers of homogeneous data for improved algorithm operation in smart buildings. Future Gen. Comput. Syst. 102, 965\u2013977 (2020)","journal-title":"Future Gen. Comput. Syst."},{"issue":"10","key":"29_CR33","doi-asserted-by":"publisher","first-page":"2029","DOI":"10.1016\/j.ins.2009.12.032","volume":"180","author":"B Baruque","year":"2010","unstructured":"Baruque, B., Corchado, E., Mata, A., Corchado, J.M.: A forecasting solution to the oil spill problem based on a hybrid intelligent system. Inf. Sci. 180(10), 2029\u20132043 (2010)","journal-title":"Inf. Sci."},{"key":"29_CR34","doi-asserted-by":"crossref","unstructured":"Rodrigues, M., Gon\u00e7alves, S., Fdez-Riverola, F.: E-learning platforms and e-learning students: building the bridge to success. ADCAIJ: Adv. Distrib. Comput. Artif. Intell. J. 1(2) (2012). ISSN 2255-2863","DOI":"10.14201\/ADCAIJ2012122134"},{"key":"29_CR35","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1016\/j.procs.2018.07.193","volume":"134","author":"R Casado-Vara","year":"2018","unstructured":"Casado-Vara, R., Prieto, J., De la Prieta, F., Corchado, J.M.: How blockchain improves the supply chain: case study alimentary supply chain. Procedia Comput. Sci. 134, 393\u2013398 (2018)","journal-title":"Procedia Comput. Sci."},{"key":"29_CR36","doi-asserted-by":"crossref","unstructured":"Corchado, J.M., Aiken, J.: Hybrid artificial intelligence methods in oceanographic forecast models. IEEE Trans. Syst. Man Cybern. Part C (Appl. Rev.) 32(4), 307\u2013313 (2002)","DOI":"10.1109\/TSMCC.2002.806072"},{"issue":"3","key":"29_CR37","doi-asserted-by":"publisher","first-page":"865","DOI":"10.3390\/s18030865","volume":"18","author":"A Gonz\u00e1lez-Briones","year":"2018","unstructured":"Gonz\u00e1lez-Briones, A., Prieto, J., De La Prieta, F., Herrera-Viedma, E., Corchado, J.M.: Energy optimization using a case-based reasoning strategy. Sensors 18(3), 865 (2018)","journal-title":"Sensors"},{"issue":"3\u20134","key":"29_CR38","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1111\/j.1467-8640.2006.00287.x","volume":"22","author":"F D\u00edaz","year":"2006","unstructured":"D\u00edaz, F., Fdez-Riverola, F., Corchado, J.M.: gene-CBR: a case-based reasoning tool for cancer diagnosis using microarray data sets. Comput. Intell. 22(3\u20134), 254\u2013268 (2006)","journal-title":"Comput. Intell."},{"key":"29_CR39","doi-asserted-by":"crossref","unstructured":"Corchado, J.M., Corchado, E.S., Aiken, J., Fyfe, C., Fernandez, F., Gonzalez, M.: Maximum likelihood hebbian learning based retrieval method for CBR systems. In: International Conference on Case-Based Reasoning, pp. 107\u2013121. Springer, Berlin (2003)","DOI":"10.1007\/3-540-45006-8_11"},{"key":"29_CR40","doi-asserted-by":"crossref","unstructured":"Castro, J., Marti-Puig, P.: Real-time identification of respiratory movements through a microphone. ADCAIJ: Adv. Distrib. Comput. Artif. Intell. J. 3(3) (2014). ISSN 2255-2863","DOI":"10.14201\/ADCAIJ2012116475"},{"key":"29_CR41","doi-asserted-by":"crossref","unstructured":"Mokom, F., Kobti, Z.: Interventions via social influence for emergent suboptimal restraint use. ADCAIJ: Adv. Distrib. Comput. Artif. Intell. J. 2(2) (2013). ISSN 2255-2863","DOI":"10.14201\/ADCAIJ2013252535"},{"key":"29_CR42","doi-asserted-by":"publisher","first-page":"135472","DOI":"10.1109\/ACCESS.2019.2942809","volume":"7","author":"JH Guill\u00e9n","year":"2019","unstructured":"Guill\u00e9n, J.H., del Rey, A.M., Casado-Vara, R.: Security countermeasures of a SCIRAS model for advanced malware propagation. IEEE Access 7, 135472\u2013135478 (2019)","journal-title":"IEEE Access"},{"issue":"2","key":"29_CR43","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1080\/088395101750065723","volume":"15","author":"JM Corchado","year":"2001","unstructured":"Corchado, J.M., Lees, B.: A hybrid case-based model for forecasting. Appl. Artif. Intell. 15(2), 105\u2013127 (2001)","journal-title":"Appl. Artif. Intell."},{"key":"29_CR44","doi-asserted-by":"crossref","unstructured":"Fern\u00e1ndez-Riverola, F., Diaz, F., Corchado, J.M.: Reducing the memory size of a fuzzy case-based reasoning system applying rough set techniques. IEEE Trans. Syst. Man Cybern. Part C (Appl. Rev.) 37(1), 138\u2013146 (2006)","DOI":"10.1109\/TSMCC.2006.876058"},{"issue":"1","key":"29_CR45","doi-asserted-by":"publisher","first-page":"15","DOI":"10.4018\/jaci.2009010102","volume":"1","author":"DI Tapia","year":"2009","unstructured":"Tapia, D.I., Corchado, J.M.: An ambient intelligence based multi-agent system for alzheimer health care. Int. J. Ambient Comput. Intell. (IJACI) 1(1), 15\u201326 (2009)","journal-title":"Int. J. Ambient Comput. Intell. (IJACI)"},{"issue":"4","key":"29_CR46","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1016\/S0954-1810(99)00007-2","volume":"13","author":"JM Corchado","year":"1999","unstructured":"Corchado, J.M., Fyfe, C.: Unsupervised neural method for temperature forecasting. Artif. Intell. Eng. 13(4), 351\u2013357 (1999)","journal-title":"Artif. Intell. Eng."},{"key":"29_CR47","doi-asserted-by":"crossref","unstructured":"Mendez, J.R., Fdez-Riverola, F., Diaz, F., Iglesias, E.L., Corchado, J.M.: A comparative performance study of feature selection methods for the anti-spam filtering domain. In: Industrial Conference on Data Mining, pp. 106\u2013120. Springer, Berlin (2006)","DOI":"10.1007\/11790853_9"},{"key":"29_CR48","doi-asserted-by":"crossref","unstructured":"Koskimaki, H., Siirtola, P.: Accelerometer vs. electromyogram in activity recognition. ADCAIJ: Adv. Distrib. Comput. Artif. Intell. J. 5(3) (2016). ISSN 2255-2863","DOI":"10.14201\/ADCAIJ2016533142"},{"key":"29_CR49","doi-asserted-by":"crossref","unstructured":"Goyal, S., Goyal, G.K.: Machine learning ANN models for predicting sensory quality of roasted coffee flavoured sterilized drink. ADCAIJ: Adv. Distrib. Comput. Artif. Intell. J. 2(3) (2013). ISSN 2255-2863","DOI":"10.14201\/ADCAIJ201426913"},{"key":"29_CR50","doi-asserted-by":"crossref","unstructured":"Jim\u00e9nez-Rodr\u00edguez, A., Fernando Castillo, L., Gonz\u00e1lez, M.: Studying the mechanisms of the Somatic Marker Hypothesis in Spiking Neural Networks (SNN). ADCAIJ: Adv. Distrib. Comput. Artif. Intell. J. 1(2) (2012). ISSN 2255-2863","DOI":"10.14201\/ADCAIJ2012123542"},{"key":"29_CR51","doi-asserted-by":"crossref","unstructured":"F\u00e4hndrich, J., Ahrndt, S., Albayrak, S.: Formal language decomposition into semantic primes. ADCAIJ: Adv. Distrib. Comput. Artif. Intell. J. 3(1) (2014). ISSN 2255-2863","DOI":"10.14201\/ADCAIJ2014385673"},{"key":"29_CR52","doi-asserted-by":"crossref","unstructured":"Griol, D., Molina, J.M.: A proposal to manage multi-task dialogs in conversational interfaces. ADCAIJ: Adv. Distrib. Comput. Artif. Intell. J. 5(2) (2016). ISSN 2255-2863","DOI":"10.14201\/ADCAIJ2016525365"},{"key":"29_CR53","doi-asserted-by":"crossref","unstructured":"Santos, A., Nogueira, R., Louren\u00e7o, A.: Applying a text mining framework to the extraction of numerical parameters from scientific literature in the biotechnology domain. ADCAIJ: Adv. Distrib. Comput. Artif. Intell. J. 1(1) (2012). ISSN 2255-2863","DOI":"10.14201\/ADCAIJ20121118"},{"issue":"4","key":"29_CR54","doi-asserted-by":"publisher","first-page":"8239","DOI":"10.1016\/j.eswa.2008.10.003","volume":"36","author":"A Mata","year":"2009","unstructured":"Mata, A., Corchado, J.M.: Forecasting the probability of finding oil slicks using a CBR system. Expert Syst. Appl. 36(4), 8239\u20138246 (2009)","journal-title":"Expert Syst. Appl."},{"key":"29_CR55","doi-asserted-by":"crossref","unstructured":"Chamoso, P., Gonz\u00e1lez-Briones, A., Rodr\u00edguez, S., Corchado, J.M.: Tendencies of technologies and platforms in smart cities: a state-of-the-art review. Wirel. Commun. Mob. Comput. (2018)","DOI":"10.1155\/2018\/3086854"},{"issue":"3","key":"29_CR56","first-page":"173","volume":"10","author":"M Glez-Bedia","year":"2002","unstructured":"Glez-Bedia, M., Corchado, J.M., Corchado, E.S., Fyfe, C.: Analytical model for constructing deliberative agents. Eng. Intell. Syst. Electr. Eng. Commun. 10(3), 173\u2013185 (2002)","journal-title":"Eng. Intell. Syst. Electr. Eng. Commun."},{"key":"29_CR57","doi-asserted-by":"crossref","unstructured":"Beliz, N., Rangel, J.C., Hong, C.S.: Detecting DoS attack in web services by using an adaptive multiagent solution. ADCAIJ: Adv. Distrib. Comput. Artif. Intell. J. 1(2) (2012). ISSN 2255-2863","DOI":"10.14201\/ADCAIJ2012125763"},{"issue":"4","key":"29_CR58","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1002\/int.1024","volume":"16","author":"C Fyfe","year":"2001","unstructured":"Fyfe, C., Corchado, J.M.: Automating the construction of CBR systems using kernel methods. Int. J. Intell. Syst. 16(4), 571\u2013586 (2001)","journal-title":"Int. J. Intell. Syst."},{"key":"29_CR59","doi-asserted-by":"crossref","unstructured":"Choon, Y.W., Mohamad, M.S., Safaai Deris, R.M., Illias, C.K.C., Chai, L.E., Omatu, S., Corchado, J.M.: Differential bees flux balance analysis with OptKnock for in silico microbial strains optimization. PloS One 9(7) (2014)","DOI":"10.1371\/journal.pone.0102744"},{"issue":"9","key":"29_CR60","doi-asserted-by":"publisher","first-page":"816","DOI":"10.3390\/math7090816","volume":"7","author":"A Mart\u00edn del Rey","year":"2019","unstructured":"Mart\u00edn del Rey, A., Casado Vara, R., Hern\u00e1ndez Serrano, D.: Reversibility of symmetric linear cellular automata with radius r\u2009=\u20093. Mathematics 7(9), 816 (2019)","journal-title":"Mathematics"},{"key":"29_CR61","doi-asserted-by":"publisher","first-page":"11972","DOI":"10.1109\/ACCESS.2019.2892905","volume":"7","author":"R Casado-Vara","year":"2019","unstructured":"Casado-Vara, R., Novais, P., Gil, A.B., Prieto, J., Corchado, J.M.: Distributed continuous-time fault estimation control for multiple devices in IoT networks. IEEE Access 7, 11972\u201311984 (2019)","journal-title":"IEEE Access"},{"key":"29_CR62","doi-asserted-by":"crossref","unstructured":"Loukanova, R.: Relationships between specified and underspecified quantification by the theory of acyclic recursion. ADCAIJ: Adv. Distrib. Comput. Artif. Intell. J. 5(4) (2016). ISSN 2255-2863","DOI":"10.14201\/ADCAIJ2016541942"},{"key":"29_CR63","doi-asserted-by":"crossref","unstructured":"Matos, S., Ara\u00fajo, H., Lu\u00eds Oliveira, J.: Biomedical literature exploration through latent semantics. ADCAIJ: Adv. Distrib. Comput. Artif. Intell. J. 2(2) (2013). ISSN 2255-2863","DOI":"10.14201\/ADCAIJ2013256574"},{"key":"29_CR64","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1016\/j.inffus.2018.12.007","volume":"49","author":"R Casado-Vara","year":"2019","unstructured":"Casado-Vara, R., Chamoso, P., De la Prieta, F., Prieto, J., Corchado, J.M.: Non-linear adaptive closed-loop control system for improved efficiency in IoT-blockchain management. Inf. Fusion 49, 227\u2013239 (2019)","journal-title":"Inf. Fusion"},{"key":"29_CR65","doi-asserted-by":"crossref","unstructured":"Monino, J.L., Sedkaoui, S.: The algorithm of the snail: an example to grasp the window of opportunity to boost big data. ADCAIJ: Adv. Distrib. Comput. Artif. Intell. J. 5(3) (2016). ISSN 2255-2863","DOI":"10.14201\/ADCAIJ2016536371"},{"key":"29_CR66","doi-asserted-by":"crossref","unstructured":"Griol, D., Molina, J.M.: From VoiceXML to multimodal mobile Apps: development of practical conversational interfaces. ADCAIJ: Adv. Distrib. Comput. Artif. Intell. J. 5(3) (2016). ISSN 2255-2863","DOI":"10.14201\/ADCAIJ2016534353"},{"key":"29_CR67","doi-asserted-by":"crossref","unstructured":"Mouysset, S., Guivarch, R., Noailles, J., Ruiz, D.: Segmentation of cDNA microarray images using parallel spectral clustering. ADCAIJ: Adv. Distrib. Comput. Artif. Intell. J. 2(1) (2013). ISSN 2255-2863","DOI":"10.14201\/ADCAIJ20132418"},{"key":"29_CR68","doi-asserted-by":"crossref","unstructured":"Leong, Y.Y., Chong, C.K., Chai, L.E., Deris, S., Illias, R., Omatu, S., Mohamad, M.S.: Simulation of fermentation pathway using bees algorithm. ADCAIJ: Adv. Distrib. Comput. Artif. Intell. J. 1(2) (2012). ISSN 2255-2863","DOI":"10.14201\/ADCAIJ2012121319"},{"key":"29_CR69","doi-asserted-by":"crossref","unstructured":"Pinto, A., Costa, R.: Hash-chain-based authentication for IoT. ADCAIJ: Adv. Distrib. Comput. Artif. Intell. J. 5(4) (2016). ISSN 2255-2863","DOI":"10.14201\/ADCAIJ2016544357"},{"key":"29_CR70","doi-asserted-by":"crossref","unstructured":"Efthymiou, V., Koutraki, M., Antoniou, G.: Real-time activity recognition and assistance in smart classrooms. ADCAIJ: Adv. Distrib. Comput. Artif. Intell. J. 1(1) (2012). ISSN 2255-2863","DOI":"10.14201\/ADCAIJ201211922"},{"key":"29_CR71","doi-asserted-by":"crossref","unstructured":"Garc\u00eda-Valls, M.: Prototyping low-cost and flexible vehicle diagnostic systems. ADCAIJ: Adv. Distrib. Comput. Artif. Intell. J. 5(4) (2016). ISSN 2255-2863","DOI":"10.14201\/ADCAIJ20165493103"}],"container-title":["Advances in Intelligent Systems and Computing","Distributed Computing and Artificial Intelligence, Special Sessions, 17th International Conference"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-53829-3_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,20]],"date-time":"2024-10-20T15:03:33Z","timestamp":1729436613000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-53829-3_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030538286","9783030538293"],"references-count":71,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-53829-3_29","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"29 July 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DCAI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Distributed Computing and Artificial Intelligence","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"L\u00b4Aquila","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 June 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 June 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dcai2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.dcai-conference.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}