{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,25]],"date-time":"2026-04-25T14:56:33Z","timestamp":1777128993589,"version":"3.51.4"},"publisher-location":"Cham","reference-count":42,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030956295","type":"print"},{"value":"9783030956301","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-95630-1_4","type":"book-chapter","created":{"date-parts":[[2022,1,22]],"date-time":"2022-01-22T17:02:23Z","timestamp":1642870943000},"page":"50-62","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":45,"title":["A Deep Learning-Based Intrusion Detection Technique for a Secured IoMT System"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1020-4432","authenticated-orcid":false,"given":"Joseph Bamidele","family":"Awotunde","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3049-1184","authenticated-orcid":false,"given":"Kazeem Moses","family":"Abiodun","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2728-0116","authenticated-orcid":false,"given":"Emmanuel Abidemi","family":"Adeniyi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7058-8618","authenticated-orcid":false,"given":"Sakinat Oluwabukonla","family":"Folorunso","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1468-8884","authenticated-orcid":false,"given":"Rasheed Gbenga","family":"Jimoh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,23]]},"reference":[{"key":"4_CR1","series-title":"Intelligent Systems Reference Library","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-981-16-2972-3_1","volume-title":"Hybrid Artificial Intelligence and IoT in Healthcare","author":"J Awotunde","year":"2021","unstructured":"Awotunde, J., Bhoi, A., Barsocchi, P.: Hybrid Cloud\/Fog environment for healthcare: an exploratory study, opportunities, challenges, and future prospects. In: KumarBhoi, A., Mallick, P.K., Narayana Mohanty, M., deAlbuquerque, V.H.C. (eds.) Hybrid Artificial Intelligence and IoT in Healthcare. ISRL, vol. 209, pp. 1\u201320. Springer, Singapore (2021). https:\/\/doi.org\/10.1007\/978-981-16-2972-3_1"},{"key":"4_CR2","first-page":"201","volume":"209","author":"JB Awotunde","year":"2021","unstructured":"Awotunde, J.B., Folorunso, S.O., Bhoi, A.K., Adebayo, P.O., Ijaz, M.F.: Disease diagnosis system for IoT-based wearable body sensors with machine learning algorithm. Intell. Syst. Ref. Libr. 209, 201\u2013222 (2021)","journal-title":"Intell. Syst. Ref. Libr."},{"issue":"21-23","key":"4_CR3","doi-asserted-by":"publisher","first-page":"31705","DOI":"10.1007\/s11042-021-11125-2","volume":"80","author":"RO Ogundokun","year":"2021","unstructured":"Ogundokun, R.O., Awotunde, J.B., Adeniyi, E.A., Ayo, F.E.: Crypto-Stegno based model for securing medical information on IOMT platform. Multimedia Tools Appl. 80(21\u201323), 31705\u201331727 (2021). https:\/\/doi.org\/10.1007\/s11042-021-11125-2","journal-title":"Multimedia Tools Appl."},{"key":"4_CR4","doi-asserted-by":"publisher","first-page":"165130","DOI":"10.1109\/ACCESS.2020.3022862","volume":"8","author":"A Alsaedi","year":"2020","unstructured":"Alsaedi, A., Moustafa, N., Tari, Z., Mahmood, A., Anwar, A.: TON_IoT telemetry dataset: a new generation dataset of IoT and IIoT for data-driven intrusion detection systems. IEEE Access 8, 165130\u2013165150 (2020)","journal-title":"IEEE Access"},{"key":"4_CR5","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1007\/978-3-030-72236-4_16","volume":"972","author":"RO Ogundokun","year":"2021","unstructured":"Ogundokun, R.O., Awotunde, J.B., Misra, S., Abikoye, O.C., Folarin, O.: Application of machine learning for ransomware detection in IoT devices. Stud. Comput. Intell. 972, 393\u2013420 (2021)","journal-title":"Stud. Comput. Intell."},{"issue":"2","key":"4_CR6","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1504\/IJESDF.2020.106318","volume":"12","author":"NA Azeez","year":"2020","unstructured":"Azeez, N.A., Salaudeen, B.B., Misra, S., Dama\u0161evi\u010dius, R., Maskeli\u016bnas, R.: Identifying phishing attacks in communication networks using URL consistency features. Int. J. Electron. Secur. Digit. Forensics 12(2), 200\u2013213 (2020)","journal-title":"Int. J. Electron. Secur. Digit. Forensics"},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"Abikoye, O.C.,\u00a0et al.: Application of internet of thing and cyber physical system in Industry 4.0 smart manufacturing. In: Advances in Science, Technology and Innovation, pp. 203\u2013217 (2021)","DOI":"10.1007\/978-3-030-66222-6_14"},{"issue":"6","key":"4_CR8","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1080\/19393555.2020.1767240","volume":"29","author":"FE Ayo","year":"2020","unstructured":"Ayo, F.E., Folorunso, S.O., Abayomi-Alli, A.A., Adekunle, A.O., Awotunde, J.B.: Network intrusion detection based on deep learning model optimized with rule-based hybrid feature selection. Inf. Secur. J. Global Persp. 29(6), 267\u2013283 (2020)","journal-title":"Inf. Secur. J. Global Persp."},{"key":"4_CR9","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"685","DOI":"10.1007\/978-981-32-9949-8_48","volume-title":"Data management, analytics and innovation","author":"N Azeez","year":"2020","unstructured":"Azeez, N., Bada, T., Misra, S., Adewumi, A., Van der Vyver, C., Ahuja, R.: Intrusion detection and prevention systems: an updated review. In: Sharma, N., Chakrabarti, A., Balas, V.E. (eds.) Data management, analytics and innovation. AISC, vol. 1042, pp. 685\u2013696. Springer, Singapore (2020). https:\/\/doi.org\/10.1007\/978-981-32-9949-8_48"},{"key":"4_CR10","doi-asserted-by":"crossref","unstructured":"Ogundokun, R.O., Awotunde, J.B., Sadiku, P., Adeniyi, E.A., Abiodun, M., Dauda, O.I.: An enhanced intrusion detection system using particle swarm optimization feature extraction technique.\u00a0Procedia Comput.\u00a0Sci.\u00a0193, 504\u2013512\u00a0(2021)","DOI":"10.1016\/j.procs.2021.10.052"},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"Marzano, A., et al.: The evolution of bashlite and mirai iot botnets. In:\u00a02018 IEEE Symposium on Computers and Communications (ISCC),\u00a0pp. 00813\u201300818. IEEE, June 2018","DOI":"10.1109\/ISCC.2018.8538636"},{"issue":"3","key":"4_CR12","doi-asserted-by":"publisher","first-page":"2671","DOI":"10.1109\/COMST.2019.2896380","volume":"21","author":"N Chaabouni","year":"2019","unstructured":"Chaabouni, N., Mosbah, M., Zemmari, A., Sauvignac, C., Faruki, P.: Network intrusion detection for IoT security based on learning techniques. IEEE Commun. Surv. Tutor. 21(3), 2671\u20132701 (2019)","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"4","key":"4_CR13","doi-asserted-by":"publisher","first-page":"2923","DOI":"10.1109\/COMST.2018.2844341","volume":"20","author":"M Mohammadi","year":"2018","unstructured":"Mohammadi, M., Al-Fuqaha, A., Sorour, S., Guizani, M.: Deep learning for IoT big data and streaming analytics: a survey. IEEE Commun. Surv. Tutor 20(4), 2923\u20132960 (2018)","journal-title":"IEEE Commun. Surv. Tutor"},{"issue":"2","key":"4_CR14","doi-asserted-by":"publisher","first-page":"1153","DOI":"10.1109\/COMST.2015.2494502","volume":"18","author":"AL Buczak","year":"2015","unstructured":"Buczak, A.L., Guven, E.: A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Commun. Surv. Tutor. 18(2), 1153\u20131176 (2015)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"4_CR15","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.jnca.2018.12.006","volume":"128","author":"N Moustafa","year":"2019","unstructured":"Moustafa, N., Hu, J., Slay, J.: A holistic review of network anomaly detection systems: a comprehensive survey. J. Netw. Comput. Appl. 128, 33\u201355 (2019)","journal-title":"J. Netw. Comput. Appl."},{"key":"4_CR16","doi-asserted-by":"publisher","first-page":"406","DOI":"10.1016\/j.comcom.2020.02.008","volume":"153","author":"R Gupta","year":"2020","unstructured":"Gupta, R., Tanwar, S., Tyagi, S., Kumar, N.: Machine learning models for secure data analytics: a taxonomy and threat model. Comput. Commun. 153, 406\u2013440 (2020)","journal-title":"Comput. Commun."},{"issue":"1\u20133","key":"4_CR17","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1080\/19393555.2015.1125974","volume":"25","author":"N Moustafa","year":"2016","unstructured":"Moustafa, N., Slay, J.: The evaluation of Network Anomaly Detection Systems: statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set. Inf. Secur. J. Global Persp. 25(1\u20133), 18\u201331 (2016)","journal-title":"Inf. Secur. J. Global Persp."},{"issue":"10","key":"4_CR18","doi-asserted-by":"publisher","first-page":"1040","DOI":"10.1002\/sec.1398","volume":"9","author":"W Shang","year":"2016","unstructured":"Shang, W., Zeng, P., Wan, M., Li, L., An, P.: Intrusion detection algorithm based on OCSVM in the industrial control system. Secur. Commun. Netw. 9(10), 1040\u20131049 (2016)","journal-title":"Secur. Commun. Netw."},{"key":"4_CR19","doi-asserted-by":"crossref","unstructured":"Maglaras, L.A., Jiang, J.: Intrusion detection in SCADA systems using machine learning techniques. In:\u00a02014 Science and Information Conference,\u00a0pp. 626\u2013631. IEEE, August 2014","DOI":"10.1109\/SAI.2014.6918252"},{"key":"4_CR20","doi-asserted-by":"crossref","unstructured":"Maglaras, L.A., Jiang, J.: OCSVM model combined with k-means recursive clustering for intrusion detection in scada systems. In:\u00a010th International Conference on Heterogeneous Networking for Quality, Reliability, Security, and Robustness,\u00a0pp. 133\u2013134. IEEE, August 2014","DOI":"10.1109\/QSHINE.2014.6928673"},{"key":"4_CR21","doi-asserted-by":"crossref","unstructured":"Linda, O., Vollmer, T., Manic, M.: Neural network-based intrusion detection system for critical infrastructures. In:\u00a02009 International Joint Conference on Neural Networks,\u00a0pp. 1827\u20131834. IEEE, June 2009","DOI":"10.1109\/IJCNN.2009.5178592"},{"key":"4_CR22","doi-asserted-by":"crossref","unstructured":"Hodo, E., et al.: Threat analysis of IoT networks using artificial neural network intrusion detection system. In:\u00a02016 International Symposium on Networks, Computers and Communications (ISNCC),\u00a0pp. 1\u20136. IEEE, May 2016","DOI":"10.1109\/ISNCC.2016.7746067"},{"key":"4_CR23","doi-asserted-by":"crossref","unstructured":"Chen, R., Liu, C.M., Chen, C.: An artificial immune-based distributed intrusion detection model for the internet of things. In:\u00a0Advanced Materials Research,\u00a0vol. 366, pp. 165\u2013168. Trans Tech Publications Ltd. (2012)","DOI":"10.4028\/www.scientific.net\/AMR.366.165"},{"key":"4_CR24","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1007\/978-3-319-90775-8_28","volume-title":"Mobile Networks and Management","author":"T Marsden","year":"2018","unstructured":"Marsden, T., Moustafa, N., Sitnikova, E., Creech, G.: Probability risk identification based intrusion detection system for SCADA systems. In: Hu, J., Khalil, I., Tari, Z., Wen, S. (eds.) MONAMI 2017. LNICSSITE, vol. 235, pp. 353\u2013363. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-90775-8_28"},{"key":"4_CR25","doi-asserted-by":"crossref","unstructured":"Kolias, C., Kambourakis, G., Stavrou, A., Gritzalis, S.: Intrusion detection in 802.11 networks: empirical evaluation of threats and a public dataset.\u00a0IEEE Commun. Surv. Tutor. 18(1), 184\u2013208 (2015)","DOI":"10.1109\/COMST.2015.2402161"},{"key":"4_CR26","doi-asserted-by":"publisher","first-page":"779","DOI":"10.1016\/j.future.2019.05.041","volume":"100","author":"N Koroniotis","year":"2019","unstructured":"Koroniotis, N., Moustafa, N., Sitnikova, E., Turnbull, B.: Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: BoT-IoT dataset. Future Gener. Comput. Syst. 100, 779\u2013796 (2019)","journal-title":"Future Gener. Comput. Syst."},{"key":"4_CR27","doi-asserted-by":"crossref","unstructured":"Hamza, A., Gharakheili, H.H., Benson, T.A., Sivaraman, V.: Detecting volumetric attacks on lot devices via sdn-based monitoring of mud activity. In:\u00a0Proceedings of the 2019 ACM Symposium on SDN Research,\u00a0pp. 36\u201348, April 2019","DOI":"10.1145\/3314148.3314352"},{"key":"4_CR28","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1016\/j.compeleceng.2019.03.015","volume":"76","author":"H Naeem","year":"2019","unstructured":"Naeem, H., Guo, B., Naeem, M.R., Ullah, F., Aldabbas, H., Javed, M.S.: Identification of malicious code variants based on image visualization. Comput. Electr. Eng. 76, 225\u2013237 (2019)","journal-title":"Comput. Electr. Eng."},{"issue":"7","key":"4_CR29","first-page":"3756","volume":"13","author":"H Naeem","year":"2019","unstructured":"Naeem, H., Guo, B., Ullah, F., Naeem, M.R.: A cross-platform malware variant classification based on image representation. KSII Trans. Internet Inf. Syst. 13(7), 3756\u20133777 (2019)","journal-title":"KSII Trans. Internet Inf. Syst."},{"key":"4_CR30","doi-asserted-by":"crossref","unstructured":"Kalash, M., et al.: Malware classification with deep convolutional neural networks. In:\u00a02018 9th IFIP International Conference on New Technologies, Mobility, and Security (NTMS),\u00a0pp. 1\u20135. IEEE, February 2018","DOI":"10.1109\/NTMS.2018.8328749"},{"key":"4_CR31","doi-asserted-by":"crossref","unstructured":"Kumar, R., Xiaosong, Z., Khan, R.U., Ahad, I., Kumar, J.: Malicious code detection based on image processing using deep learning. In:\u00a0Proceedings of the 2018 International Conference on Computing and Artificial Intelligence,\u00a0pp. 81\u201385, March 2018","DOI":"10.1145\/3194452.3194459"},{"issue":"11","key":"4_CR32","doi-asserted-by":"publisher","first-page":"1341","DOI":"10.3390\/electronics10111341","volume":"10","author":"A Alharbi","year":"2021","unstructured":"Alharbi, A., Alosaimi, W., Alyami, H., Rauf, H.T., Dama\u0161evi\u010dius, R.: Botnet attack detection using local global best bat algorithm for industrial internet of things. Electronics 10(11), 1341 (2021)","journal-title":"Electronics"},{"key":"4_CR33","doi-asserted-by":"crossref","unstructured":"Azeez, N.A., Odufuwa, O.E., Misra, S., Oluranti, J., Dama\u0161evi\u010dius, R.: Windows PE malware detection using ensemble learning. In:\u00a0Informatics,\u00a0vol. 8, no. 1, p. 10. Multidisciplinary Digital Publishing Institute, March 2021","DOI":"10.3390\/informatics8010010"},{"issue":"15","key":"4_CR34","doi-asserted-by":"publisher","first-page":"1854","DOI":"10.3390\/electronics10151854","volume":"10","author":"J Toldinas","year":"2021","unstructured":"Toldinas, J., Ven\u010dkauskas, A., Dama\u0161evi\u010dius, R., Grigali\u016bnas, \u0160, Morkevi\u010dius, N., Baranauskas, E.: A novel approach for network intrusion detection using multistage deep learning image recognition. Electronics 10(15), 1854 (2021)","journal-title":"Electronics"},{"key":"4_CR35","doi-asserted-by":"crossref","unstructured":"Tang, T.A., Mhamdi, L., McLernon, D., Zaidi, S.A.R., Ghogho, M.: Deep learning approach for network intrusion detection in software-defined networking. In:\u00a02016 International Conference on Wireless Networks and Mobile Communications (WINCOM),\u00a0pp. 258\u2013263. IEEE, October 2016","DOI":"10.1109\/WINCOM.2016.7777224"},{"issue":"1","key":"4_CR36","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1016\/S0169-7439(97)00061-0","volume":"39","author":"D Svozil","year":"1997","unstructured":"Svozil, D., Kvasnicka, V., Pospichal, J.: Introduction to multi-layer feed-forward neural networks. Chemometr. Intell. Lab. Syst. 39(1), 43\u201362 (1997)","journal-title":"Chemometr. Intell. Lab. Syst."},{"key":"4_CR37","series-title":"Lecture Notes on Data Engineering and Communications Technologies","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1007\/978-981-16-3961-6_27","volume-title":"Cyber Security and Digital Forensics","author":"P Ezra","year":"2022","unstructured":"Ezra, P., Misra, S., Agrawal, A., Oluranti, J., Maskeliunas, R., Damasevicius, R.: Secured communication using virtual private network (VPN). In: Khanna, K., Estrela, V.V., Rodrigues, J.J.P.C. (eds.) Cyber Security and Digital Forensics. LNDECT, vol. 73, pp. 309\u2013319. Springer, Singapore (2022). https:\/\/doi.org\/10.1007\/978-981-16-3961-6_27"},{"key":"4_CR38","series-title":"Lecture Notes in Networks and Systems","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1007\/978-3-030-86223-7_2","volume-title":"Information Systems and Management Science","author":"N Gana","year":"2022","unstructured":"Gana, N., Abdulhamid, S., Misra, S., Garg, L., Ayeni, F., Azeta, A.: Optimization of support vector machine for classification of spyware using symbiotic organism search for features selection. In: Garg, L., et al. (eds.) ISMS 2020. LNNS, vol. 303, pp. 11\u201321. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-030-86223-7_2"},{"issue":"2","key":"4_CR39","doi-asserted-by":"publisher","first-page":"20","DOI":"10.3390\/info7020020","volume":"7","author":"X Tao","year":"2016","unstructured":"Tao, X., Kong, D., Wei, Y., Wang, Y.: A big network traffic data fusion approach based on Fisher and deep auto-encoder. Information 7(2), 20 (2016)","journal-title":"Information"},{"issue":"2","key":"4_CR40","first-page":"865","volume":"16","author":"Y Lv","year":"2014","unstructured":"Lv, Y., Duan, Y., Kang, W., Li, Z., Wang, F.Y.: Traffic flow prediction with big data: a deep learning approach. IEEE Trans. Intell. Transp. Syst. 16(2), 865\u2013873 (2014)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"4_CR41","unstructured":"Hardy, W., Chen, L., Hou, S., Ye, Y., Li, X.: Dl4MD: a deep learning framework for intelligent malware detection. In:\u00a0Proceedings of the International Conference on Data Science (ICDATA),\u00a0p. 61. The Steering Committee of the World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp) (2016)"},{"key":"4_CR42","doi-asserted-by":"crossref","unstructured":"Azeez, N., Misra, S., Margaret, I.A., Fernandez-Sanz, L.: Adopting automated whitelist approach for detecting phishing attacks.\u00a0Comput. Secur. 108, 102328 (2021)","DOI":"10.1016\/j.cose.2021.102328"}],"container-title":["Communications in Computer and Information Science","Informatics and Intelligent Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-95630-1_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,4]],"date-time":"2022-04-04T18:04:09Z","timestamp":1649095449000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-95630-1_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030956295","9783030956301"],"references-count":42,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-95630-1_4","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"23 January 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICIIA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Informatics and Intelligent Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ota","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nigeria","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 November 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 November 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iciia2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.iciaconference.com\/home","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"108","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"22","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}