{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T10:03:39Z","timestamp":1764842619742,"version":"3.40.3"},"publisher-location":"Cham","reference-count":50,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031106835"},{"type":"electronic","value":"9783031106842"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-10684-2_9","type":"book-chapter","created":{"date-parts":[[2022,7,12]],"date-time":"2022-07-12T07:05:06Z","timestamp":1657609506000},"page":"143-161","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Local Intrinsic Dimensionality of\u00a0IoT Networks for\u00a0Unsupervised Intrusion Detection"],"prefix":"10.1007","author":[{"given":"Matt","family":"Gorbett","sequence":"first","affiliation":[]},{"given":"Hossein","family":"Shirazi","sequence":"additional","affiliation":[]},{"given":"Indrakshi","family":"Ray","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,7,13]]},"reference":[{"key":"9_CR1","doi-asserted-by":"publisher","unstructured":"Ahmad, R., Alsmadi, I.: Machine learning approaches to IoT security: a systematic literature review. Internet Things. 14, 100365 (2021). https:\/\/doi.org\/10.1016\/j.iot.2021.100365, https:\/\/www.sciencedirect.com\/science\/article\/pii\/S2542660521000093","DOI":"10.1016\/j.iot.2021.100365"},{"key":"9_CR2","doi-asserted-by":"publisher","unstructured":"Alaba, F.A., Othman, M., Hashem, I.A.T., Alotaibi, F.: Internet of Things security: a survey. J. Netw. Comput. App. 88, 10\u201328 (2017). https:\/\/doi.org\/10.1016\/j.jnca.2017.04.002, https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1084804517301455","DOI":"10.1016\/j.jnca.2017.04.002"},{"key":"9_CR3","doi-asserted-by":"publisher","first-page":"165130","DOI":"10.1109\/ACCESS.2020.3022862","volume":"8","author":"A Alsaedi","year":"2020","unstructured":"Alsaedi, A., Moustafa, N., Tari, Z., Mahmood, A., Anwar, A.: TON_IoT telemetry dataset: a new generation dataset of IoT and IIoT for data-driven intrusion detection systems. IEEE Access 8, 165130\u2013165150 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.3022862","journal-title":"IEEE Access"},{"key":"9_CR4","doi-asserted-by":"publisher","unstructured":"Amsaleg, L., et al.: Estimating local intrinsic dimensionality. In: Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 29\u201338. KDD 2015, Association for Computing Machinery (2015). https:\/\/doi.org\/10.1145\/2783258.2783405","DOI":"10.1145\/2783258.2783405"},{"key":"9_CR5","doi-asserted-by":"publisher","unstructured":"Andrea, I., Chrysostomou, C., Hadjichristofi, G.: Internet of things: security vulnerabilities and challenges. In: IEEE Symposium on Computers and Communication (ISCC), pp. 180\u2013187 (2015). https:\/\/doi.org\/10.1109\/ISCC.2015.7405513","DOI":"10.1109\/ISCC.2015.7405513"},{"key":"9_CR6","unstructured":"Ansuini, A., Laio, A., Macke, J.H., Zoccolan, D.: Intrinsic dimension of data representations in deep neural networks. arXiv:1905.12784 [cs, stat] (2019)"},{"issue":"1","key":"9_CR7","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1109\/TSUSC.2018.2809665","volume":"4","author":"A Azmoodeh","year":"2019","unstructured":"Azmoodeh, A., Dehghantanha, A., Choo, K.K.R.: Robust malware detection for internet of (battlefield) things devices using deep eigenspace learning. IEEE Trans. Sustain. Comput. 4(1), 88\u201395 (2019). https:\/\/doi.org\/10.1109\/TSUSC.2018.2809665","journal-title":"IEEE Trans. Sustain. Comput."},{"key":"9_CR8","doi-asserted-by":"publisher","unstructured":"Bernal, D.: 3 - Analytical techniques for damage detection and localization for assessing and monitoring civil infrastructures. In: Wang, M.L., Lynch, J.P., Sohn, H. (eds.) Sensor Technologies for Civil Infrastructures, vol. 56, pp. 67\u201392. Woodhead Publishing (2014). https:\/\/doi.org\/10.1533\/9781782422433.1.67, https:\/\/www.sciencedirect.com\/science\/article\/pii\/B978178242242650003X","DOI":"10.1533\/9781782422433.1.67"},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"Bezawada, B., Bachani, M., Peterson, J., Shirazi, H., Ray, I., Ray, I.: IoTSense: behavioral fingerprinting of IoT devices. arXiv:1804.03852 [cs] (2018)","DOI":"10.1145\/3266444.3266452"},{"key":"9_CR10","doi-asserted-by":"publisher","unstructured":"Bhatia, S., Jain, A., Li, P., Kumar, R., Hooi, B.: MSTREAM: fast anomaly detection in multi-aspect streams.In: Proceedings of the Web Conference 2021, pp. 3371\u20133382 (2021). https:\/\/doi.org\/10.1145\/3442381.3450023, http:\/\/arxiv.org\/abs\/2009.08451","DOI":"10.1145\/3442381.3450023"},{"key":"9_CR11","doi-asserted-by":"publisher","unstructured":"Choudhary, D.: Security challenges and countermeasures for the heterogeneity of IoT applications. J. Autonom. Intell. 1, 16 (2019). https:\/\/doi.org\/10.32629\/jai.v1i2.25, http:\/\/en.front-sci.com\/index.php\/JAI\/article\/view\/25","DOI":"10.32629\/jai.v1i2.25"},{"key":"9_CR12","doi-asserted-by":"publisher","unstructured":"Claise, B.: Cisco Systems NetFlow Services Export Version 9. Request for Comments RFC 3954, Internet Engineering Task Force (2004). https:\/\/doi.org\/10.17487\/RFC3954, https:\/\/datatracker.ietf.org\/doc\/rfc3954","DOI":"10.17487\/RFC3954"},{"key":"9_CR13","doi-asserted-by":"publisher","unstructured":"Conti, M., Dehghantanha, A., Franke, K., Watson, S.: Internet of Things security and forensics: challenges and opportunities. Future Gener. Comput. Syst. 78, 544\u2013546 (2018). https:\/\/doi.org\/10.1016\/j.future.2017.07.060, http:\/\/arxiv.org\/abs\/1807.10438","DOI":"10.1016\/j.future.2017.07.060"},{"key":"9_CR14","doi-asserted-by":"publisher","unstructured":"Elrawy, M.F., Awad, A.I., Hamed, H.F.A.: Intrusion detection systems for IoT-based smart environments: a survey. J. Cloud Comput. 7(1), 21 (2018). https:\/\/doi.org\/10.1186\/s13677-018-0123-6","DOI":"10.1186\/s13677-018-0123-6"},{"key":"9_CR15","unstructured":"Garcia, S., Parmisano, A., Erquiaga, M.J.: IoT-23 dataset: a labeled dataset of malware and benign IoT traffic. (version 1.0.0) [data set] zenodo. https:\/\/www.stratosphereips.org\/datasets-iot23"},{"key":"9_CR16","unstructured":"Gorbett, M., Blanchard, N.: Utilizing network properties to detect erroneous inputs. arXiv:2002.12520 [cs] (2020)"},{"key":"9_CR17","doi-asserted-by":"crossref","unstructured":"Gorbett, M., Shirazi, H., Ray, I.: The intrinsic dimensionality of IoT networks. In: Proceedings of the 2022 ACM Symposium on Access Control Models and Technologies (SACMAT) (2022)","DOI":"10.1145\/3532105.3535038"},{"key":"9_CR18","doi-asserted-by":"publisher","unstructured":"HaddadPajouh, H., Dehghantanha, A., Khayami, R., Choo, K.K.R.: A deep Recurrent Neural Network based approach for Internet of Things malware threat hunting. Future Gener. Comput. Syst. 85, 1-9 (2018). https:\/\/doi.org\/10.1016\/j.future.2018.03.007, https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0167739X1732486X","DOI":"10.1016\/j.future.2018.03.007"},{"key":"9_CR19","doi-asserted-by":"publisher","unstructured":"Haefner, K., Ray, I.: ComplexIoT: Behavior-based trust for IoT networks. In: 2019 First IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA), pp. 56\u201365 (2019). https:\/\/doi.org\/10.1109\/TPS-ISA48467.2019.00016","DOI":"10.1109\/TPS-ISA48467.2019.00016"},{"key":"9_CR20","unstructured":"Hendrycks, D., Gimpel, K.: A Baseline for detecting misclassified and out-of-distribution examples in neural networks. arXiv:1610.02136 [cs] (2018)"},{"key":"9_CR21","doi-asserted-by":"publisher","unstructured":"Hinton, G.E., Salakhutdinov, R.R.: Reducing the dimensionality of data with neural networks. Science 313(5786), 504\u2013507 (Jul 2006). https:\/\/doi.org\/10.1126\/science.1127647, https:\/\/www.science.org\/doi\/10.1126\/science.1127647","DOI":"10.1126\/science.1127647"},{"key":"9_CR22","doi-asserted-by":"publisher","unstructured":"Kasongo, S.M., Sun, Y.: Performance analysis of intrusion detection systems using a feature selection method on the UNSW-NB15 dataset. J. Big Data 7, 105 (2020). https:\/\/doi.org\/10.1186\/s40537-020-00379-6","DOI":"10.1186\/s40537-020-00379-6"},{"key":"9_CR23","doi-asserted-by":"publisher","unstructured":"Kollolu, R.: A Review on wide variety and heterogeneity of IoT platforms. SSRN Scholarly Paper ID 3912454, Social Science Research Network, Rochester, NY (2020). https:\/\/doi.org\/10.2139\/ssrn.3912454, https:\/\/papers.ssrn.com\/abstract=3912454","DOI":"10.2139\/ssrn.3912454"},{"key":"9_CR24","doi-asserted-by":"publisher","unstructured":"Koroniotis, N., Moustafa, N., Sitnikova, E., Slay, J.: towards developing network forensic mechanism for botnet activities in the IoT based on machine learning techniques. In: Mobile Networks and Management. pp. 30\u201344. Springer International Publishing, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-90775-83","DOI":"10.1007\/978-3-319-90775-83"},{"key":"9_CR25","doi-asserted-by":"publisher","unstructured":"Koroniotis, N., Moustafa, N., Sitnikova, E., Turnbull, B.: Towards the development of realistic botnet dataset in the Internet of Things for network forensic analytics: Bot-IoT dataset. Future Gener. Comput. Syst. 100, 779\u2013796 (2019). https:\/\/doi.org\/10.1016\/j.future.2019.05.041, https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0167739X18327687","DOI":"10.1016\/j.future.2019.05.041"},{"key":"9_CR26","doi-asserted-by":"publisher","unstructured":"Kozik, R., Pawlicki, M., Chora\u015b, M.: A new method of hybrid time window embedding with transformer-based traffic data classification in IoT-networked environment. Pattern Anal. Appl. 24(4), 1441\u20131449 (2021). https:\/\/doi.org\/10.1007\/s10044-021-00980-2, https:\/\/www.mendeley.com\/catalogue\/92cc3e51-9dc9-3c8e-9e05-aeea7382b93c\/","DOI":"10.1007\/s10044-021-00980-2"},{"key":"9_CR27","unstructured":"Levina, E., Bickel, P.J.: Maximum Likelihood estimation of intrinsic dimension. In: Proceedings of the 17th International Conference on Neural Information Processing Systems, pp. 777\u2013784. NIPS 2004, MIT Press, Cambridge, MA, USA (2004)"},{"key":"9_CR28","unstructured":"Ma, X.,et al.: Characterizing Adversarial Subspaces Using Local Intrinsic Dimensionality. arXiv:1801.02613 [cs] (2018)"},{"key":"9_CR29","doi-asserted-by":"publisher","unstructured":"Meftah, S., Rachidi, T., Assem, N.: Network based intrusion detection using the UNSW-NB15 dataset. Int. J. Comput. Digital Syst. 8, 478\u2013487 (2019). https:\/\/doi.org\/10.12785\/ijcds\/080505, https:\/\/journal.uob.edu.bh:443\/handle\/123456789\/3580","DOI":"10.12785\/ijcds\/080505"},{"key":"9_CR30","doi-asserted-by":"publisher","unstructured":"Mohsin, M., Anwar, Z., Husari, G., Al-Shaer, E., Rahman, M.A.: IoTSAT: a formal framework for security analysis of the internet of things (IoT). In: 2016 IEEE Conference on Communications and Network Security (CNS), pp. 180\u2013188 (2016). https:\/\/doi.org\/10.1109\/CNS.2016.7860484","DOI":"10.1109\/CNS.2016.7860484"},{"key":"9_CR31","unstructured":"Morningstar, W., Ham, C., Gallagher, A., Lakshminarayanan, B., Alemi, A., Dillon, J.: Density of states estimation for out of distribution detection. In: Proceedings of The 24th International Conference on Artificial Intelligence and Statistics, pp. 3232\u20133240. PMLR (2021). https:\/\/proceedings.mlr.press\/v130\/morningstar21a.html"},{"key":"9_CR32","doi-asserted-by":"publisher","unstructured":"Moustafa, N.: A new distributed architecture for evaluating AI-based security systems at the edge: network TON_iot datasets. Sustain. Cities Soc. 72, 102994 (2021). https:\/\/doi.org\/10.1016\/j.scs.2021.102994, https:\/\/www.sciencedirect.com\/science\/article\/pii\/S2210670721002808","DOI":"10.1016\/j.scs.2021.102994"},{"key":"9_CR33","doi-asserted-by":"publisher","unstructured":"Moustafa, N., Slay, J.: UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In: 2015 Military Communications and Information Systems Conference (MilCIS), pp. 1\u20136 (2015). https:\/\/doi.org\/10.1109\/MilCIS.2015.7348942","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"9_CR34","unstructured":"Nalisnick, E., Matsukawa, A., Teh, Y.W., Gorur, D., Lakshminarayanan, B.: Do Deep Generative Models Know What They Don\u2019t Know? (2018). https:\/\/openreview.net\/forum?id=H1xwNhCcYm"},{"key":"9_CR35","unstructured":"Tapping AI for Intrusion Detection Systems, October 2021. https:\/\/www.iotworldtoday.com\/2021\/10\/18\/tapping-ai-for-intrusion-detection-systems\/"},{"key":"9_CR36","unstructured":"Pope, P., Zhu, C., Abdelkader, A., Goldblum, M., Goldstein, T.: The Intrinsic Dimension of Images and Its Impact on Learning (2020). https:\/\/openreview.net\/forum?id=XJk19XzGq2J"},{"key":"9_CR37","series-title":"Algorithms for Intelligent Systems","doi-asserted-by":"publisher","first-page":"635","DOI":"10.1007\/978-981-15-5243-4_60","volume-title":"Advances in Machine Learning and Computational Intelligence","author":"BM Rashma","year":"2021","unstructured":"Rashma, B.M., Macherla, S., Jaiswal, A., Poornima, G.: Handling heterogeneity in an IoT infrastructure. In: Patnaik, S., Yang, X.-S., Sethi, I.K. (eds.) Advances in Machine Learning and Computational Intelligence. AIS, pp. 635\u2013643. Springer, Singapore (2021). https:\/\/doi.org\/10.1007\/978-981-15-5243-4_60"},{"key":"9_CR38","doi-asserted-by":"publisher","unstructured":"Rezvy, S., Luo, Y., Petridis, M., Lasebae, A., Zebin, T.: An efficient deep learning model for intrusion classification and prediction in 5G and IoT networks. In: 2019 53rd Annual Conference on Information Sciences and Systems (CISS), pp. 1\u20136 (2019). https:\/\/doi.org\/10.1109\/CISS.2019.8693059","DOI":"10.1109\/CISS.2019.8693059"},{"key":"9_CR39","doi-asserted-by":"publisher","unstructured":"Rizvi, S., Orr, R., Cox, A., Ashokkumar, P., Rizvi, M.R.: Identifying the attack surface for IoT network. Internet Things. 9, 100162 (2020). https:\/\/doi.org\/10.1016\/j.iot.2020.100162, https:\/\/www.sciencedirect.com\/science\/article\/pii\/S2542660520300056","DOI":"10.1016\/j.iot.2020.100162"},{"key":"9_CR40","doi-asserted-by":"publisher","unstructured":"Roy, B., Cheung, H.: A Deep Learning Approach for Intrusion Detection in Internet of Things using Bi-Directional Long Short-Term Memory Recurrent Neural Network, pp. 1\u20136 (2018). https:\/\/doi.org\/10.1109\/ATNAC.2018.8615294. ISSN: 2474-154X","DOI":"10.1109\/ATNAC.2018.8615294"},{"key":"9_CR41","doi-asserted-by":"publisher","unstructured":"Sahu, A.K., Sharma, S., Tanveer, M., Raja, R.: Internet of Things attack detection using hybrid Deep Learning Model. Comput. Commun. 176, 146\u2013154 (2021). https:\/\/doi.org\/10.1016\/j.comcom.2021.05.024, https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0140366421002164","DOI":"10.1016\/j.comcom.2021.05.024"},{"key":"9_CR42","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1007\/978-3-030-72802-1_9","volume-title":"Big Data Technologies and Applications","author":"M Sarhan","year":"2021","unstructured":"Sarhan, M., Layeghy, S., Moustafa, N., Portmann, M.: NetFlow datasets for machine learning-based network intrusion detection systems. In: Deze, Z., Huang, H., Hou, R., Rho, S., Chilamkurti, N. (eds.) BDTA\/WiCON -2020. LNICST, vol. 371, pp. 117\u2013135. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-72802-1_9"},{"key":"9_CR43","unstructured":"Serr\u00e0, J., \u00c1lvarez, D., G\u00f3mez, V., Slizovskaia, O., N\u00fa\u00f1ez, J.F., Luque, J.: Input Complexity and Out-of-distribution Detection with Likelihood-based Generative Models (2019). https:\/\/openreview.net\/forum?id=SyxIWpVYvr"},{"key":"9_CR44","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/TETCI.2017.2772792","volume":"2","author":"N Shone","year":"2018","unstructured":"Shone, N., Ngoc, T.N., Phai, V.D., Shi, Q.: A deep learning approach to network intrusion detection. IEEE Trans. Emerg. Topics Comput. Intell. 2, 41\u201350 (2018). https:\/\/doi.org\/10.1109\/TETCI.2017.2772792","journal-title":"IEEE Trans. Emerg. Topics Comput. Intell."},{"key":"9_CR45","doi-asserted-by":"crossref","unstructured":"Singh, P., Jaykumar, J., Pankaj, A., Mitra, R.: Edge-Detect: Edge-centric Network Intrusion Detection using Deep Neural Network. arXiv:2102.01873 [cs], February 2021","DOI":"10.1109\/CCNC49032.2021.9369469"},{"key":"9_CR46","doi-asserted-by":"publisher","unstructured":"Stolz, B.J., Tanner, J., Harrington, H.A., Nanda, V.: Geometric anomaly detection in data. Proc. Natl. Acad. Sci. 117(33), 19664\u201319669 (2020). https:\/\/doi.org\/10.1073\/pnas.2001741117, https:\/\/www.pnas.org\/content\/117\/33\/19664","DOI":"10.1073\/pnas.2001741117"},{"key":"9_CR47","doi-asserted-by":"publisher","unstructured":"Vasudevan, A., Harshini, E., Selvakumar, S.: SSENet-2011: a network intrusion detection system dataset and its comparison with KDD CUP 99 dataset. In: 2011 Second Asian Himalayas International Conference on Internet (AH-ICI), pp. 1\u20135 (2011). https:\/\/doi.org\/10.1109\/AHICI.2011.6113948","DOI":"10.1109\/AHICI.2011.6113948"},{"key":"9_CR48","doi-asserted-by":"crossref","unstructured":"Wang, Q., Erfani, S.M., Leckie, C., Houle, M.E.: A Dimensionality-Driven Approach for Unsupervised Out-of-distribution Detection, p. 9 (2021)","DOI":"10.1137\/1.9781611976700.14"},{"key":"9_CR49","doi-asserted-by":"publisher","unstructured":"Zhao, K., Ge, L.: A Survey on the Internet of Things Security, pp. 663\u2013667 (2013). DOI: https:\/\/doi.org\/10.1109\/CIS.2013.145","DOI":"10.1109\/CIS.2013.145"},{"key":"9_CR50","doi-asserted-by":"publisher","unstructured":"Zhou, S., Tordesillas, A., Pouragha, M., Bailey, J., Bondell, H.: On local intrinsic dimensionality of deformation in complex materials. Sci. Rep. 11(1), 10216 (2021). https:\/\/doi.org\/10.1038\/s41598-021-89328-8, https:\/\/www.nature.com\/articles\/s41598-021-89328-8","DOI":"10.1038\/s41598-021-89328-8"}],"container-title":["Lecture Notes in Computer Science","Data and Applications Security and Privacy XXXVI"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-10684-2_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,12]],"date-time":"2022-07-12T07:09:38Z","timestamp":1657609778000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-10684-2_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031106835","9783031106842"],"references-count":50,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-10684-2_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"13 July 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DBSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP Annual Conference on Data and Applications Security and Privacy","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Newark, NJ","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 July 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 July 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"36","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dbsec2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/cs.iit.edu\/~dbsec2022\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"12","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}