{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T20:02:53Z","timestamp":1742932973734,"version":"3.40.3"},"publisher-location":"Cham","reference-count":51,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031163012"},{"type":"electronic","value":"9783031163029"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-16302-9_2","type":"book-chapter","created":{"date-parts":[[2022,10,5]],"date-time":"2022-10-05T23:03:52Z","timestamp":1665011032000},"page":"19-32","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Survey of Cloud Traffic Anomaly Detection Algorithms"],"prefix":"10.1007","author":[{"given":"Giedrius","family":"Paulikas","sequence":"first","affiliation":[]},{"given":"Donatas","family":"Sandonavi\u010dius","sequence":"additional","affiliation":[]},{"given":"Edgaras","family":"Stasiukaitis","sequence":"additional","affiliation":[]},{"given":"Gytis","family":"Vilutis","sequence":"additional","affiliation":[]},{"given":"Mindaugas","family":"Vaitkunas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,10,6]]},"reference":[{"key":"2_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cosrev.2019.05.002","volume":"33","author":"R Kumar","year":"2019","unstructured":"Kumar, R., Goyal, R.: On cloud security requirements, threats, vulnerabilities and countermeasures: a survey. Comput. Sci. Rev. 33, 1\u201348 (2019). https:\/\/doi.org\/10.1016\/j.cosrev.2019.05.002","journal-title":"Comput. Sci. Rev."},{"key":"2_CR2","doi-asserted-by":"publisher","unstructured":"Dang, L.M., Piran, Md.J., Han, D., Min, K., Moon, H.: A survey on internet of things and cloud computing for healthcare. Electronics 8(7), art. 768 (2019). https:\/\/doi.org\/10.3390\/electronics8070768","DOI":"10.3390\/electronics8070768"},{"issue":"4","key":"2_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.25103\/jestr.134.01","volume":"13","author":"EB Priyanka","year":"2020","unstructured":"Priyanka, E.B., Thangavel, S.: Influence of internet of things (IoT) in association of data mining towards the development smart cities-a review analysis. J. Eng. Sci. Technol. Rev. 13(4), 1\u201321 (2020)","journal-title":"J. Eng. Sci. Technol. Rev."},{"key":"2_CR4","doi-asserted-by":"publisher","unstructured":"Pajouha, H.H., Dehghantanhaa, A., Parizib, R.M., Aledharib, M., Karimipour, H.: A survey on internet of things security: requirements, challenges, and solutions. Internet Things 14, art. 100129 (2021). https:\/\/doi.org\/10.1016\/j.iot.2019.100129","DOI":"10.1016\/j.iot.2019.100129"},{"issue":"12","key":"2_CR5","doi-asserted-by":"publisher","first-page":"11330","DOI":"10.1109\/JIOT.2020.3007690","volume":"7","author":"S Bagchi","year":"2020","unstructured":"Bagchi, S., et al.: New frontiers in IoT: networking, systems, reliability, and security challenges. IEEE Internet Things J. 7(12), 11330\u201311346 (2020)","journal-title":"IEEE Internet Things J."},{"issue":"12","key":"2_CR6","doi-asserted-by":"publisher","first-page":"9493","DOI":"10.1007\/s11227-020-03213-1","volume":"76","author":"H Tabrizchi","year":"2020","unstructured":"Tabrizchi, H., Kuchaki Rafsanjani, M.: A survey on security challenges in cloud computing: issues, threats, and solutions. J. Supercomput. 76(12), 9493\u20139532 (2020). https:\/\/doi.org\/10.1007\/s11227-020-03213-1","journal-title":"J. Supercomput."},{"key":"2_CR7","doi-asserted-by":"publisher","unstructured":"Du, M.: Application of information communication network security management and control based on big data technology. Int. J. Commun. Syst. 35(5), art. 4643 (2022). https:\/\/doi.org\/10.1002\/dac.4643","DOI":"10.1002\/dac.4643"},{"issue":"4","key":"2_CR8","doi-asserted-by":"publisher","first-page":"721","DOI":"10.1007\/s10922-020-09517-0","volume":"28","author":"A Clemm","year":"2020","unstructured":"Clemm, A., Zhani, M.F., Boutaba, R.: Network management 2030: operations and control of network 2030 services. J. Netw. Syst. Manage. 28(4), 721\u2013750 (2020). https:\/\/doi.org\/10.1007\/s10922-020-09517-0","journal-title":"J. Netw. Syst. Manage."},{"issue":"15","key":"2_CR9","doi-asserted-by":"publisher","first-page":"12021","DOI":"10.1109\/JIOT.2021.3075901","volume":"8","author":"ST Arzo","year":"2021","unstructured":"Arzo, S.T., Naiga, C., Granelli, F., Bassoli, R., Devetsikiotis, M., Fitzek, F.H.P.: A theoretical discussion and survey of network automation for IoT: challenges and opportunity. IEEE Internet Things J. 8(15), 12021\u201312045 (2021)","journal-title":"IEEE Internet Things J."},{"issue":"3","key":"2_CR10","doi-asserted-by":"publisher","first-page":"2062","DOI":"10.1109\/COMST.2018.2817685","volume":"20","author":"F Javed","year":"2018","unstructured":"Javed, F., Afzal, M.K., Sharif, M., Kim, B.-S.: Internet of things (IoT) operating systems support, networking technologies, applications, and challenges: a comparative review. IEEE Commun. Surv. Tutor. 20(3), 2062\u20132100 (2018)","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"6","key":"2_CR11","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1109\/MNET.011.2000788","volume":"35","author":"FR Yu","year":"2021","unstructured":"Yu, F.R.: From information networking to intelligence networking: motivations, scenarios, and challenges. IEEE Netw. 35(6), 209\u2013216 (2021)","journal-title":"IEEE Netw."},{"key":"2_CR12","doi-asserted-by":"publisher","unstructured":"Imran, Ghaffar, Z., Alshahrani, A., Fayaz, M., Alghamdi, A.M., Gwak, J.: A topical review on machine learning, software defined networking, internet of things applications: research limitations and challenges. Electronics 10(8), art. 880 (2021). https:\/\/doi.org\/10.3390\/electronics10080880","DOI":"10.3390\/electronics10080880"},{"key":"2_CR13","doi-asserted-by":"crossref","unstructured":"Santos, L., Gon\u00e7alves, R., Rabada, C., Martins, J.: A flow-based intrusion detection framework for internet of things networks. Cluster Comput. 1\u201321 (2021). http:\/\/hdl.handle.net\/10198\/23813","DOI":"10.1007\/s10586-021-03238-y"},{"key":"2_CR14","doi-asserted-by":"publisher","unstructured":"Hagemann, T., Katsarou, K.: A systematic review on anomaly detection for cloud computing environments. In: 3rd Artificial Intelligence and Cloud Computing Conference (AICCC 2020), pp. 83\u201396, December 2020. https:\/\/doi.org\/10.1145\/3442536.3442550","DOI":"10.1145\/3442536.3442550"},{"issue":"3","key":"2_CR15","doi-asserted-by":"publisher","first-page":"447","DOI":"10.1007\/s11235-018-0475-8","volume":"70","author":"G Fernandes","year":"2018","unstructured":"Fernandes, G., Rodrigues, J.J.P.C., Carvalho, L.F., Al-Muhtadi, J.F., Proen\u00e7a, M.L.: A comprehensive survey on network anomaly detection. Telecommun. Syst. 70(3), 447\u2013489 (2018). https:\/\/doi.org\/10.1007\/s11235-018-0475-8","journal-title":"Telecommun. Syst."},{"key":"2_CR16","doi-asserted-by":"publisher","first-page":"764","DOI":"10.1109\/TCC.2018.2808289","volume":"8","author":"H Jayathilaka","year":"2020","unstructured":"Jayathilaka, H., Krintz, C., Wolski, R.: Detecting performance anomalies in cloud platform applications. IEEE Trans. Cloud Comput. 8, 764\u2013777 (2020)","journal-title":"IEEE Trans. Cloud Comput."},{"key":"2_CR17","doi-asserted-by":"crossref","unstructured":"Shi, Y., Miao, K.: Detecting anomalies in application performance management system with machine learning algorithms. In: 3rd International Conference on Electronic Information Technology and Computer Engineering (EITCE), pp. 1797\u20131800 (2020)","DOI":"10.1109\/EITCE47263.2019.9094916"},{"key":"2_CR18","doi-asserted-by":"publisher","unstructured":"Baril, X., Cousti\u00e9, O., Mothe, J., Teste, O.: Application performance anomaly detection with LSTM on temporal irregularities in logs. In: Proceedings of the 29th ACM International Conference on Information & Knowledge Management (CIKM 2020), pp. 1961\u20131964, October 2020. https:\/\/doi.org\/10.1145\/3340531.3412157","DOI":"10.1145\/3340531.3412157"},{"key":"2_CR19","unstructured":"Jyothsana, L.P., Anushya, E., Kumari, S.S.: An anomaly-based approach for intrusion detection in web traffic. Int. J. Adv. Res. Basic Eng. Sci. Technol. (IJARBEST) 3(Special Issue), 360\u2013367 (2017)"},{"key":"2_CR20","doi-asserted-by":"publisher","first-page":"24120","DOI":"10.1109\/ACCESS.2020.2969428","volume":"8","author":"BA Tama","year":"2020","unstructured":"Tama, B.A., Nkenyereye, L., Islam, S.M.R., Kwak, K.-S.: An enhanced anomaly detection in web traffic using a stack of classifier ensemble. IEEE Access 8, 24120\u201324134 (2020)","journal-title":"IEEE Access"},{"key":"2_CR21","doi-asserted-by":"crossref","unstructured":"Fotiadou, K., Velivassaki, T.-H., Voulkidis, A., Skias, D., Tsekeridou, S., Zahariadis, T.: Network traffic anomaly detection via deep learning. Information 12(5), art. 215 (2021)","DOI":"10.3390\/info12050215"},{"issue":"1","key":"2_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40537-021-00475-1","volume":"8","author":"A Alshammari","year":"2021","unstructured":"Alshammari, A., Aldribi, A.: Apply machine learning techniques to detect malicious network traffic in cloud computing. J. Big Data 8(1), 1\u201324 (2021). https:\/\/doi.org\/10.1186\/s40537-021-00475-1","journal-title":"J. Big Data"},{"issue":"8","key":"2_CR23","doi-asserted-by":"publisher","first-page":"3127","DOI":"10.1109\/TNNLS.2019.2935975","volume":"31","author":"T Ergen","year":"2020","unstructured":"Ergen, T., Kozat, S.S.: Unsupervised anomaly detection with LSTM neural networks. IEEE Trans. Neural Netw. Learn. Syst. 31(8), 3127\u20133141 (2020)","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"issue":"2","key":"2_CR24","doi-asserted-by":"publisher","first-page":"146","DOI":"10.26599\/TST.2019.9010051","volume":"26","author":"G Pu","year":"2021","unstructured":"Pu, G., Wang, L., Shen, J., Dong, F.: A hybrid unsupervised clustering-based anomaly detection method. Tsinghua Sci. Technol. 26(2), 146\u2013153 (2021). https:\/\/doi.org\/10.26599\/TST.2019.9010051","journal-title":"Tsinghua Sci. Technol."},{"key":"2_CR25","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1186\/s12911-019-1004-8","volume":"19","author":"S Uddin","year":"2019","unstructured":"Uddin, S., Khan, A., Hossain, M., et al.: Comparing different supervised machine learning algorithms for disease prediction. BMC Med. Inform. Decis. Mak. 19, 281 (2019). https:\/\/doi.org\/10.1186\/s12911-019-1004-8","journal-title":"BMC Med. Inform. Decis. Mak."},{"key":"2_CR26","doi-asserted-by":"publisher","unstructured":"Hagemann, T., Katsarou, K.: A systematic review on anomaly detection for cloud computing environments. In: 2020 3rd Artificial Intelligence and Cloud Computing Conference (AICCC 2020), pp. 83\u201396. Association for Computing Machinery, New York (2020). https:\/\/doi.org\/10.1145\/3442536.3442550","DOI":"10.1145\/3442536.3442550"},{"issue":"7","key":"2_CR27","doi-asserted-by":"publisher","first-page":"1413","DOI":"10.1021\/acs.jcim.5b00101","volume":"55","author":"IC Ciriano","year":"2015","unstructured":"Ciriano, I.C., Bender, A., Malliavin, T.E.: Comparing the influence of simulated experimental errors on 12 machine learning algorithms in bioactivity modeling using 12 diverse data sets. J. Chem. Inf. Model. 55(7), 1413\u20131425 (2015). https:\/\/doi.org\/10.1021\/acs.jcim.5b00101","journal-title":"J. Chem. Inf. Model."},{"key":"2_CR28","unstructured":"Ribeiro, A.H., Tiels, K., Aguirre, L.A., Sch\u00f6n, T.: Beyond exploding and vanishing gradients: analysing RNN training using attractors and smoothness, vol. 108, pp. 2370\u20132380 (2020). https:\/\/proceedings.mlr.press\/v108\/ribeiro20a.html"},{"key":"2_CR29","doi-asserted-by":"publisher","unstructured":"Aouedi, O., Piamrat, K., Bagadthey, D.: A semi-supervised stacked autoencoder approach for network traffic classification. In: 2020 IEEE 28th International Conference on Network Protocols (ICNP), pp. 1\u20136 (2020). https:\/\/doi.org\/10.1109\/ICNP49622.2020.9259390","DOI":"10.1109\/ICNP49622.2020.9259390"},{"key":"2_CR30","series-title":"Unsupervised and Semi-Supervised Learning","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-030-22475-2_1","volume-title":"Supervised and Unsupervised Learning for Data Science","author":"M Alloghani","year":"2020","unstructured":"Alloghani, M., Al-Jumeily, D., Mustafina, J., Hussain, A., Aljaaf, A.J.: A systematic review on supervised and unsupervised machine learning algorithms for data science. In: Berry, M.W., Mohamed, A., Yap, B.W. (eds.) Supervised and Unsupervised Learning for Data Science. USL, pp. 3\u201321. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-22475-2_1"},{"key":"2_CR31","doi-asserted-by":"publisher","unstructured":"Abdallah, M., Khac, N.A.L., Jahromi, H., Delia Jurcut, A.: A hybrid CNN-LSTM based approach for anomaly detection systems in SDNs. In: The 16th International Conference on Availability, Reliability and Security (ARES 2021), pp. 1\u20137. Association for Computing Machinery, New York (2021). https:\/\/doi.org\/10.1145\/3465481.3469190. Article 34","DOI":"10.1145\/3465481.3469190"},{"key":"2_CR32","doi-asserted-by":"publisher","unstructured":"Habeeb, R.A.A., Nasaruddin, F., Gani, A., Hashem, I.A.T., Ahmed, E., Imran, M.: Real-time big data processing for anomaly detection: a survey (2019). https:\/\/doi.org\/10.1016\/j.ijinfomgt.2018.08.006","DOI":"10.1016\/j.ijinfomgt.2018.08.006"},{"key":"2_CR33","doi-asserted-by":"publisher","first-page":"30","DOI":"10.9734\/ajrcos\/2021\/v9i230218","volume":"9","author":"S Haji","year":"2021","unstructured":"Haji, S., Ameen, S.: Attack and anomaly detection in IoT networks using machine learning techniques: a review. Asian J. Res. Comput. Sci. 9, 30\u201346 (2021). https:\/\/doi.org\/10.9734\/ajrcos\/2021\/v9i230218","journal-title":"Asian J. Res. Comput. Sci."},{"key":"2_CR34","doi-asserted-by":"publisher","first-page":"30387","DOI":"10.1109\/ACCESS.2020.2973023","volume":"8","author":"R-H Hwang","year":"2020","unstructured":"Hwang, R.-H., Peng, M.-C., Huang, C.-W., Lin, P.-C., Nguyen, V.-L.: An unsupervised deep learning model for early network traffic anomaly detection. IEEE Access 8, 30387\u201330399 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.2973023","journal-title":"IEEE Access"},{"key":"2_CR35","doi-asserted-by":"publisher","unstructured":"Farzad, A., Gulliver, T.A.: Unsupervised log message anomaly detection (2020). https:\/\/doi.org\/10.1016\/j.icte.2020.06.003","DOI":"10.1016\/j.icte.2020.06.003"},{"key":"2_CR36","doi-asserted-by":"publisher","unstructured":"Lesouple, J., Baudoin, C., Spigai, M., Tourneret, J.Y.: Generalized isolation forest for anomaly detection (2021). https:\/\/doi.org\/10.1016\/j.patrec.2021.05.022","DOI":"10.1016\/j.patrec.2021.05.022"},{"key":"2_CR37","doi-asserted-by":"publisher","unstructured":"Eltanbouly, S., Bashendy, M., AlNaimi, N., Chkirbene, Z., Erbad, A.: Machine learning techniques for network anomaly detection: a survey. 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT), pp. 156\u2013162 (2020). https:\/\/doi.org\/10.1109\/ICIoT48696.2020.9089465","DOI":"10.1109\/ICIoT48696.2020.9089465"},{"issue":"4","key":"2_CR38","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1007\/s13748-020-00218-y","volume":"9","author":"M Roodschild","year":"2020","unstructured":"Roodschild, M., Gotay\u00a0Sardi\u00f1as, J., Will, A.: A new approach for the vanishing gradient problem on sigmoid activation. Progr. Artif. Intell. 9(4), 351\u2013360 (2020). https:\/\/doi.org\/10.1007\/s13748-020-00218-y","journal-title":"Progr. Artif. Intell."},{"key":"2_CR39","doi-asserted-by":"publisher","unstructured":"Girish, L., Rao, S.K.N.: Anomaly detection in cloud environment using artificial intelligence techniques. Computing (2021). https:\/\/doi.org\/10.1007\/s00607-021-00941-x","DOI":"10.1007\/s00607-021-00941-x"},{"key":"2_CR40","doi-asserted-by":"publisher","unstructured":"Alrashdi, I., Alqazzaz, A., Aloufi, E., Alharthi, R., Zohdy, M., Ming, H.: AD-IoT: anomaly detection of IoT cyberattacks in smart city using machine learning. In: 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC), pp. 0305\u20130310 (2019). https:\/\/doi.org\/10.1109\/CCWC.2019.8666450","DOI":"10.1109\/CCWC.2019.8666450"},{"key":"2_CR41","doi-asserted-by":"publisher","unstructured":"Biradar, K., Gupta, A., Mandal, M., Vipparthi, S.: Challenges in time-stamp aware anomaly detection in traffic videos (2019). https:\/\/doi.org\/10.48550\/arXiv.1906.04574","DOI":"10.48550\/arXiv.1906.04574"},{"key":"2_CR42","doi-asserted-by":"crossref","unstructured":"Boranbayev, S.N., Kuanyshev, D.D.: Network traffic analysis tools. Eurasian Union Sci. (EUS) 12(81), 35\u201338 (2020)","DOI":"10.31618\/ESU.2413-9335.2020.5.81.1171"},{"key":"2_CR43","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"1473","DOI":"10.1007\/978-981-16-1726-3_191","volume-title":"2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems","author":"J Liu","year":"2021","unstructured":"Liu, J., Qu, C., Zhou, T.: Design and implementation of cloud computing platform monitoring system based on nagios. In: Huang, C., Chan, Y.-W., Yen, N. (eds.) 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems. AISC, vol. 1379, pp. 1473\u20131478. Springer, Singapore (2021). https:\/\/doi.org\/10.1007\/978-981-16-1726-3_191"},{"key":"2_CR44","doi-asserted-by":"publisher","unstructured":"Basu, A., Singh, R., Yu, C., Prasad, A., Banerjee, K.: Designing, developing and deploying an enterprise scale network monitoring system. In: ISEC 2022: 15th Innovations in Software Engineering Conference, Article No. 18, pp. 1\u20135, February 2022. https:\/\/doi.org\/10.1145\/3511430.3511446","DOI":"10.1145\/3511430.3511446"},{"key":"2_CR45","unstructured":"Fournier, G., Afchain, S., Baubeau, S.: Runtime security monitoring with eBPF (2021)"},{"key":"2_CR46","doi-asserted-by":"publisher","unstructured":"Birundha, S., Grace, R.K., Jeyaram, T.: Network monitoring and analysis. In: 2021 7th International Conference on Advanced Computing and Communication Systems (ICACCS), pp. 1400\u20131403 (2021). https:\/\/doi.org\/10.1109\/ICACCS51430.2021.9441767","DOI":"10.1109\/ICACCS51430.2021.9441767"},{"issue":"2","key":"2_CR47","doi-asserted-by":"publisher","first-page":"1885","DOI":"10.1109\/TNSM.2021.3075656","volume":"18","author":"P Krishnamurthy","year":"2021","unstructured":"Krishnamurthy, P., Khorrami, F., Schmidt, S., Wright, K.: Machine learning for NetFlow anomaly detection with human-readable annotations. IEEE Trans. Netw. Serv. Manag. 18(2), 1885\u20131898 (2021). https:\/\/doi.org\/10.1109\/TNSM.2021.3075656","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"2_CR48","doi-asserted-by":"publisher","unstructured":"Ljubojevi\u0107, M., Baji\u0107, A., Miji\u0107, D.: Centralized monitoring of computer networks using Zenoss open source platform. In: 2018 17th International Symposium INFOTEH-JAHORINA (INFOTEH), pp. 1\u20135 (2018). https:\/\/doi.org\/10.1109\/INFOTEH.2018.8345528","DOI":"10.1109\/INFOTEH.2018.8345528"},{"key":"2_CR49","doi-asserted-by":"publisher","unstructured":"Meman, J.M., Villaverde, J.F., Linsangan, N.B.: Automation of daily monitoring operations of N2N connect Berhad using Zabbix technology. In: ICIEI 2021: 2021 The 6th International Conference on Information and Education Innovations, pp. 140\u2013145, April 2021. https:\/\/doi.org\/10.1145\/3470716.3470739","DOI":"10.1145\/3470716.3470739"},{"key":"2_CR50","unstructured":"Flowmon ADS. Network anomaly detection system. https:\/\/www.flowmon.com\/en\/products\/software-modules\/anomaly-detection-system"},{"key":"2_CR51","doi-asserted-by":"publisher","unstructured":"Kortebi, A., Aouini, Z., Juren, M., Pazdera, J.: Home networks traffic monitoring case study: anomaly detection. In: 2016 Global Information Infrastructure and Networking Symposium (GIIS), pp. 1\u20136 (2016). https:\/\/doi.org\/10.1109\/GIIS.2016.7814852","DOI":"10.1109\/GIIS.2016.7814852"}],"container-title":["Communications in Computer and Information Science","Information and Software Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-16302-9_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,5]],"date-time":"2022-10-05T23:22:40Z","timestamp":1665012160000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-16302-9_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031163012","9783031163029"],"references-count":51,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-16302-9_2","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"6 October 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICIST","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information and Software Technologies","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kaunas","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Lithuania","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 October 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 October 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icist2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/icist.ktu.edu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"66","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"23","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"35% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}