{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T08:12:28Z","timestamp":1743149548023,"version":"3.40.3"},"publisher-location":"Cham","reference-count":12,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031200953"},{"type":"electronic","value":"9783031200960"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-20096-0_49","type":"book-chapter","created":{"date-parts":[[2023,1,12]],"date-time":"2023-01-12T15:04:11Z","timestamp":1673535851000},"page":"649-663","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Research on Potential Threat Identification Algorithm for Electric UAV Network Communication"],"prefix":"10.1007","author":[{"given":"Gebiao","family":"Hu","sequence":"first","affiliation":[]},{"given":"Zhichi","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Zheng","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Ruiqing","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Xiao","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,1,13]]},"reference":[{"issue":"2","key":"49_CR1","first-page":"240","volume":"35","author":"L Hongying","year":"2020","unstructured":"Hongying, L., Tianrong, Z.: Research on recognition method of abnormal communication behavior in mobile wireless sensor network. Chinese J. Sens. Actuators 35(2), 240\u2013245 (2020)","journal-title":"Chinese J. Sens. Actuators"},{"issue":"7","key":"49_CR2","first-page":"2319","volume":"44","author":"K Ying","year":"2022","unstructured":"Ying, K., Zhihua, Z., Hao, W., Yaxing, L., Jin, M.: Deep SVDD-based anomaly detection method for communication signals. Syst. Eng. Electron. 44(7), 2319\u20132328 (2022)","journal-title":"Syst. Eng. Electron."},{"issue":"11","key":"49_CR3","doi-asserted-by":"publisher","first-page":"1912","DOI":"10.3390\/electronics9111912","volume":"9","author":"A Taoufik","year":"2020","unstructured":"Taoufik, A., Defoort, M., Busawon, K., Dala, L., Djemai, M.: A distributed observer-based cyber-attack identification scheme in cooperative networked systems under switching communication topologies. Electronics 9(11), 1912 (2020)","journal-title":"Electronics"},{"issue":"1","key":"49_CR4","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1109\/TFUZZ.2020.3006520","volume":"29","author":"S Liu","year":"2021","unstructured":"Liu, S., Wang, S., Liu, X.Y., Lin, C.T.: Fuzzy detection aided real-time and robust visual tracking under complex environments. IEEE Trans. Fuzzy Syst. 29(1), 90\u2013102 (2021)","journal-title":"IEEE Trans. Fuzzy Syst."},{"issue":"16","key":"49_CR5","doi-asserted-by":"publisher","first-page":"4941","DOI":"10.3390\/en14164941","volume":"14","author":"K Gupta","year":"2021","unstructured":"Gupta, K., Sahoo, S., Panigrahi, B.K., Blaabjerg, F., Popovski, P.: On the assessment of cyber risks and attack surfaces in a real-time co-simulation cybersecurity testbed for inverter-based microgrids. Energies 14(16), 4941 (2021)","journal-title":"Energies"},{"issue":"2","key":"49_CR6","doi-asserted-by":"publisher","first-page":"860","DOI":"10.1109\/TII.2020.2974520","volume":"17","author":"B Hussain","year":"2021","unstructured":"Hussain, B., Du, Q., Sun, B., Han, Z.: Deep learning-based ddos-attack detection for cyber-physical system over 5g network. IEEE Trans. Industr. Inf. 17(2), 860\u2013870 (2021)","journal-title":"IEEE Trans. Industr. Inf."},{"key":"49_CR7","doi-asserted-by":"publisher","first-page":"408","DOI":"10.1016\/j.ins.2021.11.079","volume":"586","author":"GY Yang","year":"2022","unstructured":"Yang, G.Y., Li, X.J.: Complete stealthiness false data injection attacks against dynamic state estimation in cyber-physical systems. Inf. Sci. 586, 408\u2013423 (2022)","journal-title":"Inf. Sci."},{"key":"49_CR8","doi-asserted-by":"publisher","first-page":"615","DOI":"10.1016\/j.neucom.2019.12.143","volume":"458","author":"S Liu","year":"2021","unstructured":"Liu, S., Liu, D., Muhammad, K., Ding, W.P.: Effective template update mechanism in visual tracking with background clutter. Neurocomputing 458, 615\u2013625 (2021)","journal-title":"Neurocomputing"},{"key":"49_CR9","doi-asserted-by":"crossref","unstructured":"Liu, S., et al.: Human memory update strategy: a multi-layer template update mechanism for remote visual monitoring, IEEE Trans. Multimedia 23, 2188\u20132198 (2021)","DOI":"10.1109\/TMM.2021.3065580"},{"key":"49_CR10","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1016\/j.ins.2019.08.020","volume":"507","author":"L Fang","year":"2020","unstructured":"Fang, L., Yin, C., Zhou, L., Li, Y., Xia, J.: A physiological and behavioral feature authentication scheme for medical cloud based on fuzzy-rough core vector machine. Inf. Sci. 507, 143\u2013160 (2020)","journal-title":"Inf. Sci."},{"issue":"4","key":"49_CR11","doi-asserted-by":"publisher","first-page":"2665","DOI":"10.1007\/s11227-019-03049-4","volume":"76","author":"U Ahmad","year":"2019","unstructured":"Ahmad, U., Song, H., Bilal, A., Alazab, M., Jolfaei, A.: Securing smart vehicles from relay attacks using machine learning. J. Supercomput. 76(4), 2665\u20132682 (2019). https:\/\/doi.org\/10.1007\/s11227-019-03049-4","journal-title":"J. Supercomput."},{"key":"49_CR12","unstructured":"Yan, X.J., Liu, F.J., Yan, Y.Z.:\u00a0Simulation analysis of end to end delay upper bound in anti jamming communication network. Comput. Simul.\u00a038(07), 176180 (2021)"}],"container-title":["Lecture Notes in Computer Science","Machine Learning for Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-20096-0_49","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,12]],"date-time":"2023-01-12T15:15:12Z","timestamp":1673536512000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-20096-0_49"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031200953","9783031200960"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-20096-0_49","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"13 January 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ML4CS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Machine Learning for Cyber Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Guangzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 December 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 December 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ml4cs2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/nsclab.org\/ml4cs2022\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}