{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T05:45:58Z","timestamp":1748583958153,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031223556"},{"type":"electronic","value":"9783031223563"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-22356-3_18","type":"book-chapter","created":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T01:33:46Z","timestamp":1672536826000},"page":"187-196","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Quantum Optimization for\u00a0IoT Security Detection"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0163-6786","authenticated-orcid":false,"given":"Vita Santa","family":"Barletta","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5719-7447","authenticated-orcid":false,"given":"Danilo","family":"Caivano","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2314-3253","authenticated-orcid":false,"given":"Mirko","family":"De Vincentiis","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6207-6404","authenticated-orcid":false,"given":"Alessio","family":"Magr\u00ec","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1561-7073","authenticated-orcid":false,"given":"Antonio","family":"Piccinno","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,1,1]]},"reference":[{"key":"18_CR1","doi-asserted-by":"crossref","unstructured":"Baldassarre, M.T., Barletta, V.S., Caivano, D.: Smart program management in a smart city. In: 2018 AEIT International Annual Conference, pp. 1\u20136 (2018). https:\/\/doi.org\/10.23919\/AEIT.2018.8577379","DOI":"10.23919\/AEIT.2018.8577379"},{"key":"18_CR2","doi-asserted-by":"publisher","unstructured":"Barletta, V.S., Buono, P., Caivano, D., Dimauro, G., Pontrelli, A.: Deriving smart city security from the analysis of their technological levels: a case study. In: 2021 IEEE International Conference on Omni-Layer Intelligent Systems (COINS), pp. 1\u20136 (2021). https:\/\/doi.org\/10.1109\/COINS51742.2021.9524268","DOI":"10.1109\/COINS51742.2021.9524268"},{"key":"18_CR3","doi-asserted-by":"publisher","unstructured":"Barletta, V.S., Caivano, D., Dimauro, G., Nannavecchia, A., Scalera, M.: Managing a smart city integrated model through smart program management. Appl. Sci. 10(2) (2020). https:\/\/doi.org\/10.3390\/app10020714, http:\/\/www.mdpi.com\/2076-3417\/10\/2\/714","DOI":"10.3390\/app10020714"},{"key":"18_CR4","doi-asserted-by":"publisher","unstructured":"Benioff, P.A.: The computer as a physical system: a microscopic quantum mechanical hamiltonian model of computers as represented by turing machines. Stat. Phys. 22 (1980). https:\/\/doi.org\/10.1007\/BF01011339","DOI":"10.1007\/BF01011339"},{"key":"18_CR5","unstructured":"D-Wave: (Accessed 29 Apr 2022). https:\/\/docs.dwavesys.com\/docs\/latest\/_images\/change.png"},{"key":"18_CR6","unstructured":"D-Wave: D-wave leap (Accessed 29 Apr 2022). https:\/\/cloud.dwavesys.com\/leap"},{"key":"18_CR7","unstructured":"D-Wave: Qboost (Accessed 29 Apr 2022). https:\/\/github.com\/dwave-examples\/qboost"},{"key":"18_CR8","doi-asserted-by":"publisher","first-page":"5355","DOI":"10.1103\/PhysRevE.58.5355","volume":"58","author":"T Kadowaki","year":"1998","unstructured":"Kadowaki, T., Nishimori, H.: Quantum annealing in the transverse ising model. Phys. Rev. E 58, 5355\u20135363 (1998). https:\/\/doi.org\/10.1103\/PhysRevE.58.5355","journal-title":"Phys. Rev. E"},{"key":"18_CR9","unstructured":"Loredo, R.: Quantum computing with python and IBM quantum example (2020)"},{"key":"18_CR10","doi-asserted-by":"publisher","DOI":"10.1098\/rspa.1930.0013","author":"DPA Maurice","year":"1930","unstructured":"Maurice, D.P.A.: Theory of electrons and protons (1930). https:\/\/doi.org\/10.1098\/rspa.1930.0013","journal-title":"Theory of electrons and protons"},{"key":"18_CR11","doi-asserted-by":"publisher","unstructured":"Moustafa, N.: A new distributed architecture for evaluating AI-based security systems at the edge: Network TON_IoT datasets. Sustain. Cities Soc. 72, 102994 (2021). https:\/\/doi.org\/10.1016\/j.scs.2021.102994, https:\/\/www.sciencedirect.com\/science\/article\/pii\/S2210670721002808","DOI":"10.1016\/j.scs.2021.102994"},{"key":"18_CR12","first-page":"333","volume":"25","author":"H Neven","year":"2012","unstructured":"Neven, H., Denchev, V., Rose, G., Macready, W.: Qboost: large scale classifier training with adiabatic quantum optimization. J. Mach. Learn. Res. 25, 333\u2013348 (2012)","journal-title":"J. Mach. Learn. Res."},{"key":"18_CR13","doi-asserted-by":"publisher","unstructured":"Neven, H., Denchev, V.S., Rose, G., Macready, W.G.: Training a binary classifier with the quantum adiabatic algorithm. arXiv: Quantum Physics (2008). https:\/\/doi.org\/10.48550\/arXiv.0811.0416.","DOI":"10.48550\/arXiv.0811.0416"},{"key":"18_CR14","doi-asserted-by":"publisher","unstructured":"Pattanayak S.: Quantum Machine Learning with Python. Apress, Berkeley, CA (2021). https:\/\/doi.org\/10.1007\/978-1-4842-6522-2","DOI":"10.1007\/978-1-4842-6522-2"},{"key":"18_CR15","doi-asserted-by":"crossref","unstructured":"Payares, E., Martinez-Santos, J.C.: Quantum machine learning for intrusion detection of distributed denial of service attacks: a comparative overview. In: OPTO (2021)","DOI":"10.1117\/12.2593297"},{"issue":"1","key":"18_CR16","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/MITP.2020.3019522","volume":"23","author":"M Piattini","year":"2021","unstructured":"Piattini, M., Serrano, M., Perez-Castillo, R., Petersen, G., Hevia, J.L.: Toward a quantum software engineering. IT Prof. 23(1), 62\u201366 (2021). https:\/\/doi.org\/10.1109\/MITP.2020.3019522","journal-title":"IT Prof."},{"key":"18_CR17","doi-asserted-by":"publisher","unstructured":"Reddy, P.R.K., Bouzefrane, S.: Analysis and detection of dos attacks in cloud computing by using GSE algorithm. In: 2014 IEEE International conference on high performance computing and communications. In: 2014 IEEE 6th International Symposium on Cyberspace Safety and Security. In: 2014 IEEE 11th International Conference on Embedded Software and System (HPCC, CSS, ICESS), pp. 1089\u20131096. https:\/\/doi.org\/10.1109\/HPCC.2014.183","DOI":"10.1109\/HPCC.2014.183"},{"key":"18_CR18","doi-asserted-by":"publisher","first-page":"1049","DOI":"10.1103\/PhysRev.28.1049","volume":"28","author":"E Schr\u00f6dinger","year":"1926","unstructured":"Schr\u00f6dinger, E.: An undulatory theory of the mechanics of atoms and molecules. Phys. Rev. 28, 1049\u20131070 (1926). https:\/\/doi.org\/10.1103\/PhysRev.28.1049","journal-title":"Phys. Rev."},{"key":"18_CR19","unstructured":"Wikimedia: (Accessed 29 Apr 2022). https:\/\/commons.wikimedia.org\/wiki\/File:Sphere_bloch.jpg"}],"container-title":["Lecture Notes in Networks and Systems","Ambient Intelligence\u2014Software and Applications\u201413th International Symposium on Ambient Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-22356-3_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T02:47:01Z","timestamp":1672541221000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-22356-3_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031223556","9783031223563"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-22356-3_18","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"1 January 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISAmI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Ambient Intelligence","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"L\u00b4Aquila","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 July 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 July 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"isaml2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.isami-conference.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}