{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T06:05:38Z","timestamp":1757311538708,"version":"3.40.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031490989"},{"type":"electronic","value":"9783031490996"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-49099-6_8","type":"book-chapter","created":{"date-parts":[[2023,12,8]],"date-time":"2023-12-08T06:02:34Z","timestamp":1702015354000},"page":"129-138","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["An Energy-Conscious Surveillance Scheme for Intrusion Detection in Underwater Sensor Networks Using Tunicate Swarm Optimization"],"prefix":"10.1007","author":[{"given":"Sunil Kumar","family":"Kammula","sequence":"first","affiliation":[]},{"given":"Veena","family":"Anand","sequence":"additional","affiliation":[]},{"given":"Deepak","family":"Singh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,12,9]]},"reference":[{"issue":"17","key":"8_CR1","doi-asserted-by":"publisher","first-page":"13126","DOI":"10.1109\/JIOT.2021.3081918","volume":"8","author":"J Luo","year":"2021","unstructured":"Luo, J., Yang, Y., Wang, Z., Chen, Y.: Localization algorithm for underwater sensor network: a review. IEEE Internet Things J. 8(17), 13126\u201313144 (2021)","journal-title":"IEEE Internet Things J."},{"key":"8_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.oceaneng.2021.109558","volume":"236","author":"M Kumar","year":"2021","unstructured":"Kumar, M., Mondal, S.: Recent developments on target tracking problems: a review. Ocean Eng. 236, 109558 (2021)","journal-title":"Ocean Eng."},{"issue":"11","key":"8_CR3","doi-asserted-by":"publisher","first-page":"10171","DOI":"10.1007\/s12652-020-02783-5","volume":"12","author":"N Zade","year":"2021","unstructured":"Zade, N., Deshpande, S., Kamatchi Iyer, R.: Target tracking based on approximate localization technique in deterministic directional passive sensor network. J. Ambient Intell. Human. Comput. 12(11), 10171\u201310181 (2021). https:\/\/doi.org\/10.1007\/s12652-020-02783-5","journal-title":"J. Ambient Intell. Human. Comput."},{"issue":"3","key":"8_CR4","doi-asserted-by":"publisher","first-page":"2667","DOI":"10.1007\/s11277-021-09024-8","volume":"122","author":"M Nain","year":"2021","unstructured":"Nain, M., Goyal, N.: Energy efficient localization through node mobility and propagation delay prediction in underwater wireless sensor network. Wireless Pers. Commun. 122(3), 2667\u20132685 (2021). https:\/\/doi.org\/10.1007\/s11277-021-09024-8","journal-title":"Wireless Pers. Commun."},{"issue":"8","key":"8_CR5","doi-asserted-by":"publisher","first-page":"1008","DOI":"10.1049\/iet-com.2018.5097","volume":"13","author":"H Feng","year":"2019","unstructured":"Feng, H., Cai, Z.: Target tracking based on improved square root cubature particle filter via underwater wireless sensor networks. IET Commun. 13(8), 1008\u20131015 (2019)","journal-title":"IET Commun."},{"key":"8_CR6","doi-asserted-by":"publisher","first-page":"101415","DOI":"10.1109\/ACCESS.2019.2930735","volume":"7","author":"I Ullah","year":"2019","unstructured":"Ullah, I., Liu, Y., Su, X., Kim, P.: Efficient and accurate target localization in underwater environment. IEEE Access 7, 101415\u2013101426 (2019)","journal-title":"IEEE Access"},{"key":"8_CR7","doi-asserted-by":"publisher","first-page":"45693","DOI":"10.1109\/ACCESS.2019.2909133","volume":"7","author":"I Ullah","year":"2019","unstructured":"Ullah, I., Chen, J., Su, X., Esposito, C., Choi, C.: Localization and detection of targets in underwater wireless sensor using distance and angle-based algorithms. IEEE Access 7, 45693\u201345704 (2019)","journal-title":"IEEE Access"},{"key":"8_CR8","doi-asserted-by":"publisher","first-page":"38982","DOI":"10.1109\/ACCESS.2022.3164515","volume":"10","author":"BB Reddy","year":"2022","unstructured":"Reddy, B.B., Pardhasaradhi, B., Srinath, G., Srihari, P.: Distributed fusion of optimally quantized local tracker estimates for underwater wireless sensor networks. IEEE Access 10, 38982\u201338998 (2022)","journal-title":"IEEE Access"},{"key":"8_CR9","doi-asserted-by":"publisher","first-page":"1880","DOI":"10.1109\/TIFS.2020.3045320","volume":"16","author":"J Yan","year":"2020","unstructured":"Yan, J., Meng, Y., Yang, X., Luo, X., Guan, X.: Privacy-preserving localization for underwater sensor networks via deep reinforcement learning. IEEE Trans. Inf. Forensics Secur. 16, 1880\u20131895 (2020)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"2","key":"8_CR10","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1007\/s11277-019-06631-4","volume":"116","author":"M Irshad","year":"2019","unstructured":"Irshad, M., Liu, W., Wang, L., Khalil, M.U.R.: Cogent machine learning algorithm for indoor and underwater localization using visible light spectrum. Wireless Pers. Commun. 116(2), 993\u20131008 (2019). https:\/\/doi.org\/10.1007\/s11277-019-06631-4","journal-title":"Wireless Pers. Commun."},{"key":"8_CR11","doi-asserted-by":"publisher","first-page":"208253","DOI":"10.1109\/ACCESS.2020.3038645","volume":"8","author":"A Singh","year":"2020","unstructured":"Singh, A., Kotiyal, V., Sharma, S., Nagar, J., Lee, C.C.: A machine learning approach to predict the average localization error with applications to wireless sensor networks. IEEE Access 8, 208253\u2013208263 (2020)","journal-title":"IEEE Access"},{"issue":"3","key":"8_CR12","first-page":"1361","volume":"17","author":"J Yan","year":"2019","unstructured":"Yan, J., Zhao, H., Pu, B., Luo, X., Chen, C., Guan, X.: Energy-efficient target tracking with UASNs: a consensus-based Bayesian approach. IEEE Trans. Autom. Sci. Eng. 17(3), 1361\u20131375 (2019)","journal-title":"IEEE Trans. Autom. Sci. Eng."},{"issue":"17","key":"8_CR13","doi-asserted-by":"publisher","first-page":"11603","DOI":"10.1007\/s00500-021-05975-z","volume":"25","author":"S Kumari","year":"2021","unstructured":"Kumari, S., Mishra, P.K., Anand, V.: Fault-resilient localization using fuzzy logic and NSGA II-based metaheuristic scheme for UWSNs. Soft. Comput. 25(17), 11603\u201311619 (2021). https:\/\/doi.org\/10.1007\/s00500-021-05975-z","journal-title":"Soft. Comput."},{"key":"8_CR14","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1016\/j.comcom.2020.02.050","volume":"154","author":"T Ojha","year":"2020","unstructured":"Ojha, T., Misra, S., Obaidat, M.S.: SEAL: self-adaptive AUV-based localization for sparsely deployed Underwater Sensor Networks. Comput. Commun. 154, 204\u2013215 (2020)","journal-title":"Comput. Commun."},{"issue":"4","key":"8_CR15","doi-asserted-by":"publisher","first-page":"1466","DOI":"10.1109\/JOE.2019.2923826","volume":"45","author":"J Yan","year":"2019","unstructured":"Yan, J., Zhao, H., Luo, X., Wang, Y., Chen, C., Guan, X.: Asynchronous localization of underwater target using consensus-based unscented Kalman filtering. IEEE J. Oceanic Eng. 45(4), 1466\u20131481 (2019)","journal-title":"IEEE J. Oceanic Eng."},{"key":"8_CR16","series-title":"Lecture Notes on Data Engineering and Communications Technologies","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/978-981-10-8681-6_5","volume-title":"International Conference on Computer Networks and Communication Technologies","author":"S Kumari","year":"2019","unstructured":"Kumari, S., Gupta, G.P.: Target localization algorithm in a three-dimensional wireless sensor networks. In: Smys, S., Bestak, R., Chen, J.-Z., Kotuliak, I. (eds.) International Conference on Computer Networks and Communication Technologies. LNDECT, vol. 15, pp. 33\u201342. Springer, Singapore (2019). https:\/\/doi.org\/10.1007\/978-981-10-8681-6_5"},{"key":"8_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2020.103541","volume":"90","author":"S Kaur","year":"2020","unstructured":"Kaur, S., Awasthi, L.K., Sangal, A.L., Dhiman, G.: Tunicate Swarm Algorithm: a new bio-inspired based metaheuristic paradigm for global optimization. Eng. Appl. Artif. Intell. 90, 103541 (2020)","journal-title":"Eng. Appl. Artif. Intell."},{"key":"8_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2022.104653","volume":"94","author":"P Srinivas","year":"2022","unstructured":"Srinivas, P., Swapna, P.: Quantum tunicate swarm algorithm-based energy aware clustering scheme for wireless sensor networks. Microprocess. Microsyst. 94, 104653 (2022)","journal-title":"Microprocess. Microsyst."},{"issue":"2","key":"8_CR19","doi-asserted-by":"publisher","first-page":"227","DOI":"10.53106\/160792642022032302004","volume":"23","author":"J Li","year":"2022","unstructured":"Li, J., Li, G.C., Chu, S.C., Gao, M., Pan, J.S.: Modified parallel tunicate swarm algorithm and application in 3D WSNs coverage optimization. J. Internet Technol. 23(2), 227\u2013244 (2022)","journal-title":"J. Internet Technol."},{"issue":"3","key":"8_CR20","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1049\/sil2.12091","volume":"16","author":"Y Lin","year":"2022","unstructured":"Lin, Y., Zhang, Z., Najafabadi, H.E.: Underwater source localization using time difference of arrival and frequency difference of arrival measurements based on an improved invasive weed optimization algorithm. IET Sig. Process. 16(3), 299\u2013309 (2022)","journal-title":"IET Sig. Process."}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-49099-6_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,8]],"date-time":"2023-12-08T06:07:04Z","timestamp":1702015624000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-49099-6_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031490989","9783031490996"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-49099-6_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"9 December 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICISS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Systems Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Raipur","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 December 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 December 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iciss2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/iciss.isrdc.in\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}