{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:26:14Z","timestamp":1742912774266,"version":"3.40.3"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031530845"},{"type":"electronic","value":"9783031530852"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-53085-2_25","type":"book-chapter","created":{"date-parts":[[2024,1,29]],"date-time":"2024-01-29T18:02:40Z","timestamp":1706551360000},"page":"307-324","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Blockchain-Enhanced Federated Learning for Secure Malicious Activity Detection in Cyber-Physical Systems"],"prefix":"10.1007","author":[{"given":"Arvind","family":"Kamble","sequence":"first","affiliation":[]},{"given":"Virendra S.","family":"Malemath","sequence":"additional","affiliation":[]},{"given":"Suman","family":"Muddapu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,1,30]]},"reference":[{"issue":"10","key":"25_CR1","first-page":"4455","volume":"14","author":"Y Liu","year":"2018","unstructured":"Liu, Y., Chen, G.: A comparative study of feature selection techniques for malicious activity detection in cyber-physical systems. IEEE Trans. Industr. Inf. 14(10), 4455\u20134464 (2018)","journal-title":"IEEE Trans. Industr. Inf."},{"unstructured":"Sharma, A., Bali, K.: Malicious activity detection in cyber-physical systems using recurrent neural networks. In: Proceedings of the International Conference on Machine Learning, Big Data, and Business Analytics, pp. 192\u2013204 (2019)","key":"25_CR2"},{"issue":"1","key":"25_CR3","first-page":"503","volume":"15","author":"H Yan","year":"2019","unstructured":"Yan, H., Zhang, J.: Blockchain-enabled security for cyber-physical systems: a review. IEEE Trans. Industr. Inf. 15(1), 503\u2013510 (2019)","journal-title":"IEEE Trans. Industr. Inf."},{"key":"25_CR4","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1016\/j.future.2016.08.004","volume":"76","author":"X Wang","year":"2017","unstructured":"Wang, X., Chen, J., Cao, L.: A hybrid feature selection and machine learning framework for malicious activity detection in cyber-physical systems. Futur. Gener. Comput. Syst. 76, 69\u201379 (2017)","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"6","key":"25_CR5","first-page":"4441","volume":"16","author":"K Gai","year":"2020","unstructured":"Gai, K., Qian, Y.: Blockchain-based security for cyber-physical systems: a survey. IEEE Trans. Industr. Inf. 16(6), 4441\u20134451 (2020)","journal-title":"IEEE Trans. Industr. Inf."},{"issue":"5","key":"25_CR6","first-page":"1763","volume":"9","author":"W Liu","year":"2018","unstructured":"Liu, W., Zhu, X., Cheng, X.: Hybrid feature selection algorithm for malicious activity detection in cyber-physical systems. J. Ambient. Intell. Humaniz. Comput. 9(5), 1763\u20131774 (2018)","journal-title":"J. Ambient. Intell. Humaniz. Comput."},{"issue":"6","key":"25_CR7","first-page":"3480","volume":"15","author":"S Raza","year":"2019","unstructured":"Raza, S., Sher, M., Malik, A.: Secure data sharing framework for cyber-physical systems based on blockchain technology. IEEE Trans. Industr. Inf. 15(6), 3480\u20133488 (2019)","journal-title":"IEEE Trans. Industr. Inf."},{"issue":"11","key":"25_CR8","first-page":"4870","volume":"14","author":"W Bao","year":"2018","unstructured":"Bao, W., Xu, J., Cao, J.: A blockchain-based access control system for cyber-physical systems. IEEE Trans. Industr. Inf. 14(11), 4870\u20134879 (2018)","journal-title":"IEEE Trans. Industr. Inf."},{"key":"25_CR9","first-page":"238","volume":"112","author":"A Almohaimeed","year":"2020","unstructured":"Almohaimeed, A., Alharbi, A., Alzahrani, A.: A hybrid deep learning model for malicious activity detection in cyber-physical systems. Futur. Gener. Comput. Syst. 112, 238\u2013247 (2020)","journal-title":"Futur. Gener. Comput. Syst."},{"unstructured":"Li, X., Huang, X., Wang, X.: Malicious activity detection in cyber-physical systems using machine learning and blockchain technology. In: Proceedings of the International Conference on Machine Learning and Cybernetics, pp. 1087\u20131092 (2017)","key":"25_CR10"},{"key":"25_CR11","first-page":"82468","volume":"7","author":"Z Zhang","year":"2019","unstructured":"Zhang, Z., Guo, Y., Li, S.: Feature selection and malicious activity detection in cyber-physical systems using genetic algorithm and machine learning. IEEE Access 7, 82468\u201382478 (2019)","journal-title":"IEEE Access"},{"issue":"7","key":"25_CR12","first-page":"3206","volume":"14","author":"Y Zhao","year":"2018","unstructured":"Zhao, Y., Han, Z., Cao, Y.: An intelligent intrusion detection system for cyber-physical systems based on deep learning. IEEE Trans. Industr. Inf. 14(7), 3206\u20133215 (2018)","journal-title":"IEEE Trans. Industr. Inf."},{"issue":"1","key":"25_CR13","first-page":"463","volume":"15","author":"C Xu","year":"2019","unstructured":"Xu, C., Dai, Y.: Blockchain-based auditable access control for cyber-physical Systems. IEEE Trans. Industr. Inf. 15(1), 463\u2013472 (2019)","journal-title":"IEEE Trans. Industr. Inf."},{"key":"25_CR14","first-page":"693","volume":"87","author":"A Karim","year":"2018","unstructured":"Karim, A., Abbas, H.: A hybrid model for malicious activity detection in cyber-physical systems using particle swarm optimization and deep learning. Futur. Gener. Comput. Syst. 87, 693\u2013703 (2018)","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"5","key":"25_CR15","first-page":"3194","volume":"16","author":"C Li","year":"2020","unstructured":"Li, C., Yang, F., Zhang, W.: Blockchain-based Integrity Verification for Cyber-Physical Systems. IEEE Trans. Industr. Inf. 16(5), 3194\u20133203 (2020)","journal-title":"IEEE Trans. Industr. Inf."},{"issue":"1","key":"25_CR16","first-page":"188","volume":"16","author":"Y Zhao","year":"2020","unstructured":"Zhao, Y., Han, Z.: Deep learning-based malicious activity detection in industrial cyber-physical systems. IEEE Trans. Industr. Inf. 16(1), 188\u2013198 (2020)","journal-title":"IEEE Trans. Industr. Inf."},{"issue":"3","key":"25_CR17","first-page":"1892","volume":"16","author":"T Wang","year":"2020","unstructured":"Wang, T., Zhang, J.: A blockchain-enabled trust model for secure data sharing in cyber-physical systems. IEEE Trans. Industr. Inf. 16(3), 1892\u20131901 (2020)","journal-title":"IEEE Trans. Industr. Inf."},{"key":"25_CR18","first-page":"30886","volume":"6","author":"C Zhou","year":"2018","unstructured":"Zhou, C., Liu, F.: Malicious activity detection in cyber-physical systems using hybrid particle swarm optimization and extreme learning machine. IEEE Access 6, 30886\u201330894 (2018)","journal-title":"IEEE Access"},{"issue":"10","key":"25_CR19","first-page":"5533","volume":"15","author":"X Yang","year":"2019","unstructured":"Yang, X., Xu, D., Ren, K.: Blockchain-based data integrity auditing for cyber-physical systems. IEEE Trans. Industr. Inf. 15(10), 5533\u20135543 (2019)","journal-title":"IEEE Trans. Industr. Inf."},{"unstructured":"Li, Y., Jiang, X., Dai, S.: A deep learning approach for intrusion detection using recurrent neural networks. In: 2017 IEEE Trustcom\/BigDataSE\/ICESS, pp. 278\u2013285 (2017)","key":"25_CR20"},{"doi-asserted-by":"crossref","unstructured":"Kim, Y., Park, J., Kim, J., Kim, S.: Long short-term memory recurrent neural network for network traffic classification. In: 2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA), pp. 201\u2013206 (2016)","key":"25_CR21","DOI":"10.1109\/PlatCon.2016.7456805"},{"doi-asserted-by":"crossref","unstructured":"Abdulhamid, S.M., Atiya, A.F.: Feature selection with a novel improved water wave optimization algorithm. In: 2018 10th International Conference on Machine Learning and Computing (ICMLC), pp. 150\u2013155 (2018)","key":"25_CR22","DOI":"10.1109\/ICMLC.2018.8526982"},{"key":"25_CR23","first-page":"125","volume":"60","author":"AL Buczak","year":"2016","unstructured":"Buczak, A.L., Guven, E.: A survey of network flow applications. J. Netw. Comput. Appl. 60, 125\u2013144 (2016)","journal-title":"J. Netw. Comput. Appl."},{"unstructured":"Abdessalem, R.B., Nolle, L.: Detecting malicious activity in IoT networks using machine learning algorithms. In: Proceedings of the 11th International Conference on Availability, Reliability and Security (ARES), pp. 55\u201363 (2016)","key":"25_CR24"},{"key":"25_CR25","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1016\/j.eswa.2016.04.032","volume":"59","author":"CA Ronao","year":"2016","unstructured":"Ronao, C.A., Cho, S.B.: Human activity recognition with smartphone sensors using deep learning neural networks. Expert Syst. Appl. 59, 235\u2013244 (2016)","journal-title":"Expert Syst. Appl."},{"unstructured":"Saxe, J., McCloskey, S., Berger, J.: Deep neural network based intrusion detection in software defined networking. In: 2015 11th International Conference on Network and Service Management (CNSM), pp. 400\u2013405 (2015)","key":"25_CR26"},{"key":"25_CR27","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jnca.2017.12.001","volume":"103","author":"Z Salehahmadi","year":"2018","unstructured":"Salehahmadi, Z., Dehghantanha, A., Choo, K.K.R., Conti, M.: Intrusion detection system for the Internet of Things utilizing a deep learning approach. J. Netw. Comput. Appl. 103, 1\u201310 (2018)","journal-title":"J. Netw. Comput. Appl."},{"unstructured":"Erkol, B., Yilmaz, Y., Bicakci, K., Anarim, E.: Anomaly detection in IoT networks using deep neural networks. In: Proceedings of the 8th International Conference on Internet of Things, pp. 68\u201373 (2017)","key":"25_CR28"},{"key":"25_CR29","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/j.neucom.2016.12.038","volume":"234","author":"Y Liu","year":"2018","unstructured":"Liu, Y., Xiang, Y., Fan, Y.: A survey of deep neural network architectures and their applications. Neurocomputing 234, 11\u201326 (2018)","journal-title":"Neurocomputing"},{"issue":"8","key":"25_CR30","first-page":"4378","volume":"42","author":"SH Tan","year":"2015","unstructured":"Tan, S.H., Ristaniemi, T.: Recent advances in feature selection and its applications. Expert Syst. Appl. 42(8), 4378\u20134409 (2015)","journal-title":"Expert Syst. Appl."},{"key":"25_CR31","first-page":"19","volume":"60","author":"R Abdullah","year":"2019","unstructured":"Abdullah, R., Tawalbeh, L., Khreishah, A.: Survey of machine learning algorithms for network anomaly detection. J. Netw. Comput. Appl. 60, 19\u201331 (2019)","journal-title":"J. Netw. Comput. Appl."}],"container-title":["Communications in Computer and Information Science","Recent Trends in Image Processing and Pattern Recognition"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-53085-2_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,9]],"date-time":"2024-11-09T12:56:27Z","timestamp":1731156987000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-53085-2_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031530845","9783031530852"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-53085-2_25","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"30 January 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"RTIP2R","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Recent Trends in Image Processing and Pattern Recognition","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Derby","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 December 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 December 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"rtip2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/rtip2r-conference.org\/2023\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"CMT, Microsoft","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"216","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"62","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"29% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.39","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.79","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}