{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,26]],"date-time":"2025-12-26T01:24:02Z","timestamp":1766712242614,"version":"3.40.3"},"publisher-location":"Cham","reference-count":45,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031597060"},{"type":"electronic","value":"9783031597077"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-59707-7_20","type":"book-chapter","created":{"date-parts":[[2024,5,10]],"date-time":"2024-05-10T04:01:42Z","timestamp":1715313702000},"page":"224-239","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["An Anomaly Intrusion Detection Systems in IoT Based on Autoencoder: A Review"],"prefix":"10.1007","author":[{"given":"Muaadh A.","family":"Alsoufi","sequence":"first","affiliation":[]},{"given":"Maheyzah Md","family":"Siraj","sequence":"additional","affiliation":[]},{"given":"Fuad A.","family":"Ghaleb","sequence":"additional","affiliation":[]},{"given":"Aya Hasan","family":"Abdulqader","sequence":"additional","affiliation":[]},{"given":"Elham","family":"Ali","sequence":"additional","affiliation":[]},{"given":"Maryam","family":"Omar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,5,11]]},"reference":[{"key":"20_CR1","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1016\/j.future.2021.08.006","volume":"126","author":"BB Sinha","year":"2022","unstructured":"Sinha, B.B., Dhanalakshmi, R.: Recent advancements and challenges of Internet of Things in smart agriculture: a survey. Futur. Gener. Comput. Syst. 126, 169\u2013184 (2022)","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"3","key":"20_CR2","doi-asserted-by":"publisher","first-page":"668","DOI":"10.3390\/pr11030668","volume":"11","author":"JM Failing","year":"2023","unstructured":"Failing, J.M., Abell\u00e1n-Nebot, J.V., N\u00e1cher, S.B., Castellano, P.R., Subir\u00f3n, F.R.: A tool condition monitoring system based on low-cost sensors and an IoT platform for rapid deployment. Processes 11(3), 668 (2023). https:\/\/doi.org\/10.3390\/pr11030668","journal-title":"Processes"},{"issue":"8","key":"20_CR3","doi-asserted-by":"publisher","first-page":"4117","DOI":"10.3390\/s23084117","volume":"23","author":"U Tariq","year":"2023","unstructured":"Tariq, U., Ahmed, I., Bashir, A.K., Shaukat, K.: A critical cybersecurity analysis and future research directions for the internet of things: a comprehensive review. Sensors 23(8), 4117 (2023)","journal-title":"Sensors"},{"key":"20_CR4","doi-asserted-by":"crossref","unstructured":"Badotra, S., Nagpal, D., Panda, S.N., Tanwar, S., Bajaj, S.: IoT-enabled healthcare network with SDN. In: 2020 8th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), pp. 38\u201342. IEEE (2020)","DOI":"10.1109\/ICRITO48877.2020.9197807"},{"key":"20_CR5","doi-asserted-by":"crossref","unstructured":"Udrea, I., et al.: IoT solution for monitoring indoor climate parameters in open space offices. In: E3S Web of Conferences, vol. 180: EDP Sciences, p. 02012 (2020)","DOI":"10.1051\/e3sconf\/202018002012"},{"issue":"2","key":"20_CR6","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/s10796-014-9492-7","volume":"17","author":"S Li","year":"2015","unstructured":"Li, S., Xu, L.D., Zhao, S.: The internet of things: a survey. Inf. Syst. Front. 17(2), 243\u2013259 (2015)","journal-title":"Inf. Syst. Front."},{"key":"20_CR7","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1007\/978-3-030-98741-1_31","volume-title":"Advances on Intelligent Informatics and Computing: Health Informatics, Intelligent Systems, Data Science and Smart Computing","author":"Y Fazea","year":"2022","unstructured":"Fazea, Y., Mohammed, F., Al-Nahari, A.: A review on 5G technology in IoT-application based on light fidelity (Li-Fi) indoor communication. In: Saeed, F., Mohammed, F., Ghaleb, F. (eds.) Advances on Intelligent Informatics and Computing: Health Informatics, Intelligent Systems, Data Science and Smart Computing, pp. 371\u2013384. Springer International Publishing, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-030-98741-1_31"},{"key":"20_CR8","doi-asserted-by":"publisher","first-page":"734","DOI":"10.1007\/978-3-030-33582-3_69","volume-title":"Emerging Trends in Intelligent Computing and Informatics: Data Science, Intelligent Information Systems and Smart Computing","author":"WM Alsharafi","year":"2020","unstructured":"Alsharafi, W.M., Omar, M.N., Al-Majmar, N.A., Fazea, Y.: Normal profile updating method for enhanced packet header anomaly detection. In: Saeed, F., Mohammed, F., Gazem, N. (eds.) Emerging Trends in Intelligent Computing and Informatics: Data Science, Intelligent Information Systems and Smart Computing, pp. 734\u2013747. Springer International Publishing, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-33582-3_69"},{"issue":"5","key":"20_CR9","doi-asserted-by":"publisher","first-page":"2844","DOI":"10.3390\/s23052844","volume":"23","author":"MA Belay","year":"2023","unstructured":"Belay, M.A., Blakseth, S.S., Rasheed, A., Salvo Rossi, P.: Unsupervised anomaly detection for IoT-based multivariate time series: existing solutions, performance analysis and future directions. Sensors 23(5), 2844 (2023)","journal-title":"Sensors"},{"issue":"9","key":"20_CR10","doi-asserted-by":"publisher","first-page":"8852","DOI":"10.1109\/JIOT.2020.2996425","volume":"7","author":"M Saharkhizan","year":"2020","unstructured":"Saharkhizan, M., Azmoodeh, A., Dehghantanha, A., Choo, K.-K.R., Parizi, R.M.: An ensemble of deep recurrent neural networks for detecting IoT cyber attacks using network traffic. IEEE Internet Things J. 7(9), 8852\u20138859 (2020)","journal-title":"IEEE Internet Things J."},{"issue":"18","key":"20_CR11","doi-asserted-by":"publisher","first-page":"8383","DOI":"10.3390\/app11188383","volume":"11","author":"MA Alsoufi","year":"2021","unstructured":"Alsoufi, M.A., et al.: Anomaly-based intrusion detection systems in iot using deep learning: a systematic literature review. Appl. Sci. 11(18), 8383 (2021)","journal-title":"Appl. Sci."},{"issue":"6","key":"20_CR12","doi-asserted-by":"publisher","first-page":"2974","DOI":"10.3390\/s23062974","volume":"23","author":"\u0141 Wawrowski","year":"2023","unstructured":"Wawrowski, \u0141, et al.: Anomaly detection module for network traffic monitoring in public institutions. Sensors 23(6), 2974 (2023)","journal-title":"Sensors"},{"key":"20_CR13","doi-asserted-by":"publisher","first-page":"2259","DOI":"10.1016\/j.procs.2021.08.239","volume":"192","author":"\u0141 Wawrowski","year":"2021","unstructured":"Wawrowski, \u0141, et al.: Detecting anomalies and attacks in network traffic monitoring with classification methods and XAI-based explainability. Procedia Comput. Sci. 192, 2259\u20132268 (2021)","journal-title":"Procedia Comput. Sci."},{"key":"20_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2022.100568","volume":"19","author":"A Chatterjee","year":"2022","unstructured":"Chatterjee, A., Ahmed, B.S.: IoT anomaly detection methods and applications: a survey. Internet Things 19, 100568 (2022)","journal-title":"Internet Things"},{"issue":"21","key":"20_CR15","doi-asserted-by":"publisher","first-page":"8417","DOI":"10.3390\/s22218417","volume":"22","author":"AM Banaamah","year":"2022","unstructured":"Banaamah, A.M., Ahmad, I.: Intrusion detection in IoT using deep learning. Sensors 22(21), 8417 (2022)","journal-title":"Sensors"},{"issue":"4","key":"20_CR16","doi-asserted-by":"publisher","first-page":"508","DOI":"10.3390\/biom12040508","volume":"12","author":"M Nasser","year":"2022","unstructured":"Nasser, M., et al.: Feature reduction for molecular similarity searching based on au-toencoder deep learning. Biomolecules 12(4), 508 (2022)","journal-title":"Biomolecules"},{"issue":"12","key":"20_CR17","doi-asserted-by":"publisher","first-page":"3448","DOI":"10.1016\/j.comnet.2007.02.001","volume":"51","author":"A Patcha","year":"2007","unstructured":"Patcha, A., Park, J.-M.: An overview of anomaly detection techniques: existing solutions and latest technological trends. Comput. Netw. 51(12), 3448\u20133470 (2007)","journal-title":"Comput. Netw."},{"key":"20_CR18","doi-asserted-by":"publisher","first-page":"659","DOI":"10.1007\/978-3-030-70713-2_60","volume-title":"Innovative Systems for Intelligent Health Informatics: Data Science, Health Informatics, Intelligent Systems, Smart Computing","author":"A Muaadh","year":"2021","unstructured":"Muaadh, A., Alsoufi, S.R., Siraj, M.M., Ali, A., Nasser, M., Abdo, S.: Anomaly intrusion detection systems in IoT using deep learning techniques: a survey. In: Saeed, F., Mohammed, F., Al-Nahari, A. (eds.) Innovative Systems for Intelligent Health Informatics: Data Science, Health Informatics, Intelligent Systems, Smart Computing, pp. 659\u2013675. Springer International Publishing, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-70713-2_60"},{"issue":"2","key":"20_CR19","doi-asserted-by":"publisher","first-page":"198","DOI":"10.3390\/electronics11020198","volume":"11","author":"M Abdullahi","year":"2022","unstructured":"Abdullahi, M., et al.: Detecting cybersecurity attacks in internet of things using artificial intelligence methods: a systematic literature review. Electronics 11(2), 198 (2022)","journal-title":"Electronics"},{"issue":"24","key":"20_CR20","doi-asserted-by":"publisher","first-page":"8320","DOI":"10.3390\/s21248320","volume":"21","author":"A Diro","year":"2021","unstructured":"Diro, A., Chilamkurti, N., Nguyen, V.-D., Heyne, W.: A comprehensive study of anomaly detection schemes in IoT networks using machine learning algorithms. Sensors 21(24), 8320 (2021)","journal-title":"Sensors"},{"key":"20_CR21","doi-asserted-by":"crossref","unstructured":"Bengio, Y.: Learning deep architectures for AI. Foundations and trends\u00ae in Mach. Learn. 2(1), 1\u2013127 (2009)","DOI":"10.1561\/2200000006"},{"key":"20_CR22","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1016\/j.neucom.2013.09.055","volume":"139","author":"C-Y Liou","year":"2014","unstructured":"Liou, C.-Y., Cheng, W.-C., Liou, J.-W., Liou, D.-R.: Autoencoder for words. Neurocomputing 139, 84\u201396 (2014)","journal-title":"Neurocomputing"},{"key":"20_CR23","doi-asserted-by":"crossref","unstructured":"Shafiq, U., Shahzad, M.K., Anwar, M., Shaheen, Q., Shiraz, M., Gani, A.: Transfer learning auto-encoder neural networks for anomaly detection of DDoS generating IoT devices. Secur. Commun. Netw. 2022 (2022)","DOI":"10.1155\/2022\/8221351"},{"key":"20_CR24","doi-asserted-by":"publisher","first-page":"140136","DOI":"10.1109\/ACCESS.2021.3116612","volume":"9","author":"W Xu","year":"2021","unstructured":"Xu, W., Jang-Jaccard, J., Singh, A., Wei, Y., Sabrina, F.: Improving performance of autoencoder-based network anomaly detection on NSL-KDD dataset. IEEE Access 9, 140136\u2013140146 (2021)","journal-title":"IEEE Access"},{"issue":"16","key":"20_CR25","doi-asserted-by":"publisher","first-page":"1876","DOI":"10.3390\/electronics10161876","volume":"10","author":"I Apostol","year":"2021","unstructured":"Apostol, I., Preda, M., Nila, C., Bica, I.: IoT botnet anomaly detection using unsupervised deep learning. Electronics 10(16), 1876 (2021)","journal-title":"Electronics"},{"issue":"6","key":"20_CR26","doi-asserted-by":"publisher","first-page":"4944","DOI":"10.1109\/JIOT.2020.3034156","volume":"8","author":"SI Popoola","year":"2020","unstructured":"Popoola, S.I., Adebisi, B., Hammoudeh, M., Gui, G., Gacanin, H.: Hybrid deep learning for botnet attack detection in the internet-of-things networks. IEEE Internet Things J. 8(6), 4944\u20134956 (2020)","journal-title":"IEEE Internet Things J."},{"key":"20_CR27","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2019.100122","volume":"14","author":"A Telikani","year":"2021","unstructured":"Telikani, A., Gandomi, A.H.: Cost-sensitive stacked auto-encoders for intrusion detection in the internet of things. Internet Things 14, 100122 (2021)","journal-title":"Internet Things"},{"key":"20_CR28","doi-asserted-by":"crossref","unstructured":"Shahid, M.R., Blanc, G., Zhang, Z., Debar, H.: Anomalous communications detec-tion in IoT networks using sparse autoencoders. In: 2019 IEEE 18th international symposium on network computing and applications (NCA), pp. 1\u20135. IEEE (2019)","DOI":"10.1109\/NCA.2019.8935007"},{"issue":"17","key":"20_CR29","doi-asserted-by":"publisher","first-page":"6617","DOI":"10.3390\/s22176617","volume":"22","author":"W Gouda","year":"2022","unstructured":"Gouda, W., Tahir, S., Alanazi, S., Almufareh, M., Alwakid, G.: Unsupervised outlier detection in IOT using deep VAE. Sensors 22(17), 6617 (2022)","journal-title":"Sensors"},{"key":"20_CR30","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108399","volume":"199","author":"EM B\u00e5rli","year":"2021","unstructured":"B\u00e5rli, E.M., Yazidi, A., Viedma, E.H., Haugerud, H.: DoS and DDoS mitigation using variational autoencoders. Comput. Netw. 199, 108399 (2021)","journal-title":"Comput. Netw."},{"key":"20_CR31","doi-asserted-by":"crossref","unstructured":"Lopez-Martin, M., Carro, B., Sanchez-Esguevillas, A., Lloret, J.: Conditional variational autoencoder for prediction and feature recovery applied to intrusion detection in IoT. Sensors 17(9), 1967 (2017). https:\/\/www.mdpi.com\/1424-8220\/17\/9\/1967","DOI":"10.3390\/s17091967"},{"key":"20_CR32","doi-asserted-by":"crossref","unstructured":"Salahuddin, M.A., Bari, M.F., Alameddine, H.A., Pourahmadi, V., Boutaba, R.: Time-based anomaly detection using autoencoder. In: 2020 16th International Conference on Network and Service Management (CNSM), pp. 1\u20139. IEEE (2020)","DOI":"10.23919\/CNSM50824.2020.9269112"},{"key":"20_CR33","doi-asserted-by":"crossref","unstructured":"Vu, L., Nguyen, Q.U., Nguyen, D.N., Hoang, D.T., Dutkiewicz, E.: Learning latent representation for IoT anomaly detection. IEEE Trans. Cybern. 52, 3769\u20133782 (2020)","DOI":"10.1109\/TCYB.2020.3013416"},{"key":"20_CR34","doi-asserted-by":"publisher","first-page":"8434","DOI":"10.1109\/ACCESS.2022.3144208","volume":"10","author":"B Lahasan","year":"2022","unstructured":"Lahasan, B., Samma, H.: Optimized deep autoencoder model for Internet of Things intruder detection. IEEE Access 10, 8434\u20138448 (2022)","journal-title":"IEEE Access"},{"issue":"1","key":"20_CR35","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1109\/TSMC.2020.2968516","volume":"52","author":"C Yin","year":"2020","unstructured":"Yin, C., Zhang, S., Wang, J., Xiong, N.N.: Anomaly detection based on convolutional recurrent autoencoder for IoT time series. IEEE Trans. Syst. Man Cybern.: Syst. 52(1), 112\u2013122 (2020)","journal-title":"IEEE Trans. Syst. Man Cybern.: Syst."},{"key":"20_CR36","doi-asserted-by":"publisher","first-page":"30387","DOI":"10.1109\/ACCESS.2020.2973023","volume":"8","author":"R-H Hwang","year":"2020","unstructured":"Hwang, R.-H., Peng, M.-C., Huang, C.-W., Lin, P.-C., Nguyen, V.-L.: An unsupervised deep learning model for early network traffic anomaly detection. IEEE Access 8, 30387\u201330399 (2020)","journal-title":"IEEE Access"},{"key":"20_CR37","doi-asserted-by":"publisher","DOI":"10.1016\/j.buildenv.2020.107212","volume":"183","author":"Y Liu","year":"2020","unstructured":"Liu, Y., Pang, Z., Karlsson, M., Gong, S.: Anomaly detection based on machine learning in IoT-based vertical plant wall for indoor climate control. Build. Environ. 183, 107212 (2020)","journal-title":"Build. Environ."},{"key":"20_CR38","doi-asserted-by":"crossref","unstructured":"Zixu, T., Liyanage, K.S.K., Gurusamy, M.: Generative adversarial network and au-to encoder based anomaly detection in distributed IoT networks. In: GLOBECOM 2020\u20132020 IEEE Global Communications Conference, pp. 1\u20137. IEEE (2020)","DOI":"10.1109\/GLOBECOM42002.2020.9348244"},{"issue":"20","key":"20_CR39","doi-asserted-by":"publisher","first-page":"3287","DOI":"10.3390\/electronics11203287","volume":"11","author":"Y Hou","year":"2022","unstructured":"Hou, Y., He, R., Dong, J., Yang, Y., Ma, W.: IoT anomaly detection based on autoencoder and Bayesian Gaussian mixture model. Electronics 11(20), 3287 (2022)","journal-title":"Electronics"},{"key":"20_CR40","doi-asserted-by":"crossref","unstructured":"Kim, S., Hwang, C., Lee, T.: Anomaly based unknown intrusion detection in end-point environments. Electronics 9(6), 1022 (2020). https:\/\/www.mdpi.com\/2079-9292\/9\/6\/1022","DOI":"10.3390\/electronics9061022"},{"key":"20_CR41","doi-asserted-by":"crossref","unstructured":"Abusitta, A., de Carvalho, G.H., Wahab, O.A., Halabi, T., Fung, B.C., Al Ma-moori, S.: Deep learning-enabled anomaly detection for IoT systems. Internet Things, 21, 100656 (2023)","DOI":"10.1016\/j.iot.2022.100656"},{"issue":"3","key":"20_CR42","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1109\/MPRV.2018.03367731","volume":"17","author":"Y Meidan","year":"2018","unstructured":"Meidan, Y., et al.: N-baiot\u2014network-based detection of IoT botnet attacks using deep auto encoders. IEEE Pervasive Comput. 17(3), 12\u201322 (2018)","journal-title":"IEEE Pervasive Comput."},{"key":"20_CR43","volume":"8","author":"C Regan","year":"2022","unstructured":"Regan, C., Nasajpour, M., Parizi, R.M., Pouriyeh, S., Dehghantanha, A., Choo, K.-K.R.: Federated IoT attack detection using decentralized edge data. Mach. Learn. Appl. 8, 100263 (2022)","journal-title":"Mach. Learn. Appl."},{"issue":"12","key":"20_CR44","doi-asserted-by":"publisher","first-page":"5656","DOI":"10.3390\/s23125656","volume":"23","author":"M Rathee","year":"2023","unstructured":"Rathee, M., Ba\u010di\u0107, B., Doborjeh, M.: Automated road defect and anomaly detection for traffic safety: a systematic review. Sensors 23(12), 5656 (2023)","journal-title":"Sensors"},{"key":"20_CR45","doi-asserted-by":"publisher","unstructured":"Abdulganiyu, O.H., Ait Tchakoucht, T., Saheed, Y.K.: A systematic literature review for network intrusion detection system (IDS). Int. J. Inform. Secur. 22, 1125\u20131162 (2023). https:\/\/doi.org\/10.1007\/s10207-023-00682-2","DOI":"10.1007\/s10207-023-00682-2"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advances in Intelligent Computing Techniques and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-59707-7_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,10]],"date-time":"2024-05-10T04:03:57Z","timestamp":1715313837000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-59707-7_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031597060","9783031597077"],"references-count":45,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-59707-7_20","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"11 May 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IRICT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference of Reliable Information and Communication Technology","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Johor Bahru","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Malaysia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 December 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 December 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"irict2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/irict.co\/irict2023\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}