{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T16:15:36Z","timestamp":1742919336974,"version":"3.40.3"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031709050"},{"type":"electronic","value":"9783031709067"}],"license":[{"start":{"date-parts":[[2024,10,18]],"date-time":"2024-10-18T00:00:00Z","timestamp":1729209600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,10,18]],"date-time":"2024-10-18T00:00:00Z","timestamp":1729209600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-70906-7_5","type":"book-chapter","created":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T09:02:51Z","timestamp":1729155771000},"page":"46-57","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An Optimized Approach Towards Malware Detection Using Java Microservices"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-1085-477X","authenticated-orcid":false,"given":"Mandhar","family":"Goel","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0003-7816-9199","authenticated-orcid":false,"given":"Subodh","family":"Thakur","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0005-0795-088X","authenticated-orcid":false,"given":"Nishant","family":"Kumar","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6674-9159","authenticated-orcid":false,"given":"Nishant","family":"Gupta","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8393-3652","authenticated-orcid":false,"given":"Mayank","family":"Singh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,10,18]]},"reference":[{"unstructured":"Raff, E., Charles, N.: A survey of machine learning methods and challenges for Windows malware classification. arXiv preprint arXiv:2006.09271 (2020)","key":"5_CR1"},{"doi-asserted-by":"crossref","unstructured":"Tram, T.-H., et al.: An empirical study on unsupervised network anomaly detection using generative adversarial networks. In: Proceedings of the 1st ACM Workshop on Security and Privacy on Artificial Intelligence, pp. 20\u201329 (2020)","key":"5_CR2","DOI":"10.1145\/3385003.3410924"},{"issue":"3","key":"5_CR3","doi-asserted-by":"publisher","first-page":"713","DOI":"10.1111\/cgf.14034","volume":"39","author":"C Angelos","year":"2020","unstructured":"Angelos, C., Messias, M.R., Ilir, J., Kostiantyn, K., Fabrice, R., Andreas, K.: The state of the art in enhancing trust in machine learning models with the use of visualizations. Comput. Graph. Forum 39(3), 713\u2013756 (2020)","journal-title":"Comput. Graph. Forum"},{"issue":"3","key":"5_CR4","doi-asserted-by":"publisher","first-page":"1879","DOI":"10.1109\/COMST.2021.3081450","volume":"23","author":"Y Zhiyuan","year":"2021","unstructured":"Zhiyuan, Y., Zack, K., Qiben, Y., Ning, Z.: Security and privacy in the emerging cyber-physical world: a survey. IEEE Commun. Surv. Tutorials 23(3), 1879\u20131919 (2021)","journal-title":"IEEE Commun. Surv. Tutorials"},{"issue":"7","key":"5_CR5","first-page":"19","volume":"20","author":"J Han-Shin","year":"2020","unstructured":"Han-Shin, J., Chanshin, P., Eunhyoung, L., Kun, C.H., Jaedon, P.: Path loss prediction based on machine learning techniques: Principal component analysis, artificial neural network, and Gaussian process. Sensors 20(7), 19\u201327 (2020)","journal-title":"Sensors"},{"key":"5_CR6","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1016\/j.future.2023.12.032","volume":"154","author":"F Nikos","year":"2024","unstructured":"Nikos, F., et al.: Intent-driven orchestration of serverless applications in the computing continuum. Future Gener. Comput. Syst. 154, 72\u201386 (2024)","journal-title":"Future Gener. Comput. Syst."},{"key":"5_CR7","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1016\/j.future.2023.12.026","volume":"154","author":"A Mathew","year":"2024","unstructured":"Mathew, A., Andrikopoulos, V., Blaauw, F.J., Karastoyanova, D.: Pattern-based serverless data processing pipelines for Function-as-a-Service orchestration systems. Future Gener. Comput. Syst. 154, 87\u2013100 (2024)","journal-title":"Future Gener. Comput. Syst."},{"unstructured":"Anton, K.: Microservices Architecture: practical implementations, benefits, and nuances (2024)","key":"5_CR8"},{"unstructured":"Swati, K., Vatsal, T., Hitesh, T.: Cyber Security on the Edge: Efficient Enabling of Machine Learning on IoT Devices (2024)","key":"5_CR9"},{"key":"5_CR10","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1016\/j.future.2023.11.022","volume":"153","author":"KM Emami","year":"2024","unstructured":"Emami, K.M., Saeed, S.: A scalable modified deep reinforcement learning algorithm for serverless IoT microservice composition infrastructure in fog layer. Futur. Gener. Comput. Syst. 153, 206\u2013221 (2024)","journal-title":"Futur. Gener. Comput. Syst."},{"unstructured":"Jia-Hao, S., Chun-Wei, L.J. Gautam, S.: Distributed learning mechanisms for anomaly detection in privacy-aware energy grid management systems. ACM Trans. Sensor Netw. (2024)","key":"5_CR11"},{"unstructured":"Zhaorui, W., Yuhui, D., Yi, Z., Jie, L., Shujie, P., Xiao, Q.: FaaSBatch: boosting serverless efficiency with in-container parallelism and resource multiplexing. IEEE Transactions on Computers (2024)","key":"5_CR12"},{"key":"5_CR13","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1016\/j.procs.2023.12.232","volume":"231","author":"G Rui","year":"2024","unstructured":"Rui, G., Julio, D., Cesar, Q., Manuel, S.M., Filipe, S.M.: Architecture proposal for deploying and integrating intelligent models in ABI. Procedia Comput. Sci. 231, 445\u2013451 (2024)","journal-title":"Procedia Comput. Sci."},{"key":"5_CR14","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/978-3-662-67782-7_4","volume-title":"Large-Scale Agile Frameworks: Agile Frameworks, Agile Infrastructure and Pragmatic Solutions for Digital Transformation","author":"S Block","year":"2023","unstructured":"Block, S.: How to adapt and implement a large-scale agile framework in your organization. In: Block, S. (ed.) Large-Scale Agile Frameworks: Agile Frameworks, Agile Infrastructure and Pragmatic Solutions for Digital Transformation, pp. 65\u2013168. Springer Berlin Heidelberg, Berlin, Heidelberg (2023). https:\/\/doi.org\/10.1007\/978-3-662-67782-7_4"},{"unstructured":"Chongjian, Y., et al.: Leveraging LLMs for KPIs Retrieval from Hybrid Long-Document: A Comprehensive Framework and Dataset. arXiv (2023)","key":"5_CR15"},{"unstructured":"Sadiq, A.: Intrusion Detection Using the WEKA Machine Learning Tool (2021)","key":"5_CR16"},{"unstructured":"Ian, C.: Transparent Machine Learning: Theory and Computation (2023)","key":"5_CR17"},{"unstructured":"Weikai, Y., Mengchen, L., Zheng, W., Shixia, L.: Foundation models meet visualizations: Challenges and opportunities. arXiv (2023)","key":"5_CR18"},{"unstructured":"Elmachtoub, A.N., Nam Liang, J.C., McNellis, R.: Decision trees for decision-making under the predict-then-optimize framework. In: International Conference on Machine Learning pp. 2858\u20132867 (2020)","key":"5_CR19"},{"unstructured":"Fredrik, O., Erik, S.: Exploratory data analysis of live 5G radio access network configuration data using interpretable machine learning (2023)","key":"5_CR20"},{"unstructured":"Barbara, T.: Causal Network Inference of High-Throughput Data with Structural Equation Models (2024)","key":"5_CR21"},{"doi-asserted-by":"crossref","unstructured":"Dombrowski, A.-K., Gerken, J.E., M\u00fcller, K.-R., Kessel, P.:Diffeomorphic counterfactuals with generative models. In: IEEE Transactions on Pattern Analysis and Machine Intelligence (2023)","key":"5_CR22","DOI":"10.1109\/TPAMI.2023.3339980"},{"key":"5_CR23","doi-asserted-by":"publisher","first-page":"106813","DOI":"10.1016\/j.ress.2020.106813","volume":"198","author":"K Omar","year":"2020","unstructured":"Omar, K., Paolo, G., Paolo, C.G.: Probabilistic framework to evaluate the resilience of engineering systems using Bayesian and dynamic Bayesian networks. Reliab. Eng. Syst. Saf. 198, 106813 (2020)","journal-title":"Reliab. Eng. Syst. Saf."}],"container-title":["Communications in Computer and Information Science","Advances in Computing and Data Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-70906-7_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,29]],"date-time":"2024-11-29T20:14:41Z","timestamp":1732911281000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-70906-7_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,18]]},"ISBN":["9783031709050","9783031709067"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-70906-7_5","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2024,10,18]]},"assertion":[{"value":"18 October 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICACDS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advances in Computing and Data Sciences","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Velizy","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 May 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 May 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icacds2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icacds.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}