{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T19:51:50Z","timestamp":1757620310738,"version":"3.44.0"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031952951"},{"type":"electronic","value":"9783031952968"}],"license":[{"start":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T00:00:00Z","timestamp":1753833600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T00:00:00Z","timestamp":1753833600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-031-95296-8_4","type":"book-chapter","created":{"date-parts":[[2025,7,29]],"date-time":"2025-07-29T05:17:05Z","timestamp":1753766225000},"page":"40-51","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Processing and Analysis of Network Flow Data Using Intelligent Technologies"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0855-3318","authenticated-orcid":false,"given":"Inomjon","family":"Yarashov","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2290-5786","authenticated-orcid":false,"given":"Rakhimberdiev","family":"Kuvonchbek","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1543-056X","authenticated-orcid":false,"given":"Maruf","family":"Juraev","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0002-4056-7258","authenticated-orcid":false,"given":"Furqat","family":"Rahmonov","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,30]]},"reference":[{"key":"4_CR1","unstructured":"Abdullah, A.M.: Application of petri nets in computer networks. Department of Applied Mathematics and Computer Science, Eastern Mediterranean University\u2013North Cyprus (2017)"},{"key":"4_CR2","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1007\/978-3-031-30258-9_10","volume-title":"Internet of Things, Smart Spaces, and Next Generation Networks and Systems: 22nd International Conference, NEW2AN 2022, Tashkent, Uzbekistan, December 15\u201316, 2022, Proceedings","author":"R Kuvonchbek","year":"2023","unstructured":"Kuvonchbek, R.: Method authentication of objects information communication. In: Koucheryavy, Y., Aziz, A. (eds.) Internet of Things, Smart Spaces, and Next Generation Networks and Systems: 22nd International Conference, NEW2AN 2022, Tashkent, Uzbekistan, December 15\u201316, 2022, Proceedings, pp. 105\u2013116. Springer Nature Switzerland, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-30258-9_10"},{"issue":"7","key":"4_CR3","doi-asserted-by":"publisher","first-page":"3081","DOI":"10.1109\/TCYB.2019.2940940","volume":"50","author":"R Coulter","year":"2019","unstructured":"Coulter, R., Han, Q.-L., Pan, L., Zhang, J., Xiang, Y.: Data-driven cyber security in perspective-Intelligent traffic analysis. IEEE Trans. Cybern. 50(7), 3081\u20133093 (2019)","journal-title":"IEEE Trans. Cybern."},{"issue":"11","key":"4_CR4","doi-asserted-by":"publisher","first-page":"1946","DOI":"10.1109\/TC.2017.2709742","volume":"66","author":"B Mao","year":"2017","unstructured":"Mao, B., et al.: Routing or computing? The paradigm shift towards intelligent computer network packet transmission based on deep learning. IEEE Trans. Comput. 66(11), 1946\u20131960 (2017)","journal-title":"IEEE Trans. Comput."},{"issue":"4","key":"4_CR5","first-page":"1","volume":"1","author":"S Mukkamala","year":"2003","unstructured":"Mukkamala, S., Sung, A.H.: Identifying significant features for network forensic analysis using artificial intelligent techniques. Int. J. Digit. Evid. 1(4), 1\u201317 (2003)","journal-title":"Int. J. Digit. Evid."},{"key":"4_CR6","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1007\/978-3-031-60994-7_19","volume-title":"Internet of Things, Smart Spaces, and Next Generation Networks and Systems: 23rd International Conference, NEW2AN 2023, and 16th Conference, ruSMART 2023, Dubai, United Arab Emirates, December 21\u201322, 2023, Proceedings, Part I","author":"R Kuvonchbek","year":"2024","unstructured":"Kuvonchbek, R., Arzieva, J.T., Arziev, A.: Designing the UzBCS lending platform network based on blockchain technology and ensure transaction security. In: Koucheryavy, Y., Aziz, A. (eds.) Internet of Things, Smart Spaces, and Next Generation Networks and Systems: 23rd International Conference, NEW2AN 2023, and 16th Conference, ruSMART 2023, Dubai, United Arab Emirates, December 21\u201322, 2023, Proceedings, Part I, pp. 232\u2013243. Springer Nature Switzerland, Cham (2024). https:\/\/doi.org\/10.1007\/978-3-031-60994-7_19"},{"issue":"5","key":"4_CR7","first-page":"6021","volume":"37","author":"T Hua","year":"2019","unstructured":"Hua, T., Li, L.: Computer network security technology based on artificial intelligence. J. Intell. Fuzzy Syst. 37(5), 6021\u20136028 (2019)","journal-title":"J. Intell. Fuzzy Syst."},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"Thames, J.L., Abler, R., Saad. A.: Hybrid intelligent systems for network security. In: Proceedings of the 44th Annual Southeast Regional Conference, pp. 286\u2013289 (2006)","DOI":"10.1145\/1185448.1185513"},{"issue":"1","key":"4_CR9","first-page":"18","volume":"2","author":"Z Xu","year":"2024","unstructured":"Xu, Z., Yuan, J., Liqiang, Y., Wang, G., Zhu, M.: Machine learning-based traffic flow prediction and intelligent traffic management. Int. J. Comput. Sci. Inform. Technol. 2(1), 18\u201327 (2024)","journal-title":"Int. J. Comput. Sci. Inform. Technol."},{"key":"4_CR10","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2023.110162","volume":"239","author":"R Doriguzzi-Corin","year":"2024","unstructured":"Doriguzzi-Corin, R., Knob, L.A.D., Mendozzi, L., Siracusa, D., Savi, M.: Introducing packet-level analysis in programmable data planes to advance Network Intrusion Detection. Comput. Netw. 239, 110162 (2024)","journal-title":"Comput. Netw."},{"issue":"1","key":"4_CR11","doi-asserted-by":"publisher","first-page":"122","DOI":"10.26577\/JMMCS2024121112","volume":"121","author":"I Saymanov","year":"2024","unstructured":"Saymanov, I.: Logical automatic implementation of steganographic coding algorithms. J. Math. Mech. Comput. Sci. 121(1), 122\u2013131 (2024). https:\/\/doi.org\/10.26577\/JMMCS2024121112","journal-title":"J. Math. Mech. Comput. Sci."},{"key":"4_CR12","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/978-3-031-30258-9_9","volume-title":"Internet of Things, Smart Spaces, and Next Generation Networks and Systems: 22nd International Conference, NEW2AN 2022, Tashkent, Uzbekistan, December 15\u201316, 2022, Proceedings","author":"GU Juraev","year":"2023","unstructured":"Juraev, G.U., Kuvonchbek, R., Toshpulov, B.: Application fuzzy neural network methods to detect cryptoattacks on financial information systems based on blockchain technology. In: Koucheryavy, Y., Aziz, A. (eds.) Internet of Things, Smart Spaces, and Next Generation Networks and Systems: 22nd International Conference, NEW2AN 2022, Tashkent, Uzbekistan, December 15\u201316, 2022, Proceedings, pp. 93\u2013104. Springer Nature Switzerland, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-30258-9_9"},{"issue":"1","key":"4_CR13","doi-asserted-by":"publisher","first-page":"37","DOI":"10.26577\/JMMCS202412114","volume":"121","author":"A Kabulov","year":"2024","unstructured":"Kabulov, A., Baizhumanov, A., Berdimurodov, M.: On the minimization of k-valued logic functions in the class of disjunctive normal forms. J. Math. Mech. Comput. Sci. 121(1), 37\u201345 (2024). https:\/\/doi.org\/10.26577\/JMMCS202412114","journal-title":"J. Math. Mech. Comput. Sci."},{"issue":"13","key":"4_CR14","doi-asserted-by":"publisher","first-page":"2120","DOI":"10.3390\/math12132120","volume":"12","author":"A Kabulov","year":"2024","unstructured":"Kabulov, A., Baizhumanov, A., Saymanov, I.: Synthesis of optimal correction functions in the class of disjunctive normal forms. Mathematics 12(13), 2120 (2024). https:\/\/doi.org\/10.3390\/math12132120","journal-title":"Mathematics"},{"issue":"4","key":"4_CR15","doi-asserted-by":"publisher","first-page":"71","DOI":"10.26577\/JMMCS2024-v124-i4-a6","volume":"124","author":"I Normatov","year":"2025","unstructured":"Normatov, I., Yarashov, I., Toshmatov, S.: Research and modeling of authentication process using functioning table. J. Math. Mech. Comput. Sci. 124(4), 71\u201385 (2025)","journal-title":"J. Math. Mech. Comput. Sci."},{"key":"4_CR16","doi-asserted-by":"crossref","unstructured":"Yarashov, I.: Development of a reliable method for grouping users in user access control based on a Functioning table. In: 2022 International Conference on Information Science and Communications Technologies (ICISCT), pp. 1\u20135. IEEE (2022)","DOI":"10.1109\/ICISCT55600.2022.10146787"},{"key":"4_CR17","doi-asserted-by":"crossref","unstructured":"Makhmudov, S., et al.: The impact of digital technologies on the labor market of Uzbekistan. In: Proceedings of the 7th International Conference on Future Networks and Distributed Systems, pp. 260\u2013267 (2023)","DOI":"10.1145\/3644713.3644747"},{"key":"4_CR18","doi-asserted-by":"crossref","unstructured":"Gaipov, J., Fayzieva, M., Makhmudov, S., Urinov, B., Xodjayeva, J.:. The influencing factors of high-technology industries in the global market. In: Proceedings of the 7th International Conference on Future Networks and Distributed Systems, pp. 58\u201364 (2023)","DOI":"10.1145\/3644713.3644722"}],"container-title":["Lecture Notes in Computer Science","Internet of Things, Smart Spaces, and Next Generation Networks and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-95296-8_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T06:09:30Z","timestamp":1757311770000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-95296-8_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,30]]},"ISBN":["9783031952951","9783031952968"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-95296-8_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025,7,30]]},"assertion":[{"value":"30 July 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ruSMART","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Conference on Internet of Things and Smart Spaces","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Marrakesh","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Morocco","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"rusmart2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/new2an.info\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}