{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:28:17Z","timestamp":1775003297612,"version":"3.50.1"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032184832","type":"print"},{"value":"9783032184849","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-18484-9_7","type":"book-chapter","created":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T23:33:35Z","timestamp":1775000015000},"page":"91-101","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Evolution of AI-Driven Digital Surveillance Monitoring in Scientific Literature"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6228-6724","authenticated-orcid":false,"given":"Spyros","family":"Lavdas","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7297-0693","authenticated-orcid":false,"given":"Nikolaos","family":"Bakas","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4657-4435","authenticated-orcid":false,"given":"Savvas A.","family":"Chatzichristofis","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4361-4032","authenticated-orcid":false,"given":"George","family":"Vardoulias","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4161-7376","authenticated-orcid":false,"given":"George","family":"Kokosalakis","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8625-6290","authenticated-orcid":false,"given":"Konstantinos","family":"Vavousis","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,4,1]]},"reference":[{"key":"7_CR1","doi-asserted-by":"publisher","unstructured":"Ahmad, I., Basheri, M., Iqbal, M.J., Rahim, A.: Performance comparison of support vector machine, random forest, and extreme learning machine for intrusion detection. IEEE Access 6, 33789\u201333795 (2018). https:\/\/doi.org\/10.1109\/ACCESS.2018.2841987. https:\/\/www.scopus.com\/inward\/record.uri?eid=2-s2.0-85047829926&doi=10.1109%2fACCESS.2018.2841987&partnerID=40&md5=9c5ed5d2812fdeb7ce0c48b52316cd4b. Cited by 514; All Open Access, Gold Open Access","DOI":"10.1109\/ACCESS.2018.2841987"},{"key":"7_CR2","doi-asserted-by":"publisher","unstructured":"Al-Qatf, M., Lasheng, Y., Al-Habib, M., Al-Sabahi, K.: Deep learning approach combining sparse autoencoder with svm for network intrusion detection. IEEE Access 6, 52843\u201352856 (2018). https:\/\/doi.org\/10.1109\/ACCESS.2018.2869577. https:\/\/www.scopus.com\/inward\/record.uri?eid=2-s2.0-85053343902&doi=10.1109%2fACCESS.2018.2869577&partnerID=40&md5=bf3387e6cc337e248f3e6f7944ca749f. cited by: 427; All Open Access, Gold Open Access","DOI":"10.1109\/ACCESS.2018.2869577"},{"key":"7_CR3","unstructured":"Bakas, N., Athenodorou, A., Anastasopoulou, N., Kyprianou, K., Katsikatsos, G., Markou, G.: A bibliometric overview of open science research. In: 9th International Conference on Computational Methods in Structural Dynamics and Earthquake Engineering. COMPDYN 2023, Athens, Greece (12\u201314 June 2023)"},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"Bakas, N., Lavdas, S., Vavousis, K., Christodoulou, C., Langousis, A.: Automated machine learning in a multi-agent environment. In: Themistocleous, M., Bakas, N., Kokosalakis, G., Papadaki, M. (eds.) Information Systems, pp. 47\u201357. Springer, Cham (2025)","DOI":"10.1007\/978-3-031-81322-1_4"},{"key":"7_CR5","doi-asserted-by":"publisher","unstructured":"Bakas, N., Koutsantonis, D., Plevris, V., Langousis, A., Chatzichristofis, S.: Inverse transform sampling for bibliometric literature analysis. In: The Thirteenth International Conference on Information, Intelligence, Systems and Applications. Ionian University, 18\u201320 July 2022. IISA 2022, Corfu, Greece (2022). https:\/\/doi.org\/10.1109\/IISA56318.2022.9904344","DOI":"10.1109\/IISA56318.2022.9904344"},{"key":"7_CR6","doi-asserted-by":"publisher","unstructured":"Farnaaz, N., Jabbar, M.: Random forest modeling for network intrusion detection system. Procedia Comput. Sci. 89, 213\u2013217 (2016). https:\/\/doi.org\/10.1016\/j.procs.2016.06.047, cited by: 518; All Open Access, Gold Open Access","DOI":"10.1016\/j.procs.2016.06.047"},{"key":"7_CR7","doi-asserted-by":"publisher","unstructured":"Gao, X., Shan, C., Hu, C., Niu, Z., Liu, Z.: An adaptive ensemble machine learning model for intrusion detection. IEEE Access 7, 82512 \u2013 82521 (2019).https:\/\/doi.org\/10.1109\/ACCESS.2019.2923640. https:\/\/www.scopus.com\/inward\/record.uri?eid=2-s2.0-85068687156&doi=10.1109%2fACCESS.2019.2923640&partnerID=40&md5=23d0d48bfa67c43d13fe404c1da4c6c7. cited by 392; All Open Access, Gold Open Access","DOI":"10.1109\/ACCESS.2019.2923640"},{"key":"7_CR8","doi-asserted-by":"publisher","unstructured":"Jin, X., Han, J.: K-Means Clustering, pp. 563\u2013564. Springer US, Boston, MA (2010). https:\/\/doi.org\/10.1007\/978-0-387-30164-8_425","DOI":"10.1007\/978-0-387-30164-8_425"},{"key":"7_CR9","doi-asserted-by":"publisher","unstructured":"Kang, M.J., Kang, J.W.: Intrusion detection system using deep neural network for in-vehicle network security. PLoS ONE 11(6) (2016). https:\/\/doi.org\/10.1371\/journal.pone.0155781. https:\/\/www.scopus.com\/inward\/record.uri?eid=2-s2.0-84975321732&doi=10.1371%2fjournal.pone.0155781&partnerID=40&md5=ce116b8df788998210b5d0d49b180ca2. cited by: 556; All Open Access, Gold Open Access, Green Open Access","DOI":"10.1371\/journal.pone.0155781"},{"key":"7_CR10","doi-asserted-by":"publisher","unstructured":"Naseer, S., Saleem, Y., Khalid, S., Bashir, M.K., Han, J., Iqbal, M.M., Han, K.: Enhanced network anomaly detection based on deep neural networks. IEEE Access 6, 48231\u201348246 (2018). https:\/\/doi.org\/10.1109\/ACCESS.2018.2863036. https:\/\/www.scopus.com\/inward\/record.uri?eid=2-s2.0-85051800788&doi=10.1109%2fACCESS.2018.2863036&partnerID=40&md5=851ad48fd98f40983561030fb8780476. cited by: 388; All Open Access, Gold Open Access","DOI":"10.1109\/ACCESS.2018.2863036"},{"key":"7_CR11","doi-asserted-by":"publisher","unstructured":"Plevris, V., Bakas, N., Markeset, G., Bellos, J.: Literature review of masonry structures under earthquake excitation utilizing machine learning algorithms. In: Proceedings of the 6th International Conference on Computational Methods in Structural Dynamics and Earthquake Engineering (COMPDYN 2015), pp. 2685\u20132694. Institute of Structural Analysis and Antiseismic Research School of Civil Engineering National Technical University of Athens (NTUA) Greece, Rhodes Island, Greece (2017). https:\/\/doi.org\/10.7712\/120117.5598.18688","DOI":"10.7712\/120117.5598.18688"},{"key":"7_CR12","doi-asserted-by":"publisher","unstructured":"Plevris, V., Solorzano, G., Bakas, N.: Literature review of historical masonry structures with machine learning. In: 7th ECCOMAS Thematic Conference on Computational Methods in Structural Dynamics and Earthquake Engineering. COMPDYN 2019, Crete, Greece (2019). https:\/\/doi.org\/10.7712\/120119.7018.21053","DOI":"10.7712\/120119.7018.21053"},{"key":"7_CR13","unstructured":"Scopus. https:\/\/www.scopus.com (2025). Accessed: 2025-04-03"},{"key":"7_CR14","doi-asserted-by":"publisher","unstructured":"Sumaiya Thaseen, I., Aswani Kumar, C.: Intrusion detection model using fusion of chi-square feature selection and multi class svm. J. King Saud Univ. Comput. Inf. Sci. 29(4), 462\u2013472 (2017). https:\/\/doi.org\/10.1016\/j.jksuci.2015.12.004, https:\/\/www.scopus.com\/inward\/record.uri?eid=2-s2.0-85006208829&doi=10.1016%2fj.jksuci.2015.12.004&partnerID=40&md5=eed09098cfaaac6259167ec38dcfaf9e. cited by: 380; All Open Access, Gold Open Access","DOI":"10.1016\/j.jksuci.2015.12.004"},{"key":"7_CR15","doi-asserted-by":"publisher","unstructured":"Vinayakumar,R.,Alazab,M.,Soman,K.,Poornachandran,P.,Al- Nemrat, A., Venkatraman, S.: Deep learning approach for intelligent intrusiondetectionsystem.IEEEAccess7,41525\u201341550(2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2895334. https:\/\/www.scopus.com\/inward\/record.uri?eid=2-s2.0-85064860273&doi=10.1109%2fACCESS.2019.2895334&partnerID=40&md5=d193bb54adc9c9e42bce838e977cd7bb. cited by: 1275; All Open Access, Gold Open Access, Green Open Access","DOI":"10.1109\/ACCESS.2019.2895334"},{"key":"7_CR16","doi-asserted-by":"publisher","unstructured":"Wang, W., et al.: Hast-ids: Learning hierarchical spatial-temporal features using deep neural networks to improve intrusion detection. IEEE Access 6, 1792\u20131806 (2017).https:\/\/doi.org\/10.1109\/ACCESS.2017.2780250. https:\/\/www.scopus.com\/inward\/record.uri?eid=2-s2.0-85038876745&doi=10.1109%2fACCESS.2017.2780250&partnerID=40&md5=da1d75d97eb4c448895f57d4945e7292. cited by: 497; All Open Access, Gold Open Access","DOI":"10.1109\/ACCESS.2017.2780250"},{"key":"7_CR17","doi-asserted-by":"publisher","unstructured":"Yin, C., Zhu, Y., Fei, J., He, X.: A deep learning approach for intrusion detection using recurrent neural networks. IEEE Access 5, 21954 \u2013 21961 (2017).https:\/\/doi.org\/10.1109\/ACCESS.2017.2762418. https:\/\/www.scopus.com\/inward\/record.uri?eid=2-s2.0-85038359674&doi=10.1109%2fACCESS.2017.2762418&partnerID=40&md5=d26bbf37de67158b5686b975c031114c. cited by: 1453; All Open Access, Gold Open Access","DOI":"10.1109\/ACCESS.2017.2762418"}],"container-title":["Lecture Notes in Business Information Processing","Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-18484-9_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T23:33:36Z","timestamp":1775000016000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-18484-9_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9783032184832","9783032184849"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-18484-9_7","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"value":"1865-1348","type":"print"},{"value":"1865-1356","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"1 April 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"EMCIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European, Mediterranean, and Middle Eastern Conference on Information Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Paphos","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Cyprus","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 September 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 September 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"emcis2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/emcis.eu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}