{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T22:33:06Z","timestamp":1725834786625},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319250151"},{"type":"electronic","value":"9783319250175"}],"license":[{"start":{"date-parts":[[2015,10,18]],"date-time":"2015-10-18T00:00:00Z","timestamp":1445126400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-25017-5_15","type":"book-chapter","created":{"date-parts":[[2015,10,18]],"date-time":"2015-10-18T23:39:25Z","timestamp":1445211565000},"page":"155-165","source":"Crossref","is-referenced-by-count":1,"title":["Reconfiguration of Access Schemes in Virtual Networks of the Internet of Things by Genetic Algorithms"],"prefix":"10.1007","author":[{"given":"Igor","family":"Saenko","sequence":"first","affiliation":[]},{"given":"Igor","family":"Kotenko","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,10,18]]},"reference":[{"key":"15_CR1","unstructured":"Catalyst 2900 Series XL and Catalyst 3500 Series XL Software Configuration Guide.: Cisco IOS Release 12.0(5) WC(1). Cisco Systems, San Jose (2001)"},{"key":"15_CR2","doi-asserted-by":"crossref","unstructured":"Perera, Ch., Zaslavsky, A., Christen, P., Georgakopoulos, D.: Context aware computing for the internet of things: a survey. In: IEEE Commission Surveys and Tutorials, vol. 16(1) (2014)","DOI":"10.1109\/SURV.2013.042313.00197"},{"key":"15_CR3","unstructured":"Applegate, S.D.: The Principle of maneuver in cyber operations. In: 4th International Conference on Cyber Conflict, pp. 1\u201313 (2012)"},{"key":"15_CR4","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1007\/978-3-319-10422-5_11","volume":"570","author":"I Saenko","year":"2014","unstructured":"Saenko, I., Kotenko, I.: A genetic approach for virtual computer network design. Stud. Comput. Intell. 570, 95\u2013105 (2014)","journal-title":"Stud. Comput. Intell."},{"key":"15_CR5","doi-asserted-by":"crossref","unstructured":"Miettinen, P., Vreeken, J.: Model order selection for boolean matrix factorization. In: 17th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, pp. 51\u201359 (2011)","DOI":"10.1145\/2020408.2020424"},{"key":"15_CR6","doi-asserted-by":"crossref","unstructured":"Miettinen, P.: Dynamic Boolean matrix factorizations. In: 2012 IEEE 12th International Conference on Data Mining, pp. 519\u2013528 (2012)","DOI":"10.1109\/ICDM.2012.118"},{"key":"15_CR7","doi-asserted-by":"crossref","unstructured":"Cergani, E., Miettinen, P.: Discovering relations using matrix factorization methods. In: ACM International Conference on Information and Knowledge Management, pp. 1549\u20131552 (2013)","DOI":"10.1145\/2505515.2507841"},{"key":"15_CR8","first-page":"307","volume":"6729","author":"A Janecek","year":"2011","unstructured":"Janecek, A., Tan, Y.: Using population based algorithms for initializing nonnegative matrix factorization. LNCS 6729, 307\u2013316 (2011)","journal-title":"LNCS"},{"key":"15_CR9","doi-asserted-by":"crossref","unstructured":"Snasel, V., Platos, J., Kromer, P.: On genetic algorithms for boolean matrix factorization. In: Eighth International Conference on Intelligent Systems Design and Applications, vol. 2 (2008)","DOI":"10.1109\/ISDA.2008.317"},{"key":"15_CR10","doi-asserted-by":"crossref","unstructured":"Snasel, V., Platos, J., Kromer, P., Husek, D., Neruda, R., Frolov, A.A.: Investigating boolean matrix factorization. In: Workshop on Data Mining using Matrices and Tensors (2008)","DOI":"10.1109\/DEXA.2008.92"},{"key":"15_CR11","doi-asserted-by":"crossref","unstructured":"Lu, H., Vaidya, J., Atluri, V., Hong, Y.: Extended boolean matrix decomposition. In: Ninth IEEE International Conference on Data Mining, pp. 317\u2013326 (2009)","DOI":"10.1109\/ICDM.2009.61"},{"key":"15_CR12","doi-asserted-by":"crossref","unstructured":"Lu, H., Vaidya, J., Atluri, V.: Optimal boolean matrix decomposition: application to role engineering. In: 24th IEEE International Conference on Data Engineering, pp. 297\u2013306 (2008)","DOI":"10.1109\/ICDE.2008.4497438"},{"key":"15_CR13","doi-asserted-by":"crossref","unstructured":"Saenko, I., Kotenko, I.: Genetic algorithms for role mining problem. In: 19th International Conference on Parallel, Distributed and Network-based Processing, pp. 646\u2013650 (2011)","DOI":"10.1109\/PDP.2011.63"},{"key":"15_CR14","doi-asserted-by":"crossref","unstructured":"Saenko, I., Kotenko, I.: Design and performance evaluation of improved genetic algorithm for role mining problem. In: 20th International Conference on Parallel, Distributed and Network-based Processing, pp. 269\u2013274 (2011)","DOI":"10.1109\/PDP.2012.31"},{"key":"15_CR15","doi-asserted-by":"crossref","unstructured":"Tai, Ch.-F., Chiang, Tz.-Ch., Hou, T.-W.: A virtual subnet scheme on clustering algorithms for mobile Ad Hoc networks. Expert Syst. with Appl. 38(3):1269\u20132922 (2011)","DOI":"10.1016\/j.eswa.2010.07.148"},{"key":"15_CR16","first-page":"209","volume":"6258","author":"I Saenko","year":"2010","unstructured":"Saenko, I., Kotenko, I.: Genetic optimization of access control schemes in virtual local area networks. LNCS 6258, 209\u2013216 (2010)","journal-title":"LNCS"},{"key":"15_CR17","volume-title":"Genetic Algorithms in Search, Optimization, and Machine Learning","author":"DE Goldberg","year":"1989","unstructured":"Goldberg, D.E.: Genetic Algorithms in Search, Optimization, and Machine Learning. Addison-Wesley Longman Publishing, Boston (1989)"},{"key":"15_CR18","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/3927.001.0001","volume-title":"An Introduction to Genetic Algorithms","author":"M Mitchell","year":"1998","unstructured":"Mitchell, M.: An Introduction to Genetic Algorithms. MIT Press, Massachusetts (1998)"},{"key":"15_CR19","unstructured":"Eiben, A.E., Smith, J.E.: Introduction to Evolutionary Computing. Springer, Berlin (2007)"},{"key":"15_CR20","unstructured":"Saenko, I., Kotenko, I.: Design of virtual local area network scheme based on genetic optimization and visual analysis. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. (JoWUA) 5(4):86\u2013102 (2014)"},{"key":"15_CR21","unstructured":"Schwartz, M.: Internet of Things with the Arduino Y\u00fan. Packt Publishing, Birmingham (2014)"}],"container-title":["Studies in Computational Intelligence","Intelligent Distributed Computing IX"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-25017-5_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,23]],"date-time":"2022-05-23T14:58:24Z","timestamp":1653317904000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-25017-5_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10,18]]},"ISBN":["9783319250151","9783319250175"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-25017-5_15","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[],"published":{"date-parts":[[2015,10,18]]}}}