{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T02:05:25Z","timestamp":1775009125526,"version":"3.50.1"},"publisher-location":"Cham","reference-count":50,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319651712","type":"print"},{"value":"9783319651729","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-65172-9_11","type":"book-chapter","created":{"date-parts":[[2017,8,1]],"date-time":"2017-08-01T04:38:54Z","timestamp":1501562334000},"page":"122-134","source":"Crossref","is-referenced-by-count":38,"title":["A Spiking One-Class Anomaly Detection Framework for Cyber-Security on Industrial Control Systems"],"prefix":"10.1007","author":[{"given":"Konstantinos","family":"Demertzis","sequence":"first","affiliation":[]},{"given":"Lazaros","family":"Iliadis","sequence":"additional","affiliation":[]},{"given":"Stefanos","family":"Spartalis","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,2]]},"reference":[{"key":"11_CR1","unstructured":"Falco, J., et al.: IT security for industrial control systems. NIST Internal Report (NISTIR) 6859 (2002). http:\/\/www.nist.gov\/customcf\/get_pdf.cfm?pub_id=821684"},{"key":"11_CR2","volume-title":"Practical SCADA for Industry","author":"D Bailey","year":"2003","unstructured":"Bailey, D., Wright, E.: Practical SCADA for Industry. IDC Technologies, Vancouver (2003)"},{"key":"11_CR3","volume-title":"SCADA: Supervisory Control and Data Acquisition","author":"S Boyer","year":"2010","unstructured":"Boyer, S.: SCADA: Supervisory Control and Data Acquisition, 4th edn. International Society of Automation, Research Triangle Park, North Carolina (2010)","edition":"4"},{"key":"11_CR4","unstructured":"Weiss, J.: Current status of cybersecurity of control systems. In: Presentation to Georgia Tech Protective Relay Conference (2003)"},{"key":"11_CR5","unstructured":"C\u00e1rdenas, A.A., Amin, S., Sastry, S.: Research challenges for the security of control systems. In: 3rd USENIX Workshop on Hot Topics in Security (HotSec 2008), Associated with the 17th USENIX Security Symposium, San Jose, CA, USA (2008)"},{"key":"11_CR6","unstructured":"Raj, V.S., Chezhian, R.M., Mrithulashri, M.: Advanced persistent threats & recent high profile cyber threat encounters. Int. J. Innov. Res. Comput. Commun. Eng. 2(1) (2014). (An ISO 3297: 2007 Certified Organization)"},{"key":"11_CR7","unstructured":"Hutchins, E., Cloppert, M., Amin, R.: Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains. In: The 6th International Conference on Information-Warfare & Security, pp. 113\u2013125 (2010)"},{"issue":"1","key":"11_CR8","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/MSP.2012.90","volume":"11","author":"AK Sood","year":"2013","unstructured":"Sood, A.K., Enbody, R.J.: Targeted cyberattacks: a superset of advanced persistent threats. IEEE Secur. Priv. 11(1), 54\u201361 (2013). doi: 10.1109\/MSP.2012.90","journal-title":"IEEE Secur. Priv."},{"issue":"3","key":"11_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V Chandola","year":"2009","unstructured":"Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: a survey. ACM Comput. Surv. 41(3), 1\u201358 (2009). doi: 10.1145\/1541880.1541882","journal-title":"ACM Comput. Surv."},{"issue":"5","key":"11_CR10","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1002\/sam.11161","volume":"5","author":"A Zimek","year":"2012","unstructured":"Zimek, A., Schubert, E., Kriegel, H.-P.: A survey on unsupervised outlier detection in high-dimensional numerical data. Stat. Anal. Data Min. 5(5), 363\u2013387 (2012). doi: 10.1002\/sam.11161","journal-title":"Stat. Anal. Data Min."},{"issue":"3\u20134","key":"11_CR11","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/s007780050006","volume":"8","author":"EM Knorr","year":"2000","unstructured":"Knorr, E.M., Ng, R.T., Tucakov, V.: Distance-based outliers: algorithms and applications. VLDB J. Int. J. Very Large Data Bases 8(3\u20134), 237\u2013253 (2000). doi: 10.1007\/s007780050006","journal-title":"VLDB J. Int. J. Very Large Data Bases"},{"key":"11_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1007\/3-540-46145-0_17","volume-title":"Data Warehousing and Knowledge Discovery","author":"S Hawkins","year":"2002","unstructured":"Hawkins, S., He, H., Williams, G., Baxter, R.: Outlier detection using replicator neural networks. In: Kambayashi, Y., Winiwarter, W., Arikawa, M. (eds.) DaWaK 2002. LNCS, vol. 2454, pp. 170\u2013180. Springer, Heidelberg (2002). doi: 10.1007\/3-540-46145-0_17"},{"key":"11_CR13","unstructured":"Valko, M., Cooper, G., Seybert, A., Visweswaran, S., Saul, M., Hauskrecht, M.: Conditional anomaly detection methods for patient-management alert systems. In: Workshop on Machine Learning in Health Care Applications in the 25th International Conference on Machine Learning (2008)"},{"key":"11_CR14","doi-asserted-by":"crossref","unstructured":"Skabar, A.: Single-class classifier learning using neural networks: an application to the prediction of mineral deposits. In: Proceedings of the Second International Conference on Machine Learning and Cybernetics, vol. 4, pp. 2127\u20132132 (2003)","DOI":"10.1109\/ICMLC.2003.1259857"},{"key":"11_CR15","first-page":"139","volume":"2","author":"LM Manevitz","year":"2001","unstructured":"Manevitz, L.M., Yousef, M.: One-class SVMS for document classification. J. Mach. Learn. Res. 2, 139\u2013154 (2001)","journal-title":"J. Mach. Learn. Res."},{"key":"11_CR16","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/978-3-319-23983-5_9","volume-title":"Engineering Applications of Neural Networks","author":"K Demertzis","year":"2015","unstructured":"Demertzis, K., Iliadis, L.: Intelligent bio-inspired detection of food borne pathogen by DNA barcodes: the case of invasive fish species Lagocephalus Sceleratus. In: Iliadis, L., Jayne, C. (eds.) EANN 2015. CCIS, vol. 517, pp. 89\u201399. Springer, Cham (2015). doi: 10.1007\/978-3-319-23983-5_9"},{"key":"11_CR17","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1007\/978-3-319-11710-2_2","volume-title":"E-Democracy, Security, Privacy and Trust in a Digital World","author":"K Demertzis","year":"2014","unstructured":"Demertzis, K., Iliadis, L.: A hybrid network anomaly and intrusion detection approach based on evolving spiking neural network classification. In: Sideridis, A.B., Kardasiadou, Z., Yialouris, C.P., Zorkadis, V. (eds.) E-Democracy 2013. CCIS, vol. 441, pp. 11\u201323. Springer, Cham (2014). doi: 10.1007\/978-3-319-11710-2_2"},{"key":"11_CR18","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"322","DOI":"10.1007\/978-3-319-07869-4_30","volume-title":"Advanced Information Systems Engineering Workshops","author":"K Demertzis","year":"2014","unstructured":"Demertzis, K., Iliadis, L.: Evolving computational intelligence system for malware detection. In: Iliadis, L., Papazoglou, M., Pohl, K. (eds.) CAiSE 2014. LNBIP, vol. 178, pp. 322\u2013334. Springer, Cham (2014). doi: 10.1007\/978-3-319-07869-4_30"},{"key":"11_CR19","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/978-3-319-18275-9_7","volume-title":"Computation, Cryptography, and Network Security","author":"K Demertzis","year":"2015","unstructured":"Demertzis, K., Iliadis, L.: A bio-inspired hybrid artificial intelligence framework for cyber security. In: Daras, N.J., Rassias, M.T. (eds.) Computation, Cryptography, and Network Security, pp. 161\u2013193. Springer, Cham (2015). doi: 10.1007\/978-3-319-18275-9_7"},{"key":"11_CR20","unstructured":"Demertzis, K., Iliadis, L.: Bio-inspired hybrid intelligent method for detecting android malware. In: Proceedings of the 9th KICSS 2014, Knowledge Information and Creative Support Systems, Cyprus, pp. 231\u2013243, November 2014. ISBN 978-9963-700-84-4"},{"key":"11_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/978-3-319-17091-6_17","volume-title":"Statistical Learning and Data Sciences","author":"K Demertzis","year":"2015","unstructured":"Demertzis, K., Iliadis, L.: Evolving smart URL filter in a zone-based policy firewall for detecting algorithmically generated malicious domains. In: Gammerman, A., Vovk, V., Papadopoulos, H. (eds.) SLDS 2015. LNCS, vol. 9047, pp. 223\u2013233. Springer, Cham (2015). doi: 10.1007\/978-3-319-17091-6_17"},{"key":"11_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1007\/978-3-319-24306-1_23","volume-title":"Computational Collective Intelligence","author":"K Demertzis","year":"2015","unstructured":"Demertzis, K., Iliadis, L.: SAME: an intelligent anti-malware extension for android ART virtual machine. In: N\u00fa\u00f1ez, M., Nguyen, N.T., Camacho, D., Trawi\u0144ski, B. (eds.) ICCCI 2015. LNCS, vol. 9330, pp. 235\u2013245. Springer, Cham (2015). doi: 10.1007\/978-3-319-24306-1_23"},{"key":"11_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s40595-017-0095-3","volume":"4","author":"K Demertzis","year":"2016","unstructured":"Demertzis, K., Iliadis, L.: Computational intelligence anti-malware framework for android OS. Spec. Issue Vietnam J. Comput. Sci. (VJCS) 4, 1\u201315 (2016). doi: 10.1007\/s40595-017-0095-3 . Springer","journal-title":"Spec. Issue Vietnam J. Comput. Sci. (VJCS)"},{"key":"11_CR24","doi-asserted-by":"publisher","first-page":"1225","DOI":"10.1007\/s00521-016-2591-2","volume":"28","author":"K Demertzis","year":"2016","unstructured":"Demertzis, K., Iliadis, L.: Detecting invasive species with a bio-inspired semi supervised neurocomputing approach: the case of Lagocephalus sceleratus. Spec. Issue Neural Comput. Appl. 28, 1225\u20131234 (2016). doi: 10.1007\/s00521-016-2591-2 . Springer","journal-title":"Spec. Issue Neural Comput. Appl."},{"issue":"3","key":"11_CR25","first-page":"45","volume":"6","author":"K Demertzis","year":"2016","unstructured":"Demertzis, K., Iliadis, L.: SICASEG: a cyber threat bio-inspired intelligence management system. J. Appl. Math. Bioinform. 6(3), 45\u201364 (2016). ISSN 1792-6602 (print), 1792-6939 (online). Scienpress Ltd.","journal-title":"J. Appl. Math. Bioinform."},{"issue":"2","key":"11_CR26","doi-asserted-by":"publisher","first-page":"115","DOI":"10.3233\/ICA-150505","volume":"23","author":"I Bougoudis","year":"2016","unstructured":"Bougoudis, I., Demertzis, K., Iliadis, L.: Fast and low cost prediction of extreme air pollution values with hybrid unsupervised learning. Integr. Comput.-Aided Eng. 23(2), 115\u2013127 (2016). doi: 10.3233\/ICA-150505 . IOS Press","journal-title":"Integr. Comput.-Aided Eng."},{"key":"11_CR27","doi-asserted-by":"publisher","first-page":"1191","DOI":"10.1007\/s00521-015-1927-7","volume":"27","author":"I Bougoudis","year":"2016","unstructured":"Bougoudis, I., Demertzis, K., Iliadis, L.: HISYCOL a hybrid computational intelligence system for combined machine learning: the case of air pollution modeling in Athens. EANN Neural Comput. Appl. 27, 1191\u20131206 (2016). doi: 10.1007\/s00521-015-1927-7","journal-title":"EANN Neural Comput. Appl."},{"key":"11_CR28","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/978-3-319-44944-9_17","volume-title":"Artificial Intelligence Applications and Innovations","author":"V-D Anezakis","year":"2016","unstructured":"Anezakis, V.-D., Demertzis, K., Iliadis, L., Spartalis, S.: A hybrid soft computing approach producing robust forest fire risk indices. In: Iliadis, L., Maglogiannis, I. (eds.) AIAI 2016. IAICT, vol. 475, pp. 191\u2013203. Springer, Cham (2016). doi: 10.1007\/978-3-319-44944-9_17"},{"key":"11_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/978-3-319-45243-2_16","volume-title":"Computational Collective Intelligence","author":"V-D Anezakis","year":"2016","unstructured":"Anezakis, V.-D., Dermetzis, K., Iliadis, L., Spartalis, S.: Fuzzy cognitive maps for long-term prognosis of the evolution of atmospheric pollution, based on climate change scenarios: the case of Athens. In: Nguyen, N.-T., Manolopoulos, Y., Iliadis, L., Trawi\u0144ski, B. (eds.) ICCCI 2016. LNCS, vol. 9875, pp. 175\u2013186. Springer, Cham (2016). doi: 10.1007\/978-3-319-45243-2_16"},{"key":"11_CR30","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/978-3-319-44188-7_4","volume-title":"Engineering Applications of Neural Networks","author":"I Bougoudis","year":"2016","unstructured":"Bougoudis, I., Demertzis, K., Iliadis, L., Anezakis, V.-D., Papaleonidas, A.: Semi-supervised hybrid modeling of atmospheric pollution in urban centers. In: Jayne, C., Iliadis, L. (eds.) EANN 2016. CCIS, vol. 629, pp. 51\u201363. Springer, Cham (2016). doi: 10.1007\/978-3-319-44188-7_4"},{"key":"11_CR31","unstructured":"Moya, M., Koch, M., Hostetler, L.: One-class classifier networks for target recognition applications. In: Proceedings World Congress on Neural Networks, pp. 797\u2013801 (1993)"},{"key":"11_CR32","unstructured":"Munroe, D.T., Madden, M.G.: Multi-class and single-class classification approaches to vehicle model recognition from images. In: Proceedings of Irish Conference on Artificial Intelligence and Cognitive Science, Portstewart (2005)"},{"key":"11_CR33","unstructured":"Yu, H.: SVMC: single-class classification with support vector machines. In: Proceedings of International Joint Conference on Artificial Intelligence, pp. 567\u2013572 (2003)"},{"key":"11_CR34","doi-asserted-by":"crossref","unstructured":"El-Yaniv, R., Nisenson, M.: Optimal single-class classification strategies. In: Proceedings of the 2006 NIPS Conference, vol. 19, pp. 377\u2013384. MIT Press (2007)","DOI":"10.7551\/mitpress\/7503.003.0052"},{"key":"11_CR35","unstructured":"Juszczak, P.: Learning to recognise. A study on one-class classification and active learning. Ph.D. thesis, Delft University of Technology (2006)"},{"key":"11_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1007\/978-3-540-73547-2_27","volume-title":"Autonomic and Trusted Computing","author":"J Luo","year":"2007","unstructured":"Luo, J., Ding, L., Pan, Z., Ni, G., Hu, G.: Research on cost-sensitive learning in one-class anomaly detection algorithms. In: Xiao, B., Yang, L.T., Ma, J., Muller-Schloer, C., Hua, Y. (eds.) ATC 2007. LNCS, vol. 4610, pp. 259\u2013268. Springer, Heidelberg (2007). doi: 10.1007\/978-3-540-73547-2_27"},{"key":"11_CR37","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/978-3-642-02326-2_19","volume-title":"Multiple Classifier Systems","author":"AD Shieh","year":"2009","unstructured":"Shieh, A.D., Kamm, D.F.: Ensembles of one class support vector machines. In: Benediktsson, J.A., Kittler, J., Roli, F. (eds.) MCS 2009. LNCS, vol. 5519, pp. 181\u2013190. Springer, Heidelberg (2009). doi: 10.1007\/978-3-642-02326-2_19"},{"key":"11_CR38","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1007\/978-3-319-31664-2_29","volume-title":"Critical Information Infrastructures Security","author":"Y Soupionis","year":"2016","unstructured":"Soupionis, Y., Ntalampiras, S., Giannopoulos, G.: Faults and cyber attacks detection in critical infrastructures. In: Panayiotou, C.G., Ellinas, G., Kyriakides, E., Polycarpou, M.M. (eds.) CRITIS 2014. LNCS, vol. 8985, pp. 283\u2013289. Springer, Cham (2016). doi: 10.1007\/978-3-319-31664-2_29"},{"key":"11_CR39","doi-asserted-by":"publisher","unstructured":"Qin, Y., Cao, X., Liang, P., Hu, Q., Zhang, W.: Research on the analytic factor neuron model based on cloud generator and its application in oil&gas SCADA security defense. In: IEEE 3rd International Conference on Cloud Computing and Intelligence Systems (CCIS) (2014). doi: 10.1109\/CCIS.2014.7175721","DOI":"10.1109\/CCIS.2014.7175721"},{"key":"11_CR40","doi-asserted-by":"crossref","unstructured":"Chen, Q., Abdelwahed, S.: A model-based approach to self-protection in computing system. In: Proceedings of the ACM Cloud and Autonomic Computing Conference, CAC 2013, Article No. 16 (2013)","DOI":"10.1145\/2494621.2494639"},{"key":"11_CR41","doi-asserted-by":"crossref","unstructured":"Yasakethu, S.L.P., Jiang, J.: Intrusion detection via machine learning for SCADA system protection. In: Proceedings of the 1st International Symposium for ICS & SCADA Cyber Security Research, Learning and Development Ltd. (2013)","DOI":"10.14236\/ewic\/ICSCSR2013.12"},{"issue":"6\u20137","key":"11_CR42","doi-asserted-by":"crossref","first-page":"715","DOI":"10.1016\/S0893-6080(01)00083-1","volume":"14","author":"SJ Thorpe","year":"2001","unstructured":"Thorpe, S.J., Delorme, A., Rullen, R.: Spike-based strategies for rapid processing. Neural Netw. 14(6\u20137), 715\u2013725 (2001). Elsevier","journal-title":"Neural Netw."},{"key":"11_CR43","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/s12530-013-9074-9","volume":"4","author":"S Schliebs","year":"2013","unstructured":"Schliebs, S., Kasabov, N.: Evolving spiking neural network\u2014a survey. Evol. Syst. 4, 87 (2013). doi: 10.1007\/s12530-013-9074-9 . Springer","journal-title":"Evol. Syst."},{"issue":"1\u20134","key":"11_CR44","first-page":"539","volume":"38\u201340","author":"A Delorme","year":"2000","unstructured":"Delorme, A., Perrinet, L., Thorpe, S.J.: Networks of integrate-and-fire neurons using rank order coding. Neurocomputing 38\u201340(1\u20134), 539\u2013545 (2000)","journal-title":"Neurocomputing"},{"key":"11_CR45","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1007\/978-1-4615-4831-7_19","volume-title":"6th Conference on Computational Neuroscience: Trends in Research","author":"S Thorpe","year":"1998","unstructured":"Thorpe, S., Gautrais, J.: Rank order coding. In: Bower, J.M. (ed.) CNS 1997, pp. 113\u2013118. Springer, Boston (1998). doi: 10.1007\/978-1-4615-4831-7_19 . Plenum Press"},{"key":"11_CR46","volume-title":"Evolving Connectionist Systems: Methods and Applications in Bioinformatics, Brain Study and Intelligent Machines","author":"N Kasabov","year":"2002","unstructured":"Kasabov, N.: Evolving Connectionist Systems: Methods and Applications in Bioinformatics, Brain Study and Intelligent Machines. Springer, Heidelberg (2002)"},{"key":"11_CR47","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1133","DOI":"10.1007\/11864349_103","volume-title":"Advanced Concepts for Intelligent Vision Systems","author":"SG Wysoski","year":"2006","unstructured":"Wysoski, S.G., Benuskova, L., Kasabov, N.: Adaptive learning procedure for a network of spiking neurons and visual pattern recognition. In: Blanc-Talon, J., Philips, W., Popescu, D., Scheunders, P. (eds.) ACIVS 2006. LNCS, vol. 4179, pp. 1133\u20131142. Springer, Heidelberg (2006). doi: 10.1007\/11864349_103"},{"issue":"5\u20136","key":"11_CR48","doi-asserted-by":"crossref","first-page":"623","DOI":"10.1016\/j.neunet.2009.06.038","volume":"22","author":"S Schliebs","year":"2009","unstructured":"Schliebs, S., Defoin-Platel, M., Kasabov, N.: Integrated feature and parameter optimization for an evolving spiking neural network. Neural Netw. 22(5\u20136), 623\u2013632 (2009). 2009 International Joint Conference on Neural Networks","journal-title":"Neural Netw."},{"issue":"2","key":"11_CR49","first-page":"174","volume":"17","author":"TH Morris","year":"2015","unstructured":"Morris, T.H., Thornton, Z., Turnipseed, I.: Industrial control system simulation and data logging for intrusion detection system research. Int. J. Netw. Secur. (IJNS) 17(2), 174\u2013188 (2015)","journal-title":"Int. J. Netw. Secur. (IJNS)"},{"issue":"8","key":"11_CR50","doi-asserted-by":"publisher","first-page":"861","DOI":"10.1016\/j.patrec.2005.10.010","volume":"27","author":"T Fawcett","year":"2006","unstructured":"Fawcett, T.: An introduction to ROC analysis. Pattern Recogn. Lett. 27(8), 861\u2013874 (2006). doi: 10.1016\/j.patrec.2005.10.010 . Elsevier Science Inc.","journal-title":"Pattern Recogn. Lett."}],"container-title":["Communications in Computer and Information Science","Engineering Applications of Neural Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-65172-9_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,24]],"date-time":"2023-08-24T19:52:53Z","timestamp":1692906773000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-65172-9_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319651712","9783319651729"],"references-count":50,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-65172-9_11","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]}}}