{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T17:40:10Z","timestamp":1748799610275,"version":"3.41.0"},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662493809"},{"type":"electronic","value":"9783662493816"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-662-49381-6_74","type":"book-chapter","created":{"date-parts":[[2016,3,7]],"date-time":"2016-03-07T18:24:06Z","timestamp":1457375046000},"page":"770-779","source":"Crossref","is-referenced-by-count":0,"title":["FARTHEST: FormAl distRibuTed scHema to dEtect Suspicious arTefacts"],"prefix":"10.1007","author":[{"given":"Pablo C.","family":"Ca\u00f1izares","sequence":"first","affiliation":[]},{"given":"Mercedes G.","family":"Merayo","sequence":"additional","affiliation":[]},{"given":"Alberto","family":"N\u00fa\u00f1ez","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"US PUBLIC LAW 107\u201371. Aviation and transportation security act. (2001)","key":"74_CR1"},{"issue":"6","key":"74_CR2","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1002\/stvr.1464","volume":"22","author":"C Andr\u00e9s","year":"2012","unstructured":"Andr\u00e9s, C., Merayo, M.G., N\u00fa\u00f1ez, M.: Formal passive testing of timed systems: Theory and tools. Softw. Test. Verification Reliab. 22(6), 365\u2013405 (2012)","journal-title":"Softw. Test. Verification Reliab."},{"issue":"3\u20134","key":"74_CR3","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/s12243-015-0457-8","volume":"70","author":"AR Cavalli","year":"2015","unstructured":"Cavalli, A.R., Higashino, T., N\u00fa\u00f1ez, M.: A survey on formal active and passive testing with applications to the cloud. Ann. Telecommun. 70(3\u20134), 85\u201393 (2015)","journal-title":"Ann. Telecommun."},{"key":"74_CR4","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1016\/j.simpat.2013.05.002","volume":"39","author":"G Casta\u00f1\u00e9","year":"2013","unstructured":"Casta\u00f1\u00e9, G., N\u00fa\u00f1ez, A., Llopis, P., Carretero, J.: E-mc$$^2$$: A formal framework for energy modelling in cloud computing. Simul. Model. Pract. Theor. 39, 56\u201375 (2013)","journal-title":"Simul. Model. Pract. Theor."},{"doi-asserted-by":"crossref","unstructured":"Ca\u00f1izares, P.C., N\u00fa\u00f1ez, A., N\u00fa\u00f1ez, M., Pardo, J.J.: A methodology for designing energy-aware systems for computational science. In: 15th International Conference on Computational Science, ICCS 2015, Procedia Computer Science 51, pp. 2804\u20132808. Elsevier (2015)","key":"74_CR5","DOI":"10.1016\/j.procs.2015.05.438"},{"issue":"11","key":"74_CR6","doi-asserted-by":"publisher","first-page":"1804","DOI":"10.1016\/j.jss.2009.06.030","volume":"82","author":"RM Hierons","year":"2009","unstructured":"Hierons, R.M., Merayo, M.G.: Mutation testing from probabilistic and stochastic finite state machines. J. Syst. Softw. 82(11), 1804\u20131818 (2009)","journal-title":"J. Syst. Softw."},{"issue":"2","key":"74_CR7","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1016\/j.jlap.2008.06.001","volume":"78","author":"RM Hierons","year":"2009","unstructured":"Hierons, R.M., Merayo, M.G., N\u00fa\u00f1ez, M.: Testing from a stochastic timed system with a fault model. J. Logic Algebraic Program. 78(2), 98\u2013115 (2009)","journal-title":"J. Logic Algebraic Program."},{"key":"74_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/3-540-47987-2_10","volume-title":"Intelligent Tutoring Systems","author":"N L\u00f3pez","year":"2002","unstructured":"L\u00f3pez, N., N\u00fa\u00f1ez, M., Rodr\u00edguez, I., Rubio, F.: Including malicious agents into a collaborative learning environment. In: Cerri, S.A., Gouard\u00e9res, G., Paragua\u00e7u, F. (eds.) ITS 2002. LNCS, vol. 2363, pp. 51\u201360. Springer, Heidelberg (2002)"},{"doi-asserted-by":"crossref","unstructured":"Liu, D., Wang, Z.: A united classification system of x-ray image based on fuzzy rule and neural networks. In: 3rd International Conference on Intelligent System and Knowledge Engineering, ISKE 2008, vol. 1, pp. 717\u2013722. IEEE Computer Society (2008)","key":"74_CR9","DOI":"10.1109\/ISKE.2008.4731024"},{"key":"74_CR10","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1007\/978-3-319-20747-6_8","volume-title":"Computer Vision for X-Ray Testing","author":"Domingo Mery","year":"2015","unstructured":"Mery, D.: Applications in X-ray testing. In: Computer Vision for X-Ray Testing, pp. 267\u2013325. Springer, Heidelberg (2015)"},{"issue":"1","key":"74_CR11","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1109\/TMECH.2014.2311032","volume":"20","author":"D Mery","year":"2015","unstructured":"Mery, D.: Inspection of complex objects using multiple-X-ray views. IEEE\/ASME Trans. Mechatron. 20(1), 338\u2013347 (2015)","journal-title":"IEEE\/ASME Trans. Mechatron."},{"key":"74_CR12","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/j.infsof.2015.03.009","volume":"64","author":"MG Merayo","year":"2015","unstructured":"Merayo, M.G., N\u00fa\u00f1ez, A.: Passive testing of communicating systems with timeouts. Inf. Softw. Technol. 64, 19\u201335 (2015)","journal-title":"Inf. Softw. Technol."},{"doi-asserted-by":"crossref","unstructured":"Murray, N.C., Riordan, K.: Evaluation of automatic explosive detection systems. In: 29th Annual International Carnahan Conference on Security Technology, pp. 175\u2013179. Institute of Electrical and Electronics Engineers (1995)","key":"74_CR13","DOI":"10.1109\/CCST.1995.524908"},{"doi-asserted-by":"crossref","unstructured":"N\u00fa\u00f1ez, A., Filgueira, R., Merayo, M.G.: SANComSim: A scalable, adaptive and non-intrusive framework to optimize performance in computational science applications. In: 13th International Conference on Computational Science, ICCS 2013, Procedia Computer Science 18, pp. 230\u2013239. Elsevier (2013)","key":"74_CR14","DOI":"10.1016\/j.procs.2013.05.186"},{"issue":"2","key":"74_CR15","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1016\/j.jocs.2013.04.003","volume":"5","author":"A N\u00fa\u00f1ez","year":"2014","unstructured":"N\u00fa\u00f1ez, A., Merayo, M.G.: A formal framework to analyze cost and performance in Map-Reduce based applications. J. Comput. Sci. 5(2), 106\u2013118 (2014)","journal-title":"J. Comput. Sci."},{"doi-asserted-by":"crossref","unstructured":"Nercessian, S., Panetta, K., Agaian, S.: Automatic detection of potential threat objects in x-ray luggage scan images. In: IEEE Conference on Technologies for Homeland Security, pp. 504\u2013509. IEEE Computer Society (2008)","key":"74_CR16","DOI":"10.1109\/THS.2008.4534504"},{"issue":"1","key":"74_CR17","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1007\/s10723-012-9208-5","volume":"10","author":"A N\u00fa\u00f1ez","year":"2012","unstructured":"N\u00fa\u00f1ez, A., V\u00e1zquez-Poletti, J.L., Caminero, A.C., Casta\u00f1\u00e9, G.G., Carretero, J., Llorente, I.M.: iCanCloud: A flexible and scalable cloud infrastructure simulator. J. Grid Comput. 10(1), 185\u2013209 (2012)","journal-title":"J. Grid Comput."},{"key":"74_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.14355\/spr.2015.04.001","volume":"4","author":"I Uroukov","year":"2015","unstructured":"Uroukov, I., Speller, R.: A preliminary approach to intelligent X-ray imaging for baggage inspection at airports. Signal Process. Res. 4, 1\u201311 (2015)","journal-title":"Signal Process. Res."},{"issue":"8","key":"74_CR19","doi-asserted-by":"publisher","first-page":"1729","DOI":"10.1016\/j.apradiso.2012.01.011","volume":"70","author":"K Wells","year":"2012","unstructured":"Wells, K., Bradley, D.A.: A review of X-ray explosives detection techniques for checked baggage. Appl. Radiat. Isot. 70(8), 1729\u20131746 (2012)","journal-title":"Appl. Radiat. Isot."}],"container-title":["Lecture Notes in Computer Science","Intelligent Information and Database Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-49381-6_74","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T17:27:17Z","timestamp":1748798837000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-662-49381-6_74"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783662493809","9783662493816"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-49381-6_74","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}