{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T16:25:38Z","timestamp":1747153538465,"version":"3.40.5"},"publisher-location":"Singapore","reference-count":15,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811617805"},{"type":"electronic","value":"9789811617812"}],"license":[{"start":{"date-parts":[[2021,9,10]],"date-time":"2021-09-10T00:00:00Z","timestamp":1631232000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,9,10]],"date-time":"2021-09-10T00:00:00Z","timestamp":1631232000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-981-16-1781-2_28","type":"book-chapter","created":{"date-parts":[[2021,9,9]],"date-time":"2021-09-09T15:05:30Z","timestamp":1631199930000},"page":"297-305","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Development of an Adaptive Fuzzy Algorithm for Identifying Technical Channels of Information Leakage"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2454-3600","authenticated-orcid":false,"given":"Pavel V.","family":"Razumov","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3452-9880","authenticated-orcid":false,"given":"Alexander A.","family":"Zelensky","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9392-3140","authenticated-orcid":false,"given":"Larissa V.","family":"Cherckesova","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7508-913X","authenticated-orcid":false,"given":"Olga A.","family":"Safaryan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4491-3376","authenticated-orcid":false,"given":"Dennis A.","family":"Korochentsev","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9896-9543","authenticated-orcid":false,"given":"Nikolay V.","family":"Boldyrikhin","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3236-6069","authenticated-orcid":false,"given":"Irina A.","family":"Pilipenko","sequence":"additional","affiliation":[]},{"given":"Veronica O.","family":"Kravchenko","sequence":"additional","affiliation":[]},{"given":"Vitaly M.","family":"Porksheyan","sequence":"additional","affiliation":[]},{"given":"Nikita G.","family":"Lyashenko","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,10]]},"reference":[{"key":"28_CR1","unstructured":"Clark L, Algaier W (2007) Surveillance detection the art of prevention, p 197. Cradle Press LLC"},{"key":"28_CR2","doi-asserted-by":"crossref","unstructured":"Keen P (1987) Decision support systems: the next decades. Decis Support Syst 3:253\u2013265","DOI":"10.1016\/0167-9236(87)90180-1"},{"key":"28_CR3","doi-asserted-by":"crossref","unstructured":"Little J (1970) Models and managers: the concept of a decision calculus. Manage Sci 16(8):466\u2013485","DOI":"10.1287\/mnsc.16.8.B466"},{"key":"28_CR4","doi-asserted-by":"crossref","unstructured":"Pengyu L, Avraham A (2020) Extracting boolean and probabilistic rules from trained neural networks. Neural Netw 126:300\u2013311","DOI":"10.1016\/j.neunet.2020.03.024"},{"key":"28_CR5","doi-asserted-by":"crossref","unstructured":"Yong G, Jian C, Qing D, Anton V, Den H, Qinfeng S, Mingkui T (2020) Multi-way backpropagation for training compact deep neural networks. Neural Netw 126:250\u2013261","DOI":"10.1016\/j.neunet.2020.03.001"},{"key":"28_CR6","doi-asserted-by":"crossref","unstructured":"Zhengxin C (1992) A conceptual framework for expert system description. Comput Edu 18:259\u2013266","DOI":"10.1016\/0360-1315(92)90097-O"},{"key":"28_CR7","doi-asserted-by":"crossref","unstructured":"Yee L (2020) Artificial intelligence and expert systems. International encyclopedia of human geography, 2nd edn, pp 209\u2013215","DOI":"10.1016\/B978-0-08-102295-5.10598-0"},{"key":"28_CR8","doi-asserted-by":"crossref","unstructured":"Kushal A, Arun M (2018) Theoretical framework of quantitative analysis based information leakage warning system. Karbala Int J Mod Sci 4:151\u2013163","DOI":"10.1016\/j.kijoms.2018.01.002"},{"key":"28_CR9","doi-asserted-by":"crossref","unstructured":"Tao Z, Yangyang S, Yaqin W, Yanzhang G, Long F (2020) An overview of speech endpoint detection algorithms. Appl Acoust 160:107\u2013133","DOI":"10.1016\/j.apacoust.2019.107133"},{"key":"28_CR10","doi-asserted-by":"crossref","unstructured":"Yu F, Tai A (1975) Information leakage through a passive optical channel. Opt Commun 14:51\u201355","DOI":"10.1016\/0030-4018(75)90056-5"},{"key":"28_CR11","doi-asserted-by":"crossref","unstructured":"Khuat T, Gabrys B (2020) Accelerated learning algorithms of general fuzzy min-max neural network using a novel hyperbox selection rule. Inf Sci","DOI":"10.1109\/IJCNN48605.2020.9207534"},{"key":"28_CR12","doi-asserted-by":"crossref","unstructured":"Vugar E (2020) Value of fuzzy logic for data mining and machine learning: a case study. Expert Syst Appl 162","DOI":"10.1016\/j.eswa.2020.113781"},{"key":"28_CR13","unstructured":"Mordechai G, Ofer H, Gabi K, Yuval E (2016) An optical covert-channel to leak data through an air-gap. In: 14th Annual Conference on Privacy, Security and Trust (PST)"},{"key":"28_CR14","doi-asserted-by":"crossref","unstructured":"Zhentao G, Yuanyuan C, Zhang Y (2020) A novel method to compute the weights of neural networks. Neurocomputing 407:409\u2013427","DOI":"10.1016\/j.neucom.2020.03.114"},{"key":"28_CR15","doi-asserted-by":"crossref","unstructured":"Mourad G (2020) Hybrid deep neural networks for recommender systems. Neurocomputing 413:23\u201330","DOI":"10.1016\/j.neucom.2020.06.025"}],"container-title":["Lecture Notes in Networks and Systems","Proceedings of Sixth International Congress on Information and Communication Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-16-1781-2_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,8]],"date-time":"2022-02-08T16:58:21Z","timestamp":1644339501000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-16-1781-2_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,10]]},"ISBN":["9789811617805","9789811617812"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-981-16-1781-2_28","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2021,9,10]]},"assertion":[{"value":"10 September 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}