{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,31]],"date-time":"2025-03-31T01:40:10Z","timestamp":1743385210120,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":14,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819628636","type":"print"},{"value":"9789819628643","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-2864-3_23","type":"book-chapter","created":{"date-parts":[[2025,3,31]],"date-time":"2025-03-31T01:15:06Z","timestamp":1743383706000},"page":"286-298","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Cross-Layer Intrusion Detection in\u00a0UWSNs Using an\u00a0Optimized CNN-LSTM Model"],"prefix":"10.1007","author":[{"given":"Pengcheng","family":"Li","sequence":"first","affiliation":[]},{"given":"Qiuling","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Miao","family":"Wei","sequence":"additional","affiliation":[]},{"given":"Rongxin","family":"Zhu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,29]]},"reference":[{"key":"23_CR1","doi-asserted-by":"crossref","unstructured":"Zhu, R., Boukerche, A., Yang, Q.: An efficient secure and adaptive routing protocol based on GMM-hmm-LSTM for internet of underwater things. IEEE Internet Things J. (2024)","DOI":"10.1109\/JIOT.2024.3354820"},{"key":"23_CR2","doi-asserted-by":"crossref","unstructured":"Zhu, R., Boukerche, A., Long, L., Yang, Q.: Design guidelines on trust management for underwater wireless sensor networks. IEEE Commun. Surv. Tutorials 1 (2024)","DOI":"10.1109\/COMST.2024.3389728"},{"issue":"1","key":"23_CR3","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/s11276-023-03470-x","volume":"30","author":"S Rajasoundaran","year":"2024","unstructured":"Rajasoundaran, S., Kumar, S.S., Selvi, M., Thangaramya, K., Arputharaj, K.: Secure and optimized intrusion detection scheme using LSTM-mac principles for underwater wireless sensor networks. Wireless Netw. 30(1), 209\u2013231 (2024)","journal-title":"Wireless Netw."},{"key":"23_CR4","doi-asserted-by":"crossref","unstructured":"Ismail, A., et al.: Rbeer: rule-based energy-efficient routing protocol for large-scale UWSNs. IEEE Trans. Green Commun. Networking (2024)","DOI":"10.1109\/TGCN.2024.3364776"},{"key":"23_CR5","doi-asserted-by":"crossref","unstructured":"Zhao, Z., Liu, C., Guang, X., Li, K.: A transmission-reliable topology control framework based on deep reinforcement learning for UWSNs. IEEE Internet Things J. 10(15), 13\u00a0317\u201313\u00a0332 (2023)","DOI":"10.1109\/JIOT.2023.3262690"},{"key":"23_CR6","doi-asserted-by":"crossref","unstructured":"Chen, X., Wang, Y., Shi, L., Shao, J.: Distributed localization algorithm for wireless sensor networks under minuscule bias injection attacks. In: Ninth International Symposium on Sensors, Mechatronics, and Automation System (ISSMAS 2023), vol. 12981. SPIE, Conference Proceedings, pp. 94\u2013100 (2023)","DOI":"10.1117\/12.3014916"},{"issue":"23","key":"23_CR7","doi-asserted-by":"publisher","first-page":"e7815","DOI":"10.1002\/cpe.7815","volume":"35","author":"KK Gola","year":"2023","unstructured":"Gola, K.K., Arya, S.: Underwater acoustic sensor networks: taxonomy on applications, architectures, localization methods, deployment techniques, routing techniques, and threats: a systematic review. Concurrency Comput. Pract. Experience 35(23), e7815 (2023)","journal-title":"Concurrency Comput. Pract. Experience"},{"issue":"4","key":"23_CR8","doi-asserted-by":"publisher","first-page":"957","DOI":"10.1016\/j.dcan.2022.02.003","volume":"9","author":"S Dong","year":"2023","unstructured":"Dong, S., Xia, Y.: Network traffic identification in packet sampling environment. Digit.Commun. Networks 9(4), 957\u2013970 (2023)","journal-title":"Digit.Commun. Networks"},{"key":"23_CR9","doi-asserted-by":"crossref","unstructured":"Suresh, A., et al.: An evolutionary computation-based federated learning for host intrusion detection in real-time traffic analysis. Wireless Pers. Commun. 1\u201327 (2024)","DOI":"10.1007\/s11277-023-10852-z"},{"issue":"10","key":"23_CR10","doi-asserted-by":"publisher","first-page":"6844","DOI":"10.1109\/TWC.2020.3006230","volume":"19","author":"J Huang","year":"2020","unstructured":"Huang, J., Diamant, R.: Adaptive modulation for long-range underwater acoustic communication. IEEE Trans. Wireless Commun. 19(10), 6844\u20136857 (2020)","journal-title":"IEEE Trans. Wireless Commun."},{"key":"23_CR11","doi-asserted-by":"publisher","first-page":"466","DOI":"10.1016\/j.future.2023.03.043","volume":"145","author":"M Zhang","year":"2023","unstructured":"Zhang, M., Feng, R., Zhang, H., Su, Y.: A recommendation management defense mechanism based on trust model in underwater acoustic sensor networks. Futur. Gener. Comput. Syst. 145, 466\u2013477 (2023)","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"7","key":"23_CR12","doi-asserted-by":"publisher","first-page":"1474","DOI":"10.3390\/jmse11071474","volume":"11","author":"A Hussain","year":"2023","unstructured":"Hussain, A., Hussain, T., Ullah, I., Muminov, B., Khan, M.Z., Alfarraj, O., Gafar, A.: Cr-nbeer: Cooperative-relay neighboring-based energy efficient routing protocol for marine underwater sensor networks. Journal of Marine Science and Engineering 11(7), 1474 (2023)","journal-title":"Journal of Marine Science and Engineering"},{"key":"23_CR13","doi-asserted-by":"crossref","unstructured":"Z.\u00a0U. Khan, M.\u00a0Aman, W.\u00a0U. Rahman, F.\u00a0Khan, T.\u00a0Jamil, and R.\u00a0Hashim, \u201cMachine learning-based multi-path reliable and energy-efficient routing protocol for underwater wireless sensor networks,\u201d in 2023 International Conference on Frontiers of Information Technology (FIT). IEEE, 2023, Conference Proceedings, pp. 316\u2013321","DOI":"10.1109\/FIT60620.2023.00064"},{"issue":"3","key":"23_CR14","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1016\/j.jksuci.2023.02.006","volume":"35","author":"M Ayaz","year":"2023","unstructured":"Ayaz, M., Ammad-Uddin, M., Sharif, Z., Hijji, M., Mansour, A.: A hybrid data collection scheme to achieve load balancing for underwater sensor networks. Journal of King Saud University-Computer and Information Sciences 35(3), 74\u201386 (2023)","journal-title":"Journal of King Saud University-Computer and Information Sciences"}],"container-title":["Lecture Notes in Computer Science","Network and Parallel Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-2864-3_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,31]],"date-time":"2025-03-31T01:15:12Z","timestamp":1743383712000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-2864-3_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819628636","9789819628643"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-2864-3_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"29 March 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"NPC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on Network and Parallel Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Haikou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"npc2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}