{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T08:24:45Z","timestamp":1743063885689,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":48,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819773558"},{"type":"electronic","value":"9789819773565"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-97-7356-5_10","type":"book-chapter","created":{"date-parts":[[2024,12,28]],"date-time":"2024-12-28T20:04:35Z","timestamp":1735416275000},"page":"115-125","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An In-Depth Exploration of Anomaly Detection, Classification, and Localization with Deep Learning: A Comprehensive Overview"],"prefix":"10.1007","author":[{"given":"Kamred Udham","family":"Singh","sequence":"first","affiliation":[]},{"given":"Ankit","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Gaurav","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Teekam","family":"Singh","sequence":"additional","affiliation":[]},{"given":"Tanupriya","family":"Choudhury","sequence":"additional","affiliation":[]},{"given":"Ketan","family":"Kotecha","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,29]]},"reference":[{"key":"10_CR1","doi-asserted-by":"publisher","unstructured":"Studiawan H, Sohel F, Payne C (2020) Anomaly detection in operating system logs with deep learning-based sentiment analysis. In: IEEE transactions on dependable and secure computing. https:\/\/doi.org\/10.1109\/TDSC.2020.3037903","DOI":"10.1109\/TDSC.2020.3037903"},{"key":"10_CR2","doi-asserted-by":"publisher","unstructured":"Ahmed, Sajan KS, Srivastava A, Wu Y (2021) Anomaly detection, localization and clas- sification using drifting synchrophasor data streams. In: IEEE transactions on smart grid. https:\/\/doi.org\/10.1109\/TSG.2021.3054375","DOI":"10.1109\/TSG.2021.3054375"},{"key":"10_CR3","doi-asserted-by":"publisher","unstructured":"Ahn H (2020) Deep learning based anomaly detection for a vehicle in swarm drone system. In: 2020 international conference on unmanned aircraft systems (ICUAS), Athens, Greece, 2020, pp 557\u2013561. https:\/\/doi.org\/10.1109\/ICUAS48674.2020.9213880","DOI":"10.1109\/ICUAS48674.2020.9213880"},{"key":"10_CR4","doi-asserted-by":"publisher","unstructured":"Park H, Park D-H, Kim S-H (2020) Deep learning-based method for detecting anomalies of operating equipment dynamically in livestock farms. In: 2020 international conference on information and communication technology convergence (ICTC), Jeju, Korea (South), pp 1182\u20131185. https:\/\/doi.org\/10.1109\/ICTC49870.2020.9289351","DOI":"10.1109\/ICTC49870.2020.9289351"},{"key":"10_CR5","doi-asserted-by":"publisher","first-page":"48231","DOI":"10.1109\/ACCESS.2018.2863036","volume":"6","author":"S Naseer","year":"2018","unstructured":"Naseer S et al (2018) Enhanced network anomaly detection based on deep neural networks. IEEE Access 6:48231\u201348246. https:\/\/doi.org\/10.1109\/ACCESS.2018.2863036","journal-title":"IEEE Access"},{"issue":"3","key":"10_CR6","doi-asserted-by":"publisher","first-page":"566","DOI":"10.1109\/TMM.2019.2893549","volume":"21","author":"S Garg","year":"2019","unstructured":"Garg S, Kaur K, Kumar N, Rodrigues JJPC (2019) Hybrid deep-learning-based anomaly detection scheme for suspicious flow detection in SDN: a social multimedia perspective. IEEE Trans Multimedia 21(3):566\u2013578. https:\/\/doi.org\/10.1109\/TMM.2019.2893549","journal-title":"IEEE Trans Multimedia"},{"key":"10_CR7","doi-asserted-by":"publisher","unstructured":"Munir M, Chattha MA, Dengel A, Ahmed S (2019) A comparative analysis of traditional and deep learning-based anomaly detection methods for streaming data. In: 2019 18th IEEE international conference on machine learning and applications (ICMLA), Boca Raton, FL, USA, 2019, pp 561\u2013566. https:\/\/doi.org\/10.1109\/ICMLA.2019.00105","DOI":"10.1109\/ICMLA.2019.00105"},{"key":"10_CR8","doi-asserted-by":"publisher","unstructured":"Qian K, Jiang J, Ding Y, Yang S (2020) Deep learning based anomaly detection in water distribution systems. In: 2020 IEEE international conference on networking, sensing and control (ICNSC), Nanjing, China, 2020, pp 1\u20136. https:\/\/doi.org\/10.1109\/ICNSC48988.2020.9238099","DOI":"10.1109\/ICNSC48988.2020.9238099"},{"key":"10_CR9","doi-asserted-by":"publisher","unstructured":"Zhang G, Qiu X, Gao Y (2019) Software defined security architecture with deep learning-based network anomaly detection module. In: 2019 IEEE 11th international conference on communication software and networks (ICCSN), Chongqing, China, 2019, pp 784\u2013788. https:\/\/doi.org\/10.1109\/ICCSN.2019.8905304","DOI":"10.1109\/ICCSN.2019.8905304"},{"key":"10_CR10","doi-asserted-by":"publisher","unstructured":"Dong Y, Wang R, He J (2019) Real-time network intrusion detection system based on deep learning. In: 2019 IEEE 10th international conference on software engineering and service science (ICSESS), Beijing, China, 2019, pp 1\u20134. https:\/\/doi.org\/10.1109\/ICSESS47205.2019.9040718","DOI":"10.1109\/ICSESS47205.2019.9040718"},{"key":"10_CR11","doi-asserted-by":"publisher","unstructured":"Kavousi-Fard, Dabbaghjamanesh M, Jin T, Su W, Roustaei M (2020) An evolutionary deep learning-based anomaly detection model for securing vehicles. In: IEEE transactions on intelligent transportation systems. https:\/\/doi.org\/10.1109\/TITS.2020.3015143","DOI":"10.1109\/TITS.2020.3015143"},{"issue":"3","key":"10_CR12","doi-asserted-by":"publisher","first-page":"924","DOI":"10.1109\/TNSM.2019.2927886","volume":"16","author":"S Garg","year":"2019","unstructured":"Garg S, Kaur K, Kumar N, Kaddoum G, Zomaya AY, Ranjan R (2019) A hybrid deep learning-based model for anomaly detection in cloud datacenter networks. IEEE Trans Netw Serv Manage 16(3):924\u2013935. https:\/\/doi.org\/10.1109\/TNSM.2019.2927886","journal-title":"IEEE Trans Netw Serv Manage"},{"key":"10_CR13","doi-asserted-by":"publisher","unstructured":"Fern\u00e1ndez Maim\u00f3 L, Perales G\u00f3mez \u00c1L, Garc\u00eda Clemente FJ, Gil P\u00e9rez M, Mart\u00ednez P\u00e9rez G (2018) A self-adaptive deep learning-based system for anomaly detection in 5G networks. In: IEEE Access 6:7700\u20137712. https:\/\/doi.org\/10.1109\/ACCESS.2018.2803446","DOI":"10.1109\/ACCESS.2018.2803446"},{"key":"10_CR14","doi-asserted-by":"publisher","unstructured":"Li X, Chen P, Jing L, He Z, Yu G (2020)SwissLog: robust and unified deep learning based log anomaly detection for diverse faults. In: 2020 IEEE 31st international symposium on software reliability engineering (ISSRE), Coimbra, Portugal, 2020, pp 92\u2013103. https:\/\/doi.org\/10.1109\/ISSRE5003.2020.00018","DOI":"10.1109\/ISSRE5003.2020.00018"},{"key":"10_CR15","doi-asserted-by":"publisher","unstructured":"Alrawashdeh K, Purdy C (2018) Fast activation function approach for deep learning based online anomaly intrusion detection. In: 2018 IEEE 4th international conference on big data security on cloud (BigDataSecurity), IEEE International Conference on High Per- formance and Smart Computing, (HPSC) and IEEE International Conference on Intelligent Data and Security (IDS), Omaha, NE, USA, 2018, pp 5\u201313. https:\/\/doi.org\/10.1109\/BDS\/HPSC\/IDS18.2018.00016","DOI":"10.1109\/BDS\/HPSC\/IDS18.2018.00016"},{"key":"10_CR16","doi-asserted-by":"publisher","unstructured":"Dong L, Zhang Y, Wen C, Wu H (2016) Camera anomaly detection based on morphological analysis and deep learning. In: 2016 IEEE international conference on digital signal processing (DSP), Beijing, China, 2016, pp 266\u2013270. https:\/\/doi.org\/10.1109\/ICDSP.2016.7868559","DOI":"10.1109\/ICDSP.2016.7868559"},{"key":"10_CR17","doi-asserted-by":"publisher","unstructured":"Lee W-Y, Wang Y.-C.F. (2020) Learning disentangled feature representations for anomaly detection. In: 2020 IEEE international conference on image processing (ICIP), Abu Dhabi, United Arab Emirates, 2020, pp 2156\u20132160. https:\/\/doi.org\/10.1109\/ICIP40778.2020.9191201","DOI":"10.1109\/ICIP40778.2020.9191201"},{"key":"10_CR18","doi-asserted-by":"publisher","first-page":"77396","DOI":"10.1109\/ACCESS.2020.2986013","volume":"8","author":"S Manimurugan","year":"2020","unstructured":"Manimurugan S, Al-Mutairi S, Aborokbah MM, Chilamkurti N, Ganesan S, Patan R (2020) Effective attack detection in internet of medical things smart environment using a deep belief neural network. IEEE Access 8:77396\u201377404. https:\/\/doi.org\/10.1109\/ACCESS.2020.2986013","journal-title":"IEEE Access"},{"key":"10_CR19","doi-asserted-by":"publisher","unstructured":"Fern\u00e1ndez GC, Xu S (2019) A case study on using deep learning for network intrusion detection. In: MILCOM 2019\u20142019 IEEE Military Communications Conference (MILCOM), Norfolk, VA, USA, 2019, pp 1\u20136. https:\/\/doi.org\/10.1109\/MILCOM47813.2019.9020824","DOI":"10.1109\/MILCOM47813.2019.9020824"},{"key":"10_CR20","doi-asserted-by":"publisher","unstructured":"Lin M, Zhao B, Xin Q (2020) ERID: a deep learning-based approach towards efficient real-time intrusion detection for IoT. In: 2020 IEEE eighth international conference on communications and networking (ComNet), Hammamet, Tunisia, pp 1\u20137. https:\/\/doi.org\/10.1109\/ComNet47917.2020.9306110","DOI":"10.1109\/ComNet47917.2020.9306110"},{"key":"10_CR21","doi-asserted-by":"publisher","unstructured":"Haselmann M, Gruber DP, Tabatabai P (2018) Anomaly detection using deep learning based image completion. In: 2018 17th IEEE international conference on machine learning and applications (ICMLA), Orlando, FL, USA, pp 1237\u20131242. https:\/\/doi.org\/10.1109\/ICMLA.2018.00201","DOI":"10.1109\/ICMLA.2018.00201"},{"key":"10_CR22","doi-asserted-by":"publisher","first-page":"140806","DOI":"10.1109\/ACCESS.2019.2943249","volume":"7","author":"RK Malaiya","year":"2019","unstructured":"Malaiya RK, Kwon D, Suh SC, Kim H, Kim I, Kim J (2019) An empirical evaluation of deep learning for network anomaly detection. IEEE Access 7:140806\u2013140817. https:\/\/doi.org\/10.1109\/ACCESS.2019.2943249","journal-title":"IEEE Access"},{"key":"10_CR23","doi-asserted-by":"publisher","unstructured":"Haider S, Akhunzada A, Ahmed G, Raza M (2019)Deep learning based ensemble convolutional neural network solution for distributed denial of service detection in SDNs. In: 2019 UK\/China emerging technologies (UCET), Glasgow, UK, 2019, pp 1\u20134. https:\/\/doi.org\/10.1109\/UCET.2019.8881856","DOI":"10.1109\/UCET.2019.8881856"},{"key":"10_CR24","doi-asserted-by":"publisher","first-page":"198384","DOI":"10.1109\/ACCESS.2020.3034875","volume":"8","author":"S Miau","year":"2020","unstructured":"Miau S, Hung W-H (2020) River flooding forecasting and anomaly detection based on deep learning. IEEE Access 8:198384\u2013198402. https:\/\/doi.org\/10.1109\/ACCESS.2020.3034875","journal-title":"IEEE Access"},{"key":"10_CR25","doi-asserted-by":"publisher","unstructured":"Potluri S, Diedrich C (2019)Deep learning based efficient anomaly detection for securing process control systems against injection attacks. In: 2019 IEEE 15th international conference on automation science and engineering (CASE), Vancouver, BC, Canada, 2019, pp 854\u2013860. https:\/\/doi.org\/10.1109\/COASE.2019.8843140","DOI":"10.1109\/COASE.2019.8843140"},{"key":"10_CR26","doi-asserted-by":"publisher","unstructured":"Abeyrathna D, Huang P, Zhong X (2019) Anomaly proposal-based fire detection for cyber-physical systems. In: 2019 international conference on computational science and computational intelligence (CSCI), Las Vegas, NV, USA, 2019, pp 1203\u20131207. https:\/\/doi.org\/10.1109\/CSCI49370.2019.00226","DOI":"10.1109\/CSCI49370.2019.00226"},{"key":"10_CR27","doi-asserted-by":"publisher","unstructured":"Ma N, Peng Y, Wang S, Liu D (2018)Hyperspectral image anomaly targets detection with online deep learning. In: 2018 IEEE international instrumentation and measurement technology conference (I2MTC), Houston, TX, USA, 2018, pp. 1\u20136. https:\/\/doi.org\/10.1109\/I2MTC.2018.8409615","DOI":"10.1109\/I2MTC.2018.8409615"},{"key":"10_CR28","doi-asserted-by":"publisher","unstructured":"Ding K,Ding S, Morozov A, Fabarisov T, Janschek K (2019) On-line error detection and mitigation for time-series data of cyber-physical systems using deep learning based methods. In: 2019 15th european dependable computing conference (EDCC), Naples, Italy, 2019, pp 7\u201314. https:\/\/doi.org\/10.1109\/EDCC.2019.00015","DOI":"10.1109\/EDCC.2019.00015"},{"key":"10_CR29","doi-asserted-by":"publisher","unstructured":"Ma X, Shi W (2020) AESMOTE: adversarial reinforcement learning with SMOTE for anomaly detection. In: IEEE transactions on network science and engineering. https:\/\/doi.org\/10.1109\/TNSE.2020.3004312","DOI":"10.1109\/TNSE.2020.3004312"},{"key":"10_CR30","doi-asserted-by":"publisher","unstructured":"Maggipinto M, Beghi A, Susto GA (2019)A deep learning-based approach to anomaly detection with 2-dimensional data in manufacturing. In: 2019 IEEE 17th international conference on industrial informatics (INDIN), Helsinki, Finland, 2019, pp 187\u2013192. https:\/\/doi.org\/10.1109\/INDIN41052.2019.8972027","DOI":"10.1109\/INDIN41052.2019.8972027"},{"key":"10_CR31","doi-asserted-by":"publisher","first-page":"39574","DOI":"10.1109\/ACCESS.2020.2975887","volume":"8","author":"X Fang","year":"2020","unstructured":"Fang X et al (2020) Sewer pipeline fault identification using anomaly detection algorithms on video sequences. IEEE Access 8:39574\u201339586. https:\/\/doi.org\/10.1109\/ACCESS.2020.2975887","journal-title":"IEEE Access"},{"key":"10_CR32","doi-asserted-by":"publisher","unstructured":"Ayg\u00fcn RC, Yavuz AG (2017)A stochastic data discrimination based autoencoder approach for network anomaly detection. In: 2017 25th signal processing and communications applications conference (SIU), Antalya, Turkey, 2017, pp 1\u20134. https:\/\/doi.org\/10.1109\/SIU.2017.7960410","DOI":"10.1109\/SIU.2017.7960410"},{"key":"10_CR33","doi-asserted-by":"publisher","unstructured":"Hussain Q Du, Ren P (2018)Deep learning-based big data-assisted anomaly detection in cellular networks. In: 2018 IEEE global communications conference (GLOBECOM), Abu Dhabi, United Arab Emirates, 2018, pp 1\u20136. https:\/\/doi.org\/10.1109\/GLOCOM.2018.8647366","DOI":"10.1109\/GLOCOM.2018.8647366"},{"key":"10_CR34","doi-asserted-by":"publisher","unstructured":"Marsiano FD, Soesanti I, Ardiyanto I (2019)Deep learning-based anomaly detection on surveillance videos: recent advances. In: 2019 international conference of advanced informatics: concepts, theory and applications (ICAICTA), Yogyakarta, Indonesia, 2019, pp 1\u20136. https:\/\/doi.org\/10.1109\/ICAICTA.2019.8904395","DOI":"10.1109\/ICAICTA.2019.8904395"},{"key":"10_CR35","doi-asserted-by":"publisher","first-page":"162395","DOI":"10.1109\/ACCESS.2019.2950972","volume":"7","author":"R Togo","year":"2019","unstructured":"Togo R, Saito N, Ogawa T, Haseyama M (2019) Estimating regions of deterioration in electron microscope images of rubber materials via a transfer learning-based anomaly detection model. IEEE Access 7:162395\u2013162404. https:\/\/doi.org\/10.1109\/ACCESS.2019.2950972","journal-title":"IEEE Access"},{"key":"10_CR36","doi-asserted-by":"publisher","unstructured":"Nie L, Zhao L, Li K (2020) Glad: global and local anomaly detection. In: 2020 IEEE international conference on multimedia and expo (ICME), London, UK, pp 1\u20136. https:\/\/doi.org\/10.1109\/ICME46284.2020.9102818","DOI":"10.1109\/ICME46284.2020.9102818"},{"key":"10_CR37","doi-asserted-by":"publisher","unstructured":"Miller J,Wang Y, Kesidis G (2018) Anomaly detection of attacks (ada) on DNN classifiers at test time. In: 2018 IEEE 28th international workshop on machine learning for signal processing (MLSP), Aalborg, Denmark, 2018, pp 1\u20136. https:\/\/doi.org\/10.1109\/MLSP.2018.8517069","DOI":"10.1109\/MLSP.2018.8517069"},{"issue":"11","key":"10_CR38","doi-asserted-by":"publisher","first-page":"5450","DOI":"10.1109\/TIP.2019.2917862","volume":"28","author":"P Perera","year":"2019","unstructured":"Perera P, Patel VM (2019) Learning deep features for one-class classification. IEEE Trans Image Process 28(11):5450\u20135463. https:\/\/doi.org\/10.1109\/TIP.2019.2917862","journal-title":"IEEE Trans Image Process"},{"key":"10_CR39","doi-asserted-by":"publisher","unstructured":"Salama R, Al-Turjman F, Bordoloi D, Yadav SP (2023) Wireless sensor networks and green networking for 6G communication\u2014an overview. In: 2023 international conference on computational intelligence, communication technology and networking (CICTN), Ghaziabad, India, 2023, pp 830\u2013834. https:\/\/doi.org\/10.1109\/CICTN57981.2023.10141262","DOI":"10.1109\/CICTN57981.2023.10141262"},{"key":"10_CR40","doi-asserted-by":"publisher","unstructured":"Aygun RC, Yavuz AG (2017) Network anomaly detection with stochastically improved autoencoder based models. In: 2017 IEEE 4th international conference on cyber security and cloud computing (CSCloud), New York, NY, USA, 2017, pp 193\u2013198. https:\/\/doi.org\/10.1109\/CSCloud.2017.39","DOI":"10.1109\/CSCloud.2017.39"},{"key":"10_CR41","doi-asserted-by":"publisher","unstructured":"Masood U,Asghar A, Imran A, Mian AN (2018) Deep learning based detection of sleeping cells in next generation cellular networks. In: 2018 IEEE global communications conference (GLOBECOM), Abu Dhabi, United Arab Emirates, 2018, pp 206\u2013212. https:\/\/doi.org\/10.1109\/GLOCOM.2018.8647689","DOI":"10.1109\/GLOCOM.2018.8647689"},{"key":"10_CR42","doi-asserted-by":"publisher","unstructured":"Qin Y, Wei J, Yang W (2019) Deep learning based anomaly detection scheme in software-defined networking. In: 2019 20th Asia-Pacific network operations and managementsymposium (APNOMS), Matsue, Japan, 2019, pp 1\u20134. https:\/\/doi.org\/10.23919\/APNOMS.2019.8892873","DOI":"10.23919\/APNOMS.2019.8892873"},{"key":"10_CR43","doi-asserted-by":"publisher","first-page":"3045","DOI":"10.1007\/s12161-022-02353-9","volume":"15","author":"M Mishra","year":"2022","unstructured":"Mishra M, Sarkar T, Choudhury T et al (2022) Allergen30: detecting food items with possible allergens using deep learning-based computer vision. Food Anal Methods 15:3045\u20133078. https:\/\/doi.org\/10.1007\/s12161-022-02353-9","journal-title":"Food Anal Methods"},{"key":"10_CR44","doi-asserted-by":"publisher","first-page":"5659","DOI":"10.3390\/s23125659","volume":"23","author":"S Sayyad","year":"2023","unstructured":"Sayyad S, Kumar S, Bongale A, Kotecha K, Abraham A (2023) Remaining useful-life prediction of the milling cutting tool using time\u2013frequency-based features and deep learning models. Sensors 23:5659. https:\/\/doi.org\/10.3390\/s23125659","journal-title":"Sensors"},{"issue":"June","key":"10_CR45","first-page":"509","volume":"79","author":"T Choudhury","year":"2020","unstructured":"Choudhury T, Anggarwal A, Tomar R (2020) A deep learning approach to helmet detection for road safety. J Sci Ind Res (India) 79(June):509\u2013512","journal-title":"J Sci Ind Res (India)"},{"key":"10_CR46","doi-asserted-by":"publisher","first-page":"133052","DOI":"10.1109\/ACCESS.2022.3227962","volume":"10","author":"A Rajendran","year":"2022","unstructured":"Rajendran A et al (2022) Detecting extremism on Twitter during U.S. Capitol Riot using deep learning techniques. IEEE Access 10:133052\u2013133077. https:\/\/doi.org\/10.1109\/ACCESS.2022.3227962","journal-title":"IEEE Access"},{"key":"10_CR47","doi-asserted-by":"publisher","first-page":"104358","DOI":"10.1109\/ACCESS.2022.3210543","volume":"10","author":"B Natarajan","year":"2022","unstructured":"Natarajan B et al (2022) Development of an end-to-end deep learning framework for sign language recognition, translation, and video generation. IEEE Access 10:104358\u2013104374. https:\/\/doi.org\/10.1109\/ACCESS.2022.3210543","journal-title":"IEEE Access"},{"key":"10_CR48","doi-asserted-by":"publisher","unstructured":"Khanna A, Sah A, Choudhury T (2020) Intelligent mobile edge computing: a deep learning based approach. In: Singh M, Gupta P, Tyagi V, Flusser J, \u00d6ren T, Valentino G (eds) Advances in computing and data sciences. ICACDS 2020. Communications in Computer and Information Science, vol 1244. Springer, Singapore. https:\/\/doi.org\/10.1007\/978-981-15-6634-9_11","DOI":"10.1007\/978-981-15-6634-9_11"}],"container-title":["Lecture Notes in Electrical Engineering","Semantic Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-7356-5_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,28]],"date-time":"2024-12-28T21:28:52Z","timestamp":1735421332000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-7356-5_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9789819773558","9789819773565"],"references-count":48,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-7356-5_10","relation":{},"ISSN":["1876-1100","1876-1119"],"issn-type":[{"type":"print","value":"1876-1100"},{"type":"electronic","value":"1876-1119"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"29 December 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISIC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Semantic Intelligence Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Braga","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Portugal","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 October 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 October 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"isic32023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}