{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T02:59:59Z","timestamp":1763348399333},"reference-count":70,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2022,1,13]],"date-time":"2022-01-13T00:00:00Z","timestamp":1642032000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,13]],"date-time":"2022-01-13T00:00:00Z","timestamp":1642032000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Comput &amp; Applic"],"published-print":{"date-parts":[[2022,4]]},"DOI":"10.1007\/s00521-021-06721-0","type":"journal-article","created":{"date-parts":[[2022,1,13]],"date-time":"2022-01-13T00:03:47Z","timestamp":1642032227000},"page":"5771-5790","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Design of backpropagated neurocomputing paradigm for Stuxnet virus dynamics in control infrastructure"],"prefix":"10.1007","volume":"34","author":[{"given":"Muhammad Asif Zahoor","family":"Raja","sequence":"first","affiliation":[]},{"given":"Hira","family":"Naz","sequence":"additional","affiliation":[]},{"given":"Muhammad","family":"Shoaib","sequence":"additional","affiliation":[]},{"given":"Ammara","family":"Mehmood","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,13]]},"reference":[{"key":"6721_CR1","volume-title":"A short course on computer viruses","author":"FB Cohen","year":"1994","unstructured":"Cohen FB, Cohen DF (1994) A short course on computer viruses. John Wiley & Sons Inc, Hoboken"},{"issue":"1","key":"6721_CR2","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1016\/0167-4048(87)90122-2","volume":"6","author":"F Cohen","year":"1987","unstructured":"Cohen F (1987) Computer viruses: theory and experiments. Comput Secur 6(1):22\u201335","journal-title":"Comput Secur"},{"key":"6721_CR3","unstructured":"Spafford EH (1990) Computer viruses - a form of artificial life? In: Computer science technical reports. Purdue University"},{"issue":"1","key":"6721_CR4","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1016\/j.jksus.2012.01.003","volume":"25","author":"OA Arqub","year":"2013","unstructured":"Arqub OA, El-Ajou A (2013) Solution of the fractional epidemic model by homotopy analysis method. J King Saud Univ Sci 25(1):73\u201381","journal-title":"J King Saud Univ Sci"},{"key":"6721_CR5","doi-asserted-by":"crossref","unstructured":"Kephart JO, White SR (1993) Measuring and modeling computer virus prevalence. In: Proceedings 1993 IEEE computer society symposium on research in security and privacy, IEEE, pp 2\u201315","DOI":"10.1109\/RISP.1993.287647"},{"key":"6721_CR6","doi-asserted-by":"crossref","unstructured":"Zou CC, Gong W, Towsley D (2002) Code red worm propagation modeling and analysis. In: Proceedings of the 9th ACM conference on computer and communications security, pp 138\u2013147","DOI":"10.1145\/586110.586130"},{"issue":"5","key":"6721_CR7","doi-asserted-by":"crossref","first-page":"961","DOI":"10.1109\/TNET.2005.857113","volume":"13","author":"CC Zou","year":"2005","unstructured":"Zou CC, Gong W, Towsley D, Gao L (2005) The monitoring and early detection of internet worms. IEEE ACM Trans Netw 13(5):961\u2013974","journal-title":"IEEE ACM Trans Netw"},{"key":"6721_CR8","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1016\/j.cose.2018.08.004","volume":"79","author":"MTS Pont","year":"2018","unstructured":"Pont MTS, Castillo AC, Mora HM, Szymanski J (2018) Modelling the malware propagation in mobile computer devices. Comput Secur 79:80\u201393","journal-title":"Comput Secur"},{"issue":"19\u201320","key":"6721_CR9","doi-asserted-by":"crossref","first-page":"8352","DOI":"10.1016\/j.apm.2016.04.023","volume":"40","author":"J Amador","year":"2016","unstructured":"Amador J (2016) The SEIQS stochastic epidemic model with external source of infection. Appl Math Model 40(19\u201320):8352\u20138365","journal-title":"Appl Math Model"},{"key":"6721_CR10","doi-asserted-by":"crossref","first-page":"110","DOI":"10.1016\/j.apm.2016.10.028","volume":"43","author":"LX Yang","year":"2017","unstructured":"Yang LX, Yang X, Wu Y (2017) The impact of patch forwarding on the prevalence of computer virus: a theoretical assessment approach. Appl Math Model 43:110\u2013125","journal-title":"Appl Math Model"},{"issue":"4","key":"6721_CR11","doi-asserted-by":"crossref","first-page":"3400","DOI":"10.1016\/j.apm.2015.10.029","volume":"40","author":"T Dong","year":"2016","unstructured":"Dong T, Wang A, Liao X (2016) Impact of discontinuous antivirus strategy in a computer virus model with the point to group. Appl Math Model 40(4):3400\u20133409","journal-title":"Appl Math Model"},{"issue":"2","key":"6721_CR12","first-page":"445","volume":"120","author":"A Raza","year":"2019","unstructured":"Raza A, Arif MS, Rafiq M, Bibi M, Naveed M, Iqbal MU, Butt Z, Naseem HA, Abbasi JN (2019) Numerical treatment for stochastic computer virus model. Comput Model Eng Sci 120(2):445\u2013465","journal-title":"Comput Model Eng Sci"},{"issue":"5","key":"6721_CR13","doi-asserted-by":"crossref","first-page":"59201","DOI":"10.1007\/s11432-018-9675-1","volume":"62","author":"Y Yu","year":"2019","unstructured":"Yu Y, Hu J, Zeng Y (2019) On computer virus spreading using node-based model with time-delayed intervention strategies. Sci China Inf Sci 62(5):59201","journal-title":"Sci China Inf Sci"},{"key":"6721_CR14","doi-asserted-by":"crossref","first-page":"1725","DOI":"10.1007\/s11071-020-05562-1","volume":"100","author":"C Gan","year":"2020","unstructured":"Gan C, Feng Q, Zhu Q, Zhang Z, Zhang Y, Xiang Y (2020) Analysis of computer virus propagation behaviors over complex networks: a case study of Oregon routing network. Nonlinear Dyn 100:1725\u20131740","journal-title":"Nonlinear Dyn"},{"key":"6721_CR15","doi-asserted-by":"crossref","first-page":"122617","DOI":"10.1016\/j.physa.2019.122617","volume":"538","author":"RK Upadhyay","year":"2020","unstructured":"Upadhyay RK, Singh P (2020) Modeling and control of computer virus attack on a targeted network. Phys A Stat Mech Appl 538:122617","journal-title":"Phys A Stat Mech Appl"},{"key":"6721_CR16","doi-asserted-by":"crossref","first-page":"112753","DOI":"10.1016\/j.cam.2020.112753","volume":"374","author":"QA Dang","year":"2020","unstructured":"Dang QA, Hoang MT (2020) Positivity and global stability preserving NSFD schemes for a mixing propagation model of computer viruses. J Comput Appl Math 374:112753","journal-title":"J Comput Appl Math"},{"issue":"5","key":"6721_CR17","doi-asserted-by":"crossref","first-page":"396","DOI":"10.3390\/math7050396","volume":"7","author":"Z Zhang","year":"2019","unstructured":"Zhang Z, Kundu S, Wei R (2019) A delayed epidemic model for propagation of malicious codes in wireless sensor network. Mathematics 7(5):396","journal-title":"Mathematics"},{"key":"6721_CR18","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/2051489","author":"C Zhang","year":"2019","unstructured":"Zhang C, Peng J, Xiao J (2019) An advanced persistent distributed denial-of-service attacked dynamical model on networks. Disc Dyn Nat Soc 2019:2051489. https:\/\/doi.org\/10.1155\/2019\/2051489","journal-title":"Disc Dyn Nat Soc"},{"key":"6721_CR19","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1515\/ijnsns-2019-0063","volume":"21","author":"N \u00d6zdemir","year":"2019","unstructured":"\u00d6zdemir N, U\u00e7ar S, Ero\u011flu BB\u0130 (2019) Dynamical analysis of fractional order model for computer virus propagation with kill signals. Int J Nonlinear Sci Numer Simul 21:239\u2013247","journal-title":"Int J Nonlinear Sci Numer Simul"},{"issue":"1","key":"6721_CR20","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s13662-019-2438-0","volume":"2019","author":"Z Zhang","year":"2019","unstructured":"Zhang Z, Kumari S, Upadhyay RK (2019) A delayed e-epidemic SLBS model for computer virus. Adv Differ Equ 2019(1):1\u201324","journal-title":"Adv Differ Equ"},{"issue":"3","key":"6721_CR21","doi-asserted-by":"crossref","first-page":"249","DOI":"10.3233\/FI-2018-1702","volume":"161","author":"Z Masood","year":"2018","unstructured":"Masood Z, Majeed K, Samar R, Raja MAZ (2018) Design of epidemic computer virus model with effect of quarantine in the presence of immunity. Fundam Inform 161(3):249\u2013273","journal-title":"Fundam Inform"},{"issue":"7350","key":"6721_CR22","doi-asserted-by":"crossref","first-page":"142","DOI":"10.1038\/474142a","volume":"474","author":"S Weinberger","year":"2011","unstructured":"Weinberger S (2011) Is this the start of cyberwarfare? Last year\u2019s Stuxnet virus attack represented a new kind of threat to critical infrastructure. Nature 474(7350):142\u2013146","journal-title":"Nature"},{"key":"6721_CR23","first-page":"1","volume":"29","author":"J Richardson","year":"2011","unstructured":"Richardson J (2011) Stuxnet as cyberwarfare: applying the law of war to the virtual battlefield. J Marshall J Comput Inf L 29:1","journal-title":"J Marshall J Comput Inf L"},{"key":"6721_CR24","unstructured":"Lachow I (2011) The Stuxnet enigma: implications for the future of cybersecurity. Georgetown J Int Aff 118\u2013126. https:\/\/www.jstor.org\/stable\/43133820"},{"key":"6721_CR25","doi-asserted-by":"crossref","first-page":"101565","DOI":"10.1016\/j.cose.2019.07.002","volume":"87","author":"Z Masood","year":"2019","unstructured":"Masood Z, Samar R, Raja MAZ (2019) Design of a mathematical model for the Stuxnet virus in a network of critical control infrastructure. Comput Secur 87:101565","journal-title":"Comput Secur"},{"issue":"5","key":"6721_CR26","first-page":"150","volume":"61","author":"A Cserhati","year":"2011","unstructured":"Cserhati A (2011) The Stuxnet virus and the Iranian Atom Programme. Fiz Szle 61(5):150\u2013155","journal-title":"Fiz Szle"},{"key":"6721_CR27","first-page":"7","volume-title":"The stuxnet computer worm: Harbinger of an emerging warfare capability","author":"PK Kerr","year":"2010","unstructured":"Kerr PK, Rollins J, Theohary CA (2010) The stuxnet computer worm: Harbinger of an emerging warfare capability. Congressional Research Service, Washington, pp 7\u20135700"},{"issue":"3","key":"6721_CR28","doi-asserted-by":"crossref","first-page":"672","DOI":"10.3390\/fi4030672","volume":"4","author":"DE Denning","year":"2012","unstructured":"Denning DE (2012) Stuxnet: What has changed? Future Internet 4(3):672\u2013687","journal-title":"Future Internet"},{"issue":"4","key":"6721_CR29","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1109\/MC.2011.115","volume":"44","author":"TM Chen","year":"2011","unstructured":"Chen TM, Abu-Nimeh S (2011) Lessons from Stuxnet. Computer 44(4):91\u201393","journal-title":"Computer"},{"key":"6721_CR30","volume-title":"Industrial network security: securing critical infrastructure networks for smart grid, SCADA, and other industrial control systems","author":"ED Knapp","year":"2014","unstructured":"Knapp ED, Langill JT (2014) Industrial network security: securing critical infrastructure networks for smart grid, SCADA, and other industrial control systems. Syngress, Rockland"},{"key":"6721_CR31","doi-asserted-by":"crossref","first-page":"109626","DOI":"10.1016\/j.chaos.2020.109626","volume":"133","author":"VP Dubey","year":"2020","unstructured":"Dubey VP, Kumar R, Kumar D (2020) A hybrid analytical scheme for the numerical computation of time fractional computer virus propagation model and its stability analysis. Chaos Solitons Fractals 133:109626","journal-title":"Chaos Solitons Fractals"},{"issue":"3","key":"6721_CR32","first-page":"1025","volume":"61","author":"MS Arif","year":"2019","unstructured":"Arif MS, Raza A, Shatanawi W, Rafiq M, Bibi M (2019) A stochastic numerical analysis for computer virus model with vertical transmission over the internet. CMC Comput Mater Contin 61(3):1025\u20131043","journal-title":"CMC Comput Mater Contin"},{"key":"6721_CR33","doi-asserted-by":"crossref","first-page":"471","DOI":"10.1016\/j.ejor.2019.10.019","volume":"291","author":"KF Cheung","year":"2019","unstructured":"Cheung KF, Bell MG (2019) Attacker\u2013defender model against quantal response adversaries for cyber security in logistics management: an introductory study. Eur J Oper Res 291:471\u2013481","journal-title":"Eur J Oper Res"},{"key":"6721_CR34","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1016\/j.future.2019.12.053","volume":"106","author":"Z Masood","year":"2020","unstructured":"Masood Z, Samar R, Raja MAZ (2020) Design of fractional order epidemic model for future generation tiny hardware implants. Future Gener Comput Syst 106:43\u201354","journal-title":"Future Gener Comput Syst"},{"issue":"6","key":"6721_CR35","doi-asserted-by":"crossref","first-page":"14372","DOI":"10.1016\/j.jmrt.2020.09.098","volume":"9","author":"Z Shah","year":"2020","unstructured":"Shah Z, Raja MAZ, Chu YM, Khan WA, Waqas M, Shoaib M, Abbass SZ (2020) Design of neural network based intelligent computing for neumerical treatment of unsteady 3D flow of Eyring-Powell magneto-nanofluidic model. J Mater Res Technol 9(6):14372\u201314387","journal-title":"J Mater Res Technol"},{"key":"6721_CR36","doi-asserted-by":"crossref","DOI":"10.1016\/j.asoc.2020.106791","volume":"97","author":"I Jadoon","year":"2020","unstructured":"Jadoon I, Ahmed A, ur Rehman A, Shoaib M, Raja MAZ (2020) Integrated meta-heuristics finite difference method for the dynamics of nonlinear unipolar electrohydrodynamic pump flow model. Appl Soft Comput 97:106791","journal-title":"Appl Soft Comput"},{"key":"6721_CR37","doi-asserted-by":"crossref","first-page":"444","DOI":"10.1016\/j.matcom.2020.10.004","volume":"181","author":"I Jadoon","year":"2021","unstructured":"Jadoon I, Raja MAZ, Junaid M, Ahmed A, ur Rehman A, Shoaib M (2021) Design of evolutionary optimized finite difference based numerical computing for dust density model of nonlinear Van-der Pol Mathieu\u2019s oscillatory systems. Math Comput Simul 181:444\u2013470","journal-title":"Math Comput Simul"},{"issue":"5","key":"6721_CR38","doi-asserted-by":"crossref","first-page":"3325","DOI":"10.1016\/j.aej.2020.04.051","volume":"59","author":"AH Bukhari","year":"2020","unstructured":"Bukhari AH, Sulaiman M, Raja MAZ, Islam S, Shoaib M, Kumam P (2020) Design of a hybrid NAR-RBFs neural network for nonlinear dusty plasma system. Alexandria Eng J 59(5):3325\u20133345","journal-title":"Alexandria Eng J"},{"key":"6721_CR39","doi-asserted-by":"crossref","first-page":"2427","DOI":"10.1007\/s00521-020-05143-8","volume":"33","author":"Z Sabir","year":"2020","unstructured":"Sabir Z, Baleanu D, Shoaib M,  Raja MAZ (2021) Design of stochastic numerical solver for the solution of singular three-point second-order boundary value problems. Neural Comput Appl 33(7):2427\u20132443","journal-title":"Neural Comput Appl"},{"issue":"6","key":"6721_CR40","doi-asserted-by":"crossref","first-page":"1905","DOI":"10.1007\/s00521-016-2806-6","volume":"30","author":"MAZ Raja","year":"2018","unstructured":"Raja MAZ, Mehmood A, Niazi SA, Shah SM (2018) Computational intelligence methodology for the analysis of RC circuit modelled with nonlinear differential order system. Neural Comput Appl 30(6):1905\u20131924","journal-title":"Neural Comput Appl"},{"issue":"11","key":"6721_CR41","doi-asserted-by":"crossref","first-page":"7121","DOI":"10.1007\/s00521-019-04197-7","volume":"32","author":"A Mehmood","year":"2020","unstructured":"Mehmood A, Zameer A, Aslam MS, Raja MAZ (2020) Design of nature-inspired heuristic paradigm for systems in nonlinear electrical circuits. Neural Comput Appl 32(11):7121\u20137137","journal-title":"Neural Comput Appl"},{"issue":"7","key":"6721_CR42","doi-asserted-by":"crossref","first-page":"449","DOI":"10.1007\/s00521-016-2547-6","volume":"29","author":"I Ahmad","year":"2018","unstructured":"Ahmad I, Ahmad F, Raja MAZ, Ilyas H, Anwar N, Azad Z (2018) Intelligent computing to solve fifth-order boundary value problem arising in induction motor models. Neural Comput Appl 29(7):449\u2013466","journal-title":"Neural Comput Appl"},{"key":"6721_CR43","doi-asserted-by":"crossref","first-page":"280","DOI":"10.1016\/j.neucom.2016.09.032","volume":"219","author":"MAZ Raja","year":"2017","unstructured":"Raja MAZ, Niazi SA, Butt SA (2017) An intelligent computing technique to analyze the vibrational dynamics of rotating electrical machine. Neurocomputing 219:280\u2013299","journal-title":"Neurocomputing"},{"issue":"5","key":"6721_CR44","doi-asserted-by":"crossref","first-page":"051003","DOI":"10.1115\/1.4046496","volume":"15","author":"MAZ Raja","year":"2020","unstructured":"Raja MAZ, Manzar MA, Shah SM, Chen Y (2020) Integrated intelligence of fractional neural networks and sequential quadratic programming for Bagley-Torvik systems arising in fluid mechanics. J Comput Nonlinear Dyn 15(5):051003","journal-title":"J Comput Nonlinear Dyn"},{"issue":"1","key":"6721_CR45","doi-asserted-by":"crossref","first-page":"359","DOI":"10.1007\/s00521-017-2991-y","volume":"31","author":"S Lodhi","year":"2019","unstructured":"Lodhi S, Manzar MA, Raja MAZ (2019) Fractional neural network models for nonlinear Riccati systems. Neural Comput Appl 31(1):359\u2013378","journal-title":"Neural Comput Appl"},{"issue":"1","key":"6721_CR46","doi-asserted-by":"crossref","first-page":"929","DOI":"10.1007\/s00521-016-2400-y","volume":"28","author":"I Ahmad","year":"2017","unstructured":"Ahmad I, Raja MAZ, Bilal M, Ashraf F (2017) Neural network methods to solve the Lane\u2013Emden type equations arising in thermodynamic studies of the spherical gas cloud model. Neural Comput Appl 28(1):929\u2013944","journal-title":"Neural Comput Appl"},{"issue":"6","key":"6721_CR47","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1007\/s00521-016-2530-2","volume":"29","author":"MAZ Raja","year":"2018","unstructured":"Raja MAZ, Shah FH, Tariq M, Ahmad I (2018) Design of artificial neural network models optimized with sequential quadratic programming to study the dynamics of nonlinear Troesch\u2019s problem arising in plasma physics. Neural Comput Appl 29(6):83\u2013109","journal-title":"Neural Comput Appl"},{"key":"6721_CR48","doi-asserted-by":"crossref","first-page":"359","DOI":"10.1016\/j.asoc.2017.10.049","volume":"62","author":"MAZ Raja","year":"2018","unstructured":"Raja MAZ, Manzar MA, Shah FH, Shah FH (2018) Intelligent computing for Mathieu\u2019s systems for parameter excitation, vertically driven pendulum and dusty plasma models. Appl Soft Comput 62:359\u2013372","journal-title":"Appl Soft Comput"},{"key":"6721_CR49","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.matcom.2020.01.005","volume":"172","author":"Z Sabir","year":"2020","unstructured":"Sabir Z, Wahab HA, Umar M, Sakar MG, Raja MAZ (2020) Novel design of Morlet wavelet neural network for solving second order Lane\u2013Emden equation. Math Comput Simul 172:1\u201314","journal-title":"Math Comput Simul"},{"issue":"1","key":"6721_CR50","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1140\/epjp\/s13360-019-00059-2","volume":"135","author":"F Faisal","year":"2020","unstructured":"Faisal F, Shoaib M, Raja MAZ (2020) A new heuristic computational solver for nonlinear singular Thomas\u2013Fermi system using evolutionary optimized cubic splines. Eur Phys J Plus 135(1):1\u201329","journal-title":"Eur Phys J Plus"},{"issue":"7","key":"6721_CR51","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1140\/epjp\/s13360-020-00557-8","volume":"135","author":"M Umar","year":"2020","unstructured":"Umar M, Raja MAZ, Sabir Z, Alwabli AS, Shoaib M (2020) A stochastic computational intelligent solver for numerical treatment of mosquito dispersal model in a heterogeneous environment. Eur Phys J Plus 135(7):1\u201323","journal-title":"Eur Phys J Plus"},{"issue":"11","key":"6721_CR52","doi-asserted-by":"crossref","first-page":"5753","DOI":"10.1007\/s00521-020-05355-y","volume":"33","author":"I Ahmad","year":"2021","unstructured":"Ahmad I, Raja MAZ, Ramos H, Bilal M, Shoaib M (2021) Integrated neuro-evolution-based computing solver for dynamics of nonlinear corneal shape model numerically. Neural Comput Appl 33(11):5753\u20135769","journal-title":"Neural Comput Appl"},{"key":"6721_CR53","doi-asserted-by":"crossref","first-page":"622","DOI":"10.1016\/j.asoc.2018.07.023","volume":"71","author":"MAZ Raja","year":"2018","unstructured":"Raja MAZ, Mehmood A, Rehman A, Khan A, Zameer A (2018) Bio-inspired computational heuristics for Sisko fluid flow and heat transfer models. Appl Soft Comput 71:622\u2013648","journal-title":"Appl Soft Comput"},{"key":"6721_CR54","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1016\/j.jtice.2018.05.046","volume":"91","author":"A Mehmood","year":"2018","unstructured":"Mehmood A, Zameer A, Ling SH, Raja MAZ (2018) Design of neuro-computing paradigms for nonlinear nanofluidic systems of MHD Jeffery\u2013Hamel flow. J Taiwan Inst Chem Eng 91:57\u201385","journal-title":"J Taiwan Inst Chem Eng"},{"issue":"7","key":"6721_CR55","doi-asserted-by":"crossref","first-page":"2845","DOI":"10.1007\/s00521-019-04157-1","volume":"32","author":"MAZ Raja","year":"2020","unstructured":"Raja MAZ, Mehmood A, Khan AA, Zameer A (2020) Integrated intelligent computing for heat transfer and thermal radiation-based two-phase MHD nanofluid flow model. Neural Comput Appl 32(7):2845\u20132877","journal-title":"Neural Comput Appl"},{"key":"6721_CR56","doi-asserted-by":"crossref","first-page":"361","DOI":"10.1016\/j.enconman.2016.12.032","volume":"134","author":"A Zameer","year":"2017","unstructured":"Zameer A, Arshad J, Khan A, Raja MAZ (2017) Intelligent and robust prediction of short term wind power using genetic programming based ensemble of neural networks. Energy Convers Manag 134:361\u2013372","journal-title":"Energy Convers Manag"},{"issue":"13","key":"6721_CR57","doi-asserted-by":"crossref","first-page":"2568","DOI":"10.3390\/en12132568","volume":"12","author":"R Jamal","year":"2019","unstructured":"Jamal R, Men B, Khan NH, Raja MAZ (2019) Hybrid bio-inspired computational heuristic paradigm for integrated load dispatch problems involving stochastic wind. Energies 12(13):2568","journal-title":"Energies"},{"key":"6721_CR58","first-page":"1","volume":"1","author":"A Ara","year":"2018","unstructured":"Ara A, Khan NA, Razzaq OA, Hameed T, Raja MAZ (2018) Wavelets optimization method for evaluation of fractional partial differential equations: an application to financial modelling. Adv Differ Equ 2018(1):1\u201313","journal-title":"Adv Differ Equ"},{"key":"6721_CR59","doi-asserted-by":"crossref","first-page":"71326","DOI":"10.1109\/ACCESS.2020.2985763","volume":"8","author":"AH Bukhari","year":"2020","unstructured":"Bukhari AH, Raja MAZ, Sulaiman M, Islam S, Shoaib M, Kumam P (2020) Fractional neuro-sequential ARFIMA-LSTM for financial market forecasting. IEEE Access 8:71326\u201371338","journal-title":"IEEE Access"},{"key":"6721_CR60","doi-asserted-by":"crossref","first-page":"100317","DOI":"10.1016\/j.cosrev.2020.100317","volume":"39","author":"P Dixit","year":"2021","unstructured":"Dixit P, Silakari S (2021) Deep learning algorithms for cybersecurity applications: a technological and status review. Comput Sci Rev 39:100317","journal-title":"Comput Sci Rev"},{"key":"6721_CR61","doi-asserted-by":"crossref","unstructured":"Kravchik M, Shabtai A (2018) Detecting cyber attacks in industrial control systems using convolutional neural networks. In: Proceedings of the 2018 workshop on cyber-physical systems security and privacy, pp 72\u201383","DOI":"10.1145\/3264888.3264896"},{"key":"6721_CR62","first-page":"1","volume":"41","author":"AH Muna","year":"2018","unstructured":"Muna AH, Moustafa N, Sitnikova E (2018) Identification of malicious activities in industrial internet of things based on deep learning models. J Inf Secur Appl 41:1\u201311","journal-title":"J Inf Secur Appl"},{"issue":"4","key":"6721_CR63","first-page":"1","volume":"39","author":"Z Sabir","year":"2020","unstructured":"Sabir Z, Raja MAZ, Guirao JL, Shoaib M (2020) Integrated intelligent computing with neuro-swarming solver for multi-singular fourth-order nonlinear Emden-Fowler equation. Comput Appl Math 39(4):1\u201318","journal-title":"Comput Appl Math"},{"issue":"4","key":"6721_CR64","first-page":"1","volume":"39","author":"Z Sabir","year":"2020","unstructured":"Sabir Z, Raja MAZ, Shoaib M, Aguilar JG (2020) FMNEICS: fractional Meyer neuro-evolution-based intelligent computing solver for doubly singular multi-fractional order Lane-Emden system. Comput Appl Math 39(4):1\u201318","journal-title":"Comput Appl Math"},{"issue":"1","key":"6721_CR65","doi-asserted-by":"crossref","first-page":"345","DOI":"10.32604\/cmc.2019.06641","volume":"59","author":"C Anitescu","year":"2019","unstructured":"Anitescu C, Atroshchenko E, Alajlan N, Rabczuk T (2019) Artificial neural network methods for the solution of second order boundary value problems. Comput Mater Contin 59(1):345\u2013359","journal-title":"Comput Mater Contin"},{"issue":"20","key":"6721_CR66","doi-asserted-by":"crossref","first-page":"16279","DOI":"10.1007\/s00521-020-05161-6","volume":"32","author":"O Erkaymaz","year":"2020","unstructured":"Erkaymaz O (2020) Resilient back-propagation approach in small-world feed-forward neural network topology based on Newman-Watts algorithm. Neural Comput Appl 32(20):16279\u201316289","journal-title":"Neural Comput Appl"},{"key":"6721_CR67","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-020-05401-9","author":"O Alfarraj","year":"2020","unstructured":"Alfarraj O (2020) Internet of things with bio-inspired co-evolutionary deep-convolution neural-network approach for detecting road cracks in smart transportation. Neural Comput Appl. https:\/\/doi.org\/10.1007\/s00521-020-05401-9","journal-title":"Neural Comput Appl"},{"key":"6721_CR68","doi-asserted-by":"crossref","first-page":"738","DOI":"10.1016\/j.future.2019.09.018","volume":"102","author":"Y Zhang","year":"2020","unstructured":"Zhang Y, Wang Y, Luo G (2020) A new optimization algorithm for non-stationary time series prediction based on recurrent neural networks. Futur Gener Comput Syst 102:738\u2013745","journal-title":"Futur Gener Comput Syst"},{"key":"6721_CR69","doi-asserted-by":"crossref","first-page":"7859","DOI":"10.1007\/s00521-019-04187-9","volume":"32","author":"S Kaur","year":"2019","unstructured":"Kaur S, Singh M (2019) Hybrid intrusion detection and signature generation using deep recurrent neural networks. Neural Comput Appl 32:7859\u20137877","journal-title":"Neural Comput Appl"},{"key":"6721_CR70","doi-asserted-by":"crossref","first-page":"298","DOI":"10.1016\/j.future.2019.05.028","volume":"100","author":"F Munoz-Martinez","year":"2019","unstructured":"Munoz-Martinez F, Abellan JL, Acacio ME (2019) InsideNet: a for characterizing convolutional neural networks. Futur Gener Comput Syst 100:298\u2013315","journal-title":"Futur Gener Comput Syst"}],"container-title":["Neural Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-021-06721-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00521-021-06721-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-021-06721-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,15]],"date-time":"2022-03-15T05:24:05Z","timestamp":1647321845000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00521-021-06721-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,13]]},"references-count":70,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2022,4]]}},"alternative-id":["6721"],"URL":"https:\/\/doi.org\/10.1007\/s00521-021-06721-0","relation":{},"ISSN":["0941-0643","1433-3058"],"issn-type":[{"value":"0941-0643","type":"print"},{"value":"1433-3058","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1,13]]},"assertion":[{"value":"20 November 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 October 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 January 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"All the authors of the manuscript declared that there are no potential conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"All the authors of the manuscript declared that there is no research involving human participants and\/or animal.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Research involving human participants and\/or animals"}},{"value":"All the authors of the manuscript declared that there is no material that required informed consent.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}}]}}