{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T18:47:55Z","timestamp":1771613275335,"version":"3.50.1"},"reference-count":54,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2021,1,19]],"date-time":"2021-01-19T00:00:00Z","timestamp":1611014400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,1,19]],"date-time":"2021-01-19T00:00:00Z","timestamp":1611014400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001871","name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","doi-asserted-by":"publisher","award":["Project UIDB\/50008\/2020"],"award-info":[{"award-number":["Project UIDB\/50008\/2020"]}],"id":[{"id":"10.13039\/501100001871","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003593","name":"Conselho Nacional de Desenvolvimento Cient\u00edfico e Tecnol\u00f3gico","doi-asserted-by":"publisher","award":["Grant No. 309335\/2017-5"],"award-info":[{"award-number":["Grant No. 309335\/2017-5"]}],"id":[{"id":"10.13039\/501100003593","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Ministry of Education of the People\u2019s Republic of China","award":["MS2017BJKJ003"],"award-info":[{"award-number":["MS2017BJKJ003"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimedia Systems"],"published-print":{"date-parts":[[2023,6]]},"DOI":"10.1007\/s00530-020-00743-9","type":"journal-article","created":{"date-parts":[[2021,1,19]],"date-time":"2021-01-19T08:03:43Z","timestamp":1611043423000},"page":"1785-1797","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":23,"title":["MADP-IIME: malware attack detection protocol in IoT-enabled industrial multimedia environment using machine learning approach"],"prefix":"10.1007","volume":"29","author":[{"given":"Sumit","family":"Pundir","sequence":"first","affiliation":[]},{"given":"Mohammad S.","family":"Obaidat","sequence":"additional","affiliation":[]},{"given":"Mohammad","family":"Wazid","sequence":"additional","affiliation":[]},{"given":"Ashok Kumar","family":"Das","sequence":"additional","affiliation":[]},{"given":"Devesh Pratap","family":"Singh","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8657-3800","authenticated-orcid":false,"given":"Joel J. P. C.","family":"Rodrigues","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,19]]},"reference":[{"issue":"4","key":"743_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2990499","volume":"16","author":"S Ahmed","year":"2016","unstructured":"Ahmed, S., Ali, A., Abbas, J., Hadi, L.: Intelligent intrusion detection in low-power IoTs. ACM Trans Internet Technol. 16(4), 1\u201325 (2016)","journal-title":"ACM Trans Internet Technol."},{"issue":"13","key":"743_CR2","doi-asserted-by":"publisher","first-page":"8627","DOI":"10.1007\/s11042-018-6288-7","volume":"79","author":"F Al-Turjman","year":"2020","unstructured":"Al-Turjman, F., Alturjman, S.: 5G\/IoT-enabled UAVs for multimedia delivery in industry-oriented applications. Multimed Tools Appl 79(13), 8627\u20138648 (2020)","journal-title":"Multimed Tools Appl"},{"key":"743_CR3","doi-asserted-by":"publisher","first-page":"47364","DOI":"10.1109\/ACCESS.2018.2866962","volume":"6","author":"VT Alaparthy","year":"2018","unstructured":"Alaparthy, V.T., Morgera, S.D.: A multi-level intrusion detection system for wireless sensor networks based on immune theory. IEEE Access 6, 47364\u201347373 (2018)","journal-title":"IEEE Access"},{"issue":"2","key":"743_CR4","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1109\/MCE.2019.2953740","volume":"9","author":"T Alladi","year":"2020","unstructured":"Alladi, T., Chamola, V., Sikdar, B., Choo, K.R.: Consumer IoT: security vulnerability case studies and solutions. IEEE Consumer Electron Mag 9(2), 17\u201325 (2020)","journal-title":"IEEE Consumer Electron Mag"},{"key":"743_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.comcom.2020.03.007","volume":"155","author":"T Alladi","year":"2020","unstructured":"Alladi, T., Chamola, V., Zeadally, S.: Industrial control systems: cyberattack trends and countermeasures. Comput Commun 155, 1\u20138 (2020)","journal-title":"Comput Commun"},{"key":"743_CR6","doi-asserted-by":"crossref","unstructured":"Breitenbacher, D., Homoliak, I., Aung, Y.L., Tippenhauer, N.O., Elovici, Y.: HADES-IoT: A Practical Host-Based Anomaly Detection System for IoT Devices. ACM Asia Conference on Computer and Communications Security. Asia CCS \u201919, pp. 479\u2013484. Auckland, New Zealand (2019)","DOI":"10.1145\/3321705.3329847"},{"issue":"3","key":"743_CR7","doi-asserted-by":"publisher","first-page":"2671","DOI":"10.1109\/COMST.2019.2896380","volume":"21","author":"N Chaabouni","year":"2019","unstructured":"Chaabouni, N., Mosbah, M., Zemmari, A., Sauvignac, C., Faruki, P.: Network intrusion detection for IoT security based on learning techniques. IEEE Commun Surv Tutorials 21(3), 2671\u20132701 (2019)","journal-title":"IEEE Commun Surv Tutorials"},{"key":"743_CR8","doi-asserted-by":"publisher","first-page":"3028","DOI":"10.1109\/ACCESS.2017.2676119","volume":"5","author":"S Challa","year":"2017","unstructured":"Challa, S., Wazid, M., Das, A.K., Kumar, N., Reddy, A.G., Yoon, E., Yoo, K.: Secure signature-based authenticated key establishment scheme for future IoT applications. IEEE Access 5, 3028\u20133043 (2017)","journal-title":"IEEE Access"},{"issue":"4","key":"743_CR9","doi-asserted-by":"publisher","first-page":"3039","DOI":"10.1109\/COMST.2019.2926625","volume":"21","author":"M Chen","year":"2019","unstructured":"Chen, M., Challita, U., Saad, W., Yin, C., Debbah, M.: Artificial neural networks-based machine learning for wireless networks: a tutorial. IEEE commun Surv Tutorials 21(4), 3039\u20133071 (2019)","journal-title":"IEEE commun Surv Tutorials"},{"issue":"4","key":"743_CR10","doi-asserted-by":"publisher","first-page":"491","DOI":"10.1109\/LGRS.2006.877949","volume":"3","author":"Q Cheng","year":"2006","unstructured":"Cheng, Q., Varshney, P.K., Arora, M.K.: Logistic regression for feature selection and soft classification of remote sensing data. IEEE Geosci Rem Sens Lett 3(4), 491\u2013494 (2006)","journal-title":"IEEE Geosci Rem Sens Lett"},{"issue":"2","key":"743_CR11","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D Dolev","year":"1983","unstructured":"Dolev, D., Yao, A.C.: On the security of public key protocols. IEEE Trans Inf Theory 29(2), 198\u2013208 (1983)","journal-title":"IEEE Trans Inf Theory"},{"key":"743_CR12","unstructured":"Ethhack: What\u2019s a botnet? When armies of contaminated IoT gadgets assault. Available at https:\/\/ethhack.com\/2019\/06\/ what-is-a-botnet-when-armies-of- infected-iot-devices-attack-2\/. Accessed on October 2019 (2019)"},{"issue":"7","key":"743_CR13","doi-asserted-by":"publisher","first-page":"1022","DOI":"10.1109\/TKDE.2010.160","volume":"23","author":"MC Ganiz","year":"2011","unstructured":"Ganiz, M.C., George, C., Pottenger, W.M.: Higher order Nave Bayes: a novel non-IID approach to text classification. IEEE Trans Knowl Data Eng 23(7), 1022\u20131034 (2011)","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"101","key":"743_CR14","first-page":"588","volume":"87","author":"X Han","year":"2019","unstructured":"Han, X., Wang, L., Xu, S., Zhao, D., Liu, G.: Recognizing roles of online illegal gambling participants: an ensemble learning approach. Comput Secur 87(101), 588 (2019)","journal-title":"Comput Secur"},{"key":"743_CR15","doi-asserted-by":"publisher","first-page":"82721","DOI":"10.1109\/ACCESS.2019.2924045","volume":"7","author":"V Hassija","year":"2019","unstructured":"Hassija, V., Chamola, V., Saxena, V., Jain, D., Goyal, P., Sikdar, B.: A survey on IoT security: application areas, security threats, and solution architectures. IEEE Access 7, 82721\u201382743 (2019)","journal-title":"IEEE Access"},{"key":"743_CR16","unstructured":"Ilascu, I.: New Echobot Botnet Variant Uses Over 50 Exploits to Propagate (2019). https:\/\/www.bleepingcomputer.com\/news\/ security\/new-echobot-botnet-variant-uses-over-50-exploits-to-propagate\/. Accessed October 2019"},{"key":"743_CR17","doi-asserted-by":"publisher","first-page":"42450","DOI":"10.1109\/ACCESS.2019.2907965","volume":"7","author":"SU Jan","year":"2019","unstructured":"Jan, S.U., Ahmed, S., Shakhov, V., Koo, I.: Toward a lightweight intrusion detection system for the Internet of Things. IEEE Access 7, 42450\u201342471 (2019)","journal-title":"IEEE Access"},{"issue":"23","key":"743_CR18","doi-asserted-by":"publisher","first-page":"24589","DOI":"10.1007\/s11042-017-5154-3","volume":"76","author":"G Jeon","year":"2017","unstructured":"Jeon, G., Damiani, E., Anisetti, M.: Computational intelligence for multimedia and industrial applications. Multimed Tools Appl 76(23), 24589\u201324593 (2017)","journal-title":"Multimed Tools Appl"},{"issue":"10","key":"743_CR19","doi-asserted-by":"publisher","first-page":"1361","DOI":"10.1109\/TKDE.2008.234","volume":"21","author":"L Jiang","year":"2009","unstructured":"Jiang, L., Zhang, H., Cai, Z.: A Novel Bayes Model: hidden Naive Bayes. IEEE Trans Knowl Data Eng 21(10), 1361\u20131371 (2009)","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"743_CR20","doi-asserted-by":"crossref","unstructured":"Kambourakis, G., Kolias, C., Stavrou, A.: The Mirai botnet and the IoT Zombie Armies. In: IEEE Military Communications Conference (MILCOM), pp. 267\u2013272. Baltimore, USA (2017)","DOI":"10.1109\/MILCOM.2017.8170867"},{"key":"743_CR21","doi-asserted-by":"publisher","unstructured":"Kang, H., Ahn, D.H., Lee, G.M., Yoo, J.D., Park, K.H., Kim, H.K.: IoT network intrusion dataset (2019). https:\/\/doi.org\/10.21227\/q70p-q449. Accessed January 2020","DOI":"10.21227\/q70p-q449"},{"key":"743_CR22","doi-asserted-by":"crossref","unstructured":"Kelley, T., Furey, E.: Getting Prepared for the Next Botnet Attack : Detecting Algorithmically Generated Domains in Botnet Command and Control. In: 29th Irish Signals and Systems Conference (ISSC), pp. 1\u20136. Belfast, Ireland (2018)","DOI":"10.1109\/ISSC.2018.8585344"},{"issue":"7","key":"743_CR23","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1109\/MC.2017.201","volume":"50","author":"C Kolias","year":"2017","unstructured":"Kolias, C., Kambourakis, G., Stavrou, A., Voas, J.: DDoS in the IoT: Mirai and Other Botnets. Computer 50(7), 80\u201384 (2017)","journal-title":"Computer"},{"key":"743_CR24","unstructured":"Korolov, M.: What is a botnet? When armies of infected IoT devices attack. https:\/\/www.csoonline.com\/ article\/3240364\/ what-is-a-botnet.html. Accessed October 2019 (2019)"},{"key":"743_CR25","doi-asserted-by":"crossref","unstructured":"Kumar, A., Lim, T.J.: EDIMA: Early Detection of IoT Malware Network Activity Using Machine Learning Techniques. In: 5th World Forum on Internet of Things (WF-IoT), pp. 289\u2013294. Limerick, Ireland (2019)","DOI":"10.1109\/WF-IoT.2019.8767194"},{"key":"743_CR26","doi-asserted-by":"publisher","unstructured":"Larose, D.T.: Logistic Regression. In: Data Mining Methods and Models, pp. 155\u2013203 (2006). https:\/\/doi.org\/10.1002\/0471756482.ch4","DOI":"10.1002\/0471756482.ch4"},{"key":"743_CR27","doi-asserted-by":"publisher","first-page":"481","DOI":"10.1016\/j.future.2019.02.064","volume":"96","author":"W Li","year":"2019","unstructured":"Li, W., Tug, S., Meng, W., Wang, Y.: Designing collaborative blockchained signature-based intrusion detection in IoT environments. Future Gen Comput Syst 96, 481\u2013489 (2019)","journal-title":"Future Gen Comput Syst"},{"issue":"5","key":"743_CR28","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1109\/TC.2002.1004593","volume":"51","author":"TS Messerges","year":"2002","unstructured":"Messerges, T.S., Dabbish, E.A., Sloan, R.H.: Examining smart-card security under the threat of power analysis attacks. IEEE Trans Comput 51(5), 541\u2013552 (2002)","journal-title":"IEEE Trans Comput"},{"key":"743_CR29","doi-asserted-by":"crossref","unstructured":"Mudgerikar, A., Sharma, P., Bertino, E.: E-spion: A system-level intrusion detection system for iot devices. ACM Asia Conference on Computer and Communications Security. Asia CCS \u201919, pp. 493\u2013500. Auckland, New Zealand (2019)","DOI":"10.1145\/3321705.3329857"},{"key":"743_CR30","doi-asserted-by":"publisher","unstructured":"Nandi, A.K., Ahmed, H.: Artificial Neural Networks (ANNs). In: Condition Monitoring with Vibration Signals: Compressive Sampling and Learning Algorithms for Rotating Machines, pp. 239\u2013258. IEEE (2019). Doi:https:\/\/doi.org\/10.1002\/9781119544678.ch12","DOI":"10.1002\/9781119544678.ch12"},{"key":"743_CR31","doi-asserted-by":"crossref","unstructured":"Nandi, A.K., Ahmed, H.: Decision Trees and Random Forests. In: Condition Monitoring with Vibration Signals: Compressive Sampling and Learning Algorithms for Rotating Machines, pp. 199\u2013224 (2019)","DOI":"10.1002\/9781119544678.ch10"},{"key":"743_CR32","doi-asserted-by":"crossref","unstructured":"Nowozin, S., Gehler, P.V., Jancsary, J., Lampert, C.H.: Training Structured Predictors Through Iterated Logistic Regression. In: Advanced Structured Prediction, pp. 213\u2013238. MITP (2014). https:\/\/ieeexplore.ieee.org\/document\/7008219","DOI":"10.7551\/mitpress\/9969.001.0001"},{"issue":"2","key":"743_CR33","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1109\/TETC.2016.2633228","volume":"7","author":"HH Pajouh","year":"2019","unstructured":"Pajouh, H.H., Javidan, R., Khayami, R., Dehghantanha, A., Choo, K.R.: A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks. IEEE Trans Emerg Topics Comput 7(2), 314\u2013323 (2019)","journal-title":"IEEE Trans Emerg Topics Comput"},{"key":"743_CR34","doi-asserted-by":"crossref","unstructured":"Semic, H., Mrdovic, S.: IoT honeypot: A multi-component solution for handling manual and Mirai-based attacks. In: 25th Telecommunication Forum (TELFOR), pp. 1\u20134. Belgrade, Serbia (2017)","DOI":"10.1109\/TELFOR.2017.8249458"},{"key":"743_CR35","doi-asserted-by":"publisher","first-page":"556","DOI":"10.1109\/ACCESS.2019.2917135","volume":"7","author":"V Sharma","year":"2019","unstructured":"Sharma, V., You, I., Yim, K., Chen, I., Cho, J.: Briot: behavior rule specification-based misbehavior detection for IoT-embedded cyber-physical systems. IEEE Access 7, 556\u2013580 (2019)","journal-title":"IEEE Access"},{"key":"743_CR36","doi-asserted-by":"crossref","unstructured":"Sinanovi, H., Mrdovic, S.: Analysis of Mirai malicious software. 25th International Conference on Software. Telecommunications and Computer Networks (SoftCOM), pp. 1\u20135. Split, Croatia (2017)","DOI":"10.23919\/SOFTCOM.2017.8115504"},{"key":"743_CR37","doi-asserted-by":"crossref","unstructured":"Singh, A., Mahapatra, S.: Network-Based Applications of Multimedia Big Data Computing in IoT Environment. In: S.\u00a0Tanwar, S.\u00a0Tyagi, N.\u00a0Kumar (eds.) Multimedia Big Data Computing for IoT Applications, chap.\u00a017, pp. 435\u2013452. Springer, Singapore (2020)","DOI":"10.1007\/978-981-13-8759-3_17"},{"issue":"5","key":"743_CR38","doi-asserted-by":"publisher","first-page":"1971","DOI":"10.1109\/JSEN.2017.2787997","volume":"18","author":"Z Sun","year":"2018","unstructured":"Sun, Z., Xu, Y., Liang, G., Zhou, Z.: An intrusion detection model for wireless sensor networks with an improved V-detector algorithm. IEEE Sens J 18(5), 1971\u20131984 (2018)","journal-title":"IEEE Sens J"},{"issue":"6","key":"743_CR39","doi-asserted-by":"publisher","first-page":"1057","DOI":"10.1109\/72.728352","volume":"9","author":"AB Tickle","year":"1998","unstructured":"Tickle, A.B., Andrews, R., Golea, M., Diederich, J.: The truth will come to light: directions and challenges in extracting the knowledge embedded within trained artificial neural networks. IEEE Trans Neural Netw 9(6), 1057\u20131068 (1998)","journal-title":"IEEE Trans Neural Netw"},{"issue":"4","key":"743_CR40","doi-asserted-by":"publisher","first-page":"2563","DOI":"10.1109\/JIOT.2019.2944632","volume":"7","author":"GK Verma","year":"2020","unstructured":"Verma, G.K., Singh, B.B., Kumar, N., Chamola, V.: CB-CAS: certificate-based efficient signature scheme with compact aggregation for industrial Internet of Things environment. IEEE Internet Things J 7(4), 2563\u20132572 (2020)","journal-title":"IEEE Internet Things J"},{"issue":"12","key":"743_CR41","doi-asserted-by":"publisher","first-page":"15234","DOI":"10.1016\/j.eswa.2011.05.076","volume":"38","author":"SS Wang","year":"2011","unstructured":"Wang, S.S., Yan, K.Q., Wang, S.C., Liu, C.W.: An integrated intrusion detection system for cluster-based wireless sensor networks. Expert Syst Appl 38(12), 15234\u201315243 (2011)","journal-title":"Expert Syst Appl"},{"issue":"2","key":"743_CR42","doi-asserted-by":"publisher","first-page":"342","DOI":"10.1109\/TPDS.2012.105","volume":"24","author":"Y Wang","year":"2013","unstructured":"Wang, Y., Fu, W., Agrawal, D.P.: Gaussian versus uniform distribution for intrusion detection in wireless sensor networks. IEEE Trans Parallel Distrib Syst 24(2), 342\u2013355 (2013)","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"6","key":"743_CR43","doi-asserted-by":"publisher","first-page":"698","DOI":"10.1109\/TMC.2008.19","volume":"7","author":"Y Wang","year":"2008","unstructured":"Wang, Y., Wang, X., Xie, B., Wang, D., Agrawal, D.P.: Intrusion detection in homogeneous and heterogeneous wireless sensor networks. IEEE Trans Mobile Comput 7(6), 698\u2013711 (2008)","journal-title":"IEEE Trans Mobile Comput"},{"issue":"4","key":"743_CR44","doi-asserted-by":"publisher","first-page":"1971","DOI":"10.1007\/s11277-016-3433-3","volume":"90","author":"M Wazid","year":"2016","unstructured":"Wazid, M., Das, A.K.: An efficient hybrid anomaly detection scheme using K-means clustering for wireless sensor networks. Wirel Pers Commun 90(4), 1971\u20132000 (2016)","journal-title":"Wirel Pers Commun"},{"issue":"3","key":"743_CR45","doi-asserted-by":"publisher","first-page":"1165","DOI":"10.1007\/s11277-016-3676-z","volume":"94","author":"M Wazid","year":"2017","unstructured":"Wazid, M., Das, A.K.: A secure group-based blackhole node detection scheme for hierarchical wireless sensor networks. Wirel Pers Commun 94(3), 1165\u20131191 (2017)","journal-title":"Wirel Pers Commun"},{"issue":"17","key":"743_CR46","doi-asserted-by":"publisher","first-page":"4596","DOI":"10.1002\/sec.1652","volume":"9","author":"M Wazid","year":"2016","unstructured":"Wazid, M., Das, A.K., Kumari, S., Khan, M.K.: Design of sinkhole node detection mechanism for hierarchical wireless sensor networks. Secur Commun Netw 9(17), 4596\u20134614 (2016)","journal-title":"Secur Commun Netw"},{"key":"743_CR47","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2017.2764083","author":"M Wazid","year":"2017","unstructured":"Wazid, M., Das, A.K., Odelu, V., Kumar, N., Susilo, W.: Secure remote user authenticated key establishment protocol for smart home environment. IEEE Trans Depend Secure Comput (2017). https:\/\/doi.org\/10.1109\/TDSC.2017.2764083","journal-title":"IEEE Trans Depend Secure Comput"},{"key":"743_CR48","doi-asserted-by":"publisher","first-page":"459","DOI":"10.1109\/ACCESS.2019.2960412","volume":"7","author":"M Wazid","year":"2019","unstructured":"Wazid, M., Das, A.K., Rodrigues, J.J.P.C., Shetty, S., Park, Y.: IoMT malware detection approaches: analysis and research challenges. IEEE Access 7, 459\u2013476 (2019)","journal-title":"IEEE Access"},{"issue":"24","key":"743_CR49","doi-asserted-by":"publisher","first-page":"5539","DOI":"10.3390\/s19245539","volume":"19","author":"M Wazid","year":"2019","unstructured":"Wazid, M., Das, A.K., Shetty, S., Rodrigues, J., Park, Y.: LDAKM-EIoT: lightweight device authentication and key management mechanism for edge-based IoT deployment. Sensors 19(24), 5539 (2019)","journal-title":"Sensors"},{"key":"743_CR50","doi-asserted-by":"crossref","unstructured":"Wazid, M., Reshma Dsouza, P., Das, A.K., Bhat, K. V., Kumar, N., Rodrigues, J.J.P.C.: RAD-EI: A routing attack detection scheme for edge-based Internet of Things environment. International Journal of Communication Systems 32(15), e4024 (2019)","DOI":"10.1002\/dac.4024"},{"issue":"3","key":"743_CR51","doi-asserted-by":"publisher","first-page":"520","DOI":"10.1109\/TEC.2005.847984","volume":"20","author":"M Wlas","year":"2005","unstructured":"Wlas, M., Krzeminski, Z., Guzinski, J., Abu-Rub, H., Toliyat, H.A.: Artificial-neural-network-based sensorless nonlinear control of induction motors. IEEE Trans Energy Convers 20(3), 520\u2013528 (2005)","journal-title":"IEEE Trans Energy Convers"},{"key":"743_CR52","doi-asserted-by":"publisher","first-page":"4608","DOI":"10.1109\/ACCESS.2018.2800287","volume":"6","author":"L Zhao","year":"2018","unstructured":"Zhao, L., Dong, X.: An industrial internet of things feature selection method based on potential entropy evaluation criteria. IEEE Access 6, 4608\u20134617 (2018)","journal-title":"IEEE Access"},{"key":"743_CR53","doi-asserted-by":"publisher","first-page":"95397","DOI":"10.1109\/ACCESS.2019.2928564","volume":"7","author":"Y Zhao","year":"2019","unstructured":"Zhao, Y., Li, Y., Zhang, X., Geng, G., Zhang, W., Sun, Y.: A survey of networking applications applying the software defined networking concept based on machine learning. IEEE Access 7, 95397\u201395417 (2019)","journal-title":"IEEE Access"},{"key":"743_CR54","doi-asserted-by":"crossref","unstructured":"Zikria, Y.B., Afzal, M.K., Kim, S.W.: Internet of Multimedia Things (IoMT): Opportunities, Challenges and Solutions. Sensors 20(8) (2020). https:\/\/www.mdpi.com\/1424-8220\/20\/8\/2334","DOI":"10.3390\/s20082334"}],"container-title":["Multimedia Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00530-020-00743-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00530-020-00743-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00530-020-00743-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,30]],"date-time":"2023-05-30T14:04:35Z","timestamp":1685455475000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00530-020-00743-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,19]]},"references-count":54,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2023,6]]}},"alternative-id":["743"],"URL":"https:\/\/doi.org\/10.1007\/s00530-020-00743-9","relation":{},"ISSN":["0942-4962","1432-1882"],"issn-type":[{"value":"0942-4962","type":"print"},{"value":"1432-1882","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1,19]]},"assertion":[{"value":"26 September 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 December 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 January 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}}]}}