{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,28]],"date-time":"2025-08-28T12:52:02Z","timestamp":1756385522906},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"3-4","license":[{"start":{"date-parts":[[2019,5,25]],"date-time":"2019-05-25T00:00:00Z","timestamp":1558742400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,5,25]],"date-time":"2019-05-25T00:00:00Z","timestamp":1558742400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Pers Ubiquit Comput"],"published-print":{"date-parts":[[2019,7]]},"DOI":"10.1007\/s00779-019-01236-x","type":"journal-article","created":{"date-parts":[[2019,5,25]],"date-time":"2019-05-25T19:02:36Z","timestamp":1558810956000},"page":"541-552","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["A security risk plan search assistant decision algorithm using deep neural network combined with two-stage similarity calculation"],"prefix":"10.1007","volume":"23","author":[{"given":"Jun","family":"Hu","sequence":"first","affiliation":[]},{"given":"Jun","family":"Fang","sequence":"additional","affiliation":[]},{"given":"Yanhua","family":"Du","sequence":"additional","affiliation":[]},{"given":"Zhe","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Pengyang","family":"Ji","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,5,25]]},"reference":[{"key":"1236_CR1","doi-asserted-by":"crossref","unstructured":"Silva C, Vasconcelos G, Barros H et al (2015 ) Case-based reasoning combined with neural networks for credit risk analysis. International Joint Conference on Neural Networks","DOI":"10.1109\/IJCNN.2015.7280738"},{"issue":"3","key":"1236_CR2","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1007\/s10703-016-0248-5","volume":"48","author":"R Sharma","year":"2016","unstructured":"Sharma R, Aiken A (2016) From invariant checking to invariant inference using randomized search. Formal Methods in System Design 48(3):235\u2013256","journal-title":"Formal Methods in System Design"},{"issue":"11","key":"1236_CR3","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.neucom.2013.06.052","volume":"138","author":"Q Yu","year":"2014","unstructured":"Yu Q, Tang H, Tan KC, Yu H (2014) A brain-inspired spiking neural network model with temporal encoding and learning. Neurocomputing 138(11):3\u201313","journal-title":"Neurocomputing"},{"issue":"2","key":"1236_CR4","doi-asserted-by":"publisher","first-page":"2331","DOI":"10.1007\/s11042-015-3180-6","volume":"76","author":"D Gharavian","year":"2017","unstructured":"Gharavian D, Bejani M, Sheikhan M (2017) Audio-visual emotion recognition using FCBF feature selection method and particle swarm optimization for fuzzy ARTMAP neural networks. Multimed Tools Appl 76(2):2331\u20132352","journal-title":"Multimed Tools Appl"},{"issue":"7","key":"1236_CR5","doi-asserted-by":"publisher","first-page":"854","DOI":"10.1177\/0272989X14529623","volume":"34","author":"RM Hamm","year":"2014","unstructured":"Hamm RM, Beasley WH, Johnson WJ (2014) A balance beam aid for instruction in clinical diagnostic reasoning. Medical Decision Making An International Journal of the Society for Medical Decision Making 34(7):854\u2013862","journal-title":"Medical Decision Making An International Journal of the Society for Medical Decision Making"},{"key":"1236_CR6","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1016\/j.cie.2016.05.032","volume":"98","author":"GJ Hahn","year":"2016","unstructured":"Hahn GJ, Sens T, Decouttere C, Vandaele NJ (2016) A multi-criteria approach to robust outsourcing decision-making in stochastic manufacturing systems. Comput Ind Eng 98:275\u2013288","journal-title":"Comput Ind Eng"},{"key":"1236_CR7","doi-asserted-by":"crossref","unstructured":"Viduto V, Maple C, Huang W et al (2012) A multi-objective genetic algorithm for minimising network security risk and cost. International Conference on High Performance Computing & Simulation. IEEE","DOI":"10.1109\/HPCSim.2012.6266959"},{"key":"1236_CR8","unstructured":"Xinlan Z X Z, Zhifang H Z H, Guangfu W G W et al (2011) Information security risk assessment methodology research: group decision making and analytic hierarchy process. Second World Congress on Software Engineering. IEEE"},{"issue":"3","key":"1236_CR9","doi-asserted-by":"publisher","first-page":"493","DOI":"10.1016\/j.dss.2011.02.013","volume":"51","author":"LP Rees","year":"2011","unstructured":"Rees LP, Deane JK, Rakes TR, Baker WH (2011) Decision support for cybersecurity risk planning[J]. Decis Support Syst 51(3):493\u2013505","journal-title":"Decis Support Syst"},{"issue":"7","key":"1236_CR10","doi-asserted-by":"publisher","first-page":"3527","DOI":"10.1016\/j.eswa.2013.10.058","volume":"41","author":"M Mandal","year":"2014","unstructured":"Mandal M (2014) Risk analysis using FMEA: fuzzy similarity value and possibility theory based approach. Expert Syst Appl 41(7):3527\u20133537","journal-title":"Expert Syst Appl"},{"key":"1236_CR11","doi-asserted-by":"crossref","unstructured":"Pham C, Estrada Z, Cao P et al (2014) Reliability and security monitoring of virtual machines using hardware architectural invariants. IEEE\/IFIP International Conference on Dependable Systems & Networks","DOI":"10.1109\/DSN.2014.19"},{"issue":"21","key":"1236_CR12","doi-asserted-by":"publisher","first-page":"8221","DOI":"10.1016\/j.eswa.2015.06.024","volume":"42","author":"NC Long","year":"2015","unstructured":"Long NC, Meesad P, Unger H (2015) A highly accurate firefly based algorithm for heart disease prediction[J]. Expert Syst Appl 42(21):8221\u20138231","journal-title":"Expert Syst Appl"},{"issue":"1","key":"1236_CR13","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1016\/j.eswa.2013.07.014","volume":"41","author":"J Chai","year":"2014","unstructured":"Chai J, Liu JNK (2014) A novel believable rough set approach for supplier selection. Expert Syst Appl 41(1):92\u2013104","journal-title":"Expert Syst Appl"},{"key":"1236_CR14","unstructured":"Wang P, Wu Q, Shen C et al (2015) Explicit knowledge-based reasoning for visual question answering. Comput Therm Sci"},{"issue":"3","key":"1236_CR15","doi-asserted-by":"publisher","first-page":"971","DOI":"10.1016\/j.jsv.2013.10.013","volume":"333","author":"E Papatheou","year":"2014","unstructured":"Papatheou E, Manson G, Barthorpe RJ, Worden K (2014) The use of pseudo-faults for damage location in SHM: an experimental investigation on a Piper Tomahawk aircraft wing. J Sound Vib 333(3):971\u2013990","journal-title":"J Sound Vib"},{"issue":"15","key":"1236_CR16","first-page":"18","volume":"116","author":"SU Kulkarni","year":"2015","unstructured":"Kulkarni SU, Shetty BS (2015) Data mining using modified GFMM neural network. Int J Comput Appl 116(15):18\u201322","journal-title":"Int J Comput Appl"},{"key":"1236_CR17","doi-asserted-by":"crossref","unstructured":"Lu W, Wang X, Yang C et al (2015) A novel feature extraction method using deep neural network for rolling bearing fault diagnosis. Control & Decision Conference","DOI":"10.1109\/CCDC.2015.7162328"},{"key":"1236_CR18","doi-asserted-by":"crossref","unstructured":"Thanda A, Venkatesan SM (2016) Audio visual speech recognition using deep recurrent neural networks. Iapr Workshop on Multimodal Pattern Recognition of Social Signals in Human-Computer Interaction","DOI":"10.1007\/978-3-319-59259-6_9"},{"key":"1236_CR19","doi-asserted-by":"crossref","unstructured":"Woo S, Lee C (2017) Feature extraction for deep neural networks based on decision boundaries. Spie Defense + Security","DOI":"10.1117\/12.2263172"},{"issue":"3","key":"1236_CR20","first-page":"1","volume":"41","author":"P Yadav","year":"2015","unstructured":"Yadav P (2015) Case retrieval algorithm using similarity measure and adaptive fractional brain storm optimization for health Informaticians[J]. Arab J Sci Eng 41(3):1\u201312","journal-title":"Arab J Sci Eng"}],"container-title":["Personal and Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-019-01236-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00779-019-01236-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-019-01236-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,23]],"date-time":"2020-05-23T23:18:55Z","timestamp":1590275935000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00779-019-01236-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,25]]},"references-count":20,"journal-issue":{"issue":"3-4","published-print":{"date-parts":[[2019,7]]}},"alternative-id":["1236"],"URL":"https:\/\/doi.org\/10.1007\/s00779-019-01236-x","relation":{},"ISSN":["1617-4909","1617-4917"],"issn-type":[{"value":"1617-4909","type":"print"},{"value":"1617-4917","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,5,25]]},"assertion":[{"value":"7 March 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 May 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 May 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}