{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T11:27:55Z","timestamp":1764588475735,"version":"build-2065373602"},"reference-count":65,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2023,11,22]],"date-time":"2023-11-22T00:00:00Z","timestamp":1700611200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,11,22]],"date-time":"2023-11-22T00:00:00Z","timestamp":1700611200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2024,4]]},"DOI":"10.1007\/s10207-023-00783-y","type":"journal-article","created":{"date-parts":[[2023,11,22]],"date-time":"2023-11-22T06:01:35Z","timestamp":1700632895000},"page":"1117-1130","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Exploring the potential of deep learning and machine learning techniques for randomness analysis to enhance security on IoT"],"prefix":"10.1007","volume":"23","author":[{"given":"Kenan","family":"Ince","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,11,22]]},"reference":[{"key":"783_CR1","doi-asserted-by":"publisher","first-page":"104379","DOI":"10.1016\/j.micpro.2021.104379","volume":"87","author":"T Fritzmann","year":"2021","unstructured":"Fritzmann, T., Vith, J., Fl\u00f3rez, D., Sep\u00falveda, J.: Post-quantum cryptography for automotive systems. Microprocess. Microsyst. 87, 104379 (2021). https:\/\/doi.org\/10.1016\/j.micpro.2021.104379","journal-title":"Microprocess. Microsyst."},{"key":"783_CR2","doi-asserted-by":"publisher","first-page":"95978","DOI":"10.1109\/ACCESS.2019.2928768","volume":"7","author":"JM Mcginthy","year":"2019","unstructured":"Mcginthy, J.M., Michaels, A.J.: Further analysis of PRNG-based key derivation functions. IEEE Access 7, 95978\u201395986 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2928768","journal-title":"IEEE Access"},{"issue":"104","key":"783_CR3","doi-asserted-by":"publisher","first-page":"108426","DOI":"10.1016\/j.compeleceng.2022.108426","volume":"1","author":"S Namasudra","year":"2022","unstructured":"Namasudra, S.: A secure cryptosystem using DNA cryptography and DNA steganography for the cloud-based IoT infrastructure. Comput. Electr. Eng. 1(104), 108426 (2022)","journal-title":"Comput. Electr. Eng."},{"key":"783_CR4","doi-asserted-by":"publisher","unstructured":"Timo, B.: Random numbers. Kaggle. https:\/\/doi.org\/10.34740\/KAGGLE\/DSV\/816507","DOI":"10.34740\/KAGGLE\/DSV\/816507"},{"key":"783_CR5","doi-asserted-by":"publisher","unstructured":"Weinberger, K., Dasgupta, A., Langford, J., Smola, A., Attenberg, J.: Feature hashing for large scale multitask learning. In: Proceedings of the 26th Annual International Conference on Machine Learning, in ICML \u201909, pp. 1113\u20131120. Association for Computing Machinery, New York, NY (2009). https:\/\/doi.org\/10.1145\/1553374.1553516.","DOI":"10.1145\/1553374.1553516"},{"key":"783_CR6","doi-asserted-by":"publisher","unstructured":"Jang, J., Brumley, D., Venkataraman, S.: Bitshred: feature hashing malware for scalable triage and semantic analysis. In: Proceedings of the 18th ACM Conference on Computer and Communications Security (2011). https:\/\/doi.org\/10.1145\/2046707.2046742. Accessed 31 Jan 2023","DOI":"10.1145\/2046707.2046742"},{"key":"783_CR7","doi-asserted-by":"crossref","unstructured":"Zhang, Z., Qi, P., Wang, W.: Dynamic malware analysis with feature engineering and feature learning. In: The Thirty-Fourth AAAI Conference on Artificial Intelligence, AAAI 2020, The Thirty-Second Innovative Applications of Artificial Intelligence Conference, IAAI 2020, The Tenth AAAI Symposium on Educational Advances in Artificial Intelligence, EAAI 2020, pp. 1210\u20131217. AAAI Press, New York (2020). https:\/\/ojs.aaai.org\/index.php\/AAAI\/article\/view\/5474. Accessed 31 Jan 2023","DOI":"10.1609\/aaai.v34i01.5474"},{"key":"783_CR8","doi-asserted-by":"publisher","unstructured":"Sharma, P., Singh, A.: Era of deep neural networks: a review. In: 2017 8th International Conference on Computing, Communication and Networking Technologies (ICCCNT), pp. 1\u20135 (2017). https:\/\/doi.org\/10.1109\/ICCCNT.2017.8203938","DOI":"10.1109\/ICCCNT.2017.8203938"},{"key":"783_CR9","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1016\/j.comcom.2022.12.027","volume":"200","author":"R Patgiri","year":"2023","unstructured":"Patgiri, R., Biswas, A., Nayak, S.: deepBF: malicious URL detection using learned bloom filter and evolutionary deep learning. Comput. Commun. 200, 30\u201341 (2023). https:\/\/doi.org\/10.1016\/j.comcom.2022.12.027","journal-title":"Comput. Commun."},{"key":"783_CR10","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1016\/j.procs.2023.01.046","volume":"218","author":"K Panwar","year":"2023","unstructured":"Panwar, K., Kukreja, S., Singh, A., Singh, K.K.: Towards deep learning for efficient image encryption. Procedia Comput. Sci. 218, 644\u2013650 (2023). https:\/\/doi.org\/10.1016\/j.procs.2023.01.046","journal-title":"Procedia Comput. Sci."},{"key":"783_CR11","doi-asserted-by":"publisher","first-page":"107325","DOI":"10.1016\/j.compeleceng.2021.107325","volume":"94","author":"C-Y Sun","year":"2021","unstructured":"Sun, C.-Y., Wu, A.C.-H., Hwang, T.: A novel privacy-preserving deep learning scheme without a cryptography component. Comput. Electr. Eng. 94, 107325 (2021). https:\/\/doi.org\/10.1016\/j.compeleceng.2021.107325","journal-title":"Comput. Electr. Eng."},{"key":"783_CR12","doi-asserted-by":"publisher","first-page":"108744","DOI":"10.1016\/j.optlastec.2022.108744","volume":"157","author":"X Zhuang","year":"2023","unstructured":"Zhuang, X., Yan, A.: Deep-learning-based ciphertext-only attack on optical scanning cryptosystem. Opt. Laser Technol. 157, 108744 (2023). https:\/\/doi.org\/10.1016\/j.optlastec.2022.108744","journal-title":"Opt. Laser Technol."},{"issue":"3","key":"783_CR13","doi-asserted-by":"publisher","first-page":"1045","DOI":"10.1109\/TVT.2006.874578","volume":"55","author":"H-N Hung","year":"2006","unstructured":"Hung, H.-N., Lee, P.-C., Lin, Y.-B.: Random number generation for excess life of mobile user residence time. IEEE Trans. Veh. Technol. 55(3), 1045\u20131050 (2006). https:\/\/doi.org\/10.1109\/TVT.2006.874578","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"11\u201312","key":"783_CR14","doi-asserted-by":"publisher","first-page":"1552","DOI":"10.1016\/j.sse.2007.09.015","volume":"51","author":"K Uchida","year":"2007","unstructured":"Uchida, K., Tanamoto, T., Fujita, S.: Single-electron random-number generator (RNG) for highly secure ubiquitous computing applications. Solid-State Electron. 51(11\u201312), 1552\u20131557 (2007). https:\/\/doi.org\/10.1016\/j.sse.2007.09.015","journal-title":"Solid-State Electron."},{"key":"783_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.spa.2011.10.011","volume":"122","author":"K Miyabe","year":"2012","unstructured":"Miyabe, K., Takemura, A.: Convergence of random series and the rate of convergence of the strong law of large numbers in game-theoretic probability. Stoch. Process. Their Appl. 122, 1\u201330 (2012)","journal-title":"Stoch. Process. Their Appl."},{"issue":"5","key":"783_CR16","doi-asserted-by":"publisher","first-page":"859","DOI":"10.1093\/ietisy\/e88-d.5.859","volume":"E88-D","author":"M Kamada","year":"2005","unstructured":"Kamada, M.: A network game based on fair random numbers. IEICE Trans. Inf. Syst. E88-D(5), 859\u2013864 (2005). https:\/\/doi.org\/10.1093\/ietisy\/e88-d.5.859","journal-title":"IEICE Trans. Inf. Syst."},{"key":"783_CR17","doi-asserted-by":"publisher","DOI":"10.1080\/10691898.1999.12131278","author":"PJ Boland","year":"1999","unstructured":"Boland, P.J., Pawitan, Y.: Trying to be random in selecting numbers for lotto. J. Stat. Educ. (1999). https:\/\/doi.org\/10.1080\/10691898.1999.12131278","journal-title":"J. Stat. Educ."},{"key":"783_CR18","doi-asserted-by":"publisher","first-page":"105502","DOI":"10.1016\/j.mejo.2022.105502","volume":"126","author":"MM Fazili","year":"2022","unstructured":"Fazili, M.M., Shah, M.F., Naz, S.F., Shah, A.P.: Next generation QCA technology based true random number generator for cryptographic applications. Microelectron. J. 126, 105502 (2022)","journal-title":"Microelectron. J."},{"key":"783_CR19","doi-asserted-by":"publisher","first-page":"105606","DOI":"10.1016\/j.mejo.2022.105606","volume":"129","author":"M Morsali","year":"2022","unstructured":"Morsali, M., Moaiyeri, M.H., Rajaei, R.: A process variation resilient spintronic true random number generator for highly reliable hardware security applications. Microelectron. J. 129, 105606 (2022)","journal-title":"Microelectron. J."},{"key":"783_CR20","doi-asserted-by":"publisher","first-page":"22987","DOI":"10.1109\/ACCESS.2018.2826448","volume":"6","author":"F Fan","year":"2018","unstructured":"Fan, F., Wang, G.: Learning from pseudo-randomness with an artificial neural network-does god play pseudo-dice? IEEE Access 6, 22987\u201322992 (2018). https:\/\/doi.org\/10.1109\/ACCESS.2018.2826448","journal-title":"IEEE Access"},{"key":"783_CR21","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2022.108536","author":"C Wang","year":"2022","unstructured":"Wang, C., Zhang, Y.: A novel image encryption algorithm with deep neural network. Signal Process. (2022). https:\/\/doi.org\/10.1016\/j.sigpro.2022.108536","journal-title":"Signal Process."},{"key":"783_CR22","doi-asserted-by":"publisher","first-page":"127116","DOI":"10.1016\/j.amc.2022.127116","volume":"426","author":"E Almaraz Luengo","year":"2022","unstructured":"Almaraz Luengo, E., Leiva Cerna, M.B., Garc\u00eda Villalba, L.J., Hernandez-Castro, J.: A new approach to analyze the independence of statistical tests of randomness. Appl. Math. Comput. 426, 127116 (2022). https:\/\/doi.org\/10.1016\/j.amc.2022.127116","journal-title":"Appl. Math. Comput."},{"key":"783_CR23","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1016\/j.optlaseng.2014.08.005","volume":"66","author":"X Wang","year":"2015","unstructured":"Wang, X., Liu, L., Zhang, Y.: A novel chaotic block image encryption algorithm based on dynamic random growth technique. Opt. Lasers Eng. 66, 10\u201318 (2015)","journal-title":"Opt. Lasers Eng."},{"issue":"16\u201317","key":"783_CR24","doi-asserted-by":"publisher","first-page":"3895","DOI":"10.1016\/j.optcom.2011.04.001","volume":"284","author":"H Liu","year":"2011","unstructured":"Liu, H., Wang, X.: Color image encryption using spatial bit-level permutation and high-dimension chaotic system. Opt. Commun. 284(16\u201317), 3895\u20133903 (2011)","journal-title":"Opt. Commun."},{"issue":"5","key":"783_CR25","doi-asserted-by":"publisher","first-page":"1052","DOI":"10.1109\/TIFS.2015.2398359","volume":"10","author":"JH Cheon","year":"2015","unstructured":"Cheon, J.H., Kim, J.: A hybrid scheme of public-key encryption and somewhat homomorphic encryption. IEEE Trans. Inf. Forensics Secur. 10(5), 1052\u20131063 (2015). https:\/\/doi.org\/10.1109\/TIFS.2015.2398359","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"783_CR26","doi-asserted-by":"publisher","unstructured":"Zhang, Y., Monteiro, D., Liang, H.-N., Ma, J., Baghaei, N.: Effect of input-output randomness on gameplay satisfaction in collectable card games. In: 2021 IEEE Conference on Games (CoG), pp. 01\u201305 (2021). https:\/\/doi.org\/10.1109\/CoG52621.2021.9619020","DOI":"10.1109\/CoG52621.2021.9619020"},{"key":"783_CR27","doi-asserted-by":"publisher","first-page":"111785","DOI":"10.1016\/j.chaos.2021.111785","volume":"156","author":"DP Mahapatra","year":"2022","unstructured":"Mahapatra, D.P., Triambak, S.: Towards predicting COVID-19 infection waves: a random-walk Monte Carlo simulation approach. Chaos Solitons Fractals 156, 111785 (2022). https:\/\/doi.org\/10.1016\/j.chaos.2021.111785","journal-title":"Chaos Solitons Fractals"},{"key":"783_CR28","doi-asserted-by":"publisher","first-page":"124670","DOI":"10.1016\/j.amc.2019.124670","volume":"364","author":"A Novikov","year":"2020","unstructured":"Novikov, A., Kuzmin, D., Ahmadi, O.: Random walk methods for Monte Carlo simulations of Brownian diffusion on a sphere. Appl. Math. Comput. 364, 124670 (2020). https:\/\/doi.org\/10.1016\/j.amc.2019.124670","journal-title":"Appl. Math. Comput."},{"key":"783_CR29","doi-asserted-by":"publisher","first-page":"105748","DOI":"10.1109\/ACCESS.2021.3099534","volume":"9","author":"R Serrano","year":"2021","unstructured":"Serrano, R., et al.: A fully digital true random number generator with entropy source based in frequency collapse. IEEE Access 9, 105748\u2013105755 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3099534","journal-title":"IEEE Access"},{"issue":"5","key":"783_CR30","doi-asserted-by":"publisher","first-page":"615","DOI":"10.1109\/81.847868","volume":"47","author":"CS Petrie","year":"2000","unstructured":"Petrie, C.S., Connelly, J.A.: A noise-based IC random number generator for applications in cryptography. IEEE Trans. Circuits Syst. Fundam. Theory Appl. 47(5), 615\u2013621 (2000). https:\/\/doi.org\/10.1109\/81.847868","journal-title":"IEEE Trans. Circuits Syst. Fundam. Theory Appl."},{"key":"783_CR31","unstructured":"Stip\u010devi\u0107, M.: Quantum random number generators and their use in cryptography. In: 2011 Proceedings of the 34th international convention MIPRO, pp. 1474\u20131479 (2011_."},{"key":"783_CR32","doi-asserted-by":"publisher","unstructured":"Thornton, M.A., MacFarlane, D.L.: Quantum photonic TRNG with dual extractor. In: Quantum Technology and Optimization Problems, Feld, S., Linnhoff-Popien, C. (eds.), in Lecture Notes in Computer Science, pp. 171\u2013182. Springer International Publishing, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-14082-3_15","DOI":"10.1007\/978-3-030-14082-3_15"},{"key":"783_CR33","unstructured":"Rohe, M.: RANDy\u2014a true-random generator based on radioactive decay, p. 36"},{"key":"783_CR34","doi-asserted-by":"publisher","unstructured":"Laurenciu, N.C., Cotofana, S.D.: Low cost and energy, thermal noise driven, probability modulated random number generator. In: 2015 IEEE International Symposium on Circuits and Systems (ISCAS), pp. 2724\u20132727 (2015). https:\/\/doi.org\/10.1109\/ISCAS.2015.7169249","DOI":"10.1109\/ISCAS.2015.7169249"},{"issue":"6","key":"783_CR35","doi-asserted-by":"publisher","first-page":"2553","DOI":"10.1109\/TED.2020.2989420","volume":"67","author":"Y Yao","year":"2020","unstructured":"Yao, Y., Chen, X., Kang, W., Zhang, Y., Zhao, W.: Thermal brownian motion of Skyrmion for true random number generation. IEEE Trans. Electron Devices 67(6), 2553\u20132558 (2020). https:\/\/doi.org\/10.1109\/TED.2020.2989420","journal-title":"IEEE Trans. Electron Devices"},{"key":"783_CR36","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1016\/j.procs.2021.07.053","volume":"191","author":"N Tariq","year":"2021","unstructured":"Tariq, N., Khan, F.A., Asim, M.: Security challenges and requirements for smart internet of things applications: a comprehensive analysis. Procedia Comput. Sci. 191, 425\u2013430 (2021). https:\/\/doi.org\/10.1016\/j.procs.2021.07.053","journal-title":"Procedia Comput. Sci."},{"key":"783_CR37","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ins.2020.10.041","volume":"558","author":"J Machicao","year":"2021","unstructured":"Machicao, J., Ngo, Q.Q., Molchanov, V., Linsen, L., Bruno, O.: A visual analysis method of randomness for classifying and ranking pseudo-random number generators. Inf. Sci. 558, 1\u201320 (2021)","journal-title":"Inf. Sci."},{"key":"783_CR38","doi-asserted-by":"publisher","unstructured":"Hegadi, R., Patil, A.P.: A statistical analysis on in-built pseudo random number generators using NIST test suite. In: 2020 5th international conference on computing, communication and security (ICCCS), pp. 1\u20136 (2020). https:\/\/doi.org\/10.1109\/ICCCS49678.2020.9276849","DOI":"10.1109\/ICCCS49678.2020.9276849"},{"key":"783_CR39","first-page":"36","volume":"12","author":"J von Neumann","year":"1951","unstructured":"von Neumann, J.: Various techniques used in connection with random digits. Natl. Bur. Stand. Appl. Math. Ser. 12, 36\u201338 (1951)","journal-title":"Natl. Bur. Stand. Appl. Math. Ser."},{"issue":"1","key":"783_CR40","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/272991.272995","volume":"8","author":"M Matsumoto","year":"1998","unstructured":"Matsumoto, M., Nishimura, T.: Mersenne twister: a 623-dimensionally equidistributed uniform pseudo-random number generator. ACM Trans. Model. Comput. Simul. 8(1), 3\u201330 (1998). https:\/\/doi.org\/10.1145\/272991.272995","journal-title":"ACM Trans. Model. Comput. Simul."},{"key":"783_CR41","doi-asserted-by":"crossref","unstructured":"Bassham, L.E. et al.: SP 800\u201322 Rev. 1a. A statistical test suite for random and pseudorandom number generators for cryptographic applications. National Institute of Standards & Technology, Gaithersburg, Technical Report (2010)","DOI":"10.6028\/NIST.SP.800-22r1a"},{"key":"783_CR42","unstructured":"Killmann, W., Schindler, W.: A proposal for functionality classes for random number generators (2011)"},{"key":"783_CR43","unstructured":"Dawei, L., Dengguo, F., Hua, C.: Information security technology binary sequence randomness detection metod. China National Standardization Administration, GB\/T 32915-2016 (2016)"},{"issue":"1","key":"783_CR44","doi-asserted-by":"publisher","first-page":"012009","DOI":"10.1088\/1742-6596\/1861\/1\/012009","volume":"1861","author":"Z Mengdi","year":"2021","unstructured":"Mengdi, Z., Xiaojuan, Z., Yayun, Z., Siwei, M.: Overview of randomness test on cryptographic algorithms. J. Phys. Conf. Ser. 1861(1), 012009 (2021). https:\/\/doi.org\/10.1088\/1742-6596\/1861\/1\/012009","journal-title":"J. Phys. Conf. Ser."},{"key":"783_CR45","unstructured":"Pseudorandom Number Sequence Test Program. https:\/\/www.fourmilab.ch\/random\/. Accessed 01 Feb 2023"},{"key":"783_CR46","unstructured":"DIEHARD. https:\/\/tams.informatik.uni-hamburg.de\/paper\/2001\/SA_Witt_Hartmann\/cdrom\/Internetseiten\/stat.fsu.edu\/diehard.html. Accessed 01 Feb 2023."},{"issue":"4","key":"783_CR47","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1268776.1268777","volume":"33","author":"P L\u2019Ecuyer","year":"2007","unstructured":"L\u2019Ecuyer, P., Simard, R.: TestU01: a C library for empirical testing of random number generators. ACM Trans. Math. Softw. 33(4), 1\u201340 (2007). https:\/\/doi.org\/10.1145\/1268776.1268777","journal-title":"ACM Trans. Math. Softw."},{"key":"783_CR48","doi-asserted-by":"crossref","unstructured":"Fernando, K.R., Tsokos, C.P.: Deep and statistical learning in biomedical imaging: State of the art in 3D MRI brain tumor segmentation. Inf. Fusion (2022)","DOI":"10.1016\/j.inffus.2022.12.013"},{"key":"783_CR49","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1016\/j.neucom.2022.11.038","volume":"521","author":"H Gao","year":"2023","unstructured":"Gao, H., Miao, Q., Ma, D., Liu, R.: Deep mutual learning for brain tumor segmentation with the fusion network. Neurocomputing 521, 213\u2013220 (2023)","journal-title":"Neurocomputing"},{"key":"783_CR50","doi-asserted-by":"publisher","first-page":"103812","DOI":"10.1016\/j.dsp.2022.103812","volume":"132","author":"R Kaur","year":"2023","unstructured":"Kaur, R., Singh, S.: A comprehensive review of object detection with deep learning. Digit. Signal Process. 132, 103812 (2023)","journal-title":"Digit. Signal Process."},{"key":"783_CR51","doi-asserted-by":"publisher","first-page":"40249","DOI":"10.1109\/ACCESS.2022.3167269","volume":"10","author":"V Tunali","year":"2022","unstructured":"Tunali, V.: Improved prioritization of software development demands in Turkish with deep learning-based NLP. IEEE Access 10, 40249\u201340263 (2022). https:\/\/doi.org\/10.1109\/ACCESS.2022.3167269","journal-title":"IEEE Access"},{"issue":"4","key":"783_CR52","doi-asserted-by":"publisher","first-page":"279","DOI":"10.26599\/BDMA.2021.9020012","volume":"4","author":"SK Patnaik","year":"2021","unstructured":"Patnaik, S.K., Babu, C.N., Bhave, M.: Intelligent and adaptive web data extraction system using convolutional and long short-term memory deep learning networks. Big Data Min. Anal. 4(4), 279\u2013297 (2021). https:\/\/doi.org\/10.26599\/BDMA.2021.9020012","journal-title":"Big Data Min. Anal."},{"issue":"8","key":"783_CR53","doi-asserted-by":"publisher","first-page":"3681","DOI":"10.1109\/TKDE.2020.3025580","volume":"34","author":"S Wang","year":"2022","unstructured":"Wang, S., Cao, J., Yu, P.S.: Deep learning for spatio-temporal data mining: a survey. IEEE Trans. Knowl. Data Eng. 34(8), 3681\u20133700 (2022). https:\/\/doi.org\/10.1109\/TKDE.2020.3025580","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"783_CR54","doi-asserted-by":"publisher","first-page":"108384","DOI":"10.1016\/j.compeleceng.2022.108384","volume":"104","author":"BK Durga","year":"2022","unstructured":"Durga, B.K., Rajesh, V.: A ResNet deep learning based facial recognition design for future multimedia applications. Comput. Electr. Eng. 104, 108384 (2022)","journal-title":"Comput. Electr. Eng."},{"key":"783_CR55","doi-asserted-by":"publisher","first-page":"106621","DOI":"10.1016\/j.cmpb.2022.106621","volume":"215","author":"H Ge","year":"2022","unstructured":"Ge, H., Zhu, Z., Dai, Y., Wang, B., Wu, X.: Facial expression recognition based on deep learning. Comput. Methods Programs Biomed. 215, 106621 (2022)","journal-title":"Comput. Methods Programs Biomed."},{"key":"783_CR56","doi-asserted-by":"publisher","first-page":"103326","DOI":"10.1016\/j.apor.2022.103326","volume":"129","author":"B Hadi","year":"2022","unstructured":"Hadi, B., Khosravi, A., Sarhadi, P.: Deep reinforcement learning for adaptive path planning and control of an autonomous underwater vehicle. Appl. Ocean Res. 129, 103326 (2022)","journal-title":"Appl. Ocean Res."},{"issue":"268","key":"783_CR57","doi-asserted-by":"publisher","first-page":"113407","DOI":"10.1016\/j.oceaneng.2022.113407","volume":"15","author":"Z Wang","year":"2023","unstructured":"Wang, Z., Li, Y., Ma, C., Yan, X., Jiang, D.: Path-following optimal control of autonomous underwater vehicle based on deep reinforcement learning. Ocean Eng. 15(268), 113407 (2023)","journal-title":"Ocean Eng."},{"issue":"1","key":"783_CR58","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1109\/TITS.2020.3012034","volume":"23","author":"S Mozaffari","year":"2022","unstructured":"Mozaffari, S., Al-Jarrah, O.Y., Dianati, M., Jennings, P., Mouzakitis, A.: Deep learning-based vehicle behavior prediction for autonomous driving applications: a review. IEEE Trans. Intell. Transp. Syst. 23(1), 33\u201347 (2022). https:\/\/doi.org\/10.1109\/TITS.2020.3012034","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"783_CR59","doi-asserted-by":"publisher","unstructured":"Dey, A.: Deep IDS\u202f: a deep learning approach for Intrusion detection based on IDS 2018. In: 2020 2nd international conference on sustainable technologies for industry 4.0 (STI), pp. 1\u20135 (2020). https:\/\/doi.org\/10.1109\/STI50764.2020.9350411","DOI":"10.1109\/STI50764.2020.9350411"},{"issue":"4","key":"783_CR60","doi-asserted-by":"publisher","first-page":"1929","DOI":"10.3906\/elk-2005-1","volume":"29","author":"K Ince","year":"2021","unstructured":"Ince, K.: A novel approach for intrusion detection systems: V-IDS. Turk. J. Electr. Eng. Comput. Sci. 29(4), 1929\u20131943 (2021). https:\/\/doi.org\/10.3906\/elk-2005-1","journal-title":"Turk. J. Electr. Eng. Comput. Sci."},{"key":"783_CR61","doi-asserted-by":"publisher","unstructured":"Alulema Flores, A.S.: Deep learning methods in natural language processing. In: Applied Technologies, Botto-Tobar, M., Zambrano Vizuete, M., Torres-Carri\u00f3n, P., Montes Le\u00f3n, S., Pizarro V\u00e1squez, G., Durakovic, B. (eds.), in Communications in Computer and Information Science, pp. 92\u2013107. Springer International Publishing, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-42520-3_8","DOI":"10.1007\/978-3-030-42520-3_8"},{"key":"783_CR62","doi-asserted-by":"publisher","unstructured":"Suciu, A., Nagy, I., Marton, K., Pinca, I.: Parallel implementation of the NIST statistical test suite. In: Proceedings of the 2010 IEEE 6th international conference on intelligent computer communication and processing, pp. 363\u2013368 (2010). https:\/\/doi.org\/10.1109\/ICCP.2010.5606412","DOI":"10.1109\/ICCP.2010.5606412"},{"issue":"2065","key":"783_CR63","doi-asserted-by":"publisher","first-page":"20150202","DOI":"10.1098\/rsta.2015.0202","volume":"374","author":"IT Jolliffe","year":"2016","unstructured":"Jolliffe, I.T., Cadima, J.: Principal component analysis: a review and recent developments. Philos. Trans. R. Soc. Math. Phys. Eng. Sci. 374(2065), 20150202 (2016). https:\/\/doi.org\/10.1098\/rsta.2015.0202","journal-title":"Philos. Trans. R. Soc. Math. Phys. Eng. Sci."},{"key":"783_CR64","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1016\/j.dib.2016.12.003","volume":"10","author":"HI Okagbue","year":"2017","unstructured":"Okagbue, H.I., Opanuga, A.A., Oguntunde, P.E., Ugwoke, P.O.: Random number datasets generated from statistical analysis of randomly sampled GSM recharge cards. Data brief. 10, 269\u2013276 (2017)","journal-title":"Data brief."},{"key":"783_CR65","doi-asserted-by":"publisher","DOI":"10.31590\/ejosat.900956","author":"K \u0130nce","year":"2021","unstructured":"\u0130nce, K.: Security analysis of java secure random library. Avrupa Bilim Ve Teknol. Derg. (2021). https:\/\/doi.org\/10.31590\/ejosat.900956","journal-title":"Avrupa Bilim Ve Teknol. Derg."}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-023-00783-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-023-00783-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-023-00783-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,27]],"date-time":"2024-03-27T07:39:10Z","timestamp":1711525150000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-023-00783-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,22]]},"references-count":65,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2024,4]]}},"alternative-id":["783"],"URL":"https:\/\/doi.org\/10.1007\/s10207-023-00783-y","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"type":"print","value":"1615-5262"},{"type":"electronic","value":"1615-5270"}],"subject":[],"published":{"date-parts":[[2023,11,22]]},"assertion":[{"value":"31 October 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 November 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"There is no situation that requires any ethical permission in the study.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}