{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T19:02:37Z","timestamp":1709838157957},"reference-count":16,"publisher":"Springer Science and Business Media LLC","issue":"17","license":[{"start":{"date-parts":[[2019,1,29]],"date-time":"2019-01-29T00:00:00Z","timestamp":1548720000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2019,9]]},"DOI":"10.1007\/s11042-019-7191-6","type":"journal-article","created":{"date-parts":[[2019,1,29]],"date-time":"2019-01-29T14:47:23Z","timestamp":1548773243000},"page":"24011-24022","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Multimedia detection algorithm of malicious nodes in intelligent grid based on fuzzy logic"],"prefix":"10.1007","volume":"78","author":[{"given":"Mingming","family":"Gao","sequence":"first","affiliation":[]},{"given":"Yue","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Jingchang","family":"Nan","sequence":"additional","affiliation":[]},{"given":"Shuyang","family":"Cui","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,29]]},"reference":[{"issue":"1","key":"7191_CR1","doi-asserted-by":"publisher","first-page":"274","DOI":"10.1016\/j.jnca.2012.06.002","volume":"36","author":"RB Braga","year":"2013","unstructured":"Braga RB, Chaves IA, Oliveira CTD et al (2013) RETENTION: a reactive trust-based mechanism to detect and punish malicious nodes in ad hoc grid environments[J]. J Netw Comput Appl 36(1):274\u2013283","journal-title":"J Netw Comput Appl"},{"key":"7191_CR2","unstructured":"Fu L, Zhang T, Zhang H et al (2011) A fuzzy classification method based on feature selection algorithm in malicious script code detection[C]. In: International conference on system science, engineering design and manufacturing Informatization. IEEE, pp 218\u2013221"},{"key":"7191_CR3","doi-asserted-by":"crossref","unstructured":"Geraily M, Jahan MV (2012) Fuzzy detection of malicious attacks on web applications based on hidden Markov model ensemble[C]. In: International conference on intelligent systems Modelling & Simulation. IEEE Computer Society, pp 102\u2013108","DOI":"10.1109\/ISMS.2012.25"},{"key":"7191_CR4","unstructured":"Guo G, Chen Z (2015) A kind of malicious code detection scheme based on fuzzy reasoning[C]. In: International conference on intelligent computation technology and automation. IEEE, pp 19\u201322"},{"key":"7191_CR5","doi-asserted-by":"crossref","unstructured":"Li J, Wei Y (2009) A shortest path algorithm of image segmentation based on fuzzy-rough grid[C]. In: International conference on computational intelligence and software engineering. IEEE, pp 1\u20134","DOI":"10.1109\/CISE.2009.5366240"},{"issue":"1.082","key":"7191_CR6","first-page":"708","volume":"2013","author":"Y Li","year":"2013","unstructured":"Li Y, Zhou Q (2013) A distributed intrusion detection scheme about communication optimization in smart grid[J]. Math Probl Eng 2013(1.082):708\u2013715","journal-title":"Math Probl Eng"},{"key":"7191_CR7","doi-asserted-by":"publisher","unstructured":"Oh SL, Hagiwara Y, Raghavendra U, Yuvaraj R, Arunkumar N, Murugappan M, Rajendra Acharya U (2018) A deep learning approach for Parkinson\u2019s disease diagnosis from EEG signals. Neural Comput & Applic:1\u20137. \n                    https:\/\/doi.org\/10.1007\/s00521-018-3689-5","DOI":"10.1007\/s00521-018-3689-5"},{"issue":"1","key":"7191_CR8","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1049\/trit.2018.0007","volume":"3","author":"C Qian","year":"2018","unstructured":"Qian C, Fang Y (2018) Adaptive tracking control of flapping wing micro-air vehicles with averaging theory. CAAI Transactions on Intelligence Technology 3(1):18\u201327","journal-title":"CAAI Transactions on Intelligence Technology"},{"key":"7191_CR9","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1016\/j.future.2018.08.044","volume":"91","author":"U Rajendra Achary","year":"2019","unstructured":"Rajendra Achary U, Hagiwara Y, Deshpande SN, Suren S, Koh JEW, Oh SL, Arunkumar N, Ciaccio EJ, Lim CM (2019) Characterization of focal EEG signals: a review. Futur Gener Comput Syst 91:290\u2013299","journal-title":"Futur Gener Comput Syst"},{"key":"7191_CR10","doi-asserted-by":"crossref","unstructured":"Sharma D, Prashar D, Salaria DS et al (2011) Detection of malicious node in ad hoc networks using statistical technique based on CPU utilization[M]. In: High performance architecture and grid computing. Springer Berlin Heidelberg, pp 349\u2013356","DOI":"10.1007\/978-3-642-22577-2_48"},{"issue":"3","key":"7191_CR11","doi-asserted-by":"publisher","first-page":"52","DOI":"10.4236\/wsn.2013.53007","volume":"05","author":"MC Shin","year":"2013","unstructured":"Shin MC, Choi YH (2013) Malicious node detection using confidence level evaluation in a grid-based wireless sensor network[J]. Wirel Sens Netw 05(3):52\u201360","journal-title":"Wirel Sens Netw"},{"issue":"2","key":"7191_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2017\/3548607","volume":"2017","author":"R Singh","year":"2017","unstructured":"Singh R, Singh J, Singh R (2017) Fuzzy based advanced hybrid intrusion detection system to detect malicious nodes in wireless sensor networks[J]. Wirel Commun Mob Comput 2017(2):1\u201314","journal-title":"Wirel Commun Mob Comput"},{"key":"7191_CR13","unstructured":"Wang H, Ren X, Zhao D et al (2015) Research of malicious nodes detecting and removing based on passive trust reaction mechanism in AGNT[J]. Application Research of Computers"},{"issue":"1","key":"7191_CR14","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1049\/trit.2018.0001","volume":"3","author":"J Wu","year":"2018","unstructured":"Wu J, Xu X (2018) Decentralised grid scheduling approach based on multi-agent reinforcement learning and gossip mechanism. CAAI Transactions on Intelligence Technology 3(1):8\u201317","journal-title":"CAAI Transactions on Intelligence Technology"},{"issue":"7","key":"7191_CR15","first-page":"6","volume":"2015","author":"R Wu","year":"2015","unstructured":"Wu R, Deng X, Lu R et al (2015) Trust-based anomaly detection in emerging sensor networks[J]. International Journal of Distributed Sensor Networks 2015(7):6","journal-title":"International Journal of Distributed Sensor Networks"},{"key":"7191_CR16","doi-asserted-by":"crossref","unstructured":"Zarei M, Rahmani AM, Sasan A et al (2009) Fuzzy based trust estimation for congestion control in wireless sensor networks[C]. In: International conference on intelligent NETWORKING and collaborative systems. IEEE, pp 233\u2013236","DOI":"10.1109\/INCOS.2009.16"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-7191-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-019-7191-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-7191-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,29]],"date-time":"2020-01-29T00:10:23Z","timestamp":1580256623000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-019-7191-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1,29]]},"references-count":16,"journal-issue":{"issue":"17","published-print":{"date-parts":[[2019,9]]}},"alternative-id":["7191"],"URL":"https:\/\/doi.org\/10.1007\/s11042-019-7191-6","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,1,29]]},"assertion":[{"value":"26 September 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 December 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 January 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 January 2019","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}