{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T15:11:13Z","timestamp":1773069073942,"version":"3.50.1"},"reference-count":58,"publisher":"Springer Science and Business Media LLC","issue":"39","license":[{"start":{"date-parts":[[2024,6,21]],"date-time":"2024-06-21T00:00:00Z","timestamp":1718928000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,6,21]],"date-time":"2024-06-21T00:00:00Z","timestamp":1718928000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-024-19617-7","type":"journal-article","created":{"date-parts":[[2024,6,21]],"date-time":"2024-06-21T07:02:01Z","timestamp":1718953321000},"page":"86557-86591","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":124,"title":["CVS-FLN: a novel IoT-IDS model based on metaheuristic feature selection and neural network classification model"],"prefix":"10.1007","volume":"83","author":[{"given":"R.","family":"Geetha","sequence":"first","affiliation":[]},{"given":"A.","family":"Jegatheesan","sequence":"additional","affiliation":[]},{"given":"Rajesh Kumar","family":"Dhanaraj","sequence":"additional","affiliation":[]},{"given":"K.","family":"Vijayalakshmi","sequence":"additional","affiliation":[]},{"given":"Anand","family":"Nayyar","sequence":"additional","affiliation":[]},{"given":"V.","family":"Arulkumar","sequence":"additional","affiliation":[]},{"given":"J.","family":"Velmurugan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0759-1846","authenticated-orcid":false,"given":"Rajendran","family":"Thavasimuthu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,6,21]]},"reference":[{"key":"19617_CR1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s42400-020-00065-3","volume":"4","author":"K Ansam","year":"2021","unstructured":"Ansam K, Ammar A (2021) A critical review of intrusions detections system in the Internet of Things: technique, deployments strategy, validations strategy, attack, public dataset, and challenges. Cybersecurity 4:1\u201327","journal-title":"Cybersecurity"},{"key":"19617_CR2","doi-asserted-by":"publisher","first-page":"8383","DOI":"10.3390\/app11188383","volume":"11","author":"AA Muaadh","year":"2021","unstructured":"Muaadh AA, Shukor R, Maheyzah MS, Ibtehal N, Fuad AG, Faisal S, Maged N (2021) Anomaly-based intrusions detections system in IoT using deep learning: a systematic literatures review. Appl Sci 11:8383","journal-title":"Appl Sci"},{"key":"19617_CR3","doi-asserted-by":"publisher","first-page":"1177","DOI":"10.3390\/electronics9071177","volume":"9","author":"A Javed","year":"2020","unstructured":"Javed A, Nour M, Hasnat K, Esam D, Waqas H, Abdul W (2020) A review of intrusions detections system using machine and deep learning in the internet of things: challenge, solution, and future direction. Electronics 9:1177","journal-title":"Electronics"},{"key":"19617_CR4","doi-asserted-by":"publisher","first-page":"3744","DOI":"10.3390\/s22103744","volume":"22","author":"G Eric","year":"2022","unstructured":"Eric G, Anca J (2022) Intrusions detections in internet of things system: a review on designed approaches leveraging multi-accesses edge computing, machine learning, and dataset. Sensors 22:3744","journal-title":"Sensors"},{"key":"19617_CR5","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1016\/j.comnet.2019.05.014","volume":"160","author":"H Somayye","year":"2019","unstructured":"Somayye H, Karzan W, Maryam B, Nima JN (2019) Intrusions detections system in the Internet of things: a comprehensive investigation. Comput Netw 160:165\u2013191","journal-title":"Comput Netw"},{"key":"19617_CR6","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s13677-017-0102-3","volume":"7","author":"FE Mohamed","year":"2018","unstructured":"Mohamed FE, Ali IA, Hesham FAH (2018) Intrusions detections system for IoT-based smart environment: a survey. J Cloud Comput Adv Syst Appl 7:1\u201320","journal-title":"J Cloud Comput Adv Syst Appl"},{"key":"19617_CR7","doi-asserted-by":"publisher","first-page":"629","DOI":"10.3390\/electronics9040629","volume":"9","author":"A Junaid","year":"2020","unstructured":"Junaid A, Muhamad AA, Roohi A, Khaled S, Mamoun A, Razi I (2020) A review of performances, energy and privacy of intrusions detections system for IoT. Electronics 9:629","journal-title":"Electronics"},{"key":"19617_CR8","first-page":"1","volume":"4016073","author":"RK Amjad","year":"2022","unstructured":"Amjad RK, Muhamad K, Rutvij HJ, Roshani R, Tanzila S, Saeed AB (2022) Deep learning for intrusions detections and security of internet of thing (IoT): current analyses, challenge, and possible solution. Secur Commun Netw 4016073:1\u201313","journal-title":"Secur Commun Netw"},{"key":"19617_CR9","doi-asserted-by":"publisher","first-page":"2287","DOI":"10.1007\/s11277-019-06986-8","volume":"111","author":"V Abhishek","year":"2020","unstructured":"Abhishek V, Virendar R (2020) Machine learning based intrusions detections system for IoT application. Wirel Pers Commun 111:2287\u20132310","journal-title":"Wirel Pers Commun"},{"key":"19617_CR10","doi-asserted-by":"publisher","first-page":"100568","DOI":"10.1016\/j.iot.2022.100568","volume":"19","author":"C Ayan","year":"2022","unstructured":"Ayan C, Bestoun SA (2022) IoT anomaly detections method and application: a survey. Internet Thing 19:100568","journal-title":"Internet Thing"},{"key":"19617_CR11","doi-asserted-by":"publisher","first-page":"121173","DOI":"10.1109\/ACCESS.2022.3220622","volume":"10","author":"PLS Jayalaxmi","year":"2022","unstructured":"Jayalaxmi PLS, Rahul S, Gulshan K, Mauro C, Tai HK (2022) Machine and deep learning solution for intrusions detections and preventions in IoT: a survey. IEEE Access 10:121173\u2013121192","journal-title":"IEEE Access"},{"key":"19617_CR12","doi-asserted-by":"publisher","first-page":"4459","DOI":"10.3390\/s22124459","volume":"22","author":"B Sahba","year":"2022","unstructured":"Sahba B, Omid R, Diego M, Mehrdad K (2022) A novel deep supervised learning-based approach for intrusions detections in IoT system. Sensors 22:4459","journal-title":"Sensors"},{"key":"19617_CR13","doi-asserted-by":"publisher","first-page":"4926","DOI":"10.3390\/s22134926","volume":"22","author":"S Asima","year":"2022","unstructured":"Asima S, Abdulah MA, Safdar NKM, Salman A, Saleh A, Waseem UK (2022) Enhanced anomaly detections systems for IoTs based on improved dynamics SBPSO. Sensors 22:4926","journal-title":"Sensors"},{"key":"19617_CR14","first-page":"140","volume":"22","author":"F Abdulaziz","year":"2022","unstructured":"Abdulaziz F, Abdelghani D, Mohammed AAA, Songfeng L, Mohamed AE (2022) Advanced features extractions and selections approach using deep learning and aquila optimizers for IoTs intrusions detections systems. Sensors 22:140","journal-title":"Sensors"},{"key":"19617_CR15","first-page":"1","volume":"6473507","author":"D Abdelghani","year":"2022","unstructured":"Abdelghani D, Mohamed AE, Samia AC, Mohammed AA, Mohammed AAB, Mohammed AAA, Agostino F (2022) Intrusions detections systems for IoTs based on deep learning and modified reptiles search algorithms. Comput Intell Neurosci 6473507:1\u201315","journal-title":"Comput Intell Neurosci"},{"key":"19617_CR16","doi-asserted-by":"publisher","first-page":"123448","DOI":"10.1109\/ACCESS.2021.3109081","volume":"9","author":"F Abdulaziz","year":"2021","unstructured":"Abdulaziz F, Mohamed AE, Abdelghani D, Mohammed AAA, Songfeng L (2021) IoTs intrusions detections systems using deep learning and enhanced transients search optimizations. IEEE Access 9:123448\u2013123464","journal-title":"IEEE Access"},{"key":"19617_CR17","doi-asserted-by":"publisher","first-page":"1396","DOI":"10.3390\/s22041396","volume":"22","author":"SK Saif","year":"2022","unstructured":"Saif SK, Reham RM, Fatma AH, Hazem MEB (2022) An effective features selections model using hybrid metaheuristic algorithm for IoTs intrusions detections. Sensors 22:1396","journal-title":"Sensors"},{"key":"19617_CR18","doi-asserted-by":"publisher","first-page":"3242","DOI":"10.1109\/JIOT.2020.3002255","volume":"8","author":"S Muhammad","year":"2021","unstructured":"Muhammad S, Zhihong T, Ali KB, Xiaojiang D, Mohsen G (2021) Corr AUC: a malicious bot IoTs traffics detections methods in IoT networks using machine-learning technique. IEEE Internet Thing J 8:3242\u20133254","journal-title":"IEEE Internet Thing J"},{"key":"19617_CR19","doi-asserted-by":"publisher","first-page":"103906","DOI":"10.1109\/ACCESS.2021.3094024","volume":"9","author":"U Imtiaz","year":"2021","unstructured":"Imtiaz U, Qusay HM (2021) Design and developments of a deep learning-based models for anomaly detections in IoT network. IEEE Access. 9:103906\u2013103926","journal-title":"IEEE Access."},{"key":"19617_CR20","doi-asserted-by":"publisher","first-page":"e3803","DOI":"10.1002\/ett.3803","volume":"33","author":"O Yazan","year":"2022","unstructured":"Yazan O, Dandan L, Amiya N (2022) DL-IDS: a deep learning-based intrusions detections frameworks for securing IoTs. Trans Emerg Telecommun Technol 33:e3803","journal-title":"Trans Emerg Telecommun Technol"},{"key":"19617_CR21","doi-asserted-by":"publisher","first-page":"8417","DOI":"10.3390\/s22218417","volume":"22","author":"MB Alaa","year":"2022","unstructured":"Alaa MB, Iftikhar A (2022) Intrusions detections in IoTs using deep learning. Sensors 22:8417","journal-title":"Sensors"},{"key":"19617_CR22","doi-asserted-by":"publisher","first-page":"170","DOI":"10.3390\/computers11120170","volume":"11","author":"AE Kamal","year":"2022","unstructured":"Kamal AE, Abdalah AA, Bashar IH (2022) Meta-heuristics optimizations algorithms-based hierarchical intrusions detections systems. Computers 11:170","journal-title":"Computers"},{"key":"19617_CR23","doi-asserted-by":"publisher","first-page":"52","DOI":"10.3390\/telecom3010003","volume":"3","author":"AF Jabed","year":"2022","unstructured":"Jabed AF, Sk TM, Janatul ST, Khondker MM, Md MA, Md AA, Atanu S, Shekh SM (2022) XGB-RF: a hybrid machine learning approach for IoTs intrusions detections. Telecom 3:52\u201369","journal-title":"Telecom"},{"key":"19617_CR24","doi-asserted-by":"publisher","first-page":"1046","DOI":"10.3390\/sym12061046","volume":"12","author":"O Almomani","year":"2020","unstructured":"Almomani O (2020) A features selection model for networks intrusions detections systems based on PSO, GWO, FFA, and GA algorithm. Symmetry 12:1046","journal-title":"Symmetry"},{"key":"19617_CR25","first-page":"200114","volume":"16","author":"IH Hasan","year":"2022","unstructured":"Hasan IH, Abdulahi M, Aliyu MM, Yusuf SA, Abdulrahim A (2022) An improved binary manta rays foraging optimizations algorithms-based features selections and random forests classifier for networks intrusions detections. Intell Syst Appl 16:200114","journal-title":"Intell Syst Appl"},{"key":"19617_CR26","doi-asserted-by":"publisher","first-page":"2114","DOI":"10.3390\/electronics9122114","volume":"9","author":"MA Sidiqi","year":"2020","unstructured":"Sidiqi MA, Pak W (2020) Optimizing filters-based features selections methods flows for the intrusions detections systems. Electronics 9:2114","journal-title":"Electronics"},{"key":"19617_CR27","doi-asserted-by":"publisher","first-page":"4459","DOI":"10.3390\/s22124459","volume":"22","author":"S Baniassadi","year":"2022","unstructured":"Baniassadi S, Rostami O, Mart\u00edn D, Kaveh M (2022) A novel deep supervised learning-based approach for intrusions detections in IoTs system. Sensors 22:4459","journal-title":"Sensors"},{"key":"19617_CR28","doi-asserted-by":"publisher","first-page":"999","DOI":"10.3390\/math10060999","volume":"10","author":"A Alzaqebah","year":"2022","unstructured":"Alzaqebah A, Aljarah I, Al-Kadi O, Dama\u0161evi\u010dius R (2022) A modified grey wolfs optimizations algorithm for intrusions detections systems. Mathematics 10:999","journal-title":"Mathematics"},{"key":"19617_CR29","doi-asserted-by":"crossref","unstructured":"Ramadan RA, Yadav K (2020) A novel hybrid intrusion detection system (IDS) for the detection of Internet of Things (IoT) network attacks. Ann Emerg Technol Comput 4(5):61\u201374","DOI":"10.33166\/AETiC.2020.05.004"},{"key":"19617_CR30","doi-asserted-by":"publisher","first-page":"1396","DOI":"10.3390\/s22041396","volume":"22","author":"SS Karem","year":"2022","unstructured":"Karem SS, Mustafa RR, Hasim FA, El-Bakry HM (2022) An effective features selections model using hybrid metaheuristics algorithm for IoTs intrusions detections. Sensors 22:1396","journal-title":"Sensors"},{"key":"19617_CR31","doi-asserted-by":"publisher","first-page":"e3803","DOI":"10.1002\/ett.3803","volume":"33","author":"Y Otoum","year":"2022","unstructured":"Otoum Y, Liu D, Nayak A (2022) DL-IDS: a deep learning\u2013based intrusions detections frameworks for securing IoTs. Trans Emerg Telecommun Technol 33:e3803","journal-title":"Trans Emerg Telecommun Technol"},{"key":"19617_CR32","doi-asserted-by":"publisher","first-page":"4926","DOI":"10.3390\/s22134926","volume":"22","author":"A Sarwaar","year":"2022","unstructured":"Sarwaar A, Alnajim AM, Marwat SNK, Ahmad S, Alyahaya S, Khan WU (2022) Enhanced anomaly detections systems for IoTs based on improved dynamics PSO. Sensors 22:4926","journal-title":"Sensors"},{"key":"19617_CR33","doi-asserted-by":"publisher","first-page":"170","DOI":"10.3390\/computers11120170","volume":"11","author":"KA ElDahshan","year":"2022","unstructured":"ElDahshan KA, AlHabshy AA, Hamed BI (2022) Meta-heuristics optimizations algorithms-based hierarchical intrusions detections systems. Computers 11:170","journal-title":"Computers"},{"key":"19617_CR34","doi-asserted-by":"publisher","first-page":"e4014","DOI":"10.1002\/ett.4014","volume":"32","author":"I Sumaiya Thasen","year":"2021","unstructured":"Sumaiya Thasen I, Saira Bhanu J, Laavanya K, Rukunudin Ghalib M, Abishek K (2021) An integrated intrusions detections system using correlations-based attributes selections and artificial neural networks. Trans Emerg Telecommun Technol 32:e4014","journal-title":"Trans Emerg Telecommun Technol"},{"key":"19617_CR35","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1016\/j.comnet.2018.02.028","volume":"136","author":"V Hajisaleem","year":"2018","unstructured":"Hajisaleem V, Babaie S (2018) A hybrid intrusions detections system based on ABC-AFS algorithms for misused and anomaly detections. Comput Netw 136:37\u201350","journal-title":"Comput Netw"},{"issue":"8","key":"19617_CR36","first-page":"3242","volume":"2020","author":"M Shafiq","year":"2020","unstructured":"Shafiq M, Tian Z, Bashir AK, Du X, Guizani M (2020) Corr AUC: A malicious bot-IoT traffics detections methods in IoTs networks using machine-learning technique. IEEE Internet Things J 2020(8):3242\u20133254","journal-title":"IEEE Internet Things J"},{"key":"19617_CR37","doi-asserted-by":"publisher","first-page":"31381","DOI":"10.1007\/s11042-021-10567-y","volume":"80","author":"MA Rahman","year":"2021","unstructured":"Rahman MA, Asyhari AT, Wen OW, Ajra H, Ahmed Y, Anwar F (2021) Effective combining of features selections technique for machine learning enabled IoTs intrusions detections. Multimed Tools Appl 80:31381\u201331399","journal-title":"Multimed Tools Appl"},{"key":"19617_CR38","first-page":"572","volume":"13","author":"RH Mohammed","year":"2022","unstructured":"Mohammed RH, Mosa FA, Sadhek RA (2022) Efficient intrusions detections systems for IoTs environments. Int J Adv Comput Sci Appl 13:572\u2013578","journal-title":"Int J Adv Comput Sci Appl"},{"key":"19617_CR39","doi-asserted-by":"publisher","first-page":"1764","DOI":"10.3390\/sym13101764","volume":"13","author":"E Jaw","year":"2021","unstructured":"Jaw E, Wang X (2021) Features selections and ensembled-based intrusions detections systems: an efficient and comprehensive approach. Symmetry 13:1764","journal-title":"Symmetry"},{"key":"19617_CR40","first-page":"100156","volume":"6","author":"JO Onah","year":"2021","unstructured":"Onah JO, Abdulahi M, Hasan IH, Al-Ghusam A (2021) Genetic Algorithms based features selections and Na\u00efve Bayes for anomaly detections in fog computing environments. Mach Learn Appl 6:100156","journal-title":"Mach Learn Appl"},{"key":"19617_CR41","doi-asserted-by":"publisher","first-page":"123","DOI":"10.3390\/sym15010123","volume":"15","author":"ES Alomaari","year":"2023","unstructured":"Alomaari ES, Nuia RR, Alyaseri ZAA, Mohamed HJ, Sani NS, Esa MI, Musawi BA (2023) Malwares detections using deep learning and correlations-based features selections. Symmetry 15:123","journal-title":"Symmetry"},{"issue":"6","key":"19617_CR42","first-page":"267","volume":"29","author":"FE Ayo","year":"2020","unstructured":"Ayo FE, Folorunsso SO, Abayomi-Ali AA, Adekunlle AO, Awotunde JB (2020) Networks intrusions detections based on deep learning models optimized with rules-based hybrid features selections. Inf Secur J 29(6):267\u2013283","journal-title":"Inf Secur J"},{"key":"19617_CR43","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s42400-021-00103-8","volume":"5","author":"RA Disha","year":"2022","unstructured":"Disha RA, Waheed S (2022) Performances analysis of machine learning model for intrusions detections systems using Gini Impurity-based Weighted Random Forests (GIWRF) features selections techniques. Cybersecurity 5:1","journal-title":"Cybersecurity"},{"key":"19617_CR44","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1016\/j.icte.2020.12.006","volume":"7","author":"K Deepak","year":"2021","unstructured":"Deepak K, Sandeep K (2021) An efficient features reduction method for the detections of DoS attacks. ICT Express 7:371\u2013375","journal-title":"ICT Express"},{"key":"19617_CR45","doi-asserted-by":"crossref","unstructured":"Pankaj J, Akalanka BM (2022) Networks anomaly uncovering on CICIDS 2017 data set: a supervised artificial intelligences approach. In IEEE International Conferences on Electro Information Technology (EIT), Mankato, MN, USA, 19\u201321:606\u2013615","DOI":"10.1109\/eIT53891.2022.9814045"},{"key":"19617_CR46","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1016\/j.icte.2021.04.012","volume":"7","author":"N Pushparaj","year":"2021","unstructured":"Pushparaj N, Deepak K (2021) Features selections for intrusions detections systems in Internet-of-Thing (IoT). ICT Express 7:177\u2013181","journal-title":"ICT Express"},{"key":"19617_CR47","doi-asserted-by":"publisher","first-page":"62","DOI":"10.3390\/cryptography6040062","volume":"6","author":"C Sneha","year":"2022","unstructured":"Sneha C, Sugata G, Aditi KG (2022) Intrusions detections systems for IoTs using logical analysis of data, and information gain ratios. Cryptography 6:62","journal-title":"Cryptography"},{"key":"19617_CR48","doi-asserted-by":"publisher","first-page":"1777","DOI":"10.1007\/s12065-021-00590-1","volume":"15","author":"SG Farhad","year":"2022","unstructured":"Farhad SG, Isa M, Zahra AD (2022) Chaotic vortex search algorithms: metaheuristics algorithm for features selections. Evol Intell 15:1777\u20131808","journal-title":"Evol Intell"},{"key":"19617_CR49","doi-asserted-by":"publisher","first-page":"106074","DOI":"10.1016\/j.asoc.2020.106074","volume":"89","author":"T Metin","year":"2020","unstructured":"Metin T (2020) Chaos-based Vortex Search algorithms for solving inversed kinematic problems of serial robot manipulator with offset wrists. Appl Soft Comput 89:106074","journal-title":"Appl Soft Comput"},{"key":"19617_CR50","doi-asserted-by":"publisher","first-page":"1683","DOI":"10.1007\/s00521-013-1398-7","volume":"24","author":"L Guoqiang","year":"2014","unstructured":"Guoqiang L, Peifeng N, Xiaolong D, Xiangye Z (2014) Fast learning networks: a novel artificial neural network with a fast-learning speed. Neural Comput Appl 24:1683\u20131695","journal-title":"Neural Comput Appl"},{"key":"19617_CR51","doi-asserted-by":"publisher","first-page":"20255","DOI":"10.1109\/ACCESS.2018.2820092","volume":"6","author":"HA Mohamed","year":"2018","unstructured":"Mohamed HA, Bahaa ADAM, Alyani I, Mohammad FZ (2018) A new intrusions detections system based on fast learning networks and particles swarm optimizations. IEEE Access 6:20255\u201320261","journal-title":"IEEE Access"},{"key":"19617_CR52","doi-asserted-by":"publisher","first-page":"102918","DOI":"10.1016\/j.cose.2022.102918","volume":"123","author":"M Michal","year":"2022","unstructured":"Michal M, \u00c1ine MD, Farkhund I, Babar S (2022) A GPU-based machine learning approach for detections of botnets attack. Comput Secur 123:102918","journal-title":"Comput Secur"},{"key":"19617_CR53","doi-asserted-by":"publisher","first-page":"52724","DOI":"10.1109\/ACCESS.2022.3174482","volume":"10","author":"AA Abdalah","year":"2022","unstructured":"Abdalah AA, Bashar IH, Kamal AE (2022) An ameliorated multi-attacks networks anomaly detections in distributed big data systems-based enhanced stacking multiple binary classifier. IEEE Access 10:52724\u201352743","journal-title":"IEEE Access"},{"key":"19617_CR54","first-page":"10","volume":"2020","author":"A Sahar","year":"1909","unstructured":"Sahar A, Daniyal A, Li C, Bander A, Abdullah AB (1909) Deep DCA: novel networks-based detections of IoTs attack using artificial immune systems. Appl Sci 2020:10","journal-title":"Appl Sci"},{"key":"19617_CR55","doi-asserted-by":"publisher","first-page":"8085","DOI":"10.3390\/s22218085","volume":"22","author":"B Hafsa","year":"2022","unstructured":"Hafsa B, Mohammed J, Khalil I, Jalel BO, El MA (2022) Anomaly detections in industrial iots using distributional reinforcements learning and generative adversarial network. Sensors 22:8085","journal-title":"Sensors"},{"key":"19617_CR56","doi-asserted-by":"publisher","first-page":"205034","DOI":"10.1109\/ACCESS.2020.3036916","volume":"8","author":"L Carucio","year":"2020","unstructured":"Carucio L, Desiato D, Polese G, Tortorra G (2020) GDPR compliant information confidentiality preservation in big data processing. IEEE Access 8:205034\u2013205050","journal-title":"IEEE Access"},{"key":"19617_CR57","doi-asserted-by":"publisher","first-page":"107470","DOI":"10.1016\/j.patcog.2020.107470","volume":"107","author":"RCT de Souza","year":"2020","unstructured":"de Souza RCT, de Macedo CA, dos Santos Coelho L, Pierezan J, Mariani VC (2020) Binary coyote optimization algorithm for feature selection. Pattern Recogn 107:107470","journal-title":"Pattern Recogn"},{"key":"19617_CR58","doi-asserted-by":"publisher","first-page":"110978","DOI":"10.1016\/j.asoc.2023.110978","volume":"149","author":"P Liang","year":"2023","unstructured":"Liang P, Cao W, Hu J (2023) A sequential three-way classification model based on risk preference and decision correction. Appl Soft Comput 149:110978","journal-title":"Appl Soft Comput"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-19617-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-024-19617-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-19617-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T13:34:54Z","timestamp":1732023294000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-024-19617-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,21]]},"references-count":58,"journal-issue":{"issue":"39","published-online":{"date-parts":[[2024,11]]}},"alternative-id":["19617"],"URL":"https:\/\/doi.org\/10.1007\/s11042-024-19617-7","relation":{},"ISSN":["1573-7721"],"issn-type":[{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,6,21]]},"assertion":[{"value":"8 September 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 May 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 June 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 June 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflicts of interest to report regarding the present study.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}}]}}