{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T12:26:49Z","timestamp":1764937609646,"version":"3.37.3"},"reference-count":52,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2023,9,11]],"date-time":"2023-09-11T00:00:00Z","timestamp":1694390400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,9,11]],"date-time":"2023-09-11T00:00:00Z","timestamp":1694390400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100014945","name":"Guangzhou Science and Technology Innovation Center","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100014945","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2024,10]]},"DOI":"10.1007\/s11276-023-03483-6","type":"journal-article","created":{"date-parts":[[2023,9,11]],"date-time":"2023-09-11T16:01:36Z","timestamp":1694448096000},"page":"6641-6655","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Machine learning-based centralized link coding attack detection in software-defined network"],"prefix":"10.1007","volume":"30","author":[{"given":"Hongyuan","family":"Wang","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,9,11]]},"reference":[{"key":"3483_CR1","doi-asserted-by":"publisher","first-page":"1178","DOI":"10.3390\/sym14061178","volume":"14","author":"H-M Chuang","year":"2022","unstructured":"Chuang, H.-M., Liu, F., & Tsai, C.-H. (2022). Early detection of abnormal attacks in software-defined networking using machine learning approaches. Symmetry, 14, 1178.","journal-title":"Symmetry"},{"key":"3483_CR2","doi-asserted-by":"crossref","unstructured":"Ahmed, M.R., Islam, S., Shatabda, S., Muzahidul Islam, A.K.M., Robin, M.T.I. (2021). Intrusion detection system in software-defined networks using machine learning and deep learning techniques\u2014A comprehensive survey. TechRxiv Preprint 2021.","DOI":"10.36227\/techrxiv.17153213.v1"},{"key":"3483_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3165290","volume":"51","author":"E Rojas","year":"2018","unstructured":"Rojas, E., Doriguzzi-Corin, R., Tamurejo, S., Beato, A., Schwabe, A., Phemius, K., & Guerrero, C. (2018). Are we readyto drive software-defined networks? A comprehensive survey on management tools and techniques. ACM Computing Surveys, 51, 1\u201335.","journal-title":"ACM Computing Surveys"},{"key":"3483_CR4","doi-asserted-by":"publisher","first-page":"39","DOI":"10.3390\/jsan10030039","volume":"10","author":"N Thakur","year":"2021","unstructured":"Thakur, N., & Han, C. Y. (2021). A study of fall detection in assisted living: identifying and improving the optimal machine learning method. Journal of Sensor and Actuator Networks, 10, 39.","journal-title":"Journal of Sensor and Actuator Networks"},{"key":"3483_CR5","doi-asserted-by":"publisher","first-page":"76024","DOI":"10.1109\/ACCESS.2021.3081629","volume":"9","author":"MHH Khairi","year":"2021","unstructured":"Khairi, M. H. H., Ariffin, S. H. S., Latiff, N. M. A. A., Yusof, K. M., Hassan, M. K., Al-Dhief, F. T., Hamdan, M., Khan, S., & Hamzah, M. (2021). Detection and classification of conflict flows in SDN using machine learning algorithms. IEEE Access, 9, 76024\u201376037.","journal-title":"IEEE Access"},{"key":"3483_CR6","doi-asserted-by":"publisher","first-page":"6608","DOI":"10.1109\/ACCESS.2020.3048900","volume":"9","author":"Y Uhm","year":"2021","unstructured":"Uhm, Y., & Pak, W. (2021). Service-aware two-level partitioningfor machine learning-based network intrusion detection with high performance and high scalability. IEEE Access, 9, 6608.","journal-title":"IEEE Access"},{"key":"3483_CR7","doi-asserted-by":"crossref","unstructured":"Bedhief, I., Kassar, M., Aguili, T., Foschini, L. (2019). Self-adaptive management of SDN distributed controllers for highly dynamiciot networks. In Proceedings of the 15th InternationalWireless Communications & Mobile Computing Conference (IWCMC),Tangier, Morocco, pp. 2098\u20132104.","DOI":"10.1109\/IWCMC.2019.8766349"},{"key":"3483_CR8","doi-asserted-by":"publisher","first-page":"23471","DOI":"10.1109\/ACCESS.2019.2899653","volume":"7","author":"L Ochoa-Aday","year":"2019","unstructured":"Ochoa-Aday, L., Cervell\u00f3-Pastor, C., & Fern\u00e1ndez-Fern\u00e1ndez, A. (2019). eTDP: Enhanced topology discovery protocol for software-defined networks. IEEE Access, 7, 23471\u201323487.","journal-title":"IEEE Access"},{"key":"3483_CR9","unstructured":"Tandon, R. (2020). A Survey of Distributed Denial of Service Attacks and Defenses. arXiv arXiv:2008.01345, 2020."},{"key":"3483_CR10","doi-asserted-by":"publisher","first-page":"165263","DOI":"10.1109\/ACCESS.2020.3022633","volume":"8","author":"AMS Elsayed","year":"2020","unstructured":"Elsayed, A. M. S., Le-Khac, N.-A., & Jurcut, A. D. (2020). InSDN: A novel SDN intrusion dataset. IEEE Access, 8, 165263\u2013165284.","journal-title":"IEEE Access"},{"key":"3483_CR11","doi-asserted-by":"publisher","first-page":"370","DOI":"10.3390\/app12010370","volume":"12","author":"C Fan","year":"2022","unstructured":"Fan, C., Kaliyamurthy, N. M., Chen, S., Jiang, H., Zhou, Y., & Campbell, C. (2022). Detection of DDoS attacks in software defined networking using entropy. Applied Sciences, 12, 370.","journal-title":"Applied Sciences"},{"key":"3483_CR12","doi-asserted-by":"publisher","first-page":"2697","DOI":"10.3390\/s22072697","volume":"22","author":"M Aslam","year":"2022","unstructured":"Aslam, M., Ye, D., Tariq, A., Asad, M., Hanif, M., Ndzi, D., Chelloug, S. A., Elaziz, M. A., Al-Qaness, M. A. A., & Jilani, S. F. (2022). Adaptive machine learning based distributed denial-of-services attacks detection and mitigation system for SDN-enabled IoT. Sensors, 22, 2697.","journal-title":"Sensors"},{"key":"3483_CR13","doi-asserted-by":"publisher","first-page":"104412","DOI":"10.1016\/j.micpro.2021.104412","volume":"89","author":"A Maheshwari","year":"2022","unstructured":"Maheshwari, A., Mehraj, B., Khan, M. S., & Idrisi, M. S. (2022). An optimized weighted voting based ensemble model for DDoS attack detection and mitigation in SDN environment. Microprocessors and Microsystems, 89, 104412.","journal-title":"Microprocessors and Microsystems"},{"key":"3483_CR14","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1016\/j.future.2021.11.009","volume":"129","author":"Y Liu","year":"2022","unstructured":"Liu, Y., Zhi, T., Shen, M., Wang, L., Li, Y., & Wan, M. (2022). Software-defined DDoS detection with information entropy analysis and optimized deep learning. Future Gener. Comput. Syst., 129, 99\u2013114.","journal-title":"Future Gener. Comput. Syst."},{"key":"3483_CR15","doi-asserted-by":"publisher","first-page":"1035","DOI":"10.3390\/su12031035","volume":"12","author":"P Huseyin","year":"2020","unstructured":"Huseyin, P., Polat, O., & Aydin, C. (2020). Detecting DDoS attacks in software-defined networks through feature selection methods and machine learning models. Sustainability, 12, 1035.","journal-title":"Sustainability"},{"key":"3483_CR16","doi-asserted-by":"publisher","first-page":"34885","DOI":"10.1109\/ACCESS.2019.2904236","volume":"7","author":"RU Rasool","year":"2019","unstructured":"Rasool, R. U., Ashraf, U., Ahmed, K., & Wang, H. (2019). Cyberpulse: A machine learning based link flooding attack mitigation system for software defined networks. IEEE Access, 7, 34885\u201334899.","journal-title":"IEEE Access"},{"key":"3483_CR17","doi-asserted-by":"publisher","first-page":"384","DOI":"10.1016\/j.ins.2022.08.093","volume":"612","author":"B Li","year":"2022","unstructured":"Li, B., Zhou, X., Ning, Z., Guan, X., & Yiu, K. C. (2022). Dynamic event-triggered security control for networked control systems with cyber-attacks: A model predictive control approach. Information Sciences, 612, 384\u2013398.","journal-title":"Information Sciences"},{"issue":"11","key":"3483_CR18","doi-asserted-by":"publisher","first-page":"5762","DOI":"10.1109\/TAC.2021.3124750","volume":"67","author":"B Li","year":"2021","unstructured":"Li, B., Tan, Y., Wu, A., & Duan, G. (2021). A distributionally robust optimization based method for stochastic model predictive control. IEEE Transactions on Automatic Control, 67(11), 5762\u20135776.","journal-title":"IEEE Transactions on Automatic Control"},{"issue":"6","key":"3483_CR19","doi-asserted-by":"publisher","first-page":"4579","DOI":"10.1109\/TWC.2021.3131384","volume":"21","author":"B Li","year":"2021","unstructured":"Li, B., Li, Q., Zeng, Y., Rong, Y., & Zhang, R. (2021). 3D trajectory optimization for energy-efficient UAV communication: A control design perspective. IEEE Transactions on Wireless Communications, 21(6), 4579\u20134593.","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"5","key":"3483_CR20","doi-asserted-by":"publisher","first-page":"1189","DOI":"10.1093\/comjnl\/bxaa168","volume":"65","author":"H Wang","year":"2022","unstructured":"Wang, H., Gao, Q., Li, H., Wang, H., Yan, L., & Liu, G. (2022). A structural evolution-based anomaly detection method for generalized evolving social networks. The Computer Journal, 65(5), 1189\u20131199.","journal-title":"The Computer Journal"},{"key":"3483_CR21","doi-asserted-by":"publisher","DOI":"10.1049\/cit2.12174","author":"X Zhang","year":"2023","unstructured":"Zhang, X., Huang, D., Li, H., Zhang, Y., Xia, Y., & Liu, J. (2023). Self-training maximum classifier discrepancy for EEG emotion recognition. CAAI Transactions on Intelligence Technology. https:\/\/doi.org\/10.1049\/cit2.12174","journal-title":"CAAI Transactions on Intelligence Technology"},{"key":"3483_CR22","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2022.3233481","author":"H Wang","year":"2023","unstructured":"Wang, H., Cui, Z., Liu, R., Fang, L., & Sha, Y. (2023). A multi-type transferable method for missing link prediction in heterogeneous social networks. IEEE Transactions on Knowledge and Data Engineering. https:\/\/doi.org\/10.1109\/TKDE.2022.3233481","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"issue":"4","key":"3483_CR23","doi-asserted-by":"publisher","first-page":"597","DOI":"10.34028\/iajit\/19\/4\/4","volume":"19","author":"F Meng","year":"2022","unstructured":"Meng, F., Xiao, X., & Wang, J. (2022). Rating the crisis of online public opinion using a multi-level index system. The International Arab Journal of Information Technology, 19(4), 597\u2013608.","journal-title":"The International Arab Journal of Information Technology"},{"key":"3483_CR24","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/j.comcom.2022.02.002","volume":"187","author":"F Guo","year":"2022","unstructured":"Guo, F., Zhou, W., Lu, Q., & Zhang, C. (2022). Path extension similarity link prediction method based on matrix algebra in directed networks. Computer Communications, 187, 83\u201392.","journal-title":"Computer Communications"},{"issue":"6","key":"3483_CR25","doi-asserted-by":"publisher","first-page":"1765","DOI":"10.1007\/s00521-019-04566-2","volume":"32","author":"X Li","year":"2020","unstructured":"Li, X., & Sun, Y. (2020). Stock intelligent investment strategy based on support vector machine parameter optimization algorithm. Neural Computing and Applications, 32(6), 1765\u20131775.","journal-title":"Neural Computing and Applications"},{"issue":"14","key":"3483_CR26","doi-asserted-by":"publisher","first-page":"8227","DOI":"10.1007\/s00521-020-04958-9","volume":"33","author":"X Li","year":"2021","unstructured":"Li, X., & Sun, Y. (2021). Application of RBF neural network optimal segmentation algorithm in credit rating. Neural Computing and Applications, 33(14), 8227\u20138235.","journal-title":"Neural Computing and Applications"},{"issue":"2","key":"3483_CR27","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1109\/TMC.2019.2947468","volume":"20","author":"J Yu","year":"2021","unstructured":"Yu, J., Lu, L., Chen, Y., Zhu, Y., & Kong, L. (2021). An indirect eavesdropping attack of keystrokes on touch screen through acoustic sensing. IEEE Transactions on Mobile Computing, 20(2), 337\u2013351.","journal-title":"IEEE Transactions on Mobile Computing"},{"issue":"11","key":"3483_CR28","doi-asserted-by":"publisher","first-page":"3148","DOI":"10.1109\/TMC.2020.2994955","volume":"20","author":"H Kong","year":"2021","unstructured":"Kong, H., Lu, L., Yu, J., Chen, Y., & Tang, F. (2021). Continuous Authentication through finger gesture interaction for smart homes using WiFi. IEEE Transactions on Mobile Computing, 20(11), 3148\u20133162.","journal-title":"IEEE Transactions on Mobile Computing"},{"issue":"1","key":"3483_CR29","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/s11424-022-1030-y","volume":"35","author":"B Wang","year":"2022","unstructured":"Wang, B., Zhang, Y., & Zhang, W. (2022). A composite adaptive fault-tolerant attitude control for a quadrotor UAV with multiple uncertainties. Journal of Systems Science and Complexity, 35(1), 81\u2013104.","journal-title":"Journal of Systems Science and Complexity"},{"key":"3483_CR30","doi-asserted-by":"publisher","first-page":"748","DOI":"10.1016\/j.ins.2022.12.096","volume":"624","author":"S Wang","year":"2023","unstructured":"Wang, S., Hu, X., Sun, J., & Liu, J. (2023). Hyperspectral anomaly detection using ensemble and robust collaborative representation. Information Sciences, 624, 748\u2013760.","journal-title":"Information Sciences"},{"key":"3483_CR31","doi-asserted-by":"publisher","first-page":"105608","DOI":"10.1016\/j.engappai.2022.105608","volume":"117","author":"H Liu","year":"2023","unstructured":"Liu, H., Xu, Y., & Chen, F. (2023). Sketch2Photo: Synthesizing photo-realistic images from sketches via global contexts. Engineering Applications of Artificial Intelligence, 117, 105608.","journal-title":"Engineering Applications of Artificial Intelligence"},{"key":"3483_CR32","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2023.3258413","author":"Y Deng","year":"2023","unstructured":"Deng, Y., Zhang, W., Xu, W., Shen, Y., & Lam, W. (2023). Nonfactoid question answering as query-focused summarization with graph-enhanced multihop inference. IEEE Transactions on Neural Networks and Learning Systems. https:\/\/doi.org\/10.1109\/TNNLS.2023.3258413","journal-title":"IEEE Transactions on Neural Networks and Learning Systems"},{"issue":"1","key":"3483_CR33","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1007\/s44196-023-00233-6","volume":"16","author":"S Lu","year":"2023","unstructured":"Lu, S., Ding, Y., Liu, M., Yin, Z., Yin, L., & Zheng, W. (2023). Multiscale feature extraction and fusion of image and text in VQA. International Journal of Computational Intelligence Systems, 16(1), 54.","journal-title":"International Journal of Computational Intelligence Systems"},{"issue":"8","key":"3483_CR34","doi-asserted-by":"publisher","first-page":"1774","DOI":"10.3390\/electronics12081774","volume":"12","author":"Q Gu","year":"2023","unstructured":"Gu, Q., Tian, J., Yang, B., Liu, M., Gu, B., Yin, Z., & Zheng, W. A. (2023). A Novel architecture of a six degrees of freedom parallel platform. Electronics, 12(8), 1774.","journal-title":"Electronics"},{"issue":"5","key":"3483_CR35","doi-asserted-by":"publisher","first-page":"3082","DOI":"10.3390\/app13053082","volume":"13","author":"M Liu","year":"2023","unstructured":"Liu, M., Gu, Q., Yang, B., Yin, Z., Liu, S., Yin, L., & Zheng, W. (2023). Kinematics model optimization algorithm for six degrees of freedom parallel platform. Applied Sciences, 13(5), 3082.","journal-title":"Applied Sciences"},{"key":"3483_CR36","doi-asserted-by":"publisher","DOI":"10.1007\/s11265-023-01868-6","author":"Z Xiong","year":"2023","unstructured":"Xiong, Z., Li, X., Zhang, X., Deng, M., Xu, F., Zhou, B., & Zeng, M. (2023). A comprehensive confirmation-based selfish node detection algorithm for socially aware networks. Journal of Signal Processing Systems. https:\/\/doi.org\/10.1007\/s11265-023-01868-6","journal-title":"Journal of Signal Processing Systems"},{"issue":"11","key":"3483_CR37","doi-asserted-by":"publisher","first-page":"2909","DOI":"10.1093\/comjnl\/bxac085","volume":"65","author":"P Chen","year":"2022","unstructured":"Chen, P., Liu, H., Xin, R., Carval, T., Zhao, J., Xia, Y., & Zhao, Z. (2022). Effectively detecting operational anomalies in large-scale IoT Data infrastructures by using a GAN-based predictive model. The Computer Journal, 65(11), 2909\u20132925.","journal-title":"The Computer Journal"},{"issue":"94","key":"3483_CR38","doi-asserted-by":"publisher","first-page":"1253","DOI":"10.1007\/s11265-022-01790-3","volume":"2022","author":"X Zenggang","year":"2022","unstructured":"Zenggang, X., Mingyang, Z., Xuemin, Z., Sanyuan, Z., Fang, X., Xiaochao, Z., & Xiang, L. (2022). Social similarity routing algorithm based on socially aware networks in the big data environment. Journal of Signal Processing Systems, 2022(94), 1253.","journal-title":"Journal of Signal Processing Systems"},{"issue":"3","key":"3483_CR39","first-page":"426","volume":"58","author":"J Ma","year":"2022","unstructured":"Ma, J., & Hu, J. (2022). Safe consensus control of cooperative-competitive multi-agent systems via differential privacy. Kybernetika, 58(3), 426\u2013439.","journal-title":"Kybernetika"},{"key":"3483_CR40","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1016\/j.comcom.2020.01.060","volume":"153","author":"Z Lv","year":"2020","unstructured":"Lv, Z., & Kumar, N. (2020). Software-defined solutions for sensors in 6G\/IoE. Computer Communications, 153, 42\u201347.","journal-title":"Computer Communications"},{"issue":"3","key":"3483_CR41","doi-asserted-by":"publisher","first-page":"1564","DOI":"10.1109\/TCSVT.2021.3069838","volume":"32","author":"H Liu","year":"2022","unstructured":"Liu, H., Yuan, H., Liu, Q., Hou, J., Zeng, H., & Kwong, S. (2022). A hybrid compression framework for color attributes of static 3D point clouds. IEEE Transactions on Circuits and Systems for Video Technology, 32(3), 1564\u20131577.","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"issue":"1","key":"3483_CR42","doi-asserted-by":"publisher","first-page":"23","DOI":"10.21278\/brod73102","volume":"73","author":"C Zong","year":"2022","unstructured":"Zong, C., & Wan, Z. (2022). Container ship cell guide accuracy check technology based on improved 3d point cloud instance segmentation. Brodogradnja, 73(1), 23\u201335.","journal-title":"Brodogradnja"},{"issue":"5","key":"3483_CR43","doi-asserted-by":"publisher","first-page":"2228","DOI":"10.1109\/TNET.2021.3084251","volume":"29","author":"H Jiang","year":"2021","unstructured":"Jiang, H., Wang, M., Zhao, P., Xiao, Z., & Dustdar, S. (2021). A utility-aware general framework with quantifiable privacy preservation for destination prediction in LBSs. IEEE\/ACM Transactions on Networking, 29(5), 2228\u20132241.","journal-title":"IEEE\/ACM Transactions on Networking"},{"issue":"3","key":"3483_CR44","doi-asserted-by":"publisher","first-page":"129","DOI":"10.4236\/jis.2016.73009","volume":"7","author":"MAM Hasan","year":"2016","unstructured":"Hasan, M. A. M., Nasser, M., Ahmad, S., & Molla, K. I. (2016). Feature selection for intrusion detection using random forest. Journal of information security, 7(3), 129\u2013140.","journal-title":"Journal of information security"},{"key":"3483_CR45","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1016\/j.jpdc.2020.03.021","volume":"143","author":"A Yazdinejad","year":"2020","unstructured":"Yazdinejad, A., Parizi, R. M., Dehghantanha, A., Srivastava, G., Mohan, S., & Rababah, A. M. (2020). Cost optimization of secure routing with untrusted devices in software defined networking. Journal of Parallel and Distributed Computing, 143, 36\u201346.","journal-title":"Journal of Parallel and Distributed Computing"},{"key":"3483_CR46","doi-asserted-by":"publisher","first-page":"3043","DOI":"10.1007\/s40747-022-00760-3","volume":"9","author":"UA Butt","year":"2022","unstructured":"Butt, U. A., Amin, R., Aldabbas, H., Mohan, S., Alouffi, B., & Ahmadian, A. (2022). Cloud-based email phishing attack using machine and deep learning algorithm. Complex and Intelligent Systems, 9, 3043.","journal-title":"Complex and Intelligent Systems"},{"key":"3483_CR47","unstructured":"https:\/\/www.kaggle.com\/datasets\/hassan06\/nslkdd"},{"issue":"6","key":"3483_CR48","first-page":"446","volume":"4","author":"L Dhanabal","year":"2015","unstructured":"Dhanabal, L., & Shantharajah, S. P. (2015). A study on NSL-KDD dataset for intrusion detection system based on classification algorithms. International Journal of Advanced Research in Computer and Communication Engineering, 4(6), 446\u2013452.","journal-title":"International Journal of Advanced Research in Computer and Communication Engineering"},{"key":"3483_CR49","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1016\/j.protcy.2012.05.017","volume":"4","author":"S Mukherjee","year":"2012","unstructured":"Mukherjee, S., & Sharma, N. (2012). Intrusion detection using naive bayes classifier with feature reduction. Procedia Technology, 4, 119\u2013128. https:\/\/doi.org\/10.1016\/j.protcy.2012.05.017","journal-title":"Procedia Technology"},{"key":"3483_CR50","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5120\/ijca2016910764","volume":"150","author":"K Kumar","year":"2016","unstructured":"Kumar, K. (2016). Network intrusion detection with feature selection techniques using machine-learning algorithms. International Journal of Computer Applications., 150, 1\u201313. https:\/\/doi.org\/10.5120\/ijca2016910764","journal-title":"International Journal of Computer Applications."},{"issue":"03","key":"3483_CR51","first-page":"100","volume":"1","author":"A Moradi","year":"2017","unstructured":"Moradi, A. (2017). Nonlinearity and asymmetries in Iranian business cycle: Through Markov switching auto regression model. Medbiotech Journal, 1(03), 100\u2013104.","journal-title":"Medbiotech Journal"},{"issue":"21","key":"3483_CR52","doi-asserted-by":"publisher","first-page":"7886","DOI":"10.3390\/app10217886","volume":"10","author":"A Rahiminasab","year":"2020","unstructured":"Rahiminasab, A., Tirandazi, P., Ebadi, M. J., Ahmadian, A., & Salimi, M. (2020). An energy-aware method for selecting cluster heads in wireless sensor networks. Applied Sciences, 10(21), 7886.","journal-title":"Applied Sciences"}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-023-03483-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11276-023-03483-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-023-03483-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,8]],"date-time":"2024-11-08T05:11:08Z","timestamp":1731042668000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11276-023-03483-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,11]]},"references-count":52,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2024,10]]}},"alternative-id":["3483"],"URL":"https:\/\/doi.org\/10.1007\/s11276-023-03483-6","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"type":"print","value":"1022-0038"},{"type":"electronic","value":"1572-8196"}],"subject":[],"published":{"date-parts":[[2023,9,11]]},"assertion":[{"value":"18 August 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 September 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"There is no conflicts of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}}]}}