{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T18:49:50Z","timestamp":1771613390994,"version":"3.50.1"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"3-4","license":[{"start":{"date-parts":[[2024,4,16]],"date-time":"2024-04-16T00:00:00Z","timestamp":1713225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,4,16]],"date-time":"2024-04-16T00:00:00Z","timestamp":1713225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2025,2]]},"DOI":"10.1007\/s11277-024-11015-4","type":"journal-article","created":{"date-parts":[[2024,4,16]],"date-time":"2024-04-16T15:25:34Z","timestamp":1713281134000},"page":"785-805","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Design of Intelligent Software Security System Based on Spark Big Data Computing"],"prefix":"10.1007","volume":"140","author":[{"given":"Chong","family":"Xu","sequence":"first","affiliation":[]},{"given":"Jing","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,4,16]]},"reference":[{"key":"11015_CR1","doi-asserted-by":"crossref","unstructured":"Ugochukwu, N. A., Goyal, S. B., Rajawat, A. S., Verma, C., & Ill\u00e9s, Z. (2023). Enhancing Logistics With the Internet of Things: A Secured and Efficient Distribution and Storage Model Utilizing Blockchain Innovations and Interplanetary File System. IEEE Access, 12, 4139\u20134152.","DOI":"10.1109\/ACCESS.2023.3339754"},{"key":"11015_CR2","doi-asserted-by":"crossref","unstructured":"Ravi, R. V., Goyal, S. B., Constantin, N. B., Raboaca, M. S., Verma, C., & Kustov, V. (2022). Monitoring and Control of Electrical Sub Station Using IoT and Cloud. In: 2022 International Conference and Exposition on Electrical And Power Engineering (EPE). IEEE, pp. 654\u2013657.","DOI":"10.1109\/EPE56121.2022.9959776"},{"key":"11015_CR3","doi-asserted-by":"crossref","unstructured":"Ravi, R. V., Goyal, S. B., Neagu, B. C., Raboaca, M. S., & Verma, C. (2022). A low-cost industrial automation system using IoT and cloud computing. In: 2022 International Conference and Exposition on Electrical And Power Engineering (EPE). IEEE, pp. 649\u2013653.","DOI":"10.1109\/EPE56121.2022.9959772"},{"key":"11015_CR4","doi-asserted-by":"crossref","unstructured":"Stepanova, M., & Eremin, O. and Proletarsky, A. (2022). Self-regulation Management in IoT Infrastructure Using Machine Learning. Recent Innovations in Computing: Proceedings of ICRIC 2021, Volume 1. Springer, pp. 3\u201315.","DOI":"10.1007\/978-981-16-8248-3_1"},{"key":"11015_CR5","doi-asserted-by":"crossref","unstructured":"Eremin, O., & Stepanova, M. (2021). A reinforcement learning approach for task assignment in IoT distributed platform. Cyber-Physical Systems: Digital Technologies and Applications, pp. 385\u2013394.","DOI":"10.1007\/978-3-030-67892-0_31"},{"issue":"2","key":"11015_CR6","doi-asserted-by":"publisher","first-page":"1173","DOI":"10.2991\/ijcis.d.191016.001","volume":"12","author":"K Ramya","year":"2019","unstructured":"Ramya, K., Teekaraman, Y., & Ramesh Kumar, K. A. (2019). Fuzzy-based energy management system with decision tree algorithm for power security system. International Journal of Computational Intelligence Systems, 12(2), 1173\u20131178.","journal-title":"International Journal of Computational Intelligence Systems"},{"issue":"2","key":"11015_CR7","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1049\/iet-net.2017.0212","volume":"7","author":"J Li","year":"2018","unstructured":"Li, J., Zhao, Z., & Li, R. (2018). Machine learning-based IDS for software\u2010defined 5G network. Iet Networks, 7(2), 53\u201360.","journal-title":"Iet Networks"},{"issue":"5","key":"11015_CR8","first-page":"121","volume":"8","author":"XING Fukang","year":"2022","unstructured":"Fukang, X. I. N. G., Zheng, Z. H. A. N. G., Ran, S. U. I., Sheng, Q. U., & Xinsheng, J. I. (2022). Qualitative modeling and analysis of attack surface for process multi-variant execution software system. Chinese Journal of Network and Information Security, 8(5), 121\u2013128.","journal-title":"Chinese Journal of Network and Information Security"},{"issue":"3","key":"11015_CR9","first-page":"3822","volume":"13","author":"S Rahul","year":"2022","unstructured":"Pol, R. S., Deshmukh, A. B., Jadhav, M. M., Liyakat, K. K. S. L., & Mulani, A. O. (2022). Kazi Kutubuddin Sayyad Liyakat, Altaf O. Mulani. iButton Based Physical access authorization and security system. Journal of Algebraic Statistics, 13(3), 3822\u20133829.","journal-title":"Journal of Algebraic Statistics"},{"key":"11015_CR10","doi-asserted-by":"publisher","first-page":"1665","DOI":"10.1109\/TSE.2020.3030745","volume":"48","author":"F Wentao Wang","year":"2020","unstructured":"Wang, W., Dumont, F., Niu, N., & Horton, G. (2020). Detecting software security vulnerabilities via requirements dependency analysis. IEEE Transactions on Software Engineering, 48, 1665\u20131675.","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"3","key":"11015_CR11","first-page":"7048","volume":"8","author":"M Alenezi","year":"2019","unstructured":"Alenezi, M., & Sadiq Almuairf. (2019). Security risks in the software development lifecycle. International Journal of Recent Technology and Engineering, 8(3), 7048\u20137055.","journal-title":"International Journal of Recent Technology and Engineering"},{"key":"11015_CR12","doi-asserted-by":"crossref","unstructured":"Agarwal, S., Makkar, S., & Tran, D.-C. (Eds.). (2020). Privacy vulnerabilities and data security challenges in the IoT. CRC.","DOI":"10.1201\/9780429322969"},{"key":"11015_CR13","first-page":"10","volume":"15","author":"R Govindaraj","year":"2021","unstructured":"Govindaraj, R., Govindaraj, P., Chowdhury, S., Kim, D., Tran, D. T., & Le, A. N. (2021). A review on various applications of reputation based trust management. International Journal of Interactive Mobile Technologies, 15, 10.","journal-title":"A Review on Various Applications of Reputation Based Trust Management International Journal of Interactive Mobile Technologies"},{"issue":"1","key":"11015_CR14","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s40537-017-0110-7","volume":"5","author":"SMOFM Ba-Alwi","year":"2018","unstructured":"Othman, S. M., Ba-Alwi, F. M., Alsohybe, N. T., & Al-Hashida, A. Y. (2018). Intrusion detection model using machine learning algorithm on Big Data environment. Journal of big data, 5(1), 1\u201312.","journal-title":"Journal of big data"},{"issue":"1","key":"11015_CR15","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1109\/TNSM.2018.2799000","volume":"15","author":"J Wu","year":"2018","unstructured":"Wu, J., Dong, M., Ota, K., Li, J., & Guan, Z. (2018). Big data analysis-based secure cluster management for optimized control plane in software-defined networks. IEEE Transactions on Network and Service Management, 15(1), 27\u201338.","journal-title":"IEEE Transactions on Network and Service Management"},{"issue":"2","key":"11015_CR16","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1080\/01969722.2018.1429835","volume":"49","author":"D Gupta","year":"2018","unstructured":"Gupta, D. (2018). Big data framework for zero-day malware detection. Cybernetics and Systems, 49(2), 103\u2013121.","journal-title":"Cybernetics and Systems"},{"key":"11015_CR17","first-page":"2055","volume":"14","author":"B Danda","year":"2019","unstructured":"Danda, B., Rawat, R., & Doku, M. G. (2019). Cybersecurity in big data era: From securing big data to data-driven security. IEEE Transactions on Services Computing, 14, 2055\u20132072.","journal-title":"IEEE Transactions on Services Computing"},{"issue":"5","key":"11015_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3408314","volume":"53","author":"A Davoudian","year":"2020","unstructured":"Davoudian, A. (2020). Big data systems: A software engineering perspective. ACM Computing Surveys (CSUR), 53(5), 1\u201339.","journal-title":"ACM Computing Surveys (CSUR)"},{"issue":"1","key":"11015_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s41044-020-00045-1","volume":"5","author":"C Avci","year":"2020","unstructured":"Avci, C., Tekinerdogan, B., & Ioannis, N. (2020). Athanasiadis. Software architectures for big data: A systematic literature review. Big Data Analytics, 5(1), 1\u201353.","journal-title":"Big Data Analytics"},{"key":"11015_CR20","first-page":"7","volume":"35","author":"A Atif Mashkoor","year":"2023","unstructured":"Mashkoor, A., Egyed, A., Wille, R., & Stock, S. (2023). Model-driven engineering of safety and security software systems: A systematic mapping study and future research directions. J Softw Evol Process, 35, 7.","journal-title":"J Softw Evol Process"},{"issue":"4","key":"11015_CR21","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1007\/s42979-023-01785-2","volume":"4","author":"RR Althar","year":"2023","unstructured":"Althar, R. R., Samanta, D., Purushotham, S., & Sengar, S. S. (2023). Chaminda Hewage. Design and development of Artificial Intelligence Knowledge Processing System for Optimizing Security of Software System. SN Comput Sci, 4(4), 331.","journal-title":"SN Comput Sci"},{"key":"11015_CR22","doi-asserted-by":"publisher","first-page":"2383","DOI":"10.1109\/OJCOMS.2023.3318860","volume":"4","author":"H Shitharth Selvarajan","year":"2023","unstructured":"Selvarajan, S., Manoharan, H., Khadidos, A. O., Shankar, A., Mekala, M. S., & Khadidos, A. O. (2023). RLIS: Resource Limited Improved Security Beyond Fifth-Generation Networks using Deep Learning algorithms. IEEE Open J Commun Soc, 4, 2383\u20132396.","journal-title":"IEEE Open J Commun Soc"},{"issue":"6","key":"11015_CR23","first-page":"3430","volume":"49","author":"NB Chaleshtari","year":"2023","unstructured":"Chaleshtari, N. B., Pastore, F., & Goknil, A. (2023). Briand. Metamorphic testing for web System Security. Ieee Transactions on Software Engineering, 49(6), 3430\u20133471.","journal-title":"Ieee Transactions on Software Engineering"},{"key":"11015_CR24","doi-asserted-by":"publisher","first-page":"106771","DOI":"10.1016\/j.infsof.2021.106771","volume":"144","author":"A Nesara Dissanayake","year":"2022","unstructured":"Dissanayake, N., Jayatilaka, A., Zahedi, M., & Babar, M. A. (2022). Muhammad Ali Babar: Software security patch management - A systematic literature review of challenges, approaches, tools and practices. Inf Softw Technol, 144, 106771.","journal-title":"Inf Softw Technol"},{"key":"11015_CR25","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/s43926-023-00047-0","volume":"3.1","author":"E Caushaj","year":"2023","unstructured":"Caushaj, E., & Sugumaran, V. (2023). Classification and security assessment of android apps. Discov Internet Things, 3.1, 15.","journal-title":"Discov Internet Things"},{"key":"11015_CR26","doi-asserted-by":"publisher","first-page":"19523","DOI":"10.1007\/s00521-023-08756-x","volume":"35","author":"SK Pemmada","year":"2023","unstructured":"Pemmada, S. K., Nayak, J., & Naik, B. (2023). A deep intelligent framework for software risk prediction using improved firefly optimization. Neural Comput & Applic, 35, 19523\u201319539.","journal-title":"Neural Comput & Applic"},{"issue":"1","key":"11015_CR27","first-page":"1","volume":"12","author":"DKN Soumya Ray","year":"2020","unstructured":"Ray, S., Mishra, K. N., & Dutta, S. (2020). Big data security issues from the perspective of IoT and cloud computing: A review. Recent Advances in Computer Science and Communications, 12(1), 1\u201322.","journal-title":"Recent Advances in Computer Science and Communications"},{"issue":"4","key":"11015_CR28","doi-asserted-by":"publisher","first-page":"1555","DOI":"10.1109\/TR.2021.3111031","volume":"71","author":"H Xiao","year":"2021","unstructured":"Xiao, H., Kunxiang, Y., & Rui, P. (2021). Reliability of a distributed computing system with performance sharing. IEEE Transactions on Reliability, 71(4), 1555\u20131566.","journal-title":"IEEE Transactions on Reliability"},{"issue":"6","key":"11015_CR29","doi-asserted-by":"publisher","first-page":"4185","DOI":"10.1109\/TIT.2021.3068165","volume":"67","author":"T Jahani-Nezhad","year":"2021","unstructured":"Jahani-Nezhad, T. (2021). Codedsketch: A coding scheme for distributed computation of approximated matrix multiplication. IEEE Transactions on Information Theory, 67(6), 4185\u20134196.","journal-title":"IEEE Transactions on Information Theory"},{"issue":"6","key":"11015_CR30","doi-asserted-by":"publisher","first-page":"609","DOI":"10.1177\/0734242X211033716","volume":"40","author":"W Xia","year":"2022","unstructured":"Xia, W., Yanping, J., & Xiaohong, C. (2022). Application of machine learning algorithms in municipal solid waste management: A mini review. Waste Management & Research, 40(6), 609\u2013624.","journal-title":"Waste Management & Research"},{"issue":"1","key":"11015_CR31","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s12911-021-01742-0","volume":"22","author":"K Moulaei","year":"2022","unstructured":"Moulaei, K., Mostafa, S., & Zahra, M. T. (2022). Kazemi-Arpanahi Hadi. Comparing machine learning algorithms for predicting COVID-19 mortality. BMC Medical Informatics and Decision Making, 22(1), 1\u201312.","journal-title":"BMC Medical Informatics and Decision Making"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-024-11015-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-024-11015-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-024-11015-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,19]],"date-time":"2025-05-19T10:01:16Z","timestamp":1747648876000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-024-11015-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,16]]},"references-count":31,"journal-issue":{"issue":"3-4","published-print":{"date-parts":[[2025,2]]}},"alternative-id":["11015"],"URL":"https:\/\/doi.org\/10.1007\/s11277-024-11015-4","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,4,16]]},"assertion":[{"value":"29 March 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 April 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This article abides by ethical standards. The article does not cover human or animal research.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}},{"value":"The authors declare no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interests"}}]}}