{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T01:31:52Z","timestamp":1773797512691,"version":"3.50.1"},"reference-count":59,"publisher":"Springer Science and Business Media LLC","issue":"5-6","license":[{"start":{"date-parts":[[2021,5,28]],"date-time":"2021-05-28T00:00:00Z","timestamp":1622160000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,5,28]],"date-time":"2021-05-28T00:00:00Z","timestamp":1622160000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ann. Telecommun."],"published-print":{"date-parts":[[2022,6]]},"DOI":"10.1007\/s12243-021-00852-0","type":"journal-article","created":{"date-parts":[[2021,5,28]],"date-time":"2021-05-28T18:25:19Z","timestamp":1622226319000},"page":"371-394","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":28,"title":["Multi-layer perceptron for network intrusion detection"],"prefix":"10.1007","volume":"77","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5937-5331","authenticated-orcid":false,"given":"Arnaud","family":"Rosay","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0747-3324","authenticated-orcid":false,"given":"K\u00e9vin","family":"Riou","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0314-3667","authenticated-orcid":false,"given":"Florent","family":"Carlier","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4447-7244","authenticated-orcid":false,"given":"Pascal","family":"Leroux","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,5,28]]},"reference":[{"key":"852_CR1","unstructured":"CicFlowMeter (2021) A network traffic Biflow generator and analyzer (Formerly ISCXFlowMeter). https:\/\/www.unb.ca\/cic\/research\/applications.html (Accessed Mar 6)"},{"key":"852_CR2","unstructured":"Cse-cic-ids2018 on aws, a collaborative project between the communications security establishment (cse) & the canadian institute for cybersecurity (cic). https:\/\/www.unb.ca\/cic\/datasets\/ids-2018.html. (Accessed Mar 6, 2021)"},{"key":"852_CR3","unstructured":"Kali linux, the most advanced penetration testing distribution. https:\/\/www.kali.org\/. (Accessed Mar 6, 2021)"},{"key":"852_CR4","unstructured":"Owasp top ten 2017. https:\/\/owasp.org\/www-project-top-ten\/OWASP_Top_Ten_2017\/. (Accessed Mar 6, 2021)"},{"key":"852_CR5","unstructured":"A realistic cyber defense dataset (cse-cic-ids2018) - registry of open data on aws. https:\/\/registry.opendata.aws\/cse-cic-ids2018\/. (Accessed Mar 6, 2021)"},{"key":"852_CR6","first-page":"281","volume":"13","author":"J Bergstra","year":"2012","unstructured":"Bergstra J, Bengio Y (2012) Random search for hyper-parameter optimization. J Mach Learn Res 13:281\u2013305","journal-title":"J Mach Learn Res"},{"key":"852_CR7","doi-asserted-by":"publisher","unstructured":"Bo\u0161njak L, Sre\u0161 J, Brumen B (2018) Brute-force and dictionary attack on hashed real-world passwords. In: 41st International convention on information and communication technology, electronics and microelectronics (MIPRO), pp 1161\u20131166. https:\/\/doi.org\/10.23919\/MIPRO.2018.8400211","DOI":"10.23919\/MIPRO.2018.8400211"},{"issue":"6","key":"852_CR8","doi-asserted-by":"publisher","first-page":"981","DOI":"10.1016\/j.jcss.2014.12.012","volume":"81","author":"W Bul\u2019ajoul","year":"2015","unstructured":"Bul\u2019ajoul W, James A, Pannu M (2015) Improving network intrusion detection system performance through quality of service configuration and parallel technology. J Comput Syst Sci 81(6):981\u2013999. https:\/\/doi.org\/10.1016\/j.jcss.2014.12.012. Special Issue on Optimisation, Security, Privacy and Trust in E-business Systems","journal-title":"J Comput Syst Sci"},{"key":"852_CR9","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1613\/jair.953","volume":"16","author":"NV Chawla","year":"2002","unstructured":"Chawla NV, Bowyer KW, Hall LO, Kegelmeyer WP (2002) SMOTE: Synthetic minority over-sampling technique. J Artif Intell Res 16:321\u2013357","journal-title":"J Artif Intell Res"},{"issue":"1","key":"852_CR10","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1186\/s13040-021-00244-z","volume":"14","author":"D Chicco","year":"2021","unstructured":"Chicco D, T\u00f6tsch N., Jurman G (2021) The matthews correlation coefficient (mcc) is more reliable than balanced accuracy, bookmaker informedness, and markedness in two-class confusion matrix evaluation. BioData Mining 14(1):13. https:\/\/doi.org\/10.1186\/s13040-021-00244-z","journal-title":"BioData Mining"},{"key":"852_CR11","doi-asserted-by":"publisher","unstructured":"Derbyshire R, Green B, Prince D, Mauthe A, Hutchison D (2018) An analysis of cyber security attack taxonomies. In: IEEE European symposium on security and privacy workshops (EuroS PW), pp 153\u2013161. https:\/\/doi.org\/10.1109\/EuroSPW.2018.00028","DOI":"10.1109\/EuroSPW.2018.00028"},{"key":"852_CR12","doi-asserted-by":"publisher","unstructured":"Dhanabal L, Shantharajah DSP (2015) A Study on NSL-KDD dataset for intrusion detection system based on classification algorithms. In: International journal of advanced research in computer and communication engineering, vol 4, pp 446\u2013452. https:\/\/doi.org\/10.17148\/IJARCCE.2015.4696","DOI":"10.17148\/IJARCCE.2015.4696"},{"key":"852_CR13","doi-asserted-by":"publisher","unstructured":"Draper-Gil G, Lashkari AH, Mamun MSI, Ghorbani AA (2016) Characterization of encrypted and vpn traffic using time-related features. In: Proceedings of the 2nd International conference on information systems security and privacy (ICISSP), vol 1, pp 407\u2013414. INSTICC, SciTePress. https:\/\/doi.org\/10.5220\/0005740704070414","DOI":"10.5220\/0005740704070414"},{"key":"852_CR14","doi-asserted-by":"publisher","unstructured":"Durumeric Z, Li F, Kasten J, Amann J, Beekman J, Payer M, Weaver N, Adrian D, Paxson V, Bailey M, Halderman JA (2014) The matter of heartbleed. In: Proceedings of the 2014 conference on internet measurement conference, IMC \u201914, p 475\u2013488. association for computing machinery. https:\/\/doi.org\/10.1145\/2663716.2663755","DOI":"10.1145\/2663716.2663755"},{"key":"852_CR15","doi-asserted-by":"publisher","unstructured":"Eslahi M, Salleh R, Anuar NB (2012) Bots and botnets: An overview of characteristics, detection and challenges. In: IEEE International conference on control system, computing and engineering, pp 349\u2013354. https:\/\/doi.org\/10.1109\/ICCSCE.2012.6487169","DOI":"10.1109\/ICCSCE.2012.6487169"},{"key":"852_CR16","doi-asserted-by":"publisher","unstructured":"Ferrag MA, Maglaras L (2019) Deliverycoin: An ids and blockchain-based delivery framework for drone-delivered services. Computers 8(3). https:\/\/doi.org\/10.3390\/computers8030058","DOI":"10.3390\/computers8030058"},{"key":"852_CR17","doi-asserted-by":"publisher","unstructured":"Fonseca J, Vieira M, Madeira H (2009) Vulnerability attack injection for web applications. In: IEEE\/IFIP International conference on dependable systems networks, pp 93\u2013102. https:\/\/doi.org\/10.1109\/DSN.2009.5270349","DOI":"10.1109\/DSN.2009.5270349"},{"key":"852_CR18","doi-asserted-by":"publisher","unstructured":"Gamage S, Samarabandu J (2020) Deep learning methods in network intrusion detection: A survey and an objective comparison. J Netw Comput Appl 169(102):767. https:\/\/doi.org\/10.1016\/j.jnca.2020.102767","DOI":"10.1016\/j.jnca.2020.102767"},{"key":"852_CR19","doi-asserted-by":"publisher","unstructured":"Garg A, Maheshwari P (2016) Performance analysis of snort-based intrusion detection system. In: 3rd International conference on advanced computing and communication systems (ICACCS), vol 01, pp 1\u20135. https:\/\/doi.org\/10.1109\/ICACCS.2016.7586351","DOI":"10.1109\/ICACCS.2016.7586351"},{"key":"852_CR20","unstructured":"G\u00e9ron A (2019) Hands-on machine learning with scikit-learn, Keras, and TensorFlow: concepts, tools, and techniques to build intelligent systems. O\u2019Reilly Media"},{"key":"852_CR21","unstructured":"Goodfellow I, Bengio Y, Courville A (2016) Deep Learning. MIT Press, Cambridge"},{"issue":"2","key":"852_CR22","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1016\/0893-6080(91)90009-T","volume":"4","author":"K Hornik","year":"1991","unstructured":"Hornik K (1991) Approximation capabilities of multilayer feedforward networks. Neural Netw 4 (2):251\u2013257. https:\/\/doi.org\/10.1016\/0893-6080(91)90009-T","journal-title":"Neural Netw"},{"key":"852_CR23","doi-asserted-by":"publisher","unstructured":"Hua Y (2020) An efficient traffic classification scheme using embedded feature selection and lightgbm. In: Information communication technologies conference (ICTC), pp 125\u2013130. https:\/\/doi.org\/10.1109\/ICTC49638.2020.9123302","DOI":"10.1109\/ICTC49638.2020.9123302"},{"key":"852_CR24","doi-asserted-by":"publisher","unstructured":"Jiang J, Yu Q, Yu M, Li G, Chen J, Liu K, Liu C, Huang W (2018) ALDD: A Hybrid Traffic-User Behavior Detection Method for Application Layer DDoS. In: 17th IEEE International conference on trust, security and privacy in computing and communications\/ 12th IEEE international conference on big data science and engineering (TrustCom\/BigDataSE), pp 1565\u20131569. https:\/\/doi.org\/10.1109\/TrustCom\/BigDataSE.2018.00225","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00225"},{"key":"852_CR25","doi-asserted-by":"publisher","unstructured":"Karatas G, Demir O, Sahingoz OK (2020) Increasing the performance of machine learning-based idss on an imbalanced and up-to-date dataset. IEEE Access 8:32,150\u201332,162. https:\/\/doi.org\/10.1109\/ACCESS.2020.2973219","DOI":"10.1109\/ACCESS.2020.2973219"},{"issue":"4","key":"852_CR26","doi-asserted-by":"publisher","first-page":"165","DOI":"10.33851\/JMIS.2019.6.4.165","volume":"6","author":"J Kim","year":"2019","unstructured":"Kim J, Shin Y, Choi E (2019) An intrusion detection model based on a convolutional neural network. J Multimed Inf Syst 6(4):165\u2013172. https:\/\/doi.org\/10.33851\/JMIS.2019.6.4.165","journal-title":"J Multimed Inf Syst"},{"key":"852_CR27","unstructured":"Kingma DP, Ba J (2015) Adam: A method for stochastic optimization. 3rd international conference for learning representations"},{"issue":"7","key":"852_CR28","doi-asserted-by":"publisher","first-page":"522","DOI":"10.1016\/j.cose.2006.08.004","volume":"25","author":"M Kjaerland","year":"2006","unstructured":"Kjaerland M (2006) A taxonomy and comparison of computer security incidents from the commercial and government sectors. Comput Secur 25(7):522\u2013538. https:\/\/doi.org\/10.1016\/j.cose.2006.08.004","journal-title":"Comput Secur"},{"key":"852_CR29","unstructured":"Klambauer G, Unterthiner T, Mayr A, Hochreiter S (2017) Self-normalizing neural networks. In: Advances in neural information processing systems, pp. 971\u2013980"},{"key":"852_CR30","doi-asserted-by":"publisher","unstructured":"Lai J, Wu J, Chen S, Wu C, Yang C (2008) Designing a taxonomy of web attacks. In: International conference on convergence and hybrid information technology (ICHIT), pp. 278\u2013282. IEEE Computer Society. https:\/\/doi.org\/10.1109\/ICHIT.2008.280","DOI":"10.1109\/ICHIT.2008.280"},{"key":"852_CR31","doi-asserted-by":"publisher","unstructured":"Lashkari AH, Gil GD, Mamun MSI, Ghorbani AA (2017) Characterization of tor traffic using time based features. In: Proceedings of the 3rd International conference on information systems security and privacy - Volume 1: ICISSP, p. 253\u2013262. SciTePress. https:\/\/doi.org\/10.5220\/0006105602530262","DOI":"10.5220\/0006105602530262"},{"key":"852_CR32","doi-asserted-by":"publisher","unstructured":"Lee W, Stolfo SJ, Mok KW (1999) Mining in a data-flow environment: Experience in network intrusion detection. In: Proceedings of the Fifth ACM SIGKDD international conference on knowledge discovery and data mining, KDD \u201999, pp 114\u2013124. ACM, New York, NY, USA. https:\/\/doi.org\/10.1145\/312129.312212","DOI":"10.1145\/312129.312212"},{"key":"852_CR33","doi-asserted-by":"publisher","unstructured":"Leevy JL, Khoshgoftaar TM (2020) A survey and analysis of intrusion detection models based on cse-cic-ids2018 big data. J Big Data 7(1):104. https:\/\/doi.org\/10.1186\/s40537-020-00382-x","DOI":"10.1186\/s40537-020-00382-x"},{"key":"852_CR34","doi-asserted-by":"publisher","unstructured":"M Devendra Prasad Prasanta Babu V CA (2019) Machine learning ddos detection using stochastic gradient boosting. Int J Comput Sci Eng 7:157\u2013166. https:\/\/doi.org\/10.26438\/ijcse\/v7i4.157166","DOI":"10.26438\/ijcse\/v7i4.157166"},{"key":"852_CR35","doi-asserted-by":"publisher","unstructured":"Maniriho P, Ahmad T (2018) Analyzing the performance of machine learning algorithms in anomaly network intrusion detection systems. In: 4th International conference on science and technology (ICST), pp 1\u20136. https:\/\/doi.org\/10.1109\/ICSTC.2018.8528645","DOI":"10.1109\/ICSTC.2018.8528645"},{"key":"852_CR36","doi-asserted-by":"publisher","unstructured":"Matthews B (1975) Comparison of the predicted and observed secondary structure of T4 phage lysozyme. Biochimica et Biophysica Acta (BBA) - Protein Structure 405(2):442\u2013451. https:\/\/doi.org\/10.1016\/0005-2795(75)90109-9","DOI":"10.1016\/0005-2795(75)90109-9"},{"issue":"4","key":"852_CR37","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1145\/382912.382923","volume":"3","author":"J McHugh","year":"2000","unstructured":"McHugh J (2000) Testing Intrusion Detection Systems: A Critique of the 1998 and 1999 DARPA Intrusion Detection System Evaluations As Performed by Lincoln Laboratory. ACM Trans Inf Syst Secur 3 (4):262\u2013294. https:\/\/doi.org\/10.1145\/382912.382923","journal-title":"ACM Trans Inf Syst Secur"},{"key":"852_CR38","doi-asserted-by":"publisher","unstructured":"Gao M, Zhang K, Jiahua L (2006) Efficient packet matching for gigabit network intrusion detection using tcams. In: 20th International conference on advanced information networking and applications - Volume 1 (AINA\u201906), vol. 2, pp. 6 pp.\u2013254. https:\/\/doi.org\/10.1109\/AINA.2006.164","DOI":"10.1109\/AINA.2006.164"},{"key":"852_CR39","doi-asserted-by":"publisher","unstructured":"Moustafa N, Slay J (2015) UNSW-NB15: A comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In: Military communications and information systems conference (MilCIS), pp 1\u20136. https:\/\/doi.org\/10.1109\/MilCIS.2015.7348942","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"852_CR40","doi-asserted-by":"publisher","unstructured":"Moustafa N, Slay J (2016) The evaluation of network anomaly detection systems: Statistical analysis of the unsw-nb15 data set and the comparison with the kdd99 data set. Inf Sec J A Global Perspective 25 (1-3):18\u201331. https:\/\/doi.org\/10.1080\/19393555.2015.1125974","DOI":"10.1080\/19393555.2015.1125974"},{"key":"#cr-split#-852_CR41.1","unstructured":"Parliament E (2015) Regulation"},{"key":"#cr-split#-852_CR41.2","unstructured":"(EU) 2015\/758 of the European Parliament and of the Council of 29 April 2015 concerning type-approval requirements for the deployment of the eCall in-vehicle system based on the 112 service and amending Directive 2007\/46\/EC. Official Journal of the European Union"},{"key":"852_CR42","unstructured":"Patel P, Langin C, Yu F, Rahimi S (2012) Network intrusion detection types and computation. In: International journal of computer science and information security, vol 10, pp 14\u201321"},{"issue":"23","key":"852_CR43","doi-asserted-by":"publisher","first-page":"2435","DOI":"10.1016\/S1389-1286(99)00112-7","volume":"31","author":"V Paxson","year":"1999","unstructured":"Paxson V (1999) Bro: a system for detecting network intruders in real-time. Comput Netw 31 (23):2435\u20132463. https:\/\/doi.org\/10.1016\/S1389-1286(99)00112-7","journal-title":"Comput Netw"},{"key":"852_CR44","doi-asserted-by":"publisher","unstructured":"Riyaz B, Ganapathy S (2018) An intelligent fuzzy rule based feature selection for effective intrusion detection. In: International conference on recent trends in advance computing (ICRTAC), pp 206\u2013211. https:\/\/doi.org\/10.1109\/ICRTAC.2018.8679328","DOI":"10.1109\/ICRTAC.2018.8679328"},{"key":"852_CR45","doi-asserted-by":"publisher","unstructured":"Roesch M (1999) Snort - lightweight intrusion detection for networks. In: Proceedings of the 13th USENIX Conference on System Administration, LISA \u201999, 229\u2013238, USENIX Association, USA. https:\/\/doi.org\/10.5555\/1039834.1039864","DOI":"10.5555\/1039834.1039864"},{"key":"852_CR46","doi-asserted-by":"publisher","unstructured":"Rosay A, Carlier F, Leroux P (2020) Mlp4nids: An efficient mlp-based network intrusion detection for cicids2017 dataset. In: Boumerdassi S, Renault \u00c9, M\u00fchlethaler P (eds) Machine learning for networking, pp 240\u2013254. Springer International Publishing. https:\/\/doi.org\/10.1007\/978-3-030-45778-5_16","DOI":"10.1007\/978-3-030-45778-5_16"},{"key":"852_CR47","doi-asserted-by":"publisher","unstructured":"Shah M, Ahmed S, Saeed K, Junaid M, Khan H, ur rehman A (2019) Penetration testing active reconnaissance phase \u2013 optimized port scanning with nmap tool. In: 2nd International conference on computing, mathematics and engineering technologies (iCoMET), pp 1\u20136. https:\/\/doi.org\/10.1109\/ICOMET.2019.8673520","DOI":"10.1109\/ICOMET.2019.8673520"},{"key":"852_CR48","doi-asserted-by":"publisher","unstructured":"Sharafaldin I, Lashkari AH, Ghorbani AA (2018) Toward generating a new intrusion detection dataset and intrusion traffic characterization. In: Proceedings of the 4th international conference on information systems security and privacy (ICISSP), vol 1, pp 108\u2013116. SciTePress. https:\/\/doi.org\/10.5220\/0006639801080116","DOI":"10.5220\/0006639801080116"},{"key":"852_CR49","doi-asserted-by":"publisher","unstructured":"Shone N, Ngoc TN, Phai VD, Shi Q (2018) A deep learning approach to network intrusion detection. IEEE Trans Emerg Topics Comput Intell 2(1):41\u201350. https:\/\/doi.org\/10.1109\/TETCI.2017.2772792","DOI":"10.1109\/TETCI.2017.2772792"},{"key":"852_CR50","doi-asserted-by":"publisher","unstructured":"Shorey T, Subbaiah D, Goyal A, Sakxena A, Mishra AK (2018) Performance comparison and analysis of slowloris, goldeneye and xerxes ddos attack tools. In: International conference on advances in computing, communications and informatics (ICACCI), pp 318\u2013322. https:\/\/doi.org\/10.1109\/ICACCI.2018.8554590","DOI":"10.1109\/ICACCI.2018.8554590"},{"key":"852_CR51","unstructured":"Simmons CB, Ellis C, Shiva S, Dasgupta D, Wu Q (2009) Avoidit: A cyber attack taxonomy CTIT technical reports series"},{"key":"852_CR52","doi-asserted-by":"publisher","unstructured":"Tang TA, Mhamdi L, McLernon D, Zaidi SAR, Ghogho M (2016) Deep learning approach for network intrusion detection in software defined networking. In: International conference on wireless networks and mobile communications (WINCOM), pp. 258\u2013263. https:\/\/doi.org\/10.1109\/WINCOM.2016.7777224","DOI":"10.1109\/WINCOM.2016.7777224"},{"key":"852_CR53","doi-asserted-by":"publisher","unstructured":"Tavallaee M, Bagheri E, Lu W, Ghorbani AA (2009) A detailed analysis of the KDD CUP 99 data set. In: IEEE Symposium on computational intelligence for security and defense applications, pp. 1\u20136. https:\/\/doi.org\/10.1109\/CISDA.2009.5356528","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"852_CR54","doi-asserted-by":"publisher","unstructured":"Ullah I, Mahmoud QH (2019) A two-level hybrid model for anomalous activity detection in IoT networks. In: 16th IEEE annual consumer communications networking conference (CCNC), pp 1\u20136. https:\/\/doi.org\/10.1109\/CCNC.2019.8651782","DOI":"10.1109\/CCNC.2019.8651782"},{"key":"852_CR55","doi-asserted-by":"publisher","unstructured":"Ustebay S, Turgut Z, Aydin MA (2018) Intrusion detection system with recursive feature elimination by using random forest and deep learning classifier. In: International congress on big data, deep learning and fighting cyber terrorism (IBIGDELFT), pp 71\u201376. https:\/\/doi.org\/10.1109\/IBIGDELFT.2018.8625318","DOI":"10.1109\/IBIGDELFT.2018.8625318"},{"issue":"11","key":"852_CR56","first-page":"19155","volume":"5","author":"V Valluri","year":"2018","unstructured":"Valluri V, Harika N, Shreya MV (2018) Exposure of sql injection in packet stream. International Journal of Engineering and Computer Science 5(11):19155\u201319158","journal-title":"International Journal of Engineering and Computer Science"},{"issue":"7","key":"852_CR57","doi-asserted-by":"publisher","first-page":"1341","DOI":"10.1162\/neco.1996.8.7.1341","volume":"8","author":"DH Wolpert","year":"1996","unstructured":"Wolpert DH (1996) The lack of a priori distinctions between learning algorithms. Neural Comput 8(7):1341\u20131390. https:\/\/doi.org\/10.1162\/neco.1996.8.7.1341","journal-title":"Neural Comput"},{"key":"852_CR58","doi-asserted-by":"publisher","unstructured":"Zyad E, Taha A, Mohammed B (2019) Improve R2L attack detection using trimmed PCA. In: International conference on advanced communication technologies and networking (CommNet), pp 1\u20135. https:\/\/doi.org\/10.1109\/COMMNET.2019.8742361","DOI":"10.1109\/COMMNET.2019.8742361"}],"container-title":["Annals of Telecommunications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12243-021-00852-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12243-021-00852-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12243-021-00852-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,13]],"date-time":"2022-06-13T08:34:25Z","timestamp":1655109265000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12243-021-00852-0"}},"subtitle":["From a study on two recent data sets to deployment on automotive processor"],"short-title":[],"issued":{"date-parts":[[2021,5,28]]},"references-count":59,"journal-issue":{"issue":"5-6","published-print":{"date-parts":[[2022,6]]}},"alternative-id":["852"],"URL":"https:\/\/doi.org\/10.1007\/s12243-021-00852-0","relation":{},"ISSN":["0003-4347","1958-9395"],"issn-type":[{"value":"0003-4347","type":"print"},{"value":"1958-9395","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,5,28]]},"assertion":[{"value":"25 June 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 May 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 May 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}