{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T15:36:42Z","timestamp":1775230602172,"version":"3.50.1"},"reference-count":49,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2025,7,9]],"date-time":"2025-07-09T00:00:00Z","timestamp":1752019200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,7,9]],"date-time":"2025-07-09T00:00:00Z","timestamp":1752019200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100000780","name":"European Commission","doi-asserted-by":"publisher","award":["101120684"],"award-info":[{"award-number":["101120684"]}],"id":[{"id":"10.13039\/501100000780","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000780","name":"European Commission","doi-asserted-by":"publisher","award":["101120684"],"award-info":[{"award-number":["101120684"]}],"id":[{"id":"10.13039\/501100000780","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100014013","name":"UK Research and Innovation","doi-asserted-by":"publisher","award":["EP\/Z003490\/1"],"award-info":[{"award-number":["EP\/Z003490\/1"]}],"id":[{"id":"10.13039\/100014013","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100014013","name":"UK Research and Innovation","doi-asserted-by":"publisher","award":["EP\/Z003490\/1"],"award-info":[{"award-number":["EP\/Z003490\/1"]}],"id":[{"id":"10.13039\/100014013","id-type":"DOI","asserted-by":"publisher"}]},{"name":"NextGenerationEU - National Recovery and Resilience Plan","award":["IR0000013"],"award-info":[{"award-number":["IR0000013"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Reliable Intell Environ"],"published-print":{"date-parts":[[2025,9]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>The sophistication of cyberattacks has significantly increased, making it almost certain that organizations can be victims of cyberattacks at any time. Managing cybersecurity risk is critical for any organization so that informed decisions can be made to tackle risks before they materialize. Cybersecurity risk management is context-specific and heavily relies on the specific organization\u2019s context. However, performing effective risk management is always challenging due to the constant changes in organizational infrastructure and security posture, including the adoption of new applications and the reconfiguration or updating of existing assets and their dependencies, as well as the potential exploitation of vulnerabilities. Despite the wider adoption of AI enabled cybersecurity risk management, there is a lack of focus on the integration of these systems along with the dynamic elements of the risk management. In this context, this research proposes a novel dynamic cyber security risk management (d-CSRM) framework to tackle this challenge by integrating dynamic parameters such as vulnerability exploitation and assets dependencies for assessing and managing the risk. The framework consists of a systemic process and makes use of a hybrid AI-enabled model that combines both linear regression and deep learning, to prioritize the vulnerabilities. Additionally, d-CSRM integrates the explainability and interpretability characteristics of the AI model for explaining model decision making and the inner working parameters. This allows the extraction of the key features that are linked with the risk and informed decision making to tackle the risks. An experiment was performed to prioritize the vulnerabilities from the widely used CVEjoin dataset using the proposed hybrid model to quantify the dynamic risk with explainability. The results show that the hybrid model effectively identifies and prioritizes the most critical vulnerabilities using the selected key features such as exploit type, exploit platform and impact that can further enhance the dynamic risk assessment.<\/jats:p>","DOI":"10.1007\/s40860-025-00253-3","type":"journal-article","created":{"date-parts":[[2025,7,10]],"date-time":"2025-07-10T09:41:19Z","timestamp":1752140479000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["Intelligent dynamic cybersecurity risk management framework with explainability and interpretability of AI models for enhancing security and resilience of digital infrastructure"],"prefix":"10.1007","volume":"11","author":[{"given":"Shareeful","family":"Islam","sequence":"first","affiliation":[]},{"given":"Nihala","family":"Basheer","sequence":"additional","affiliation":[]},{"given":"Spyridon","family":"Papastergiou","sequence":"additional","affiliation":[]},{"given":"Mario","family":"Ciampi","sequence":"additional","affiliation":[]},{"given":"Stefano","family":"Silvestri","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,9]]},"reference":[{"issue":"9","key":"253_CR1","doi-asserted-by":"publisher","first-page":"4443","DOI":"10.3390\/app12094443","volume":"12","author":"S Islam","year":"2022","unstructured":"Islam S, Papastergiou S, Kalogeraki E-M, Kioskli K (2022) Cyberattack path generation and prioritisation for securing healthcare systems. Appl Sci 12(9):4443. https:\/\/doi.org\/10.3390\/app12094443","journal-title":"Appl Sci"},{"issue":"10","key":"253_CR2","doi-asserted-by":"publisher","first-page":"324","DOI":"10.3390\/fi15100324","volume":"15","author":"P Cheimonidis","year":"2023","unstructured":"Cheimonidis P, Rantos K (2023) Dynamic risk assessment in cybersecurity: a systematic literature review. Future Internet 15(10):324. https:\/\/doi.org\/10.3390\/fi15100324","journal-title":"Future Internet"},{"key":"253_CR3","doi-asserted-by":"publisher","unstructured":"Naumov S, Kabanov I (2016) Dynamic framework for assessing cyber security risks in a changing environment. In: 2016 international conference on information science and communications technologies (ICISCT), pp 1\u20134. https:\/\/doi.org\/10.1109\/ICISCT.2016.7777406","DOI":"10.1109\/ICISCT.2016.7777406"},{"key":"253_CR4","unstructured":"Gonzalez A (2021) Dynamic cybersecurity risk assessment. https:\/\/www.tarlogic.com\/ blog\/dynamic-cybersecurity-risk-assessment\/. Accessed 24 May 2024"},{"key":"253_CR5","doi-asserted-by":"publisher","unstructured":"Schneider D, Reich J, Adler R, Liggesmeyer P (2024) Dynamic risk management in cyber physical systems. CoRR https:\/\/doi.org\/10.48550\/ARXIV.2401.13539. arXiv:2401.13539","DOI":"10.48550\/ARXIV.2401.13539"},{"key":"253_CR6","unstructured":"Mitre (2024) Common vulnerabilities and exposures. https:\/\/cve.mitre.org. Accessed 24 May 2024"},{"key":"253_CR7","unstructured":"Cyentia Institute KS (ed) (2018) Proitization to prediction: analyzing vulnerability remediation strategies. Cyentia Institute, Leesburg"},{"issue":"4","key":"253_CR8","doi-asserted-by":"publisher","first-page":"389","DOI":"10.3233\/ICA-220689","volume":"29","author":"S Islam","year":"2022","unstructured":"Islam S, Abba A, Ismail U, Mouratidis H, Papastergiou S (2022) Vulnerability prediction for secure healthcare supply chain service delivery. Int Comput Aided Eng 29(4):389\u2013409. https:\/\/doi.org\/10.3233\/ICA-220689","journal-title":"Int Comput Aided Eng"},{"issue":"6","key":"253_CR9","doi-asserted-by":"publisher","first-page":"898","DOI":"10.3390\/app8060898","volume":"8","author":"HI Kure","year":"2018","unstructured":"Kure HI, Islam S, Razzaque MA (2018) An integrated cyber security risk management approach for a cyber-physical system. Appl Sci 8(6):898. https:\/\/doi.org\/10.3390\/app8060898","journal-title":"Appl Sci"},{"key":"253_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cose.2015.09.009","volume":"56","author":"Y Cherdantseva","year":"2016","unstructured":"Cherdantseva Y, Burnap P, Blyth A, Eden P, Jones K, Soulsby H, Stoddart K (2016) A review of cyber security risk assessment methods for scada systems. Comput Secur 56:1\u201327. https:\/\/doi.org\/10.1016\/j.cose.2015.09.009","journal-title":"Comput Secur"},{"key":"253_CR11","doi-asserted-by":"publisher","unstructured":"Kanakogi K, Washizaki H, Fukazawa Y, Ogata S, Okubo T, Kato T, Kanuka H, Hazeyama A, Yoshioka N (2021) Tracing CAPEC attack patterns from CVE vulnerability information using natural language processing technique. In: 54th Hawaii international conference on system sciences HICSS-54. AIS, Hawaii, USA. https:\/\/doi.org\/10.24251\/hicss.2021.841","DOI":"10.24251\/hicss.2021.841"},{"issue":"1","key":"253_CR12","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/s40860-023-00202-y","volume":"10","author":"ZH Toman","year":"2024","unstructured":"Toman ZH, Hamel L, Toman SH, Graiet M, Valadares D (2024) Formal verification for security and attacks in iot physical layer. J Reliab Intell Environ 10(1):73\u201391","journal-title":"J Reliab Intell Environ"},{"key":"253_CR13","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1007\/978-3-031-63211-2_24","volume-title":"Artificial intelligence applications and innovations","author":"N Basheer","year":"2024","unstructured":"Basheer N, Pranggono B, Islam S, Papastergiou S, Mouratidis H (2024) Enhancing malware detection through machine learning using xai with shap framework. In: Maglogiannis I, Iliadis L, Macintyre J, Avlonitis M, Papaleonidas A (eds) Artificial intelligence applications and innovations. Springer, Cham, pp 316\u2013329"},{"key":"253_CR14","doi-asserted-by":"crossref","unstructured":"Chennam KK, Mudrakola S, Maheswari VU, Aluvalu R, Rao KG (2023 Black box models for explainable Artificial intelligence. In: Mehta M, Palade V, Chatterjee I (eds) Explainable AI: foundations, methodologies and applications. Intelligent systems reference library, vol 232. Springer, Cham, pp 1\u201324. https:\/\/doi.org\/10.1007\/978-3-031-12807-3_1","DOI":"10.1007\/978-3-031-12807-3_1"},{"key":"253_CR15","doi-asserted-by":"crossref","unstructured":"Sanmorino A, Marnisah L, Sunardi H (2023) Feature selection using extra trees classifier for research productivity framework in Indonesia. In: Triwiyanto T, Rizal A, Caesarendra W (eds) Proceeding of the 3rd international conference on electronics, biomedical engineering, and health informatics. Springer, Singapore, pp 13\u201321","DOI":"10.1007\/978-981-99-0248-4_2"},{"key":"253_CR16","doi-asserted-by":"publisher","first-page":"380","DOI":"10.1007\/978-3-031-29056-5_34","volume-title":"Advanced information networking and applications","author":"F Ponte","year":"2023","unstructured":"Ponte F, Rodrigues EB, Mattos C (2023) Cvejoin: an information security vulnerability and threat intelligence dataset. In: Barolli L (ed) Advanced information networking and applications. Springer, Cham, pp 380\u2013392"},{"key":"253_CR17","doi-asserted-by":"publisher","first-page":"71749","DOI":"10.1109\/ACCESS.2022.3187211","volume":"10","author":"N Sun","year":"2022","unstructured":"Sun N, Li C-T, Chan H, Islam MZ, Islam MR, Armstrong W (2022) How do organizations seek cyber assurance? Investigations on the adoption of the common criteria and beyond. IEEE Access 10:71749\u201371763. https:\/\/doi.org\/10.1109\/ACCESS.2022.3187211","journal-title":"IEEE Access"},{"issue":"02","key":"253_CR18","doi-asserted-by":"publisher","first-page":"1188","DOI":"10.54751\/revistafoco.v16n2-215","volume":"16","author":"A Junior","year":"2023","unstructured":"Junior A, Arima CH (2023) Cyber risk management and iso 27005 applied in organizations: a systematic literature review. REVISTA FOCO 16(02):1188\u20131188. https:\/\/doi.org\/10.54751\/revistafoco.v16n2-215","journal-title":"REVISTA FOCO"},{"issue":"2","key":"253_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.21609\/jsi.v18i2.1146","volume":"18","author":"E Endro Joko Wibowo","year":"2022","unstructured":"Endro Joko Wibowo E, Kalamullah Ramli KR (2022) Impact of implementation of information security risk management and security controls on cyber security maturity (a case study at data management applications of xyz institute). J Inf Syst 18(2):1\u201317. https:\/\/doi.org\/10.21609\/jsi.v18i2.1146","journal-title":"J Inf Syst"},{"key":"253_CR20","unstructured":"ISO (2018) ISO 27005:2018 (ISO 27005) Information technology\u2014Security techniques\u2014Information security risk management. International Standard Organization. https:\/\/www.iso.org\/standard\/75281.html. Accessed 24 May 2024"},{"key":"253_CR21","unstructured":"ISO (2018) ISO 31000:2018 risk management\u2013principles and guidelines. International Standard Organization. https:\/\/www.iso.org\/standard\/75281.html. Accessed 24 May 2024"},{"key":"253_CR22","unstructured":"NIST (2011) NIST Special Publication 800-39, (NIST 800-39) Managing information security risk, organization, mission, and information system view. National Institute of Standards and Technology. https:\/\/nvlpubs.nist.gov\/nistpubs\/Legacy\/SP\/nistspecialpublication800-39.pdf. Accessed 24 May 2024"},{"key":"253_CR23","doi-asserted-by":"publisher","first-page":"535","DOI":"10.1016\/j.future.2017.05.043","volume":"83","author":"G Gonzalez-Granadillo","year":"2018","unstructured":"Gonzalez-Granadillo G, Dubus S, Motzek A, Garcia-Alfaro J, Alvarez E, Merialdo M, Papillon S, Debar H (2018) Dynamic risk management response system to handle cyber threats. Futur Gener Comput Syst 83:535\u2013552. https:\/\/doi.org\/10.1016\/j.future.2017.05.043","journal-title":"Futur Gener Comput Syst"},{"issue":"10","key":"253_CR24","doi-asserted-by":"publisher","first-page":"5875","DOI":"10.3390\/app13105875","volume":"13","author":"S Mishra","year":"2023","unstructured":"Mishra S (2023) Exploring the impact of ai-based cyber security financial sector management. Appl Sci 13(10):5875. https:\/\/doi.org\/10.3390\/app13105875","journal-title":"Appl Sci"},{"key":"253_CR25","doi-asserted-by":"publisher","unstructured":"Islam S, Papastergiou S, Silvestri S (2022) Cyber threat analysis using natural language processing for a secure healthcare system. In: 2022 IEEE symposium on computers and communications (ISCC). IEEE, Rhodes, Greece, pp 1\u20137. https:\/\/doi.org\/10.1109\/ISCC55528.2022.9912768","DOI":"10.1109\/ISCC55528.2022.9912768"},{"key":"253_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2023.101804","volume":"97","author":"R Kaur","year":"2023","unstructured":"Kaur R, Gabrijel\u010di\u010d D, Klobu\u010dar T (2023) Artificial intelligence for cybersecurity: literature review and future research directions. Inf Fusion 97:101804. https:\/\/doi.org\/10.1016\/j.inffus.2023.101804","journal-title":"Inf Fusion"},{"issue":"2","key":"253_CR27","doi-asserted-by":"publisher","first-page":"651","DOI":"10.3390\/s23020651","volume":"23","author":"S Silvestri","year":"2023","unstructured":"Silvestri S, Islam S, Papastergiou S, Tzagkarakis C, Ciampi M (2023) A machine learning approach for the NLP-based analysis of cyber threats and vulnerabilities of the healthcare ecosystem. Sensors 23(2):651. https:\/\/doi.org\/10.3390\/s23020651","journal-title":"Sensors"},{"key":"253_CR28","doi-asserted-by":"crossref","unstructured":"Pandey P, Katsikas S (2023) The future of cyber risk management: AI and DLT for automated cyber risk modelling, decision making, and risk transfer. In: Handbook of research on artificial intelligence, innovation and entrepreneurship, Chap. 17. Edward Elgar Publishing, Cheltenham, Gloucestershire, UK, pp 272\u2013290. https:\/\/EconPapers.repec.org\/RePEc:elg:eechap:19750_17. Accessed 24 May 2024","DOI":"10.4337\/9781839106750.00028"},{"key":"253_CR29","doi-asserted-by":"publisher","unstructured":"Ligo AK, Kott A, Dozier H, Linkov I (2023) Risk management. In: Kott A (eds) Autonomous intelligent cyber defense agent (AICA). Advances in information security, vol 87. Springer, Cham , pp 341\u2013352. https:\/\/doi.org\/10.1007\/978-3-031-29269-9_16","DOI":"10.1007\/978-3-031-29269-9_16"},{"key":"253_CR30","doi-asserted-by":"publisher","unstructured":"Jyothi VE, Sai\u00a0Kumar DL, Thati B, Tondepu Y, Pratap VK, Praveen SP (2022) Secure data access management for cyber threats using artificial intelligence. In: 2022 6th international conference on electronics, communication and aerospace technology. IEEE, pp 693\u2013697. https:\/\/doi.org\/10.1109\/ICECA55336.2022.10009139","DOI":"10.1109\/ICECA55336.2022.10009139"},{"issue":"1","key":"253_CR31","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/s10207-023-00769-w","volume":"23","author":"S Silvestri","year":"2024","unstructured":"Silvestri S, Islam S, Amelin D, Weiler G, Papastergiou S, Ciampi M (2024) Cyber threat assessment and management for securing healthcare ecosystems using natural language processing. Int J Inf Secur 23(1):31\u201350. https:\/\/doi.org\/10.1007\/s10207-023-00769-w","journal-title":"Int J Inf Secur"},{"key":"253_CR32","unstructured":"Silvestri S, Tricomi G, Russo GF, Ciampi M (2024) A natural language processing-based approach for cyber risk assessment in the healthcare ecosystems. In: Martino SD, Sansone C, Masciari E, Rossi S, Gravina M (eds) Proceedings of the Ital-IA Intelligenza Artificiale\u2014thematic workshops co-located with the 4th CINI National Lab AIIS conference on artificial intelligence (Ital-IA 2024). CEUR workshop Proceedings, vol 3762. CEUR-WS.org, Naples, Italy, pp 176\u2013181. https:\/\/ceur-ws.org\/Vol-3762\/527.pdf. Accessed 24 May 2024"},{"key":"253_CR33","unstructured":"KPMG (2024) Decoding the EU AI Act. https:\/\/assets.kpmg.com\/content\/dam\/kpmg\/xx\/pdf\/2024\/02\/decoding-the-eu-artificial-intelligence-act.pdf. Accessed 24 May 2024"},{"key":"253_CR34","doi-asserted-by":"publisher","unstructured":"Ali S, Abuhmed T, El-Sappagh S, Muhammad K, Alonso-Moral JM, Confalonieri R, Guidotti R, Del Ser J, D\u00edaz-Rodr\u00ed\u00adguez N, Herrera F (2023) Explainable artificial intelligence (xai): what we know and what is left to attain trustworthy artificial intelligence. Inf Fusion 99:101805. https:\/\/doi.org\/10.1016\/j.inffus.2023.101805","DOI":"10.1016\/j.inffus.2023.101805"},{"key":"253_CR35","unstructured":"Audrey\u00a0Huang JL, Shankar N (2020) Interpretability. Machine Learning Blog, ML@CMU. Carnegie Mellon University. https:\/\/blog.ml.cmu.edu\/2020\/08\/31\/6-interpretability\/. Accessed 24 May 2024"},{"key":"253_CR36","unstructured":"Zhuravel H (2024) The crucial role of explainable AI in transparent decision-making. Binarkis. https:\/\/binariks.com\/blog\/explainable-ai-implementation-for-decision-making\/. Accessed 24 May 2024"},{"key":"253_CR37","unstructured":"Mitre (2024) Common platform enumeration. https:\/\/cpe.mitre.org. Accessed 24 May 2024"},{"key":"253_CR38","unstructured":"Mitre (2024) Common weakness enumeration. https:\/\/cwe.mitre.org. Accessed 24 May 2024"},{"key":"253_CR39","unstructured":"Incident\u00a0Response F (FIRST) ST (2024) Common Vulnerability Scoring System (CVSS). https:\/\/www.first.org\/cvss\/. Accessed 24 May 2024"},{"issue":"1","key":"253_CR40","doi-asserted-by":"publisher","first-page":"19","DOI":"10.3846\/ntcs.2023.17901","volume":"1","author":"S Ergun","year":"2023","unstructured":"Ergun S (2023) A review of cyber security risk assessment methods for scada systems. Ner Trends Comput Sci 1(1):19\u201331. https:\/\/doi.org\/10.3846\/ntcs.2023.17901","journal-title":"Ner Trends Comput Sci"},{"issue":"3","key":"253_CR41","doi-asserted-by":"publisher","first-page":"525","DOI":"10.3390\/make3030027","volume":"3","author":"MR Zafar","year":"2021","unstructured":"Zafar MR, Khan N (2021) Deterministic local interpretable model-agnostic explanations for stable explainability. Mach Learn Knowl Extr 3(3):525\u2013541. https:\/\/doi.org\/10.3390\/make3030027","journal-title":"Mach Learn Knowl Extr"},{"key":"253_CR42","unstructured":"Tovar\u0148\u00e1\u00a1k D, Sadlek L, \u00c4\u0152eleda P (2021) Graph-based cpe matching for identification of vulnerable asset configurations. In: 2021 IFIP\/IEEE International symposium on integrated network management (IM). IEEE, Bordeaux, France, pp 986\u2013991"},{"issue":"9","key":"253_CR43","doi-asserted-by":"publisher","first-page":"1477","DOI":"10.3390\/app8091477","volume":"8","author":"E-M Kalogeraki","year":"2018","unstructured":"Kalogeraki E-M, Papastergiou S, Mouratidis H, Polemi N (2018) A novel risk assessment methodology for scada maritime logistics environments. Appl Sci 8(9):1477. https:\/\/doi.org\/10.3390\/app8091477","journal-title":"Appl Sci"},{"key":"253_CR44","doi-asserted-by":"crossref","unstructured":"Aghaei E, Niu X, Shadid W, Al-Shaer E (2023) SecureBERT: a domain-specific language model for cybersecurity. In: Security and privacy in communication networks. Springer, Cham, pp 39\u201356","DOI":"10.1007\/978-3-031-25538-0_3"},{"key":"253_CR45","doi-asserted-by":"publisher","unstructured":"Alam MT, Bhusal D, Park Y, Rastogi N (2022) CyNER: a Python library for cybersecurity named entity recognition. CoRR https:\/\/doi.org\/10.48550\/ARXIV.2204.05754. arXiv:2204.05754 [cs.CR]","DOI":"10.48550\/ARXIV.2204.05754"},{"key":"253_CR46","doi-asserted-by":"publisher","unstructured":"Wang X, He S, Xiong Z, Wei X, Jiang Z, Chen S, Jiang J (2022) APTNER: a specific dataset for NER missions in cyber threat intelligence field. In: Proceedings of the 2022 IEEE 25th international conference on computer supported cooperative work in design (CSCWD), pp 1233\u20131238. https:\/\/doi.org\/10.1109\/CSCWD54268.2022.9776031","DOI":"10.1109\/CSCWD54268.2022.9776031"},{"issue":"6","key":"253_CR47","doi-asserted-by":"publisher","first-page":"1440","DOI":"10.1108\/JD-02-2023-0019","volume":"79","author":"G Aracri","year":"2023","unstructured":"Aracri G, Folino A, Silvestri S (2023) Integrated use of KOS and deep learning for data set annotation in tourism domain. J Doc 79(6):1440\u20131458. https:\/\/doi.org\/10.1108\/JD-02-2023-0019","journal-title":"J Doc"},{"key":"253_CR48","first-page":"137","volume-title":"Linear regression","author":"WW Hsieh","year":"2023","unstructured":"Hsieh WW (2023) Linear regression. Cambridge University Press, Cambridge, pp 137-172"},{"key":"253_CR49","unstructured":"Gonzalez R (2023) Machine learning: linearity vs nonlinearity. https:\/\/www.linkedin.com\/pulse\/machine-learning-linearity-vs-nonlinearity-reday-zarra\/. Accessed 24 May 2024"}],"container-title":["Journal of Reliable Intelligent Environments"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40860-025-00253-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40860-025-00253-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40860-025-00253-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,18]],"date-time":"2025-09-18T08:27:27Z","timestamp":1758184047000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40860-025-00253-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,9]]},"references-count":49,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,9]]}},"alternative-id":["253"],"URL":"https:\/\/doi.org\/10.1007\/s40860-025-00253-3","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-4796809\/v1","asserted-by":"object"}]},"ISSN":["2199-4668","2199-4676"],"issn-type":[{"value":"2199-4668","type":"print"},{"value":"2199-4676","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,7,9]]},"assertion":[{"value":"24 July 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 June 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 July 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"12"}}