{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T12:21:59Z","timestamp":1762345319821,"version":"build-2065373602"},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T00:00:00Z","timestamp":1762300800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T00:00:00Z","timestamp":1762300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"name":"Construction and research of the intelligent management platform for digital courses under the Spark framework","award":["NO: 232102321065"],"award-info":[{"award-number":["NO: 232102321065"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Discov Internet Things"],"DOI":"10.1007\/s43926-025-00221-6","type":"journal-article","created":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T12:15:59Z","timestamp":1762344959000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Design and application of a J2EE-based financial informatization system for power supply companies"],"prefix":"10.1007","volume":"5","author":[{"given":"Chongke","family":"Wang","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,11,5]]},"reference":[{"issue":"12","key":"221_CR1","doi-asserted-by":"publisher","first-page":"13077","DOI":"10.1109\/TVT.2022.3201155","volume":"71","author":"AM Molaei","year":"2022","unstructured":"Molaei AM, Fromenteze T, Skouroliakou V, Hoang TV, Kumar R, Fusco V, Yurduseven O. Development of fast Fourier-compatible image reconstruction for 3D near-field bistatic microwave imaging with dynamic metasurface antennas. IEEE Trans Veh Technol. 2022;71(12):13077\u201390.","journal-title":"IEEE Trans Veh Technol"},{"issue":"6","key":"221_CR2","first-page":"1","volume":"55","author":"M Fahmideh","year":"2022","unstructured":"Fahmideh M, Grundy J, Ahmad A, Shen J, Yan J, Mougouei D, Abedin B. Engineering blockchain-based software systems: Foundations, survey, and future directions. ACM-CSUR. 2022;55(6):1\u201344.","journal-title":"ACM-CSUR"},{"issue":"20","key":"221_CR3","first-page":"21599","volume":"39","author":"Y Wu","year":"2025","unstructured":"Wu Y, Meng X, Hu H, Zhang J, Dong Y, Lu D. Affirm: interactive Mamba with adaptive fourier filters for long-term time series forecasting. Proc AAAI Conf Artif Intell. 2025;39(20):21599\u2013607.","journal-title":"Proc AAAI Conf Artif Intell"},{"issue":"2","key":"221_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4236\/jcc.2025.132001","volume":"13","author":"M Zhu","year":"2025","unstructured":"Zhu M. Design and implementation of a CRM system based on email services. J Comput Commun. 2025;13(2):1\u201315.","journal-title":"J Comput Commun"},{"key":"221_CR5","unstructured":"Trenchva M, Filipova M, Stefanovabogdanska D, Dimitrova R. Development and sustainability of specialized accounting software products. Ann Spiru Haret Univ Economic Ser. 2023;23(4):642\u201352."},{"issue":"1","key":"221_CR6","doi-asserted-by":"publisher","first-page":"28","DOI":"10.3390\/software3010002","volume":"3","author":"K Sambhus","year":"2024","unstructured":"Sambhus K, Liu Y. Automating Sql injection and cross-site scripting vulnerability remediation in code. Software. 2024;3(1):28\u201346.","journal-title":"Software"},{"issue":"2","key":"221_CR7","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1504\/IJASS.2023.133894","volume":"10","author":"S Bi","year":"2023","unstructured":"Bi S. Reliability analysis of the financial management auxiliary system of remote branches based on cloud computing. Int J Appl Syst Stud. 2023;10(2):136\u201353.","journal-title":"Int J Appl Syst Stud"},{"issue":"10","key":"221_CR8","doi-asserted-by":"publisher","first-page":"10028","DOI":"10.1016\/j.jksuci.2022.10.003","volume":"34","author":"F Al-Hawari","year":"2022","unstructured":"Al-Hawari F. Software design patterns for data management features in web-based information systems. J King Saud University-Computer Inform Sci. 2022;34(10):10028\u201343.","journal-title":"J King Saud University-Computer Inform Sci"},{"issue":"9","key":"221_CR9","first-page":"596","volume":"20","author":"Z Mei","year":"2024","unstructured":"Mei Z. Design and implementation of intelligent tourism management system based on fuzzy cluster analysis. J Electr Syst. 2024;20(9):596\u2013602.","journal-title":"J Electr Syst"},{"issue":"7","key":"221_CR10","doi-asserted-by":"publisher","first-page":"2914","DOI":"10.1007\/s13198-024-02304-z","volume":"15","author":"J Li","year":"2024","unstructured":"Li J, Jia Z, Wang F. Construction of enterprise comprehensive management system based on information reconstruction and IoT. Int J Syst Assur Eng Manage. 2024;15(7):2914\u201330.","journal-title":"Int J Syst Assur Eng Manage"},{"issue":"3","key":"221_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/IJITSA.307027","volume":"15","author":"H Liu","year":"2022","unstructured":"Liu H. Financial risk intelligent early warning system of a municipal company based on genetic Tabu algorithm and big data analysis. Int J Inform Technol Syst Approach (IJITSA). 2022;15(3):1\u201314.","journal-title":"Int J Inform Technol Syst Approach (IJITSA)"},{"issue":"3","key":"221_CR12","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1080\/23742917.2023.2261169","volume":"8","author":"F Nabi","year":"2024","unstructured":"Nabi F, Zhou X, Iftikhar U, Attaullah HM. A case study of cyber subversion attack based design flaw in service oriented component application logic. J Cyber Secur Technol. 2024;8(3):204\u201328.","journal-title":"J Cyber Secur Technol"},{"issue":"3","key":"221_CR13","first-page":"391","volume":"44","author":"W Chen","year":"2023","unstructured":"Chen W. Risk warning method of computerised accounting information distortion based on deep integration model. Int J Ind Syst Eng. 2023;44(3):391\u2013403.","journal-title":"Int J Ind Syst Eng"},{"issue":"8","key":"221_CR14","doi-asserted-by":"publisher","first-page":"5187","DOI":"10.1080\/03772063.2021.1973596","volume":"69","author":"Y Luo","year":"2023","unstructured":"Luo Y. Financial data security management method and edge computing platform based on intelligent edge computing and big data. IETE J Res. 2023;69(8):5187\u201395.","journal-title":"IETE J Res"},{"issue":"1","key":"221_CR15","doi-asserted-by":"publisher","first-page":"9","DOI":"10.56705\/ijodas.v3i1.31","volume":"3","author":"J Kabuya","year":"2022","unstructured":"Kabuya J, Tshipepele E, Kasoro N. Application of big data to configuration management in a PLM context. Indonesian J Data Sci. 2022;3(1):9\u201316.","journal-title":"Indonesian J Data Sci"},{"issue":"1","key":"221_CR16","doi-asserted-by":"publisher","first-page":"469","DOI":"10.32604\/cmc.2022.019593","volume":"70","author":"AH Seh","year":"2022","unstructured":"Seh AH, Al-Amri JF, Subahi AF, Ansari MJ, Kumar R, Bokhari MU, et al. Hybrid computational modeling for web application security assessment. CMC-Comput Mater Continua. 2022;70(1):469\u201389.","journal-title":"CMC-Comput Mater Continua"},{"issue":"4","key":"221_CR17","first-page":"7751","volume":"46","author":"Y Wan","year":"2024","unstructured":"Wan Y, Huang Q, Wu Y, Li S. A BPSO based collaborative management platform for multi-source data security in power grids. J Intell Fuzzy Syst. 2024;46(4):7751\u201361.","journal-title":"J Intell Fuzzy Syst"},{"issue":"8","key":"221_CR18","first-page":"1681","volume":"53","author":"M Khanahmadi","year":"2023","unstructured":"Khanahmadi M, Shameli-Sendi A, Jabbarifar M, Fournier Q, Dagenais M. Detection of microservice\u2010based software anomalies based on OpenTracing in cloud. Software: Pract Experience. 2023;53(8):1681\u201399.","journal-title":"Software: Pract Experience"},{"key":"221_CR19","doi-asserted-by":"crossref","unstructured":"Guan H, Yang H, Wang J. Approach to security pattern selection. Int J Autom Comput 13(2): 168\u201382.","DOI":"10.1007\/s11633-016-0950-1"},{"issue":"4","key":"221_CR20","first-page":"221","volume":"1","author":"H Mokayed","year":"2023","unstructured":"Mokayed H, Quan TZ, Alkhaled L, Sivakumar V. Real-time human detection and counting system using deep learning computer vision techniques. Artif Intell Appl. 2023;1(4):221\u20139.","journal-title":"Artif Intell Appl"}],"container-title":["Discover Internet of Things"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-025-00221-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s43926-025-00221-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-025-00221-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T12:16:03Z","timestamp":1762344963000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s43926-025-00221-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,5]]},"references-count":20,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["221"],"URL":"https:\/\/doi.org\/10.1007\/s43926-025-00221-6","relation":{},"ISSN":["2730-7239"],"issn-type":[{"type":"electronic","value":"2730-7239"}],"subject":[],"published":{"date-parts":[[2025,11,5]]},"assertion":[{"value":"20 May 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 September 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 November 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"123"}}