{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:59:47Z","timestamp":1740099587337,"version":"3.37.3"},"publisher-location":"Cham","reference-count":58,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030369378"},{"type":"electronic","value":"9783030369385"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-36938-5_12","type":"book-chapter","created":{"date-parts":[[2019,12,9]],"date-time":"2019-12-09T19:04:11Z","timestamp":1575918251000},"page":"199-220","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["OutGene: Detecting Undefined Network Attacks with Time Stretching and Genetic Zooms"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2842-6655","authenticated-orcid":false,"given":"Lu\u00eds","family":"Dias","sequence":"first","affiliation":[]},{"given":"H\u00e9lder","family":"Reia","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5482-9883","authenticated-orcid":false,"given":"Rui","family":"Neves","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7873-5531","authenticated-orcid":false,"given":"Miguel","family":"Correia","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,12,10]]},"reference":[{"key":"12_CR1","unstructured":"Apache Spark documentation. \nhttps:\/\/spark.apache.org\/\n\n. Accessed 22 Apr 2019"},{"key":"12_CR2","unstructured":"Fail2ban. \nhttps:\/\/www.fail2ban.org\n\n. Accessed 22 Apr 2019"},{"key":"12_CR3","first-page":"110","volume":"29","author":"S Alelyani","year":"2013","unstructured":"Alelyani, S., Tang, J., Liu, H.: Feature selection for clustering: a review. Data Clustering 29, 110\u2013121 (2013)","journal-title":"Data Clustering"},{"issue":"1","key":"12_CR4","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1109\/SURV.2013.052213.00046","volume":"6","author":"M Bhuyan","year":"2014","unstructured":"Bhuyan, M., Bhattacharyya, D., Kalita, J.: Network anomaly detection: methods, systems and tools. IEEE Commun. Surv. Tutorials 6(1), 303\u2013336 (2014)","journal-title":"IEEE Commun. Surv. Tutorials"},{"issue":"2","key":"12_CR5","doi-asserted-by":"publisher","first-page":"1153","DOI":"10.1109\/COMST.2015.2494502","volume":"18","author":"A Buczak","year":"2016","unstructured":"Buczak, A., Guven, E.: A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Commun. Surv. Tutorials 18(2), 1153\u20131176 (2016)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"C\u00e1rdenas, A., Manadhata, P., Rajan, S.: Big data analytics for security intelligence. Cloud Secur. Alliance, 10\u201311 (2013)","DOI":"10.1109\/MSP.2013.138"},{"issue":"7","key":"12_CR7","doi-asserted-by":"publisher","first-page":"772","DOI":"10.1016\/j.comcom.2012.01.016","volume":"35","author":"P Casas","year":"2012","unstructured":"Casas, P., Mazel, J., Owezarski, P.: Unsupervised network intrusion detection systems: detecting the unknown without knowledge. Comput. Commun. 35(7), 772\u2013783 (2012)","journal-title":"Comput. Commun."},{"key":"12_CR8","unstructured":"CheckPoint: 2018 security report: Welcome to the future of cyber security (2018)"},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"Cinque, M., Corte, R.D., Pecchia, A.: Entropy-based security analytics: measurements from a critical information system. In: 2017 47th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks, pp. 379\u2013390, June 2017","DOI":"10.1109\/DSN.2017.39"},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"Claise, B.: Cisco systems netflow services export version 9. Technical report, RFC 3954. IETF RFC 3954 (2004)","DOI":"10.17487\/rfc3954"},{"issue":"8","key":"12_CR11","doi-asserted-by":"publisher","first-page":"805","DOI":"10.1016\/S1389-1286(98)00017-6","volume":"31","author":"H Debar","year":"1999","unstructured":"Debar, H., Dacier, M., Wespi, A.: Towards a taxonomy of intrusion detection systems. Comput. Netw. 31(8), 805\u2013822 (1999)","journal-title":"Comput. Netw."},{"key":"12_CR12","unstructured":"Denning, D.E., Neumann, P.G.: Requirements and model for IDES: a real-time intrusion detection expert system. Technical report, Computer Science Laboratory, SRI International, Menlo Park, CA (1985)"},{"key":"12_CR13","doi-asserted-by":"crossref","unstructured":"Dias, L.F., Correia, M.: Big data analytics for intrusion detection: an overview. In: Handbook of Research on Machine and Deep Learning Applications for Cyber Security, pp. 292\u2013316. IGI Global (2020)","DOI":"10.4018\/978-1-5225-9611-0.ch014"},{"key":"12_CR14","doi-asserted-by":"crossref","unstructured":"Du, M., Li, F., Zheng, G., Srikumar, V.: DeepLog: anomaly detection and diagnosis from system logs through deep learning. In: ACM SIGSAC Conference on Computer and Communications Security (2017)","DOI":"10.1145\/3133956.3134015"},{"key":"12_CR15","first-page":"845","volume":"5","author":"JG Dy","year":"2004","unstructured":"Dy, J.G., Brodley, C.E.: Feature selection for unsupervised learning. J. Mach. Learn. Res. 5, 845\u2013889 (2004)","journal-title":"J. Mach. Learn. Res."},{"key":"12_CR16","first-page":"2171","volume":"13","author":"FA Fortin","year":"2012","unstructured":"Fortin, F.A., Rainville, F.M.D., Gardner, M.A., Parizeau, M., Gagn\u00e9, C.: Deap: evolutionary algorithms made easy. J. Mach. Learn. Res. 13, 2171\u20132175 (2012)","journal-title":"J. Mach. Learn. Res."},{"issue":"2","key":"12_CR17","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1023\/A:1022602019183","volume":"3","author":"DE Goldberg","year":"1988","unstructured":"Goldberg, D.E., Holland, J.H.: Genetic algorithms and machine learning. Mach. Learn. 3(2), 95\u201399 (1988)","journal-title":"Mach. Learn."},{"key":"12_CR18","doi-asserted-by":"crossref","unstructured":"Gon\u00e7alves, D., Bota, J., Correia, M.: Big data analytics for detecting host misbehavior in large logs. In: Proceedings of the 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (2015)","DOI":"10.1109\/Trustcom.2015.380"},{"issue":"11","key":"12_CR19","first-page":"14072","volume":"38","author":"A Gorgulho","year":"2011","unstructured":"Gorgulho, A., Neves, R., Horta, N.: Applying a GA kernel on optimizing technical analysis rules for stock picking and portfolio composition. Expert Syst. Appl. 38(11), 14072\u201314085 (2011)","journal-title":"Expert Syst. Appl."},{"key":"12_CR20","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1016\/j.ijinfomgt.2018.08.006","volume":"45","author":"RAA Habeeb","year":"2018","unstructured":"Habeeb, R.A.A., Nasaruddin, F., Gani, A., Hashem, I.A.T., Ahmed, E., Imran, M.: Real-time big data processing for anomaly detection: a survey. Int. J. Inf. Manage. 45, 289\u2013307 (2018)","journal-title":"Int. J. Inf. Manage."},{"key":"12_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1007\/978-3-642-30633-4_11","volume-title":"Dependable Networks and Services","author":"L Hellemons","year":"2012","unstructured":"Hellemons, L., Hendriks, L., Hofstede, R., Sperotto, A., Sadre, R., Pras, A.: SSHCure: a flow-based SSH intrusion detection system. In: Sadre, R., Novotn\u00fd, J., \u010celeda, P., Waldburger, M., Stiller, B. (eds.) AIMS 2012. LNCS, vol. 7279, pp. 86\u201397. Springer, Heidelberg (2012). \nhttps:\/\/doi.org\/10.1007\/978-3-642-30633-4_11"},{"issue":"1","key":"12_CR22","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1007\/BF01908075","volume":"2","author":"L Hubert","year":"1985","unstructured":"Hubert, L., Arabie, P.: Comparing partitions. J. Classif. 2(1), 193\u2013218 (1985)","journal-title":"J. Classif."},{"key":"12_CR23","unstructured":"Hunt, P., Konar, M., Junqueira, F., Reed, B.: Zookeeper: wait-free coordination for internet-scale systems. In: USENIX Annual Technical Conference (2010)"},{"key":"12_CR24","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1007\/11875604_20","volume-title":"Foundations of Intelligent Systems","author":"C Jin","year":"2006","unstructured":"Jin, C., Carbonell, J.: Incremental aggregation on multiple continuous queries. In: Esposito, F., Ra\u015b, Z.W., Malerba, D., Semeraro, G. (eds.) ISMIS 2006. LNCS (LNAI), vol. 4203, pp. 167\u2013177. Springer, Heidelberg (2006). \nhttps:\/\/doi.org\/10.1007\/11875604_20"},{"key":"12_CR25","unstructured":"Kent, A.D.: Comprehensive. Multi-Source Cyber-Security Events, Los Alamos National Laboratory (2015)"},{"key":"12_CR26","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1142\/9781786340757_0002","volume":"1","author":"AD Kent","year":"2016","unstructured":"Kent, A.D.: Cyber security data sources for dynamic network research. Dyn. Netw. Cyber-Secur. 1, 37\u201365 (2016)","journal-title":"Dyn. Netw. Cyber-Secur."},{"key":"12_CR27","unstructured":"Kienzler, R.: Mastering Apache Spark 2.x: Scalable Analytics Faster than Ever. Packt Publishing, Birmingham (2017)"},{"key":"12_CR28","unstructured":"Kreps, J., Narkhede, N., Rao, J., et al.: Kafka: a distributed messaging system for log processing. In: Proceedings of NetDB, pp. 1\u20137 (2011)"},{"key":"12_CR29","unstructured":"Lee, W., Stolfo, S.: Data mining approaches for intrusion detection. In: Proceedings of the 7th USENIX Security Symposium, January 1998"},{"key":"12_CR30","unstructured":"Leung, K., Leckie, C.: Unsupervised anomaly detection in network intrusion detection using clusters. In: Proceedings of the 28th Australasian Conference on Computer Science, pp. 333\u2013342 (2005)"},{"key":"12_CR31","unstructured":"MacQueen, J.B.: Some methods for classification and analysis of multivariate observations. In: Proceedings of 5th Berkeley Symposium on Mathematical Statistics and Probability, pp. 281\u2013297 (1967)"},{"key":"12_CR32","unstructured":"Mandiant: Special report, M-TRENDS 2018 (2018)"},{"key":"12_CR33","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1016\/j.comnet.2016.05.018","volume":"109","author":"M Marchetti","year":"2016","unstructured":"Marchetti, M., Pierazzi, F., Colajanni, M., Guido, A.: Analysis of high volumes of network traffic for advanced persistent threat detection. Comput. Netw. 109, 127\u2013141 (2016)","journal-title":"Comput. Netw."},{"issue":"1","key":"12_CR34","first-page":"1235","volume":"17","author":"X Meng","year":"2016","unstructured":"Meng, X., et al.: MLlib: machine learning in apache spark. J. Mach. Learn. Res. 17(1), 1235\u20131241 (2016)","journal-title":"J. Mach. Learn. Res."},{"key":"12_CR35","unstructured":"Middlemiss, M., Dick, G.: Feature selection of intrusion detection data using a hybrid genetic algorithm\/KNN approach. In: Design and Application of Hybrid Intelligent Systems, pp. 519\u2013527. IOS Press (2003)"},{"key":"12_CR36","doi-asserted-by":"crossref","unstructured":"Mirsky, Y., Doitshman, T., Elovici, Y., Shabtai, A.: Kitsune: an ensemble of autoencoders for online network intrusion detection. In: Proceedings of the Network and Distributed System Security Symposium (2018)","DOI":"10.14722\/ndss.2018.23204"},{"key":"12_CR37","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1007\/978-3-319-66399-9_19","volume-title":"Computer Security \u2013 ESORICS 2017","author":"G Osada","year":"2017","unstructured":"Osada, G., Omote, K., Nishide, T.: Network intrusion detection based on semi-supervised variational auto-encoder. In: Foley, S.N., Gollmann, D., Snekkenes, E. (eds.) ESORICS 2017. LNCS, vol. 10493, pp. 344\u2013361. Springer, Cham (2017). \nhttps:\/\/doi.org\/10.1007\/978-3-319-66399-9_19"},{"key":"12_CR38","unstructured":"OTA: Cyber incident & breach trends report (2018)"},{"issue":"2\u20133","key":"12_CR39","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1007\/s10618-005-0014-6","volume":"12","author":"ME Otey","year":"2006","unstructured":"Otey, M.E., Ghoting, A., Parthasarathy, S.: Fast distributed outlier detection in mixed-attribute data sets. Data Min. Knowl. Discov. 12(2\u20133), 203\u2013228 (2006)","journal-title":"Data Min. Knowl. Discov."},{"key":"12_CR40","doi-asserted-by":"crossref","unstructured":"Sacramento, L., Medeiros, I., Bota, J., Correia, M.: Flowhacker: detecting unknown network attacks in big traffic data using network flows. In: 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp. 567\u2013572 (2018)","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00086"},{"key":"12_CR41","first-page":"31","volume":"21","author":"A Satoh","year":"2015","unstructured":"Satoh, A., Nakamura, Y., Ikenaga, T.: A flow-based detection method for stealthy dictionary attacks against secure shell. J. Inf. Secur. Appl. 21, 31\u201341 (2015)","journal-title":"J. Inf. Secur. Appl."},{"key":"12_CR42","doi-asserted-by":"crossref","unstructured":"Shvachko, K., Kuang, H., Radia, S., Chansler, R.: The Hadoop distributed file system. In: IEEE 26th Symposium on Mass Storage Systems and Technologies, pp. 1\u201310 (2010)","DOI":"10.1109\/MSST.2010.5496972"},{"key":"12_CR43","doi-asserted-by":"crossref","unstructured":"Sommer, R., Paxson, V.: Outside the closed world: on using machine learning for network intrusion detection. In: Proceedings of the 30th IEEE Symposium on Security and Privacy, pp. 305\u2013316 (2010)","DOI":"10.1109\/SP.2010.25"},{"issue":"3","key":"12_CR44","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1109\/SURV.2010.032210.00054","volume":"12","author":"A Sperotto","year":"2010","unstructured":"Sperotto, A., Schaffrath, G., Sadre, R., Morariu, C., Pras, A., Stiller, B.: An overview of IP flow-based intrusion detection. IEEE Commun. Surv. Tutorials 12(3), 343\u2013356 (2010)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"12_CR45","doi-asserted-by":"crossref","unstructured":"Srisuresh, P., Holdrege, M.: IP network address translator (NAT) terminology and considerations. IETF Request for Comments: RFC 2663, August 1999","DOI":"10.17487\/rfc2663"},{"key":"12_CR46","doi-asserted-by":"crossref","unstructured":"Stein, G., Chen, B., Wu, A.S., Hua, K.A.: Decision tree classifier for network intrusion detection with GA-based feature selection. In: Proceedings of the 43rd ACM Annual Southeast Regional Conference, vol. 2, pp. 136\u2013141 (2005)","DOI":"10.1145\/1167253.1167288"},{"key":"12_CR47","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1007\/978-3-319-99073-6_17","volume-title":"Computer Security","author":"G Stergiopoulos","year":"2018","unstructured":"Stergiopoulos, G., Talavari, A., Bitsikas, E., Gritzalis, D.: Automatic detection of various malicious traffic using side channel features on TCP packets. In: Lopez, J., Zhou, J., Soriano, M. (eds.) ESORICS 2018. LNCS, vol. 11098, pp. 346\u2013362. Springer, Cham (2018). \nhttps:\/\/doi.org\/10.1007\/978-3-319-99073-6_17"},{"issue":"01","key":"12_CR48","doi-asserted-by":"publisher","first-page":"65","DOI":"10.4236\/ib.2011.31011","volume":"03","author":"Yen-Ning Su","year":"2011","unstructured":"Su, Y.N., Chung, G.H., Wu, B.J.: Developing the upgrade detection and defense system of SSH dictionary-attack for multi-platform environment. iBusiness 3(01), 65 (2011)","journal-title":"iBusiness"},{"key":"12_CR49","unstructured":"Thames, J.L., Abler, R., Keeling, D.: A distributed active response architecture for preventing SSH dictionary attacks. In: IEEE Southeastcon, pp. 84\u201389 (2008)"},{"key":"12_CR50","first-page":"1","volume-title":"Security Science and Technology","author":"Melissa J. M. Turcotte","year":"2018","unstructured":"Turcotte, M.J.M., Kent, A.D., Hash, C.: Unified Host and Network Data Set, chap. 1, pp. 1\u201322, November 2018"},{"key":"12_CR51","doi-asserted-by":"crossref","unstructured":"Veeramachaneni, K., Arnaldo, I., Cuesta-Infante, A., Korrapati, V., Bassias, C., Li, K.: $$AI^2$$: training a big data machine to defend. In: Proceedings of the 2nd IEEE International Conference on Big Data Security on Cloud (2016)","DOI":"10.1109\/BigDataSecurity-HPSC-IDS.2016.79"},{"key":"12_CR52","unstructured":"Whitley, D.: The GENITOR algorithm and selection pressure. In: Proceedings of the 3rd International Conference on Genetic Algorithms, pp. 116\u2013121 (1989)"},{"key":"12_CR53","unstructured":"Xu, W., Qi, Y., Evans, D.: Automatically evading classifiers. In: Proceedings of the 2016 Network and Distributed Systems Symposium (2016)"},{"issue":"3","key":"12_CR54","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1023\/B:DAMI.0000023676.72185.7c","volume":"8","author":"K Yamanishi","year":"2004","unstructured":"Yamanishi, K., Takeuchi, J.I., Williams, G., Milne, P.: On-line unsupervised outlier detection using finite mixtures with discounting learning algorithms. Data Min. Knowl. Discov. 8(3), 275\u2013300 (2004)","journal-title":"Data Min. Knowl. Discov."},{"key":"12_CR55","unstructured":"Yen, T.F.: Detecting stealthy malware using behavioral features in network traffic. Ph.D. thesis, Carnegie Mellon University Department of Electrical and Computer Engineering (2011)"},{"key":"12_CR56","doi-asserted-by":"crossref","unstructured":"Yen, T.F., et al.: Beehive: large-scale log analysis for detecting suspicious activity in enterprise networks. In: Proceedings of the 29th ACM Annual Computer Security Applications Conference (2013)","DOI":"10.1145\/2523649.2523670"},{"key":"12_CR57","doi-asserted-by":"crossref","unstructured":"Zhang, J., Zulkernine, M.: Anomaly based network intrusion detection with unsupervised outlier detection. In: 2006 IEEE International Conference on Communications, vol. 5, pp. 2388\u20132393 (2006)","DOI":"10.1109\/ICC.2006.255127"},{"key":"12_CR58","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1186\/s40537-015-0013-4","volume":"2","author":"R Zuech","year":"2015","unstructured":"Zuech, R., Khoshgofthaar, T., Wald, R.: Intrusion detection and big heterogeneous data: a survey. J. Big Data 2, 90\u2013107 (2015)","journal-title":"J. Big Data"}],"container-title":["Lecture Notes in Computer Science","Network and System Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-36938-5_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,9]],"date-time":"2019-12-09T19:05:59Z","timestamp":1575918359000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-36938-5_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030369378","9783030369385"],"references-count":58,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-36938-5_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"10 December 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"NSS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Network and System Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sapporo","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 December 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 December 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"nss2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/nsclab.org\/nss2019\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"89","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"7","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"40% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.8","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"7","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}