{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T03:00:33Z","timestamp":1743130833902,"version":"3.40.3"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030862602"},{"type":"electronic","value":"9783030862619"}],"license":[{"start":{"date-parts":[[2021,9,2]],"date-time":"2021-09-02T00:00:00Z","timestamp":1630540800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,9,2]],"date-time":"2021-09-02T00:00:00Z","timestamp":1630540800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-86261-9_11","type":"book-chapter","created":{"date-parts":[[2021,9,1]],"date-time":"2021-09-01T13:04:13Z","timestamp":1630501453000},"page":"108-118","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A Search Engine for Scientific Publications: A Cybersecurity Case Study"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5030-7751","authenticated-orcid":false,"given":"Nuno","family":"Oliveira","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2919-4817","authenticated-orcid":false,"given":"Norberto","family":"Sousa","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2519-9859","authenticated-orcid":false,"given":"Isabel","family":"Pra\u00e7a","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,2]]},"reference":[{"key":"11_CR1","doi-asserted-by":"crossref","unstructured":"Suryotrisongko, H., Musashi, Y.: Review of cybersecurity research topics, taxonomy and challenges: Interdisciplinary perspective. In: 2019 IEEE 12th Conference on Service-Oriented Computing and Applications (SOCA), pp. 162\u2013167 (2019)","DOI":"10.1109\/SOCA.2019.00031"},{"key":"11_CR2","first-page":"08","volume":"03","author":"Y Lu","year":"2018","unstructured":"Lu, Y.: Cybersecurity research: a review of current research topics. J. Ind. Integration Manag. 03, 08 (2018)","journal-title":"J. Ind. Integration Manag."},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"Rawung, R.H., Putrada, A.G.: Cyber physical system: paper survey. In: 2014 International Conference on ICT For Smart Society (ICISS), pp. 273\u2013278 (2014)","DOI":"10.1109\/ICTSS.2014.7013187"},{"issue":"1","key":"11_CR4","first-page":"21","volume":"1","author":"N Wirkuttis","year":"2017","unstructured":"Wirkuttis, N., Klein, H.: Artificial intelligence in cybersecurity. Cyber Intell. Secur. J. 1(1), 21\u201323 (2017)","journal-title":"Cyber Intell. Secur. J."},{"key":"11_CR5","doi-asserted-by":"crossref","unstructured":"Rajpurkar, P., Zhang, J., Lopyrev, K., Liang, P.: SQuAD: 100,000+ questions for machine comprehension of text. In: Proceedings of the 2016 Conference on Empirical Methods in Natural Language Processing, (Austin, Texas), pp. 2383\u20132392. Association for Computational Linguistics, November 2016","DOI":"10.18653\/v1\/D16-1264"},{"key":"11_CR6","unstructured":"Vaswani, A., et al.: Attention is all you need. In: Proceedings of the 31st International Conference on Neural Information Processing Systems, NIPS 2017, (Red Hook, NY, USA), pp. 6000\u20136010. Curran Associates Inc. (2017)"},{"key":"11_CR7","unstructured":"Devlin, J., Chang, M.-W., Lee, K., Toutanova, K.: BERT: pre-training of deep bidirectional transformers for language understanding. In: Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, Volume 1 (Long and Short Papers), (Minneapolis, Minnesota), pp. 4171\u20134186. Association for Computational Linguistics, June 2019"},{"key":"11_CR8","unstructured":"Liu, Y.: RoBERTa: a robustly optimized BERT pretraining approach. arXiv:1907.11692 (2019)"},{"key":"11_CR9","doi-asserted-by":"publisher","unstructured":"Aggarwal, C.C., Zhai, C.: A survey of text classification algorithms. In: Aggarwal, C., Zhai, C. (eds.) Mining Text Data. Springer, Boston (2012). https:\/\/doi.org\/10.1007\/978-1-4614-3223-4_6","DOI":"10.1007\/978-1-4614-3223-4_6"},{"key":"11_CR10","first-page":"469","volume":"4","author":"AK Singh","year":"2009","unstructured":"Singh, A.K., Kumar, P.R.: A comparative study of page ranking algorithms for information retrieval. Int. J. Electr. Comput. Eng. 4, 469\u2013480 (2009)","journal-title":"Int. J. Electr. Comput. Eng."},{"issue":"1","key":"11_CR11","first-page":"25","volume":"181","author":"S Qaiser","year":"2018","unstructured":"Qaiser, S., Ali, R.: Text mining: use of TF-IDF to examine the relevance of words to documents. Int. J. Comput. Appl. 181(1), 25\u201329 (2018)","journal-title":"Int. J. Comput. Appl."},{"issue":"4","key":"11_CR12","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1007\/s00799-015-0156-0","volume":"17","author":"J Beel","year":"2016","unstructured":"Beel, J., Gipp, B., Langer, S., Breitinger, C.: Research-paper recommender systems\u202f: a literature survey. Int. J. Digit. Libr. 17(4), 305\u2013338 (2016)","journal-title":"Int. J. Digit. Libr."},{"key":"11_CR13","unstructured":"Neto, J.A., Santos, A.D., Kaestner, C.A., Freitas, A.A.: Document clustering and text summarization. In: Proceedings of the Fourth International Conference on the Practical Application of Knowledge Discovery and Data Mining, pp. 41\u201355. The Practical Application Company (2000)"},{"key":"11_CR14","doi-asserted-by":"crossref","unstructured":"Karpukhin, V., et al.: Dense passage retrieval for open-domain question answering. arXiv preprint arXiv:2004.04906 (2020)","DOI":"10.18653\/v1\/2020.emnlp-main.550"},{"key":"11_CR15","doi-asserted-by":"crossref","unstructured":"Lee, K., Chang, M.-W., Toutanova, K.: Latent retrieval for weakly supervised open domain question answering. arXiv preprint arXiv:1906.00300 (2019)","DOI":"10.18653\/v1\/P19-1612"},{"key":"11_CR16","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1162\/tacl_a_00276","volume":"7","author":"T Kwiatkowski","year":"2019","unstructured":"Kwiatkowski, T., et al.: Natural questions: a benchmark for question answering research. Trans. Assoc. Comput. Linguist. 7, 453\u2013466 (2019)","journal-title":"Trans. Assoc. Comput. Linguist."},{"key":"11_CR17","doi-asserted-by":"crossref","unstructured":"Ge, L., Moh, T.: Improving text classification with word embedding. In: 2017 IEEE International Conference on Big Data (Big Data), pp. 1796\u20131805 (2017)","DOI":"10.1109\/BigData.2017.8258123"},{"key":"11_CR18","unstructured":"Mikolov, T., Sutskever, I., Chen, J., Corrado, G., Dean, J.: Distributed representations of words and phrases and their compositionality. arXiv preprint arXiv:1310.4546 (2013)"},{"key":"11_CR19","doi-asserted-by":"crossref","unstructured":"Yang, W., et al.: End-to-end open-domain question answering with bertserini. arXiv preprint arXiv:1902.01718 (2019)","DOI":"10.18653\/v1\/N19-4013"},{"key":"11_CR20","unstructured":"Haystack (2020). https:\/\/haystack.deepset.ai\/. Accessed 06 June 2021"},{"key":"11_CR21","unstructured":"Branden Chan, M.P., M\u00f6ller, T., Soni, T.: Deepset roberta-base-squad2. https:\/\/huggingface.co\/deepset\/roberta-base-squad2. Accessed 06 May 2021"},{"key":"11_CR22","unstructured":"Morla, R.: Ten AI stepping stones for cybersecurity. arXiv:1912.06817 (2019)"},{"key":"11_CR23","doi-asserted-by":"crossref","unstructured":"Kayan, H., Nunes, M., Rana, O., Burnap, P., Perera, C.: Cybersecurity of industrial cyber-physical systems: a review, January 2021. arXiv e-prints arXiv:2101.03564","DOI":"10.1145\/3510410"},{"key":"11_CR24","unstructured":"Gardner, C., Waliga, A., Thaw, D., Churchman, S.: Using camouflaged cyber simulations as a model to ensure validity in cybersecurity experimentation. arXiv:1905.07059 (2019)"},{"issue":"3","key":"11_CR25","doi-asserted-by":"publisher","first-page":"2457","DOI":"10.32604\/cmc.2021.013852","volume":"66","author":"V Priya","year":"2021","unstructured":"Priya, V., Thaseen, I.S., Gadekallu, T.R., Aboudaif, M.K., Nasr, E.A.: Robust attack detection approach for IIoT using ensemble classifier. Comput. Mater. Continua 66(3), 2457\u20132470 (2021)","journal-title":"Comput. Mater. Continua"},{"key":"11_CR26","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1016\/j.future.2017.10.016","volume":"80","author":"SAR Shah","year":"2018","unstructured":"Shah, S.A.R., Issac, B.: Performance comparison of intrusion detection systems and application of machine learning to SNORT system. Future Gener. Comput. Syst. 80, 157\u2013170 (2018)","journal-title":"Future Gener. Comput. Syst."}],"container-title":["Lecture Notes in Networks and Systems","Distributed Computing and Artificial Intelligence, Volume 1: 18th International Conference"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-86261-9_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,8]],"date-time":"2023-01-08T11:58:43Z","timestamp":1673179123000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-86261-9_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,2]]},"ISBN":["9783030862602","9783030862619"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-86261-9_11","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2021,9,2]]},"assertion":[{"value":"2 September 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DCAI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Distributed Computing and Artificial Intelligence","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Salamanca","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 October 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 October 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dcai2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.dcai-conference.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}