{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T01:56:49Z","timestamp":1742954209382,"version":"3.40.3"},"publisher-location":"Cham","reference-count":52,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031541285"},{"type":"electronic","value":"9783031541292"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-54129-2_4","type":"book-chapter","created":{"date-parts":[[2024,3,11]],"date-time":"2024-03-11T22:03:15Z","timestamp":1710194595000},"page":"59-75","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Unravelling Network-Based Intrusion Detection: A Neutrosophic Rule Mining and Optimization Framework"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1693-7872","authenticated-orcid":false,"given":"Tiago Fontes","family":"Dias","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4968-3653","authenticated-orcid":false,"given":"Jo\u00e3o","family":"Vitorino","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5592-3107","authenticated-orcid":false,"given":"Tiago","family":"Fonseca","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2519-9859","authenticated-orcid":false,"given":"Isabel","family":"Pra\u00e7a","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8075-531X","authenticated-orcid":false,"given":"Eva","family":"Maia","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6464-3529","authenticated-orcid":false,"given":"Maria Jo\u00e3o","family":"Viamonte","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,3,12]]},"reference":[{"doi-asserted-by":"publisher","unstructured":"Zhang, Y., Breslau, L., Paxson, V., Shenker, S.: On the characteristics and origins of internet flow rates. In: Proceedings of the 2002 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications - SIGCOMM 2002 (2002). https:\/\/doi.org\/10.1145\/633025","key":"4_CR1","DOI":"10.1145\/633025"},{"key":"4_CR2","doi-asserted-by":"publisher","first-page":"157727","DOI":"10.1109\/ACCESS.2021.3129336","volume":"9","author":"M Ozkan-Okay","year":"2021","unstructured":"Ozkan-Okay, M., Samet, R., Aslan, O., Gupta, D.: A comprehensive systematic literature review on intrusion detection systems. IEEE Access 9, 157727\u2013157760 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3129336","journal-title":"IEEE Access"},{"issue":"1","key":"4_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/S42400-019-0038-7\/FIGURES\/8","volume":"2","author":"A Khraisat","year":"2019","unstructured":"Khraisat, A., Gondal, I., Vamplew, P., Kamruzzaman, J.: Survey of intrusion detection systems: techniques, datasets and challenges. Cybersecurity 2(1), 1\u201322 (2019). https:\/\/doi.org\/10.1186\/S42400-019-0038-7\/FIGURES\/8","journal-title":"Cybersecurity"},{"unstructured":"Waltl, B., Bonczek, G., Matthes, F.: Rule-based Information Extraction: Advantages, Limitations, and Perspectives, vol. 24, no. 2, p. 26 (2007)","key":"4_CR4"},{"doi-asserted-by":"publisher","unstructured":"Fallahi, N., Sami, A., Tajbakhsh, M.: Automated flow-based rule generation for network intrusion detection systems. In: 2016 24th Iranian Conference on Electrical Engineering, ICEE 2016, pp. 1948\u20131953 (2016). https:\/\/doi.org\/10.1109\/IranianCEE.2016.7585840","key":"4_CR5","DOI":"10.1109\/IranianCEE.2016.7585840"},{"unstructured":"Kong, H., Jong, C., Ryang, U.: Rare association rule mining for network intrusion detection, October 2016","key":"4_CR6"},{"issue":"1","key":"4_CR7","doi-asserted-by":"publisher","first-page":"253","DOI":"10.17482\/uumfd.747078","volume":"26","author":"AS Eesa","year":"2021","unstructured":"Eesa, A.S., Sadiq, S., Hassan, M., Orman, Z.: Rule generation based on modified cuttlefish algorithm for intrusion detection S. Uluda\u011f Univ. J. Faculty Eng. 26(1), 253\u2013268 (2021). https:\/\/doi.org\/10.17482\/uumfd.747078","journal-title":"Uluda\u011f Univ. J. Faculty Eng."},{"issue":"2","key":"4_CR8","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1111\/j.1468-0394.2007.00423.x","volume":"24","author":"J Prentzas","year":"2007","unstructured":"Prentzas, J., Hatzilygeroudis, I.: Categorizing approaches combining rule-based and case-based reasoning. Expert. Syst. 24(2), 97\u2013122 (2007). https:\/\/doi.org\/10.1111\/j.1468-0394.2007.00423.x","journal-title":"Expert. Syst."},{"doi-asserted-by":"publisher","unstructured":"Medsker, L.R., Bailey, D.L.: Models and guidelines for integrating expert systems and neural networks. In: Hybrid Architectures for Intelligent Systems, pp. 153\u2013171 (2020). https:\/\/doi.org\/10.1201\/9781003068075-9","key":"4_CR9","DOI":"10.1201\/9781003068075-9"},{"doi-asserted-by":"publisher","unstructured":"Dias, T., Oliveira, N., Sousa, N., Pra\u00e7a, I., Sousa, O.: A hybrid approach for an interpretable and explainable intrusion detection system. In: Lecture Notes in Networks and Systems, vol. 418 LNNS, pp. 1035\u20131045. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-030-96308-8_96\/COVER","key":"4_CR10","DOI":"10.1007\/978-3-030-96308-8_96\/COVER"},{"doi-asserted-by":"publisher","unstructured":"Dash, B., Farheen Ansari, M., Sharma, P., Ali, A.: Threats and opportunities with AI-based cyber security intrusion detection: a review. Int. J. Softw. Eng. Appl. (IJSEA) 13(5), 2022. https:\/\/doi.org\/10.5121\/ijsea.2022.13502","key":"4_CR11","DOI":"10.5121\/ijsea.2022.13502"},{"doi-asserted-by":"publisher","unstructured":"Sadiku, M.N.O., Fagbohungbe, O.I., Musa, S.M., Perry, R.G.: Artificial intelligence in cyber security. Int. J. Eng. Res. Adv. Technol. https:\/\/doi.org\/10.31695\/IJERAT.2020.3612","key":"4_CR12","DOI":"10.31695\/IJERAT.2020.3612"},{"issue":"8","key":"4_CR13","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1016\/S1361-3723(18)30073-3","volume":"2018","author":"G Smith","year":"2018","unstructured":"Smith, G.: The intelligent solution: automation, the skills shortage and cyber-security. Comp. Fraud Secur. 2018(8), 6\u20139 (2018). https:\/\/doi.org\/10.1016\/S1361-3723(18)30073-3","journal-title":"Comp. Fraud Secur."},{"doi-asserted-by":"publisher","unstructured":"Zhang, Z., al Hamadi, H., Damiani, E., Yeun, C.Y., Taher, F.: Explainable artificial intelligence applications in cyber security: state-of-the-art in research. IEEE Access 10, 93104\u201393139 (2022). https:\/\/doi.org\/10.1109\/ACCESS.2022.3204051","key":"4_CR14","DOI":"10.1109\/ACCESS.2022.3204051"},{"key":"4_CR15","doi-asserted-by":"publisher","first-page":"73127","DOI":"10.1109\/ACCESS.2020.2988359","volume":"8","author":"M Wang","year":"2020","unstructured":"Wang, M., Zheng, K., Yang, Y., Wang, X.: An explainable machine learning framework for intrusion detection systems. IEEE Access 8, 73127\u201373141 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.2988359","journal-title":"IEEE Access"},{"issue":"3","key":"4_CR16","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1609\/AIMAG.V17I3.1230","volume":"17","author":"U Fayyad","year":"1996","unstructured":"Fayyad, U., Piatetsky-Shapiro, G., Smyth, P.: From data mining to knowledge discovery in databases. AI Mag. 17(3), 37 (1996). https:\/\/doi.org\/10.1609\/AIMAG.V17I3.1230","journal-title":"AI Mag."},{"doi-asserted-by":"publisher","unstructured":"Mohan, L., Jain, S., Suyal, P., Kumar, A.: Data mining classification techniques for intrusion detection system. In: 2020 12th International Conference on Computational Intelligence and Communication Networks (CICN), Sep. 2020, pp. 351\u2013355 (2020) https:\/\/doi.org\/10.1109\/CICN49253.2020.9242642","key":"4_CR17","DOI":"10.1109\/CICN49253.2020.9242642"},{"key":"4_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/J.INS.2013.03.038","volume":"240","author":"A Cano","year":"2013","unstructured":"Cano, A., Zafra, A., Ventura, S.: An interpretable classification rule mining algorithm. Inf. Sci. (N Y) 240, 1\u201320 (2013). https:\/\/doi.org\/10.1016\/J.INS.2013.03.038","journal-title":"Inf. Sci. (N Y)"},{"doi-asserted-by":"publisher","unstructured":"Sharafaldin, I., Lashkari, A.H., Ghorbani, A.A.: Toward generating a new intrusion detection dataset and intrusion traffic characterization. In: ICISSP 2018 - Proceedings of the 4th International Conference on Information Systems Security and Privacy, vol. 2018-Janua, pp. 108\u2013116 (2018). https:\/\/doi.org\/10.5220\/0006639801080116","key":"4_CR19","DOI":"10.5220\/0006639801080116"},{"issue":"10","key":"4_CR20","doi-asserted-by":"publisher","first-page":"959","DOI":"10.1007\/s00500-008-0392-y","volume":"13","author":"S Garc\u00eda","year":"2009","unstructured":"Garc\u00eda, S., Fern\u00e1ndez, A., Luengo, J., Herrera, F.: A study of statistical techniques and performance measures for genetics-based machine learning: accuracy and interpretability. Soft. Comput. 13(10), 959\u2013977 (2009). https:\/\/doi.org\/10.1007\/s00500-008-0392-y","journal-title":"Soft. Comput."},{"unstructured":"Lu, H., Setiono, R., Liu, H.: NeuroRule: a connectionist approach to data mining (2017)","key":"4_CR21"},{"issue":"2","key":"4_CR22","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1016\/J.INS.2004.03.002","volume":"162","author":"S Tsumoto","year":"2004","unstructured":"Tsumoto, S.: Mining diagnostic rules from clinical databases using rough sets and medical diagnostic model. Inform. Sci. Inform. Comp. Sci. Intell. Syst. Appl. Int. J. 162(2), 65\u201380 (2004). https:\/\/doi.org\/10.1016\/J.INS.2004.03.002","journal-title":"Inform. Sci. Inform. Comp. Sci. Intell. Syst. Appl. Int. J."},{"doi-asserted-by":"publisher","unstructured":"Vitorino, J., Andrade, R., Pra\u00e7a, I., Sousa, O., Maia, E.: A comparative analysis of machine learning techniques for IoT intrusion detection, pp. 191\u2013207 (2022). https:\/\/doi.org\/10.1007\/978-3-031-08147-7_13","key":"4_CR23","DOI":"10.1007\/978-3-031-08147-7_13"},{"issue":"1","key":"4_CR24","doi-asserted-by":"publisher","first-page":"17","DOI":"10.3390\/a13010017","volume":"13","author":"E Pintelas","year":"2020","unstructured":"Pintelas, E., Livieris, I.E., Pintelas, P.: A grey-box ensemble model exploiting black-box accuracy and white-box intrinsic interpretability. Algorithms 13(1), 17 (2020). https:\/\/doi.org\/10.3390\/a13010017","journal-title":"Algorithms"},{"doi-asserted-by":"publisher","unstructured":"Gandhi, K.R., Karnan, M., Kannan, S.: Classification rule construction using particle swarm optimization algorithm for breast cancer data sets. In: 2010 International Conference on Signal Acquisition and Processing, ICSAP 2010, pp. 233\u2013237 (2010). https:\/\/doi.org\/10.1109\/ICSAP.2010.58","key":"4_CR25","DOI":"10.1109\/ICSAP.2010.58"},{"unstructured":"Islam, N., Abu, Farid, T.: Crime Prediction Using Classification Rule Mining (2018)","key":"4_CR26"},{"issue":"81","key":"4_CR27","first-page":"4033","volume":"6","author":"M Al-Diabat","year":"2012","unstructured":"Al-Diabat, M.: Arabic text categorization using classification rule mining. Appl. Math. Sci. 6(81), 4033\u20134046 (2012)","journal-title":"Appl. Math. Sci."},{"unstructured":"Han, J., Kamber, M., Pei, J.: Data Mining. Concepts and Techniques, 3rd Edition (The Morgan Kaufmann Series in Data Management Systems) (2011)","key":"4_CR28"},{"doi-asserted-by":"publisher","unstructured":"Bo, L., Abbas, H.A., McKay, B.: Classification rule discovery with ant colony optimization. In: IEEE\/WIC International Conference on Intelligent Agent Technology, 2003. IAT 2003, pp. 83\u201388 (2003) https:\/\/doi.org\/10.1109\/IAT.2003.1241052","key":"4_CR29","DOI":"10.1109\/IAT.2003.1241052"},{"doi-asserted-by":"publisher","unstructured":"Wang, Z., Feng, B.: Classification rule mining with an improved ant colony algorithm. In: Lecture Notes in Artificial Intelligence (Subseries of Lecture Notes in Computer Science), vol. 3339, pp. 357\u2013367 (2004).https:\/\/doi.org\/10.1007\/978-3-540-30549-1_32","key":"4_CR30","DOI":"10.1007\/978-3-540-30549-1_32"},{"doi-asserted-by":"publisher","unstructured":"Wang, Z., Sun, X., Zhang, D.: Classification rule mining based on particle swarm optimization. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 4062 LNAI, pp. 436\u2013441 (2006). https:\/\/doi.org\/10.1007\/11795131_63","key":"4_CR31","DOI":"10.1007\/11795131_63"},{"doi-asserted-by":"publisher","unstructured":"Li, X., Qian, X., Wang, Z.: Classification rule mining using feature selection and genetic algorithm. In: PACIIA 2009 - 2009 2nd Asia-Pacific Conference on Computational Intelligence and Industrial Applications, vol. 2, pp. 107\u2013110 (2009). https:\/\/doi.org\/10.1109\/PACIIA.2009.5406606","key":"4_CR32","DOI":"10.1109\/PACIIA.2009.5406606"},{"issue":"9","key":"4_CR33","doi-asserted-by":"publisher","first-page":"2373","DOI":"10.1016\/j.patcog.2006.12.009","volume":"40","author":"C-H Tsang","year":"2007","unstructured":"Tsang, C.-H., Kwong, S., Wang, H.: Genetic-fuzzy rule mining approach and evaluation of feature selection techniques for anomaly intrusion detection. Pattern Recogn. 40(9), 2373\u20132391 (2007). https:\/\/doi.org\/10.1016\/j.patcog.2006.12.009","journal-title":"Pattern Recogn."},{"doi-asserted-by":"publisher","unstructured":"Dartigue, C., Jang, H.I., Zeng, W.: A new data-mining based approach for network intrusion detection. In: 2009 Seventh Annual Communication Networks and Services Research Conference, May 2009, pp. 372\u2013377. https:\/\/doi.org\/10.1109\/CNSR.2009.64","key":"4_CR34","DOI":"10.1109\/CNSR.2009.64"},{"unstructured":"Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.A.: A Detailed Analysis of the KDD CUP 99 Data Set\u201d","key":"4_CR35"},{"doi-asserted-by":"publisher","unstructured":"Almseidin, M., Alzubi, M., Kovacs, S., Alkasassbeh, M.: Evaluation of machine learning algorithms for intrusion detection system. In: 2017 IEEE 15th International Symposium on Intelligent Systems and Informatics (SISY), Sep. 2017, pp. 000277\u2013000282. https:\/\/doi.org\/10.1109\/SISY.2017.8080566","key":"4_CR36","DOI":"10.1109\/SISY.2017.8080566"},{"issue":"20","key":"4_CR37","doi-asserted-by":"publisher","first-page":"4396","DOI":"10.3390\/app9204396","volume":"9","author":"H Liu","year":"2019","unstructured":"Liu, H., Lang, B.: Machine learning and deep learning methods for intrusion detection systems: a survey. Appl. Sci. 9(20), 4396 (2019). https:\/\/doi.org\/10.3390\/app9204396","journal-title":"Appl. Sci."},{"issue":"4","key":"4_CR38","doi-asserted-by":"publisher","first-page":"1674","DOI":"10.3390\/app11041674","volume":"11","author":"N Oliveira","year":"2021","unstructured":"Oliveira, N., Pra\u00e7a, I., Maia, E., Sousa, O.: Intelligent cyber attack detection and classification for network-based intrusion detection systems. Appl. Sci. 11(4), 1674 (2021). https:\/\/doi.org\/10.3390\/app11041674","journal-title":"Appl. Sci."},{"doi-asserted-by":"publisher","unstructured":"Carneiro, J., Oliveira, N., Sousa, N., Maia, E., Pra\u00e7a, I.: Machine learning for network-based intrusion detection systems: an analysis of the CIDDS-001 dataset (2022), pp. 148\u2013158. https:\/\/doi.org\/10.1007\/978-3-030-86261-9_15","key":"4_CR39","DOI":"10.1007\/978-3-030-86261-9_15"},{"doi-asserted-by":"publisher","unstructured":"Hassan, M.M.M.: Current studies on intrusion detection system, genetic algorithm and fuzzy logic. Int. J. Distrib. Parallel Syst. (IJDPS) 4(2) (2013). https:\/\/doi.org\/10.5121\/ijdps.2013.4204","key":"4_CR40","DOI":"10.5121\/ijdps.2013.4204"},{"unstructured":"Abdalla, A.: Different methodologies in treating uncertainty. In: IMSCI 2018 - 12th International Multi-Conference on Society, Cybernetics and Informatics, Proceedings, vol. 1, no. July, pp. 59\u201364 (2018)","key":"4_CR41"},{"doi-asserted-by":"publisher","unstructured":"Jain, A., Pal Nandi, B.: Intuitionistic and neutrosophic fuzzy logic: basic concepts and applications. Stud. Comput. Intell. 827, 3\u201318 (2020). https:\/\/doi.org\/10.1007\/978-3-030-34135-0_1\/COVER","key":"4_CR42","DOI":"10.1007\/978-3-030-34135-0_1\/COVER"},{"key":"4_CR43","first-page":"3","volume":"11","author":"N Radwan","year":"2016","unstructured":"Radwan, N., Senousy, M.B., Riad, A.E.D.M.: Neutrosophic logic approach for evaluating learning management systems. Neutrosophic Sets Syst. 11, 3\u20137 (2016)","journal-title":"Neutrosophic Sets Syst."},{"issue":"14","key":"4_CR44","doi-asserted-by":"publisher","first-page":"1860","DOI":"10.1016\/j.fss.2007.11.011","volume":"159","author":"U Rivieccio","year":"2008","unstructured":"Rivieccio, U.: Neutrosophic logics: prospects and problems. Fuzzy Sets Syst. 159(14), 1860\u20131868 (2008). https:\/\/doi.org\/10.1016\/j.fss.2007.11.011","journal-title":"Fuzzy Sets Syst."},{"doi-asserted-by":"publisher","unstructured":"Kavitha, B., Karthikeyan, D.S., Sheeba Maybell, P.: An ensemble design of intrusion detection system for handling uncertainty using Neutrosophic Logic Classifier. Knowl Based Syst. 28, 88\u201396 (2012). https:\/\/doi.org\/10.1016\/J.KNOSYS.2011.12.004","key":"4_CR45","DOI":"10.1016\/J.KNOSYS.2011.12.004"},{"unstructured":"Gardin, F., Gautier, R., Goix, N., Ndiaye, B., Schertzer, J.-M.: Skope-Rules Algorithm. https:\/\/skope-rules.readthedocs.io\/en\/latest\/. Accessed 30 Sep 2022","key":"4_CR46"},{"key":"4_CR47","doi-asserted-by":"publisher","first-page":"154096","DOI":"10.1109\/ACCESS.2019.2949286","volume":"7","author":"O Loyola-Gonzalez","year":"2019","unstructured":"Loyola-Gonzalez, O.: Black-box vs. White-Box: understanding their advantages and weaknesses from a practical point of view. IEEE Access 7, 154096\u2013154113 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2949286","journal-title":"IEEE Access"},{"issue":"1","key":"4_CR48","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman, L.: Random forests. Mach. Learn. 45(1), 5\u201332 (2001). https:\/\/doi.org\/10.1023\/A:1010933404324","journal-title":"Mach. Learn."},{"issue":"3","key":"4_CR49","doi-asserted-by":"publisher","first-page":"1170","DOI":"10.1016\/J.APM.2013.07.020","volume":"38","author":"J Ye","year":"2014","unstructured":"Ye, J.: Single valued neutrosophic cross-entropy for multicriteria decision making problems. Appl. Math. Model. 38(3), 1170\u20131175 (2014). https:\/\/doi.org\/10.1016\/J.APM.2013.07.020","journal-title":"Appl. Math. Model."},{"doi-asserted-by":"crossref","unstructured":"Sharafaldin, I., Lashkai, A.H., Ghorbani, A.A.: IDS 2017 | Datasets | Research | Canadian Institute for Cybersecurity | UNB. Canadian Institute for Cybersecurity (2018). https:\/\/www.unb.ca\/cic\/datasets\/ids-2017.html","key":"4_CR50","DOI":"10.13052\/jsn2445-9739.2017.009"},{"doi-asserted-by":"publisher","unstructured":"Engelen, G., Rimmer, V., Joosen, W.: Troubleshooting an intrusion detection dataset: the CICIDS2017 case study. In: 2021 IEEE Security and Privacy Workshops (SPW), May 2021, pp. 7\u201312 (2021). https:\/\/doi.org\/10.1109\/SPW53761.2021.00009","key":"4_CR51","DOI":"10.1109\/SPW53761.2021.00009"},{"doi-asserted-by":"crossref","unstructured":"Lanvin, M., Gimenez, P.-F., Han, Y., Majorczyk, F., M\u00e9, L., Totel, E.: Errors in the CICIDS2017 dataset and the significant differences in detection performances it makes, pp. 1\u201316 (2023). https:\/\/hal.science\/hal-03775466","key":"4_CR52","DOI":"10.1007\/978-3-031-31108-6_2"}],"container-title":["Lecture Notes in Computer Science","Computer Security. ESORICS 2023 International Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-54129-2_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,11]],"date-time":"2024-03-11T22:03:43Z","timestamp":1710194623000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-54129-2_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031541285","9783031541292"],"references-count":52,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-54129-2_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"12 March 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESORICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Symposium on Research in Computer Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The Hague","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The Netherlands","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 September 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 September 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esorics2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/esorics2023.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"478","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"93","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"19% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3-4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"10","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}