{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,29]],"date-time":"2024-08-29T07:12:14Z","timestamp":1724915534846},"reference-count":57,"publisher":"Informa UK Limited","issue":"5","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Information Security Journal: A Global Perspective"],"published-print":{"date-parts":[[2024,9,2]]},"DOI":"10.1080\/19393555.2024.2338438","type":"journal-article","created":{"date-parts":[[2024,4,12]],"date-time":"2024-04-12T17:28:27Z","timestamp":1712942907000},"page":"528-545","update-policy":"http:\/\/dx.doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":1,"title":["A new early warning system based on metaheuristics in CPS architecture"],"prefix":"10.1080","volume":"33","author":[{"given":"Anwer","family":"Mbiriki","sequence":"first","affiliation":[{"name":"LARODEC, Institut Sup\u00e9rieur de Gestion de Tunis, Le Bardo, Tunisie"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Chaker","family":"Katar","sequence":"additional","affiliation":[{"name":"LARODEC, Institut Sup\u00e9rieur de Gestion de Tunis, Le Bardo, Tunisie"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ahmed","family":"Badreddine","sequence":"additional","affiliation":[{"name":"LARODEC, Institut Sup\u00e9rieur de Gestion de Tunis, Le Bardo, Tunisie"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"301","published-online":{"date-parts":[[2024,4,12]]},"reference":[{"key":"e_1_3_2_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2018.8619332"},{"key":"e_1_3_2_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-813314-9.00010-4"},{"key":"e_1_3_2_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2960925"},{"key":"e_1_3_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2903568"},{"key":"e_1_3_2_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.04.005"},{"key":"e_1_3_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/MATHIT.2017.8259708"},{"key":"e_1_3_2_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/11962977_9"},{"key":"e_1_3_2_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2013.2291004"},{"key":"e_1_3_2_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.1991.169756"},{"key":"e_1_3_2_11_1","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2017.7927154"},{"key":"e_1_3_2_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SmartIoT.2018.00036"},{"key":"e_1_3_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/502512.502549"},{"key":"e_1_3_2_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2017.10.009"},{"key":"e_1_3_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/NAFIPS.2004.1336254"},{"key":"e_1_3_2_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/0167-7152(88)90004-1"},{"key":"e_1_3_2_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2019.09.013"},{"key":"e_1_3_2_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2019.09.013"},{"key":"e_1_3_2_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-020-03296-w"},{"key":"e_1_3_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACOSIS.2016.7843930"},{"key":"e_1_3_2_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2703906"},{"key":"e_1_3_2_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2007.08.049"},{"key":"e_1_3_2_23_1","first-page":"21","volume-title":"Proceedings of the 1st pacific-asia conference on knowledge discovery and data mining,(PAKDD)","author":"Huang Z.","year":"1997","unstructured":"Huang, Z. (1997, February). Clustering large data sets with mixed numeric and categorical values. Proceedings of the 1st pacific-asia conference on knowledge discovery and data mining,(PAKDD) (pp. 21\u201334), Singapore."},{"key":"e_1_3_2_24_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1009769707641"},{"key":"e_1_3_2_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2994813"},{"key":"e_1_3_2_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICICIP.2011.6008428"},{"key":"e_1_3_2_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2016.08.001"},{"key":"e_1_3_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISGT.2017.8085965"},{"key":"e_1_3_2_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00161577"},{"key":"e_1_3_2_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2002.1019208"},{"key":"e_1_3_2_31_1","doi-asserted-by":"publisher","DOI":"10.1063\/1.4982543"},{"key":"e_1_3_2_32_1","doi-asserted-by":"publisher","DOI":"10.14257\/ijsia.2015.9.7.01"},{"issue":"2","key":"e_1_3_2_33_1","first-page":"1","article-title":"Hybrid intrusion detection system using artificial bee colony algorithm and multi-layer perceptron","volume":"13","author":"Mahmod M. S.","year":"2015","unstructured":"Mahmod, M. S., Alnaish, Z. A. H., & Al-Hadi, I. A. A. (2015). Hybrid intrusion detection system using artificial bee colony algorithm and multi-layer perceptron. International Journal of Computer Science and Information Security, 13(2), 1.","journal-title":"International Journal of Computer Science and Information Security"},{"key":"e_1_3_2_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/WSOM.2017.8020025"},{"key":"e_1_3_2_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2018.03.011"},{"key":"e_1_3_2_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02294245"},{"key":"e_1_3_2_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2022.04.004"},{"key":"e_1_3_2_38_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1475-4754.1983.tb00671.x"},{"key":"e_1_3_2_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3088763"},{"key":"e_1_3_2_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2014.08.011"},{"key":"e_1_3_2_41_1","first-page":"1967","volume-title":"IJCAI","author":"Rajan V.","year":"2016","unstructured":"Rajan, V., & Bhattacharya, S. (2016, January). Dependency clustering of mixed data with gaussian mixture copulas. IJCAI (pp. 1967\u20131973), New York City."},{"key":"e_1_3_2_42_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1647"},{"key":"e_1_3_2_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASPDAC.2017.7858319"},{"key":"e_1_3_2_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICOEI.2017.8300843"},{"key":"e_1_3_2_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/AICCSA47632.2019.9035238"},{"key":"e_1_3_2_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-023-01507-8"},{"key":"e_1_3_2_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSP.2015.7322612"},{"key":"e_1_3_2_49_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-47358-7_52"},{"key":"e_1_3_2_50_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2017.08.004"},{"key":"e_1_3_2_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/IWACI.2010.5585107"},{"key":"e_1_3_2_52_1","doi-asserted-by":"publisher","DOI":"10.1007\/s40565-019-0500-2"},{"key":"e_1_3_2_53_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-017-0874-1"},{"key":"e_1_3_2_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2017.2781198"},{"key":"e_1_3_2_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2012.2188509"},{"key":"e_1_3_2_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSCSE.2016.0093"},{"key":"e_1_3_2_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNEA.2017.96"},{"key":"e_1_3_2_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2159818"},{"key":"e_1_3_2_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2017.2738605"}],"container-title":["Information Security Journal: A Global Perspective"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/19393555.2024.2338438","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,27]],"date-time":"2024-08-27T00:31:18Z","timestamp":1724718678000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/19393555.2024.2338438"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,12]]},"references-count":57,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2024,9,2]]}},"alternative-id":["10.1080\/19393555.2024.2338438"],"URL":"https:\/\/doi.org\/10.1080\/19393555.2024.2338438","relation":{},"ISSN":["1939-3555","1939-3547"],"issn-type":[{"type":"print","value":"1939-3555"},{"type":"electronic","value":"1939-3547"}],"subject":[],"published":{"date-parts":[[2024,4,12]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uiss20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uiss20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2024-04-12","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}