{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T19:44:18Z","timestamp":1774899858844,"version":"3.50.1"},"reference-count":111,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100003725","name":"Basic Science Research Program through the National Research Foundation of Korea","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003621","name":"Ministry of Science and ICT","doi-asserted-by":"publisher","award":["NRF-2020R1F1A1075605"],"award-info":[{"award-number":["NRF-2020R1F1A1075605"]}],"id":[{"id":"10.13039\/501100003621","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/access.2020.3036037","type":"journal-article","created":{"date-parts":[[2020,11,5]],"date-time":"2020-11-05T20:27:05Z","timestamp":1604608025000},"page":"205948-205967","source":"Crossref","is-referenced-by-count":60,"title":["The Application of Machine Learning in Self-Adaptive Systems: A Systematic Literature Review"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9234-2889","authenticated-orcid":false,"given":"Theresia Ratih Dewi","family":"Saputri","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8569-0236","authenticated-orcid":false,"given":"Seok-Won","family":"Lee","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/2701126.2701191"},{"key":"ref38","article-title":"Automated software vulnerability detection with machine learning","author":"harer","year":"2018","journal-title":"arXiv 1803 04497"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/SEAMS.2007.6"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICAC.2018.00031"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/2593929.2593937"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-014-9305-0"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/CCDC.2014.6852575"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2016.125"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.05.046"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC.2010.107"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35813-5_9"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2013.37"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/DeSE.2011.109"},{"key":"ref20","first-page":"1","year":"2006","journal-title":"An architectural blueprint for autonomic computing"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2011.2136490"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2016.2645699"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2015.2433892"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35813-5"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2016.176"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1882291.1882296"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2018.01.009"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2008.01.006"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/1450579.1450586"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/SEAA.2015.48"},{"key":"ref59","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1038\/nature14539","article-title":"Deep learning","volume":"521","author":"lecun","year":"2015","journal-title":"Nature"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZY.2005.1452467"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2017.82"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/CCAA.2016.7813744"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2014.09.009"},{"key":"ref54","article-title":"Comparison of approaches for developing self-adaptive systems","author":"krupitzer","year":"2018"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/FAS-W.2018.00045"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28166-2_6"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/SEsCPS.2015.12"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2002.1021698"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2017.2769039"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SCC.2018.00010"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/COGSIMA.2017.7929586"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SASO.2009.25"},{"key":"ref49","first-page":"76","article-title":"Reinforcement learning-based dynamic adaptation planning method for architecture-based self-managed software","author":"kim","year":"2009","journal-title":"Proc ICSE Workshop Softw Eng Adapt Self-Manag Syst"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SEAMS.2013.6595498"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICISA.2014.6847354"},{"key":"ref46","first-page":"204","article-title":"Towards an intelligent security defense software&#x2019;s self-decision system","author":"jin-dong","year":"2010","journal-title":"Proc 2nd IEEE Int Conf Inf Manage Eng"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/S0004-3702(99)00107-1"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2003.1160055"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2017.06.030"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.196"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2015.07.004"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/SEAMS.2019.00015"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/2593929.2593940"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2019.04.011"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1145\/3194133.3194147"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/SEAMS.2019.00011"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/SEAMS.2013.6595494"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1145\/1516533.1516538"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/NAFIPS.2004.1336241"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/ICAC.2016.37"},{"key":"ref75","first-page":"65","article-title":"Reasoning non-functional requirements trade-off in self-adaptive systems using multi-entity Bayesian network modeling","volume":"24","author":"saeed","year":"2019","journal-title":"J Korean Soc Comput Inf"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/ICICTA.2009.125"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.01.032"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/2993717.2993731"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/2365324.2365335"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/1809085.1809089"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-C.2017.40"},{"key":"ref64","first-page":"20","author":"mendel","year":"2000","journal-title":"Uncertain Rule-Based Fuzzy Logic Systems Introduction and New Directions"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2019.00046"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/ICSA-C.2019.00050"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1007\/s11761-017-0222-0"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.10.031"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2593929.2593941"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1049\/ip-cdt:20020411"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICAS.2008.35"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1145\/1186778.1186782"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1145\/2677832.2677840"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02161-9_3"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSACW.2011.13"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/SASO.2014.36"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1145\/2020723.2020738"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/FAS-W.2018.00020"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2019.2897650"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1145\/2555611"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-04771-9_28"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35813-5_3"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1145\/2347583.2347592"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2893871"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/ICAC.2017.47"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1145\/3194133.3194145"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1145\/1137677.1137693"},{"key":"ref98","first-page":"108","article-title":"Hybrid prediction model for improving reliability in self-healing system","author":"yoo","year":"2006","journal-title":"Proc 4th Int Conf Softw Eng Res Manage Appl (SERA)"},{"key":"ref99","first-page":"582","article-title":"An agent-based self-adaptive mechanism with; Reinforcement learning","author":"yu","year":"2015","journal-title":"Proc IEEE 39th Annu Comput Softw Appl Conf"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-05843-6_5"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2015.2504350"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2006.07.009"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2897053.2897063"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568310"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.14236\/ewic\/EASE2010.17"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SEAMS.2013.6595491"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2608826"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3184407.3184413"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/FAS-W.2018.00048"},{"key":"ref17","article-title":"Self-learning and self-adaptive resource allocation for cloud-based software services","volume":"12","author":"chen","year":"2018","journal-title":"Concurrency Comput Pract Exper"},{"key":"ref81","first-page":"66","article-title":"Adaptive agent based system for state estimation using dynamic multidimensional information sources","author":"soto","year":"2001","journal-title":"Proceedings of the International Workshop on Self-Adaptive Software"},{"key":"ref18","first-page":"5525","article-title":"Software engineering for self-adaptive systems","author":"cheng","year":"2019","journal-title":"Proc LNCS"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1145\/1066677.1067023"},{"key":"ref19","first-page":"168","article-title":"Sass: Self-adaptation using stochastic search","author":"coker","year":"2018","journal-title":"Proc 10th Int Symp Softw Eng Adapt Self-Manag Syst"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.18293\/SEKE2019-009"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1145\/1321211.1321225"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/SEAMS.2012.6224395"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSACW.2012.38"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/ACC.2003.1243433"},{"key":"ref87","first-page":"331","article-title":"Multiagent systems: A modern approach to distributed artificial intelligence","volume":"1","author":"weiss","year":"2011","journal-title":"Int J Comput Intell Appl"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00262-6_11"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8948470\/09249012.pdf?arnumber=9249012","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T15:56:58Z","timestamp":1642003018000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9249012\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":111,"URL":"https:\/\/doi.org\/10.1109\/access.2020.3036037","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]}}}