{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T17:00:19Z","timestamp":1754154019428,"version":"3.41.2"},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,10,6]],"date-time":"2022-10-06T00:00:00Z","timestamp":1665014400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,10,6]],"date-time":"2022-10-06T00:00:00Z","timestamp":1665014400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,10,6]]},"DOI":"10.1109\/iccr56254.2022.9995941","type":"proceedings-article","created":{"date-parts":[[2023,1,3]],"date-time":"2023-01-03T16:53:52Z","timestamp":1672764832000},"page":"1-4","source":"Crossref","is-referenced-by-count":1,"title":["Retracted: Machine Learning in Healthcare Industry: An Analysis"],"prefix":"10.1109","author":[{"given":"Kanhaiya","family":"Jee","sequence":"first","affiliation":[{"name":"Chandigarh University,Department of Computer Science,Mohali,Punjab,India"}]},{"given":"Amanpreet","family":"Kaur","sequence":"additional","affiliation":[{"name":"Chandigarh University,Department of Computer Science,Mohali,Punjab,India"}]},{"given":"Abhishek","family":"Joshi","sequence":"additional","affiliation":[{"name":"Uttaranchal University,Dehradun,India,248007"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1161\/CIRCULATIONAHA.114.014508"},{"key":"ref2","first-page":"161","article-title":"An empirical comparison of supervised learning algorithms using different performance measurements","volume-title":"Proceedings of the 23rd worldwide social affair on AI","author":"Caruana","year":"2006"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICCMC.2019.8819782"},{"article-title":"In A, pages 2019-13, in MACSth International Conference on Mathematics, Actu-arial Science, Computer Science and Statistics","volume-title":"Proceedings 9024821, 2019. Proposing a Rank and Wormhole Attack Detection Framework using Machine Learning","author":"Jhanjhi","key":"ref4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-3153-5_49"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICRIEECE44171.2018.9008482"},{"issue":"3","key":"ref7","first-page":"2250","article-title":"Solving ipv4 (32 bits) address shortage problem using ipv6 (128 bits)","volume":"2","author":"Gupta","year":"2012","journal-title":"IJREISS"},{"issue":"3","key":"ref8","first-page":"2554","article-title":"Ideas on ad hoc networks and power aware networks","volume":"4","author":"Gupta","year":"2018","journal-title":"IJFRCSCE"},{"issue":"1","key":"ref9","first-page":"8","article-title":"A review of intrusion detection system using machine learning approach","volume":"12","author":"Kok","year":"2019","journal-title":"International Journal of Engineering Research and Technology"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICCTCT.2018.8550902"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.350"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICCUBEA.2018.8697386"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CINC.2010.5643830"},{"issue":"4","key":"ref14","first-page":"2321","article-title":"Figure of coronary sickness using multiple linear regression model","volume":"5","author":"Polaraju","year":"2017","journal-title":"International Diary of Engineering Development and Research"},{"key":"ref15","first-page":"796","article-title":"Similar assessment of ai assessments for chest compromising advancement presumption","volume-title":"Proceedings of the third International Conference on Smart Systems and Inventive Innovation","author":"Sengar","year":"2020"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICECA.2018.8474918"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.2478\/acss-2019-0002"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.jclinepi.2015.04.005"},{"issue":"5","key":"ref19","first-page":"2319","article-title":"Potential of replication in distibuted r.t.d.b","volume":"4","author":"Yadav","year":"2015","journal-title":"IJECS"}],"event":{"name":"2022 International Conference on Cyber Resilience (ICCR)","start":{"date-parts":[[2022,10,6]]},"location":"Dubai, United Arab Emirates","end":{"date-parts":[[2022,10,7]]}},"container-title":["2022 International Conference on Cyber Resilience (ICCR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9995718\/9995732\/09995941.pdf?arnumber=9995941","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,23]],"date-time":"2025-07-23T18:42:01Z","timestamp":1753296121000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9995941\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,6]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/iccr56254.2022.9995941","relation":{},"subject":[],"published":{"date-parts":[[2022,10,6]]}}}