{"id":"https://openalex.org/W2937220155","doi":"https://doi.org/10.3390/sym11040583","title":"A Scalable and Hybrid Intrusion Detection System Based on the Convolutional-LSTM Network","display_name":"A Scalable and Hybrid Intrusion Detection System Based on the Convolutional-LSTM Network","publication_year":2019,"publication_date":"2019-04-22","ids":{"openalex":"https://openalex.org/W2937220155","doi":"https://doi.org/10.3390/sym11040583","mag":"2937220155"},"language":"en","primary_location":{"id":"doi:10.3390/sym11040583","is_oa":true,"landing_page_url":"https://doi.org/10.3390/sym11040583","pdf_url":"https://www.mdpi.com/2073-8994/11/4/583/pdf?version=1556093566","source":{"id":"https://openalex.org/S190787756","display_name":"Symmetry","issn_l":"2073-8994","issn":["2073-8994"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Symmetry","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2073-8994/11/4/583/pdf?version=1556093566","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5030511916","display_name":"Muhammad Ashfaq Khan","orcid":"https://orcid.org/0000-0001-9664-2734"},"institutions":[{"id":"https://openalex.org/I205490536","display_name":"Dongguk University","ror":"https://ror.org/057q6n778","country_code":"KR","type":"education","lineage":["https://openalex.org/I205490536"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Muhammad Khan","raw_affiliation_strings":["Department of Information and Communication Engineering, Dongguk University, 30-Pildong-ro 1-gil, Jung-gu, Seoul 100-715, Korea"],"affiliations":[{"raw_affiliation_string":"Department of Information and Communication Engineering, Dongguk University, 30-Pildong-ro 1-gil, Jung-gu, Seoul 100-715, Korea","institution_ids":["https://openalex.org/I205490536"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5114549797","display_name":"Md. Rezaul Karim","orcid":"https://orcid.org/0000-0001-6804-9183"},"institutions":[{"id":"https://openalex.org/I4210110507","display_name":"Fraunhofer Institute for Applied Information Technology","ror":"https://ror.org/01ak24c12","country_code":"DE","type":"facility","lineage":["https://openalex.org/I4210110507","https://openalex.org/I4923324"]},{"id":"https://openalex.org/I887968799","display_name":"RWTH Aachen University","ror":"https://ror.org/04xfq0f34","country_code":"DE","type":"education","lineage":["https://openalex.org/I887968799"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Md. Karim","raw_affiliation_strings":["Chair of Computer Science 5, RWTH Aachen University, 52074 Aachen, Germany","Fraunhofer Institute for Applied Information Technology FIT, 53754 Sankt Augustin, Germany"],"affiliations":[{"raw_affiliation_string":"Chair of Computer Science 5, RWTH Aachen University, 52074 Aachen, Germany","institution_ids":["https://openalex.org/I887968799"]},{"raw_affiliation_string":"Fraunhofer Institute for Applied Information Technology FIT, 53754 Sankt Augustin, Germany","institution_ids":["https://openalex.org/I4210110507"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5052094063","display_name":"Yangwoo Kim","orcid":"https://orcid.org/0000-0002-4038-3267"},"institutions":[{"id":"https://openalex.org/I205490536","display_name":"Dongguk University","ror":"https://ror.org/057q6n778","country_code":"KR","type":"education","lineage":["https://openalex.org/I205490536"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Yangwoo Kim","raw_affiliation_strings":["Department of Information and Communication Engineering, Dongguk University, 30-Pildong-ro 1-gil, Jung-gu, Seoul 100-715, Korea"],"affiliations":[{"raw_affiliation_string":"Department of Information and Communication Engineering, Dongguk University, 30-Pildong-ro 1-gil, Jung-gu, Seoul 100-715, Korea","institution_ids":["https://openalex.org/I205490536"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5052094063"],"corresponding_institution_ids":["https://openalex.org/I205490536"],"apc_list":{"value":2000,"currency":"CHF","value_usd":2165},"apc_paid":{"value":2000,"currency":"CHF","value_usd":2165},"fwci":16.3437,"has_fulltext":true,"cited_by_count":174,"citation_normalized_percentile":{"value":0.99326654,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":100},"biblio":{"volume":"11","issue":"4","first_page":"583","last_page":"583"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8873201012611389},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.7857987284660339},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7469785809516907},{"id":"https://openalex.org/keywords/spark","display_name":"SPARK (programming language)","score":0.6125380396842957},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.509786069393158},{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.4732656478881836},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.460018128156662},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.44774043560028076},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.44509634375572205},{"id":"https://openalex.org/keywords/anomaly-based-intrusion-detection-system","display_name":"Anomaly-based intrusion detection system","score":0.44495901465415955},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4441129267215729},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.4255616366863251},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.24734720587730408},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.09673610329627991}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8873201012611389},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.7857987284660339},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7469785809516907},{"id":"https://openalex.org/C2781215313","wikidata":"https://www.wikidata.org/wiki/Q3493345","display_name":"SPARK (programming language)","level":2,"score":0.6125380396842957},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.509786069393158},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.4732656478881836},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.460018128156662},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.44774043560028076},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.44509634375572205},{"id":"https://openalex.org/C137524506","wikidata":"https://www.wikidata.org/wiki/Q2247688","display_name":"Anomaly-based intrusion detection system","level":3,"score":0.44495901465415955},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4441129267215729},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.4255616366863251},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.24734720587730408},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.09673610329627991},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.0}],"mesh":[],"locations_count":6,"locations":[{"id":"doi:10.3390/sym11040583","is_oa":true,"landing_page_url":"https://doi.org/10.3390/sym11040583","pdf_url":"https://www.mdpi.com/2073-8994/11/4/583/pdf?version=1556093566","source":{"id":"https://openalex.org/S190787756","display_name":"Symmetry","issn_l":"2073-8994","issn":["2073-8994"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Symmetry","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:08bd9508df6c451fa362155ac8c4d6da","is_oa":true,"landing_page_url":"https://doaj.org/article/08bd9508df6c451fa362155ac8c4d6da","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Symmetry, Vol 11, Iss 4, p 583 (2019)","raw_type":"article"},{"id":"pmh:oai:fraunhofer.de:N-558728","is_oa":true,"landing_page_url":"http://publica.fraunhofer.de/documents/N-558728.html","pdf_url":null,"source":{"id":"https://openalex.org/S4306400801","display_name":"Publikationsdatenbank der Fraunhofer-Gesellschaft (Fraunhofer-Gesellschaft)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4923324","host_organization_name":"Fraunhofer-Gesellschaft","host_organization_lineage":["https://openalex.org/I4923324"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Fraunhofer FIT","raw_type":"Journal Article"},{"id":"pmh:oai:mdpi.com:/2073-8994/11/4/583/","is_oa":true,"landing_page_url":"https://dx.doi.org/10.3390/sym11040583","pdf_url":null,"source":{"id":"https://openalex.org/S4306400947","display_name":"MDPI (MDPI AG)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210097602","host_organization_name":"Multidisciplinary Digital Publishing Institute (Switzerland)","host_organization_lineage":["https://openalex.org/I4210097602"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Symmetry","raw_type":"Text"},{"id":"pmh:oai:publica.fraunhofer.de:publica/259686","is_oa":false,"landing_page_url":"https://publica.fraunhofer.de/handle/publica/259686","pdf_url":null,"source":{"id":"https://openalex.org/S4306400318","display_name":"Fraunhofer-Publica (Fraunhofer-Gesellschaft)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4923324","host_organization_name":"Fraunhofer-Gesellschaft","host_organization_lineage":["https://openalex.org/I4923324"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"journal article"},{"id":"pmh:oai:publications.rwth-aachen.de:761727","is_oa":true,"landing_page_url":"https://publications.rwth-aachen.de/record/761727","pdf_url":null,"source":{"id":"https://openalex.org/S4306401033","display_name":"RWTH Publications (RWTH Aachen)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I887968799","host_organization_name":"RWTH Aachen University","host_organization_lineage":["https://openalex.org/I887968799"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Symmetry 11(4), 583 (2019). doi:10.3390/sym11040583","raw_type":"info:eu-repo/semantics/article"}],"best_oa_location":{"id":"doi:10.3390/sym11040583","is_oa":true,"landing_page_url":"https://doi.org/10.3390/sym11040583","pdf_url":"https://www.mdpi.com/2073-8994/11/4/583/pdf?version=1556093566","source":{"id":"https://openalex.org/S190787756","display_name":"Symmetry","issn_l":"2073-8994","issn":["2073-8994"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Symmetry","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.6399999856948853}],"awards":[{"id":"https://openalex.org/G1739134435","display_name":null,"funder_award_id":"IITP-","funder_id":"https://openalex.org/F4320324891","funder_display_name":"Iran Telecommunication Research Center"},{"id":"https://openalex.org/G266217951","display_name":null,"funder_award_id":"IITP-2018","funder_id":"https://openalex.org/F4320328359","funder_display_name":"Ministry of Science and ICT, South Korea"}],"funders":[{"id":"https://openalex.org/F4320324891","display_name":"Iran Telecommunication Research Center","ror":"https://ror.org/01a3g2z22"},{"id":"https://openalex.org/F4320328359","display_name":"Ministry of Science and ICT, South Korea","ror":"https://ror.org/01wpjm123"},{"id":"https://openalex.org/F4320335489","display_name":"Institute for Information and Communications Technology Promotion","ror":"https://ror.org/01g0hqq23"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2937220155.pdf","grobid_xml":"https://content.openalex.org/works/W2937220155.grobid-xml"},"referenced_works_count":54,"referenced_works":["https://openalex.org/W135902891","https://openalex.org/W1543152427","https://openalex.org/W1544101352","https://openalex.org/W1577117059","https://openalex.org/W1598796236","https://openalex.org/W1671156703","https://openalex.org/W1811853421","https://openalex.org/W1851171594","https://openalex.org/W1995678176","https://openalex.org/W2005536871","https://openalex.org/W2009058336","https://openalex.org/W2031163547","https://openalex.org/W2057039461","https://openalex.org/W2064675550","https://openalex.org/W2066832805","https://openalex.org/W2078559757","https://openalex.org/W2088476668","https://openalex.org/W2097034581","https://openalex.org/W2100537916","https://openalex.org/W2103024672","https://openalex.org/W2120685459","https://openalex.org/W2136922672","https://openalex.org/W2141254179","https://openalex.org/W2160598920","https://openalex.org/W2161565164","https://openalex.org/W2166015814","https://openalex.org/W2250966211","https://openalex.org/W2281706614","https://openalex.org/W2289716850","https://openalex.org/W2399941526","https://openalex.org/W2512144135","https://openalex.org/W2528521450","https://openalex.org/W2546875627","https://openalex.org/W2547629195","https://openalex.org/W2560413256","https://openalex.org/W2562189182","https://openalex.org/W2565788054","https://openalex.org/W2598811698","https://openalex.org/W2738328309","https://openalex.org/W2762776925","https://openalex.org/W2775103799","https://openalex.org/W2809706118","https://openalex.org/W2889165715","https://openalex.org/W2893365799","https://openalex.org/W2896752973","https://openalex.org/W4245460974","https://openalex.org/W4285719527","https://openalex.org/W6637079174","https://openalex.org/W6638363044","https://openalex.org/W6638782365","https://openalex.org/W6677718073","https://openalex.org/W6696884929","https://openalex.org/W6730442478","https://openalex.org/W7018722687"],"related_works":["https://openalex.org/W2337148208","https://openalex.org/W3004832009","https://openalex.org/W3036013726","https://openalex.org/W1971929717","https://openalex.org/W2355532322","https://openalex.org/W2061466315","https://openalex.org/W2368329025","https://openalex.org/W3157271777","https://openalex.org/W2534684341","https://openalex.org/W1485296229"],"abstract_inverted_index":{"With":[0],"the":[1,106,142,160,171,175,198,219],"rapid":[2],"advancements":[3],"of":[4,13,214,234],"ubiquitous":[5],"information":[6],"and":[7,17,47,71,76,99,111,140,144,150,159,205,236],"communication":[8],"technologies,":[9],"a":[10,35,52,116,148,167,190],"large":[11],"number":[12],"trustworthy":[14],"online":[15],"systems":[16,58],"services":[18],"have":[19],"been":[20],"deployed.":[21],"However,":[22],"cybersecurity":[23],"threats":[24],"are":[25,60,84,133],"still":[26],"mounting.":[27],"An":[28],"intrusion":[29,66],"detection":[30,67,177,192],"(ID)":[31],"system":[32,50,68],"can":[33,120,210,227],"play":[34],"significant":[36],"role":[37],"in":[38,63,218,232],"detecting":[39],"such":[40,201],"security":[41,78],"threats.":[42],"Thus,":[43],"developing":[44],"an":[45],"intelligent":[46],"accurate":[48,96],"ID":[49,57,169],"is":[51,154,166,180,195],"non-trivial":[53],"research":[54],"problem.":[55],"Existing":[56],"that":[59,91,202,223],"typically":[61],"used":[62],"traditional":[64],"network":[65,118,229],"often":[69,126],"fail":[70,127],"cannot":[72],"detect":[73],"many":[74,102],"known":[75,103],"new":[77],"threats,":[79],"largely":[80],"because":[81],"those":[82],"approaches":[83,125,239],"based":[85,155,181,196],"on":[86,95,156,182,197],"classical":[87],"machine":[88],"learning":[89],"methods":[90],"provide":[92],"less":[93],"focus":[94],"feature":[97],"selection":[98],"classification.":[100],"Consequently,":[101],"signatures":[104,209],"from":[105],"attack":[107],"traffic":[108],"remain":[109],"unidentifiable":[110],"become":[112],"latent.":[113],"Furthermore,":[114],"since":[115],"massive":[117],"infrastructure":[119],"produce":[121],"large-scale":[122],"data,":[123],"these":[124,138],"to":[128],"handle":[129],"them":[130],"flexibly,":[131],"hence":[132],"not":[134],"scalable.":[135],"To":[136],"address":[137],"issues":[139],"improve":[141],"accuracy":[143],"scalability,":[145],"we":[146],"propose":[147],"scalable":[149],"hybrid":[151,225],"IDS,":[152],"which":[153,179,194],"Spark":[157,183],"ML":[158],"convolutional-LSTM":[161],"(Conv-LSTM)":[162],"network.":[163],"This":[164],"IDS":[165,226],"two-stage":[168],"system:":[170],"first":[172],"stage":[173,187],"employs":[174],"anomaly":[176],"module,":[178,193],"ML.":[184],"The":[185],"second":[186],"acts":[188],"as":[189],"misuse":[191],"Conv-LSTM":[199],"network,":[200],"both":[203],"global":[204],"local":[206],"latent":[207],"threat":[208],"be":[211],"addressed.":[212],"Evaluations":[213],"several":[215],"baseline":[216],"models":[217],"ISCX-UNB":[220],"dataset":[221],"show":[222],"our":[224],"identify":[228],"misuses":[230],"accurately":[231],"97.29%":[233],"cases":[235],"outperforms":[237],"state-of-the-art":[238],"during":[240],"10-fold":[241],"cross-validation":[242],"tests.":[243]},"counts_by_year":[{"year":2026,"cited_by_count":4},{"year":2025,"cited_by_count":26},{"year":2024,"cited_by_count":28},{"year":2023,"cited_by_count":28},{"year":2022,"cited_by_count":34},{"year":2021,"cited_by_count":33},{"year":2020,"cited_by_count":19},{"year":2019,"cited_by_count":2}],"updated_date":"2026-04-15T08:11:43.952461","created_date":"2025-10-10T00:00:00"}
