{"id":2428,"date":"2023-09-01T07:34:40","date_gmt":"2023-09-01T07:34:40","guid":{"rendered":"https:\/\/codata.org\/blog\/?p=2428"},"modified":"2023-09-01T07:35:00","modified_gmt":"2023-09-01T07:35:00","slug":"august-2023-publications-in-the-data-science-journal","status":"publish","type":"post","link":"https:\/\/codata.org\/blog\/2023\/09\/01\/august-2023-publications-in-the-data-science-journal\/","title":{"rendered":"August 2023: Publications in the Data Science Journal"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/codata.org\/wp-content\/uploads\/2020\/03\/dsj.png\" \/><\/p>\n<table border=\"0\" width=\"100%\">\n<tbody>\n<tr>\n<td align=\"left\" valign=\"top\"><\/td>\n<td align=\"left\" valign=\"top\"><strong><a href=\"https:\/\/codata.org\/blog\/wp-content\/uploads\/2023\/09\/2023-031.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-2436 size-thumbnail\" src=\"https:\/\/codata.org\/blog\/wp-content\/uploads\/2023\/09\/2023-031-150x150.png\" alt=\"\" width=\"150\" height=\"150\" \/><\/a>Title:<\/strong> Enhancing Privacy-Preserving Intrusion Detection in Blockchain-Based Networks with Deep Learning<br \/>\n<strong>Author:<\/strong>Junzhou Li, Qianhui Sun, Feixian Sun<br \/>\n<strong>URL: <a href=\"http:\/\/doi.org\/10.5334\/dsj-2023-031\">http:\/\/doi.org\/10.5334\/dsj-2023-031<\/a><\/strong><\/td>\n<\/tr>\n<tr>\n<td align=\"left\" valign=\"top\"><\/td>\n<td align=\"left\" valign=\"top\"><strong><a href=\"https:\/\/codata.org\/blog\/wp-content\/uploads\/2023\/09\/2023-030.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-2435 size-thumbnail\" src=\"https:\/\/codata.org\/blog\/wp-content\/uploads\/2023\/09\/2023-030-150x150.png\" alt=\"\" width=\"150\" height=\"150\" \/><\/a>Title:<\/strong> Data Management Plans for the Photon and Neutron Communities<br \/>\n<strong>Author:<\/strong> Marjolaine Bodin, Fredrik Bolmsten, Petra Aulin, Teodor Iv\u0103noaica, Alessandro Olivo, Janusz Malka, Krzysztof Wrona, Andy G\u00f6tz<br \/>\n<strong>URL: <a href=\"http:\/\/doi.org\/10.5334\/dsj-2023-030\">http:\/\/doi.org\/10.5334\/dsj-2023-030<\/a><\/strong><\/td>\n<\/tr>\n<tr>\n<td align=\"left\" valign=\"top\"><\/td>\n<td align=\"left\" valign=\"top\"><strong><a href=\"https:\/\/codata.org\/blog\/wp-content\/uploads\/2023\/09\/2023-029.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-2434 size-thumbnail\" src=\"https:\/\/codata.org\/blog\/wp-content\/uploads\/2023\/09\/2023-029-150x150.jpg\" alt=\"\" width=\"150\" height=\"150\" \/><\/a>Title: <\/strong>Making Data Management Plans Machine Actionable: Templates and Tools<br \/>\n<strong>Author: <\/strong>Joakim Philipson, Adil Hasan, Hanne Moa<br \/>\n<strong>URL: <a href=\"http:\/\/doi.org\/10.5334\/dsj-2023-029\">http:\/\/doi.org\/10.5334\/dsj-2023-029<\/a><\/strong><\/td>\n<\/tr>\n<tr>\n<td align=\"left\" valign=\"top\"><\/td>\n<td align=\"left\" valign=\"top\"><strong><a href=\"https:\/\/codata.org\/blog\/wp-content\/uploads\/2023\/09\/2023-028.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-2433 size-thumbnail\" src=\"https:\/\/codata.org\/blog\/wp-content\/uploads\/2023\/09\/2023-028-150x150.png\" alt=\"\" width=\"150\" height=\"150\" \/><\/a>Title:<\/strong> Towards a Toolbox for Automated Assessment of Machine-Actionable Data Management Plans<br \/>\n<strong>Author:\u00a0 <\/strong>Tomasz Miksa, Marek Such\u00e1nek, Jan Slifka, Vojtech Knaisl, Fajar J. Ekaputra, Filip Kovacevic, Annisa Maulida Ningtyas, Alaa El-Ebshihy, Robert Pergl<br \/>\n<strong>URL: <a href=\"http:\/\/doi.org\/10.5334\/dsj-2023-028\">http:\/\/doi.org\/10.5334\/dsj-2023-028<\/a><\/strong><\/td>\n<\/tr>\n<tr>\n<td align=\"left\" valign=\"top\"><\/td>\n<td align=\"left\" valign=\"top\"><strong><a href=\"https:\/\/codata.org\/blog\/wp-content\/uploads\/2023\/09\/2023-027.gif\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-2432 size-thumbnail\" src=\"https:\/\/codata.org\/blog\/wp-content\/uploads\/2023\/09\/2023-027-150x150.gif\" alt=\"\" width=\"150\" height=\"150\" \/><\/a>Title:<\/strong> Data Management Plan Implementation, Assessments, and Evaluations: Implications and Recommendations<br \/>\n<strong>Author:<\/strong> Bradley Wade Bishop, Peter Neish, Ji Hyun Kim, Rapha\u00eblle Bats, A. J. Million, Jake Carlson, Heather Moulaison-Sandy, Minh T. Pham<br \/>\n<strong>URL: <a href=\"http:\/\/doi.org\/10.5334\/dsj-2023-027\">http:\/\/doi.org\/10.5334\/dsj-2023-027<\/a><\/strong><\/td>\n<\/tr>\n<tr>\n<td align=\"left\" valign=\"top\"><\/td>\n<td align=\"left\" valign=\"top\"><strong><a href=\"https:\/\/codata.org\/blog\/wp-content\/uploads\/2023\/09\/2023-026.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-2431 size-thumbnail\" src=\"https:\/\/codata.org\/blog\/wp-content\/uploads\/2023\/09\/2023-026-150x150.png\" alt=\"\" width=\"150\" height=\"150\" \/><\/a>Title:<\/strong> A Programmatic and Scalable Approach to making Data Management Machine-Actionable<br \/>\n<strong>Author:<\/strong> Maria Praetzellis, Matthew Buys, Xiaoli Chen, John Chodacki, Neil Davies, Kristian Garza, Catherine Nancarrow, Brian Riley, Erin Robinson<br \/>\n<strong>URL: <a href=\"http:\/\/doi.org\/10.5334\/dsj-2023-026\">http:\/\/doi.org\/10.5334\/dsj-2023-026<\/a><\/strong><\/td>\n<\/tr>\n<tr>\n<td align=\"left\" valign=\"top\"><\/td>\n<td align=\"left\" valign=\"top\"><strong><a href=\"https:\/\/codata.org\/blog\/wp-content\/uploads\/2023\/09\/2023-025.gif\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-2430\" src=\"https:\/\/codata.org\/blog\/wp-content\/uploads\/2023\/09\/2023-025.gif\" alt=\"\" width=\"150\" height=\"150\" \/><\/a>Title:<\/strong> Benefits and Challenges: Data Management Plans in Two Collaborative Projects<br \/>\n<strong>Author:<\/strong> Denise J\u00e4ckel, Anna Lehmann<br \/>\n<strong>URL: <a href=\"http:\/\/doi.org\/10.5334\/dsj-2023-025\">http:\/\/doi.org\/10.5334\/dsj-2023-025<\/a><\/strong><\/td>\n<\/tr>\n<tr>\n<td align=\"left\" valign=\"top\"><\/td>\n<td align=\"left\" valign=\"top\"><strong><a href=\"https:\/\/codata.org\/blog\/wp-content\/uploads\/2021\/08\/2021-024.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-2173 size-thumbnail alignleft\" src=\"https:\/\/codata.org\/blog\/wp-content\/uploads\/2021\/08\/2021-024-150x150.png\" alt=\"\" width=\"150\" height=\"150\" \/><\/a>Title:<\/strong> Implementing Informatics Tools with Data Management Plans for Disease Area Research<br \/>\n<strong>Author:<\/strong>\u00a0 Vivek Navale, Matthew McAuliffe<br \/>\n<strong>URL: <a href=\"http:\/\/doi.org\/10.5334\/dsj-2023-024\">http:\/\/doi.org\/10.5334\/dsj-2023.-024<\/a><\/strong><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"excerpt":{"rendered":"<p>Title: Enhancing Privacy-Preserving Intrusion Detection in Blockchain-Based Networks with Deep Learning Author:Junzhou Li, Qianhui Sun, Feixian Sun URL: http:\/\/doi.org\/10.5334\/dsj-2023-031 Title: Data Management Plans for the Photon and Neutron Communities Author: Marjolaine Bodin, Fredrik Bolmsten, Petra Aulin, Teodor Iv\u0103noaica, Alessandro Olivo, Janusz Malka, Krzysztof Wrona, Andy G\u00f6tz URL: http:\/\/doi.org\/10.5334\/dsj-2023-030 Title: Making Data Management Plans Machine Actionable: [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":["post-2428","post","type-post","status-publish","format-standard","hentry","category-data-science-journal"],"_links":{"self":[{"href":"https:\/\/codata.org\/blog\/wp-json\/wp\/v2\/posts\/2428","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/codata.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/codata.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/codata.org\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/codata.org\/blog\/wp-json\/wp\/v2\/comments?post=2428"}],"version-history":[{"count":2,"href":"https:\/\/codata.org\/blog\/wp-json\/wp\/v2\/posts\/2428\/revisions"}],"predecessor-version":[{"id":2438,"href":"https:\/\/codata.org\/blog\/wp-json\/wp\/v2\/posts\/2428\/revisions\/2438"}],"wp:attachment":[{"href":"https:\/\/codata.org\/blog\/wp-json\/wp\/v2\/media?parent=2428"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/codata.org\/blog\/wp-json\/wp\/v2\/categories?post=2428"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/codata.org\/blog\/wp-json\/wp\/v2\/tags?post=2428"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}