<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<OAI-PMH xmlns="http://www.openarchives.org/OAI/2.0/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:dim="http://www.dspace.org/xmlns/dspace/dim" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/ http://www.openarchives.org/OAI/2.0/OAI-PMH.xsd">
    <responseDate>2026-05-10T08:08:54.084Z</responseDate>
    <request verb="GetRecord" identifier="ezaposleni.singidunum.ac.rs/rest/sciNaucniRezultati/oai:3:11410" metadataPrefix="dim">http://ezaposleni.singidunum.ac.rs/rest/sciNaucniRezultati/oai</request>
    <GetRecord>
        <record>
            <header>
                <identifier>ezaposleni.singidunum.ac.rs/rest/sciNaucniRezultati/oai:3:11410</identifier>
                <datestamp>2025-05-15T23:07:32Z</datestamp>
                <setSpec>3</setSpec>
            </header>
            <metadata>
                <dim:dim>
                    <dim:field mdschema="dc" element="title" lang="en">Optimizing XGBoost for Blockchain Malicious Node Detection by Metaheuristics, Chapter in CCIS Communications in Computer and Information Science: icSoftComp 2024: International Conference on Soft Computing and its Engineering Applications, Springer, volume 2430</dim:field>
                    <dim:field mdschema="dc" element="date" qualifier="issued">2025</dim:field>
                    <dim:field mdschema="dc" element="identifier" qualifier="uri">http://ezaposleni.singidunum.ac.rs/rest/sciNaucniRezultati/oai/record/3/11410</dim:field>
                    <dim:field mdschema="dc" element="identifier" qualifier="uri">https://link.springer.com/chapter/10.1007/978-3-031-88039-1_3</dim:field>
                    <dim:field mdschema="dc" element="contributor" qualifier="author" authority="orcid::0000-0001-9402-7391" confidence="-1">L. Jovanovic</dim:field>
                    <dim:field mdschema="dc" element="contributor" qualifier="author" authority="id:52578" confidence="-1">M. Protic</dim:field>
                    <dim:field mdschema="dc" element="contributor" qualifier="author" authority="orcid::0000-0002-2062-924X" confidence="-1">N. Bacanin</dim:field>
                    <dim:field mdschema="dc" element="contributor" qualifier="author" authority="orcid::0000-0001-5442-3998" confidence="-1">M. Mravik</dim:field>
                    <dim:field mdschema="dc" element="contributor" qualifier="author" authority="orcid::0000-0002-4351-068X" confidence="-1">M. Zivkovic</dim:field>
                    <dim:field mdschema="dc" element="contributor" qualifier="author" authority="orcid::0000-0002-5511-2531" confidence="-1">M. Antonijevic</dim:field>
                    <dim:field mdschema="dc" element="contributor" qualifier="author" authority="id:52583" confidence="-1">J. Cadjenovic Milovanovic</dim:field>
                    <dim:field mdschema="dc" element="description" qualifier="abstract">Concerns over proof of work and proof of stake techniques that are fundamental to the blockchain yet also susceptible to certain security flaws have grown as a result of increased adoption of the blockchain. Notably, malevolent nodes might work together to create a fake consensus, which can cause the blockchain to be incorrectly validated. This vulnerability affects both PoW and PoS algorithms. Creating strong defenses against malevolent nodes for these systems is crucial to resolving this pressing problem. This work investigates the possibilities of using metaheuristic approaches to optimize artificial intelligence systems for the detection of rogue nodes. An altered form of a metaheuristic optimization technique was presented and used on a semi-synthetic dataset that was made available to the general public. With the help of the suggested method, the top-performing classification algorithms were optimized, and their accuracy surpassed 87% suggest suitable potential.</dim:field>
                    <dim:field mdschema="dc" element="type">bookPart</dim:field>
                    <dim:field mdschema="dc" element="publisher">Springer, Cham</dim:field>
                    <dim:field mdschema="dc" element="citation" qualifier="spage">30</dim:field>
                    <dim:field mdschema="dc" element="citation" qualifier="epage">43</dim:field>
                    <dim:field mdschema="dc" element="identifier" qualifier="doi">10.1007/978-3-031-88039-1_3</dim:field>
                    <dim:field mdschema="dc" element="source">CCIS Communications in Computer and Information Science: icSoftComp 2024: Soft Computing and its Engineering Applications, volume 2430</dim:field>
                </dim:dim>
            </metadata>
        </record>
    </GetRecord>
</OAI-PMH>
