{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T16:14:51Z","timestamp":1743092091295,"version":"3.40.3"},"publisher-location":"Cham","reference-count":53,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030446840"},{"type":"electronic","value":"9783030446857"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-44685-7_10","type":"book-chapter","created":{"date-parts":[[2020,7,22]],"date-time":"2020-07-22T14:07:01Z","timestamp":1595426821000},"page":"243-270","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Reliable Control and Data Planes for\u00a0Softwarized Networks"],"prefix":"10.1007","author":[{"given":"Carmen","family":"Mas-Machuca","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Francesco","family":"Musumeci","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Petra","family":"Vizarreta","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Dimitrios","family":"Pezaros","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Simon","family":"Jou\u00ebt","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Massimo","family":"Tornatore","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ali","family":"Hmaity","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Madhusanka","family":"Liyanage","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Andrei","family":"Gurtov","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"An","family":"Braeken","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2020,7,23]]},"reference":[{"key":"10_CR1","doi-asserted-by":"crossref","unstructured":"Ahmad I, Kumar T, Liyanage M, Okwuibe J, Ylianttila M, Gurtov A (2017) 5G security: analysis of threats and solutions. In: 2017 IEEE Conference on Standards for Communications and Networking (CSCN), pp 193\u2013199. IEEE, New York","DOI":"10.1109\/CSCN.2017.8088621"},{"issue":"1","key":"10_CR2","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/MCOMSTD.2018.1700063","volume":"2","author":"I Ahmad","year":"2018","unstructured":"Ahmad I, Kumar T, Liyanage M, Okwuibe J, Ylianttila M, Gurtov A (2018) Overview of 5G security challenges and solutions. IEEE Commun Stand Mag 2(1):36\u201343","journal-title":"IEEE Commun Stand Mag"},{"key":"10_CR3","doi-asserted-by":"publisher","unstructured":"Ahmadi V, Jalili A, Khorramizadeh SM, Keshtgari M (2015) A hybrid NSGA-II for solving multiobjective controller placement in SDN. In: 2015 2nd International Conference on Knowledge-based Engineering and Innovation (KBEI), pp 663\u2013669. \nhttps:\/\/doi.org\/10.1109\/KBEI.2015.7436122","DOI":"10.1109\/KBEI.2015.7436122"},{"issue":"4","key":"10_CR4","doi-asserted-by":"publisher","first-page":"2232","DOI":"10.1109\/COMST.2017.2715220","volume":"19","author":"R Alvizu","year":"2017","unstructured":"Alvizu R, Maier G, Kukreja N, Pattavina A, Morro R, Capello A, Cavazzoni C (2017) Comprehensive survey on T-SDN: software-defined networking for transport networks. IEEE Commun Surv Tutor 19(4):2232\u20132283","journal-title":"IEEE Commun Surv Tutor"},{"issue":"11","key":"10_CR5","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/0895-7177(93)90246-U","volume":"17","author":"K Bagga","year":"1993","unstructured":"Bagga K, Beineke L, Pippert R, Lipman M (1993) A classification scheme for vulnerability and reliability parameters of graphs. Math Comput Model 17(11):13\u201316. \nhttps:\/\/doi.org\/10.1016\/0895-7177(93)90246-U","journal-title":"Math Comput Model"},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"Benton K, Camp LJ, Small C (2013) Openflow vulnerability assessment. In: Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, pp 151\u2013152. ACM","DOI":"10.1145\/2491185.2491222"},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"Costa-Requena J, Santos JL, Guasch VF, Ahokas K, Premsankar G, Luukkainen S, Ahmed I, Liyanage M, Ylianttila M, P\u00e9rez OL, Itzazelaia MU, de\u00a0Oca EM (2015) SDN and NFV integration in generalized mobile network architecture. In: European Conference on Networks and Communications (EUCNC), pp 1\u20135. IEEE, New York","DOI":"10.1109\/EuCNC.2015.7194059"},{"key":"10_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/GLOCOM.2017.8254759","volume":"2017","author":"L Csikor","year":"2017","unstructured":"Csikor L, Pezaros DP (2017) End-host driven troubleshooting architecture for software-defined networking. GLOBECOM 2017:1\u20137. \nhttps:\/\/doi.org\/10.1109\/GLOCOM.2017.8254759","journal-title":"GLOBECOM"},{"key":"10_CR9","first-page":"1","volume":"2016","author":"L Cui","year":"2016","unstructured":"Cui L, Cziva R, Tso FP, Pezaros DP (2016) Synergistic policy and virtual machine consolidation in cloud data centers. IEEE INFOCOM 2016:1\u20139","journal-title":"IEEE INFOCOM"},{"key":"10_CR10","doi-asserted-by":"publisher","unstructured":"Cui L, Tso FP, Pezaros DP, Jia W, Zhao W (2017) PLAN: joint policy- and network-aware VM management for cloud data centers. IEEE Trans Parallel Distrib Syst 28(4):1163\u20131175. \nhttps:\/\/doi.org\/10.1109\/TPDS.2016.2604811","DOI":"10.1109\/TPDS.2016.2604811"},{"issue":"2","key":"10_CR11","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1109\/TNSM.2016.2528220","volume":"13","author":"R Cziva","year":"2016","unstructured":"Cziva R, Jou\u00ebt S, Stapleton D, Tso FP, Pezaros DP (2016) SDN-based virtual machine management for cloud data centers. IEEE Trans Netw Serv Mgmt 13(2):212\u2013225","journal-title":"IEEE Trans Netw Serv Mgmt"},{"issue":"18","key":"10_CR12","doi-asserted-by":"publisher","first-page":"3175","DOI":"10.1109\/JLT.2014.2334713","volume":"32","author":"F Dikbiyik","year":"2014","unstructured":"Dikbiyik F, Tornatore M, Mukherjee B (2014) Minimizing the risk from disaster failures in optical backbone networks. J Lightwave Technol 32(18):3175\u20133183","journal-title":"J Lightwave Technol"},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"Fonseca P, Bennesby R, Mota E, Passito A (2012) A replication component for resilient OpenFlow-based networking. In: Network Operations and Management Symposium (NOMS), 2012 IEEE, pp 933\u2013939. IEEE, New York","DOI":"10.1109\/NOMS.2012.6212011"},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"Gurtov A (2008) Host identity protocol (HIP): towards the secure mobile internet. Wiley, New York","DOI":"10.1002\/9780470772898"},{"key":"10_CR15","first-page":"3","volume":"2013","author":"MF Habib","year":"2013","unstructured":"Habib MF, Tornatore M, Mukherjee B (2013) Fault-tolerant virtual network mapping to provide content connectivity in optical networks. OFC 2013:3\u20134","journal-title":"OFC"},{"key":"10_CR16","doi-asserted-by":"publisher","unstructured":"Heller B, Sherwood R, McKeown N (2012) The controller placement problem. In: Proceedings of the First Workshop on Hot Topics in Software Defined Networks, HotSDN \u201912, pp 7\u201312. ACM, New York. \nhttps:\/\/doi.org\/10.1145\/2342441.2342444","DOI":"10.1145\/2342441.2342444"},{"key":"10_CR17","doi-asserted-by":"crossref","unstructured":"Hmaity A, Musumeci F, Tornatore M (2016) Survivable virtual network mapping to provide content connectivity against double-link failures. In: 2016 12th International Conference on the Design of Reliable Communication Networks (DRCN), pp 160\u2013166","DOI":"10.1109\/DRCN.2016.7470851"},{"key":"10_CR18","doi-asserted-by":"publisher","unstructured":"Hock D, Hartmann M, Gebert S, Jarschel M, Zinner T, Tran-Gia P (2013) Pareto-optimal resilient controller placement in SDN-based core networks. In: Proceedings of the 2013 25th International Teletraffic Congress (ITC), pp 1\u20139. \nhttps:\/\/doi.org\/10.1109\/ITC.2013.6662939","DOI":"10.1109\/ITC.2013.6662939"},{"key":"10_CR19","unstructured":"Hu Y, Wendong W, Gong X, Que X, Shiduan C (2013) Reliability-aware controller placement for software-defined networks. In: 2013 IFIP\/IEEE International Symposium on Integrated Network Management (IM 2013), pp 672\u2013675"},{"key":"10_CR20","doi-asserted-by":"crossref","unstructured":"ul\u00a0Huque MTI, Jourjon G, Gramoli V (2015) Revisiting the controller placement problem. In: 2015 IEEE 40th Conference on Local Computer Networks (LCN), pp 450\u2013453","DOI":"10.1109\/LCN.2015.7366350"},{"key":"10_CR21","doi-asserted-by":"crossref","unstructured":"Jimenez Y, Cervello-Pastor C, Garcia AJ (2014) On the controller placement for designing a distributed SDN control layer. In: 2014 IFIP Networking Conference, pp 1\u20139","DOI":"10.1109\/IFIPNetworking.2014.6857117"},{"key":"10_CR22","doi-asserted-by":"publisher","unstructured":"Jouet S, Perkins C, Pezaros D (2016) OTCP: SDN-managed congestion control for data center networks. In: NOMS 2016\u20142016 IEEE\/IFIP Network Operations and Management Symposium, pp 171\u2013179. \nhttps:\/\/doi.org\/10.1109\/NOMS.2016.7502810","DOI":"10.1109\/NOMS.2016.7502810"},{"key":"10_CR23","doi-asserted-by":"publisher","unstructured":"Jouet S, Pezaros DP (2017) BPFabric: data plane programmability for software defined networks. In: 2017 ACM\/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS), pp 38\u201348. \nhttps:\/\/doi.org\/10.1109\/ANCS.2017.14","DOI":"10.1109\/ANCS.2017.14"},{"key":"10_CR24","doi-asserted-by":"crossref","unstructured":"Kreutz D, Ramos F, Verissimo P (2013) Towards secure and dependable software-defined networks. In: Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, pp 55\u201360. ACM","DOI":"10.1145\/2491185.2491199"},{"key":"10_CR25","doi-asserted-by":"publisher","unstructured":"Lange S, Gebert S, Zinner T, Tran-Gia P, Hock D, Jarschel M, Hoffmann M (2015) Heuristic approaches to the controller placement problem in large scale SDN networks. IEEE Trans Netw Serv Manag 12(1):4\u201317. \nhttps:\/\/doi.org\/10.1109\/TNSM.2015.2402432","DOI":"10.1109\/TNSM.2015.2402432"},{"issue":"4","key":"10_CR26","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/MSP.2016.82","volume":"14","author":"M Liyanage","year":"2016","unstructured":"Liyanage M, Abro AB, Ylianttila M, Gurtov A (2016) Opportunities and challenges of software-defined mobile networks in network security. IEEE Secur Priv 14(4):34\u201344","journal-title":"IEEE Secur Priv"},{"key":"10_CR27","doi-asserted-by":"crossref","unstructured":"Liyanage M, Ahmad I, Abro AB, Gurtov A, Ylianttila M (2018) A comprehensive guide to 5G security. Wiley, New York","DOI":"10.1002\/9781119293071"},{"key":"10_CR28","doi-asserted-by":"publisher","first-page":"9422","DOI":"10.1109\/ACCESS.2017.2701416","volume":"5","author":"M Liyanage","year":"2017","unstructured":"Liyanage M, Ahmed I, Okwuibe J, Ylianttila M, Kabir H, Santos JL, Kantola R, Perez OL, Itzazelaia MU, De Oca EM (2017) Enhancing security of software defined mobile networks. IEEE Access 5:9422\u20139438","journal-title":"IEEE Access"},{"key":"10_CR29","doi-asserted-by":"crossref","unstructured":"Liyanage M, Ahmed I, Ylianttila M, Santos JL, Kantola R, Perez OL, Itzazelaia MU, de Oca EM, Valtierra A, Jimenez C (2015) Security for future software defined mobile networks. In: 2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies, pp 256\u2013264. IEEE, New York","DOI":"10.1109\/NGMAST.2015.43"},{"key":"10_CR30","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1016\/j.comnet.2017.01.007","volume":"114","author":"M Liyanage","year":"2017","unstructured":"Liyanage M, Braeken A, Jurcut AD, Ylianttila M, Gurtov A (2017) Secure communication channel architecture for software defined mobile networks. Computer Netw 114:32\u201350","journal-title":"Computer Netw"},{"key":"10_CR31","doi-asserted-by":"crossref","unstructured":"Liyanage M, Gurtov A, Ylianttila M (2015) Software defined mobile networks (SDMN): beyond LTE network architecture. Wiley, New York","DOI":"10.1002\/9781118900253"},{"key":"10_CR32","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1016\/j.osn.2018.05.004","volume":"30","author":"RBR Louren\u00e7o","year":"2018","unstructured":"Louren\u00e7o RBR, Savas SS, Tornatore M, Mukherjee B (2018) Robust hierarchical control plane for transport software-defined networks. Opt Switch Netw 30:10\u201322","journal-title":"Opt Switch Netw"},{"key":"10_CR33","doi-asserted-by":"crossref","unstructured":"Mas-Machuca C, Secci S, Vizarreta P, Kuipers F, Gouglidis A, Hutchison D, Jouet S, Pezaros D, Elmokashfi A, Heegaard P, Ristov S, Gusev M (2016) Technology-related disasters: a survey towards disaster-resilient software defined networks. In: 2016 8th International Workshop on Resilient Networks Design and Modeling (RNDM), pp 35\u201342","DOI":"10.1109\/RNDM.2016.7608265"},{"key":"10_CR34","unstructured":"McBride M, Cohn M, Deshpande S et al (2013) SDN security considerations in the data center. White Paper"},{"key":"10_CR35","doi-asserted-by":"crossref","unstructured":"McKeown N, Anderson T, Balakrishnan H, Parulkar G, Peterson L, Rexford J, Shenker S, Turner J (2008) OpenFlow: enabling innovation in campus networks. SIGCOMM","DOI":"10.1145\/1355734.1355746"},{"key":"10_CR36","first-page":"1","volume":"2013","author":"C Meyer","year":"2013","unstructured":"Meyer C, Schwenk J (2013) Lessons learned from previous SSL\/TLS attacks\u2014a brief chronology of attacks and weaknesses. IACR Cryptol ePrint Arch 2013:1\u201315","journal-title":"IACR Cryptol ePrint Arch"},{"key":"10_CR37","doi-asserted-by":"publisher","unstructured":"M\u00fcller LF, Oliveira RR, Luizelli MC, Gaspary LP, Barcellos MP (2014) Survivor: an enhanced controller placement strategy for improving SDN survivability. In: 2014 IEEE Global Communications Conference, pp 1909\u20131915. \nhttps:\/\/doi.org\/10.1109\/GLOCOM.2014.7037087","DOI":"10.1109\/GLOCOM.2014.7037087"},{"issue":"5","key":"10_CR38","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1109\/MCOM.2014.6815917","volume":"52","author":"B Mukherjee","year":"2014","unstructured":"Mukherjee B, Habib MF, Dikbiyik F (2014) Network adaptability from disaster disruptions and cascading failures. IEEE Commun Mag 52(5):230\u2013238","journal-title":"IEEE Commun Mag"},{"issue":"6","key":"10_CR39","doi-asserted-by":"publisher","first-page":"1610","DOI":"10.1109\/TNET.2011.2128879","volume":"19","author":"S Neumayer","year":"2011","unstructured":"Neumayer S, Zussman G, Cohen R, Modiano E (2011) Assessing the vulnerability of the fiber infrastructure to disasters. IEEE\/ACM Trans Netw 19(6):1610\u20131623","journal-title":"IEEE\/ACM Trans Netw"},{"key":"10_CR40","doi-asserted-by":"crossref","unstructured":"Okwuibe J, Liyanage M, Ylianttila M (2015) Performance analysis of open-source Linux-based HIP implementations. In: 2015 IEEE 10th International Conference on Industrial and Information Systems (ICIIS), pp 60\u201365. IEEE, New York","DOI":"10.1109\/ICIINFS.2015.7398986"},{"key":"10_CR41","doi-asserted-by":"crossref","unstructured":"Vizarreta P, Heegaard PV, Helvik B, Kellerer W, Mas-Machuca C (2017) Characterization of failure dynamics in SDN controllers. In: RNDM 2017, pp 1\u20137","DOI":"10.1109\/RNDM.2017.8093037"},{"key":"10_CR42","unstructured":"OpenFlow Switch Specification Version 1.4.0. URL \nhttps:\/\/www.opennetworking.org\/images\/stories\/downloads\/sdn-resources\/onf-specifications\/openflow\/openflow-spec-v1.4.0.pdf"},{"key":"10_CR43","doi-asserted-by":"crossref","unstructured":"Petersen MD et al (2008) Documentation for the 2008 update of the United States national seismic hazard maps. US Geologic Hazards Science Center","DOI":"10.3133\/fs20083018"},{"key":"10_CR44","doi-asserted-by":"publisher","unstructured":"Ros FJ, Ruiz PM (2014) Five nines of southbound reliability in software-defined networks. In: Proceedings of the third workshop on hot topics in software defined networking, HotSDN\u201914, pp 31\u201336. ACM, New York. \nhttps:\/\/doi.org\/10.1145\/2620728.2620752","DOI":"10.1145\/2620728.2620752"},{"key":"10_CR45","first-page":"1","volume":"2018","author":"D Santos","year":"2018","unstructured":"Santos D, de Sousa A, Mas-Machuca C (2018) Robust SDN controller placement to malicious node attacks. DRCN 2018:1\u20138","journal-title":"DRCN"},{"key":"10_CR46","doi-asserted-by":"publisher","first-page":"575","DOI":"10.1007\/s12243-019-00725-7","volume":"74","author":"D Santos","year":"2019","unstructured":"Santos D, de Sousa A, Mas-Machuca C (2019) The controller placement problem for robust SDNs against malicious node attacks considering the control plane with and without split-brain. Ann Telecommun 74:575\u2013591","journal-title":"Ann Telecommun"},{"key":"10_CR47","doi-asserted-by":"crossref","unstructured":"Simpson S, Shirazi SN, Marnerides A, Jouet S, Pezaros D, Hutchison D (2018) An inter-domain collaboration scheme to remedy DDoS attacks in computer networks. IEEE Trans Netw Serv Manag 15(3):879\u2013893","DOI":"10.1109\/TNSM.2018.2828938"},{"issue":"4","key":"10_CR48","doi-asserted-by":"publisher","first-page":"2738","DOI":"10.1109\/COMST.2016.2586999","volume":"18","author":"A Thyagaturu","year":"2016","unstructured":"Thyagaturu A, Mercian A, McGarry M, Reisslein M, Kellerer W (2016) Software defined optical networks (SDONs): a comprehensive survey. IEEE Commun Surv Tutor 18(4):2738\u20132786. \nhttps:\/\/doi.org\/10.1109\/COMST.2016.2586999","journal-title":"IEEE Commun Surv Tutor"},{"key":"10_CR49","first-page":"1","volume":"2017","author":"P Vizarreta","year":"2017","unstructured":"Vizarreta P, Trivedi K, Helvik B, Heegaard P, Kellerer W, Mas-Machuca C (2017) An empirical study of software reliability in SDN controllers. CNSM 2017:1\u20139","journal-title":"CNSM"},{"key":"10_CR50","doi-asserted-by":"crossref","unstructured":"Vaghani R, Lung CH (2014) A comparison of data forwarding schemes for network resiliency in software defined networking. Procedia Comput Sci 34:680\u2013685. FNC\u201914\/MobiSPC\u201914\/Affiliated Workshops","DOI":"10.1016\/j.procs.2014.07.097"},{"key":"10_CR51","doi-asserted-by":"publisher","unstructured":"Xie A, Wang X, Wang W, Lu S (2014) Designing a disaster-resilient network with software defined networking. In: 2014 IEEE 22nd International Symposium of Quality of Service (IWQoS), pp 135\u2013140. \nhttps:\/\/doi.org\/10.1109\/IWQoS.2014.6914312","DOI":"10.1109\/IWQoS.2014.6914312"},{"issue":"8","key":"10_CR52","doi-asserted-by":"publisher","first-page":"1339","DOI":"10.1109\/LCOMM.2014.2332341","volume":"18","author":"G Yao","year":"2014","unstructured":"Yao G, Bi J, Li Y, Guo L (2014) On the capacitated controller placement problem in software defined networks. IEEE Commun Lett 18(8):1339\u20131342","journal-title":"IEEE Commun Lett"},{"key":"10_CR53","doi-asserted-by":"publisher","unstructured":"Zhang Y, Beheshti N, Tatipamula M (2011) On resilience of split-architecture networks. In: 2011 IEEE Global Telecommunications Conference\u2014GLOBECOM 2011, pp 1\u20136. \nhttps:\/\/doi.org\/10.1109\/GLOCOM.2011.6134496","DOI":"10.1109\/GLOCOM.2011.6134496"}],"container-title":["Computer Communications and Networks","Guide to Disaster-Resilient Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-44685-7_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,22]],"date-time":"2020-07-22T14:10:50Z","timestamp":1595427050000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-44685-7_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030446840","9783030446857"],"references-count":53,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-44685-7_10","relation":{},"ISSN":["1617-7975","2197-8433"],"issn-type":[{"type":"print","value":"1617-7975"},{"type":"electronic","value":"2197-8433"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"23 July 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}