{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T19:37:25Z","timestamp":1770838645399,"version":"3.50.1"},"publisher-location":"Cham","reference-count":57,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783031040351","type":"print"},{"value":"9783031040368","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,4,7]],"date-time":"2022-04-07T00:00:00Z","timestamp":1649289600000},"content-version":"vor","delay-in-days":96,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>As cars and other transportation devices become increasingly interconnected, mobility takes on a new meaning, offering new opportunities. The integration of new communications technologies in modern vehicles has generated an enormous variety of data from various communications sources. Hence, there is a demand for intelligent transportation systems that can provide safe and reliable transportation while maintaining environmental conditions such as pollution, CO2 emission, and energy consumption. This chapter provides an overview of the Intelligent Transportation Systems (ITS) models. Briefly, it discusses the most important features of the systems and challenges, mostly related to the security in data and information processing. Fast anomalies detection and prevention of external attacks may help solve the problems of traffic congestion and road safety to prevent accidents. The chapter contains the description of the realistic Smart Transportation System developed by the Wobcom company and implemented in Wolfsburg (Germany). That system is also used for practical validation of the security service components of the platform created in the GUARD project.<\/jats:p>","DOI":"10.1007\/978-3-031-04036-8_3","type":"book-chapter","created":{"date-parts":[[2022,4,6]],"date-time":"2022-04-06T12:03:11Z","timestamp":1649246591000},"page":"56-82","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Intelligent Transportation Systems \u2013 Models, Challenges, Security Aspects"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5181-8713","authenticated-orcid":false,"given":"Joanna","family":"Ko\u0142odziej","sequence":"first","affiliation":[]},{"given":"Cornelio","family":"Hopmann","sequence":"additional","affiliation":[]},{"given":"Giovanni","family":"Coppa","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5905-0403","authenticated-orcid":false,"given":"Daniel","family":"Grzonka","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9256-0061","authenticated-orcid":false,"given":"Adrian","family":"Wid\u0142ak","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,4,7]]},"reference":[{"key":"3_CR1","unstructured":"Osterwalder, A., Pigneur, Y.: An e-business model ontology for modelling e-business. In: Bled 2002 Proceedings, Paper 2: Bled, Slovenia (2002)"},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"Giannoutakis, K., Li, F.: Developing sustainable e-business models for intelligent transportation systems (ITS). In: Proceedings of the 11th Conference on e-Business, e-Services, and e-Society (I3E), Kaunas, Lithuani, pp. 200\u2013211 (2011)","DOI":"10.1007\/978-3-642-27260-8_16"},{"key":"3_CR3","unstructured":"Baby, S., Al-Sarawi, M.A.: Traffic environmental assessment studies for township re-development: present status and future prediction. In: Proceedings of the International Conference on Biology, Environment and Chemistry, vol. 1, IACSIT Press, Singapore (2011)"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Xu, Y., Kong, Q. J., Lin, S., Liu, Y.: Urban traffic flow prediction based on road network model. In: Proceedings of the 9th IEEE International Conference on Networking, Sensing and Control (ICNSC), pp. 334\u2013339 (2012)","DOI":"10.1109\/ICNSC.2012.6204940"},{"key":"3_CR5","unstructured":"Jin, W.L.: A link queue model of network traffic (2012)"},{"issue":"9","key":"3_CR6","doi-asserted-by":"publisher","first-page":"998","DOI":"10.1049\/iet-its.2018.0064","volume":"12","author":"H Nguyen","year":"2018","unstructured":"Nguyen, H., Kieu, L.M., Wen, T., Cai, C.: Deep learning methods in transportation domain: a review. IET Intell. Transp. Syst. 12(9), 998\u20131004 (2018)","journal-title":"IET Intell. Transp. Syst."},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Li, R., Lu, H.: Combined neural network approach for short-term urban freeway traffic flow prediction. In: Advances in Neural Networks-ISNN, pp. 1017\u20131025 (2009)","DOI":"10.1007\/978-3-642-01513-7_112"},{"issue":"3","key":"3_CR8","doi-asserted-by":"publisher","first-page":"e0119044","DOI":"10.1371\/journal.pone.0119044","volume":"10","author":"X Ma","year":"2015","unstructured":"Ma, X., et al.: Large-scale transportation network congestion evolution prediction using deep learning theory. PLoS ONE 10(3), e0119044 (2015)","journal-title":"PLoS ONE"},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"Fouladgar, M., et al.: Scalable deep traffic flow neural networks for urban traffic congestion prediction. arXiv preprint arXiv:1703.01006 (2017)","DOI":"10.1109\/IJCNN.2017.7966128"},{"issue":"5","key":"3_CR10","doi-asserted-by":"publisher","first-page":"2191","DOI":"10.1109\/TITS.2014.2311123","volume":"15","author":"W Huang","year":"2014","unstructured":"Huang, W., et al.: Deep architecture for traffic flow prediction: deep belief networks with multitask learning. IEEE Trans. Intell. Transp. Syst. 15(5), 2191\u20132201 (2014)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"3_CR11","unstructured":"Genders, W., Razavi, S.: Using a deep reinforcement learning agent for traffic signal control. arXiv preprint arXiv:1611.01142 (2016)"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Liu, L., Chen, R.C.: A MRT daily passenger flow prediction model with different combinations of influential factors. In: Proceedings of the 31st International Conference Advanced Information Networking and Applications Workshops (WAINA), Taipei, Taiwan, pp. 601\u2013605 (2017)","DOI":"10.1109\/WAINA.2017.19"},{"issue":"1","key":"3_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1561\/2200000006","volume":"2","author":"Y Bengio","year":"2009","unstructured":"Bengio, Y.: Learning deep architectures for AI. Trends Mach. Learn. 2(1), 1\u201327 (2009)","journal-title":"Trends Mach. Learn."},{"issue":"9","key":"3_CR14","doi-asserted-by":"publisher","first-page":"836","DOI":"10.1061\/(ASCE)TE.1943-5436.0000144","volume":"136","author":"V Singh","year":"2010","unstructured":"Singh, V., Kumar, P.: Web-based advanced traveler information system for developing countries. J. Transp. Eng. ASCE 136(9), 836\u2013845 (2010)","journal-title":"J. Transp. Eng. ASCE"},{"issue":"3\u20134","key":"3_CR15","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1016\/j.trc.2004.07.004","volume":"12","author":"H Yang","year":"2004","unstructured":"Yang, H., Huang, H.-J.: Modeling user adoption of advanced traveler information systems: a control theoretic approach for optimal endogenous growth. Transp. Res. Part C: Emerg. Technol. 12(3\u20134), 193\u2013207 (2004)","journal-title":"Transp. Res. Part C: Emerg. Technol."},{"issue":"5","key":"3_CR16","doi-asserted-by":"publisher","first-page":"831","DOI":"10.1016\/j.techfore.2010.01.010","volume":"77","author":"CJ Yang","year":"2010","unstructured":"Yang, C.J.: Launching strategy for electric vehicles: lessons from China and Taiwan. Technol. Forecast. Soc. Change 77(5), 831\u2013834 (2010)","journal-title":"Technol. Forecast. Soc. Change"},{"key":"3_CR17","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1016\/j.trc.2007.04.004","volume":"15","author":"CD Chen","year":"2007","unstructured":"Chen, C.D., Fan, Y.W., Farn, C.K.: Predicting electronic toll collection service adoption: an integration of the technology acceptance model and the theory of planned behavior. Transp. Res. Part C Emerg. Technol. 15, 300\u2013311 (2007)","journal-title":"Transp. Res. Part C Emerg. Technol."},{"issue":"12","key":"3_CR18","doi-asserted-by":"publisher","first-page":"2925","DOI":"10.1016\/j.comcom.2008.05.014","volume":"31","author":"WH Lee","year":"2008","unstructured":"Lee, W.H., Tseng, S.S., Wang, C.H.: Design and implementation of electronic toll collection system based on vehicle positioning system techniques. Comput. Commun. 31(12), 2925\u20132933 (2008)","journal-title":"Comput. Commun."},{"key":"3_CR19","doi-asserted-by":"crossref","unstructured":"Velastin, S.A., Boghossian, B.A., Lo, B.P.L., Sun, J., Vicencio-Silva, M.A.: PRISMATICA: toward ambient intelligence in public transport environments. IEEE Trans. Syst. Man Cybern. Part A Syst. Humans. 35(1), 164\u2013182 (2005)","DOI":"10.1109\/TSMCA.2004.838461"},{"issue":"1","key":"3_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1049\/iet-its:20080013","volume":"3","author":"L Vanajakshi","year":"2009","unstructured":"Vanajakshi, L., Subramanian, S.C., Sivanandan, R.: travel time prediction under heterogeneous traffic conditions using global positioning system data from buses. IET Intell. Transp. Syst. 3(1), 1\u20139 (2009)","journal-title":"IET Intell. Transp. Syst."},{"key":"3_CR21","doi-asserted-by":"crossref","unstructured":"Pawar, M., Anuradha, J.: Network security and types of attacks in network. In: Proceedings of the International Conference on Computer, Communication and Convergence (ICCC 2015), Procedia Computer Science, vol. 48, pp. 503\u2013506 (2015)","DOI":"10.1016\/j.procs.2015.04.126"},{"key":"3_CR22","first-page":"51","volume":"31","author":"S Geric","year":"2007","unstructured":"Geric, S., Hutinski, Z.: Information system security threats classifications. J. Inf. Organ. Sci. 31, 51\u201361 (2007)","journal-title":"J. Inf. Organ. Sci."},{"key":"3_CR23","doi-asserted-by":"crossref","unstructured":"Alhabeeb, M., Almuhaideb, A., Le, P., Srinivasan, B.: Information security threats classification pyramid. In: Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, pp. 208\u2013213 (2010)","DOI":"10.1109\/WAINA.2010.39"},{"issue":"1","key":"3_CR24","first-page":"80","volume":"1","author":"EM Hutchins","year":"2011","unstructured":"Hutchins, E.M., Cloppert, M.J., Amin, R.M.: Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains. Lead. Issues Inf. Warf. Secur. Res. 1(1), 80 (2011)","journal-title":"Lead. Issues Inf. Warf. Secur. Res."},{"key":"3_CR25","unstructured":"Meier, J., Mackman, A., Vasireddy, S., Dunner, M., Escamilla, R., Murukan, A.: Improving the application security: threats and counter measures. Microsoft Corporation, Satyam Computer Services (2003)"},{"issue":"1","key":"3_CR26","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/j.cam.2012.11.017","volume":"36","author":"H-J Liao","year":"2013","unstructured":"Liao, H.-J., Lin, C.-H.R., Lin, Y.-C., Tung, K.-Y.: Intrusion detection system: a comprehensive review. J. Netw. Comput. App. 36(1), 19\u201324 (2013)","journal-title":"J. Netw. Comput. App."},{"key":"3_CR27","doi-asserted-by":"publisher","first-page":"129","DOI":"10.14257\/ijunesst.2014.7.5.12","volume":"7","author":"P Sounak","year":"2014","unstructured":"Sounak, P., Mishra, B.K.: Survey of polymorphic worm signatures. Int. J. u-Serv. e- Serv. Sci. Technol. 7, 129\u2013150 (2014)","journal-title":"Int. J. u-Serv. e- Serv. Sci. Technol."},{"key":"3_CR28","first-page":"97","volume":"15","author":"M Uddin","year":"2016","unstructured":"Uddin, M., Rehman, A.A., Uddin, N., Memon, J., Alsaqour, R., Kazi, S.: Signature-based multi-layer distributed intrusion detection system using mobile agents. Int. J. Netw. Secur. 15, 97\u2013105 (2016)","journal-title":"Int. J. Netw. Secur."},{"key":"3_CR29","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1016\/j.jocs.2016.07.010","volume":"23","author":"J Branitskiy","year":"2016","unstructured":"Branitskiy, J., Kotenko, A.: Hybridization of computational intelligence methods for attack detection in computer networks. J. Comput. Sci. 23, 145\u2013156 (2016)","journal-title":"J. Comput. Sci."},{"key":"3_CR30","unstructured":"Roesch, M.: Snort - lightweight intrusion detection for networks. In: Proceedings of the 13th Conference on Systems Administration, pp. 229\u2013238, Seattle, WA (1999)"},{"key":"3_CR31","unstructured":"Kim, H.-A., Karp, B.: Autograph: toward automated, distributed worm signature detection. In: Proceedings of the 13th conference on USENIX Security Symposium (SSYM 2004), vol. 13. USENIX Association, Berkeley, CA, USA (2004)"},{"key":"3_CR32","doi-asserted-by":"crossref","unstructured":"Newsome, J., Karp, B., Song, D.: Polygraph: automatically generating signatures for polymorphic worms. In: Proceeding of the IEEE Symposium on Security and Privacy (S&P 2005), pp. 226\u2013241. IEEE Computer Society, Los Alamitos, US (2005)","DOI":"10.1109\/SP.2005.15"},{"key":"3_CR33","doi-asserted-by":"crossref","unstructured":"Werner, T., Fuchs, C., Gerhards-Padilla, E., Martini, P.: Nebula - generating syntactical network intrusion signatures. In: Proceedings of the 4th International Conference on Malicious and Unwanted Software (MALWARE), pp. 31\u201338 (2009)","DOI":"10.1109\/MALWARE.2009.5403022"},{"key":"3_CR34","unstructured":"Li, Z., Sanghi, M., Chen, Y., Kao, M., Chavez, B.: HAMSA: fast signature generation for zero-day polymorphic worms with provable attack resilience. In: Proceedings of the IEEE Symposium on Security and Privacy (S&P 2006) (2006)"},{"key":"3_CR35","doi-asserted-by":"crossref","unstructured":"Cavallaro, L., Lanzi, A., Mayer, L., Monga, M.: LISABETH: automated content-based signature generator for zero-day polymorphic worms. In: Proceedings of the 4th International Workshop on Software Engineering for Secure Systems SESS 2008, pp. 41\u201348 (2008)","DOI":"10.1145\/1370905.1370911"},{"key":"3_CR36","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1016\/j.jocs.2017.05.006","volume":"22","author":"P Szynkiewicz","year":"2017","unstructured":"Szynkiewicz, P., Kozakiewicz, A.: Design and evaluation of a system for network threat signatures generation. J. Comput. Sci. 22, 187\u2013197 (2017)","journal-title":"J. Comput. Sci."},{"key":"3_CR37","unstructured":"Forrest, S., et al.: Self-nonself discrimination in a computer. In: Proceedings of Computer Society Symposium on Security and Privacy, Oakland, CA, USA, vol. 10, pp. 311\u2013324 (1994)"},{"key":"3_CR38","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"286","DOI":"10.1007\/978-3-642-31128-4_21","volume-title":"Computational Science and Its Applications \u2013 ICCSA 2012","author":"IL de Oliveira","year":"2012","unstructured":"de Oliveira, I.L., Gr\u00e9gio, A.R.A., Cansian, A.M.: A malware detection system inspired on the human immune system. In: Murgante, B., et al. (eds.) ICCSA 2012. LNCS, vol. 7336, pp. 286\u2013301. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-31128-4_21"},{"key":"3_CR39","doi-asserted-by":"crossref","unstructured":"Stalmans, E., Irwin, B.: A framework for DNS based detection and mitigation of malware infections on a network. In: Proceedings of 10th Annual Information Security South Africa Conference ISSA 2011, Johannesburg, South Africa (2011)","DOI":"10.1109\/ISSA.2011.6027531"},{"key":"3_CR40","volume-title":"Guide to Intrusion Detection and Prevention Systems (IDPS)","author":"K Scarfone","year":"2007","unstructured":"Scarfone, K., Mell, P.: Guide to Intrusion Detection and Prevention Systems (IDPS), vol. 800. NIST Special Publication, US (2007)"},{"issue":"1","key":"3_CR41","first-page":"290","volume":"7","author":"SD Lakshmi","year":"2015","unstructured":"Lakshmi, S.D., Arunkumar, G., Viswanatham, V.M.: Network security enhancement through honeypot based systems. Int. J. Eng. Technol. 7(1), 290\u2013293 (2015)","journal-title":"Int. J. Eng. Technol."},{"issue":"1","key":"3_CR42","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/j.cose.2008.08.003","volume":"28","author":"P Garcia-Teodoro","year":"2009","unstructured":"Garcia-Teodoro, P., Diaz-Verdejo, J., Macia-Fernandez, G., Vazquez, E.: Anomaly-based network intrusion detection: techniques, systems and challenges. Comput. Secur. 28(1), 18\u201328 (2009)","journal-title":"Comput. Secur."},{"issue":"3","key":"3_CR43","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V Chandola","year":"2009","unstructured":"Chandola, V., Arindam, B., Vipin, K.: Anomaly detection: a survey. ACM Comput. Surv. (CSUR) 41(3), 15 (2009)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"3_CR44","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1016\/j.neucom.2017.04.070","volume":"262","author":"A Subutai","year":"2017","unstructured":"Subutai, A., Lavin, A., Purdy, S., Agha, Z.: Unsupervised real-time anomaly detection for streaming data. Neurocomputing 262, 134\u2013147 (2017)","journal-title":"Neurocomputing"},{"key":"3_CR45","unstructured":"Cannady, J.: Artificial neural networks for misuse detection. In: National Information Systems Security Conference, pp. 368\u2013381 (1998)"},{"key":"3_CR46","first-page":"301","volume":"89","author":"D Heckerman","year":"1998","unstructured":"Heckerman, D., et al.: A tutorial on learning with Bayesian networks. Nato ASI Ser. D Behav. Soc. Sci. 89, 301\u2013354 (1998)","journal-title":"Nato ASI Ser. D Behav. Soc. Sci."},{"issue":"3","key":"3_CR47","doi-asserted-by":"publisher","first-page":"645","DOI":"10.1109\/TNN.2005.845141","volume":"16","author":"R Xu","year":"2005","unstructured":"Xu, R., Wunsch, D.: Survey of clustering algorithms. IEEE Trans. Neural Netw. 16(3), 645\u2013678 (2005)","journal-title":"IEEE Trans. Neural Netw."},{"issue":"4","key":"3_CR48","doi-asserted-by":"publisher","first-page":"2761","DOI":"10.1109\/JSYST.2016.2602848","volume":"11","author":"K Kalkan","year":"2017","unstructured":"Kalkan, K., Gur, G., Alagoz, F.: Filtering-based defense mechanisms against DDoS attacks: a survey. IEEE Syst. J. 11(4), 2761\u20132773 (2017)","journal-title":"IEEE Syst. J."},{"key":"3_CR49","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1016\/j.cosrev.2007.05.001","volume":"1","author":"SE Shaeffer","year":"2010","unstructured":"Shaeffer, S.E.: Graph clustering. Comput. Sci. Rev. 1, 27\u201364 (2010)","journal-title":"Comput. Sci. Rev."},{"key":"3_CR50","unstructured":"Mulukutla, V., Sundaravel, B., Park, Y., Reeves, D.: Fast malware classification by automated behavioral graph matching. In: Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research, pp. 1\u20134 (2010)"},{"key":"3_CR51","unstructured":"Wicherski, G.: A novel approach to fast malware clustering. In: Proceedings of LEET 2009 -The 2nd USENIX Conference on Large-Scale Exploits and Emergent Threats: Botnets, Spyware, Worms, and More, pp. 1\u20138 (2009)"},{"issue":"3","key":"3_CR52","doi-asserted-by":"publisher","first-page":"660","DOI":"10.1109\/21.97458","volume":"21","author":"SR Safavian","year":"1991","unstructured":"Safavian, S.R., Landgrebe, D.: A survey of decision tree classifier methodology. IEEE Trans. Syst. Man Cybern. 21(3), 660\u2013674 (1991)","journal-title":"IEEE Trans. Syst. Man Cybern."},{"issue":"3","key":"3_CR53","doi-asserted-by":"publisher","first-page":"360","DOI":"10.1090\/S0002-9904-1967-11751-8","volume":"73","author":"LE Baum","year":"1967","unstructured":"Baum, L.E., Eagon, J.A.: An inequality with applications to statistical estimation for probabilistic functions of Markov processes and to a model for ecology. Bull. Am. Math. Soc. 73(3), 360\u2013363 (1967)","journal-title":"Bull. Am. Math. Soc."},{"key":"3_CR54","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-77242-4","volume-title":"Support Vector Machines","author":"I Steinwart","year":"2009","unstructured":"Steinwart, I., Christmann, A.: Support Vector Machines. Springer Science & Business Media, Cham (2009). https:\/\/doi.org\/10.1007\/978-0-387-77242-4"},{"issue":"10","key":"3_CR55","doi-asserted-by":"publisher","first-page":"11994","DOI":"10.1016\/j.eswa.2009.05.029","volume":"36","author":"C-F Tsai","year":"2009","unstructured":"Tsai, C.-F., et al.: Intrusion detection by machine learning: a review. Expert Syst. App. 36(10), 11994\u201312000 (2009)","journal-title":"Expert Syst. App."},{"key":"3_CR56","unstructured":"Skopik, F.: Collaborative Cyber Threat Intelligence: Detecting and Responding to Advanced Cyber Attacks at the National Level, 416p., 1st edn. ISBN-10:1138031828, ISBN-13:978-1138031821, Taylor & Francis, CRC Press (2007)"},{"key":"3_CR57","volume-title":"Principles of Information Security","author":"W Michael","year":"2011","unstructured":"Michael, W., Herbert, M.: Principles of Information Security. Cengage Learning, Boston (2011)"}],"container-title":["Lecture Notes in Computer Science","Cybersecurity of Digital Service Chains"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-04036-8_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,21]],"date-time":"2024-09-21T17:57:28Z","timestamp":1726941448000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-04036-8_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031040351","9783031040368"],"references-count":57,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-04036-8_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"7 April 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}