{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T18:11:53Z","timestamp":1774721513749,"version":"3.50.1"},"publisher-location":"Cham","reference-count":52,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031961953","type":"print"},{"value":"9783031961960","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-96196-0_2","type":"book-chapter","created":{"date-parts":[[2025,6,21]],"date-time":"2025-06-21T18:13:32Z","timestamp":1750529612000},"page":"17-30","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["A Survey of\u00a0Federated Learning-Based Intrusion Detection Methods in\u00a0Medical IoT"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-2352-025X","authenticated-orcid":false,"given":"Ahlem","family":"Harhad","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8086-8886","authenticated-orcid":false,"given":"David","family":"Durand","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1636-9462","authenticated-orcid":false,"given":"Cyril","family":"Drocourt","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3081-6185","authenticated-orcid":false,"given":"Gil","family":"Utard","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,22]]},"reference":[{"key":"2_CR1","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1016\/j.comcom.2022.09.012","volume":"195","author":"S Agrawal","year":"2022","unstructured":"Agrawal, S., et al.: Federated learning for intrusion detection system: concepts, challenges and future directions. Comput. Commun. 195, 346\u2013361 (2022)","journal-title":"Comput. Commun."},{"key":"2_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2021.102621","volume":"122","author":"M Ahmed","year":"2021","unstructured":"Ahmed, M., Byreddy, S., Nutakki, A., Sikos, L.F., Haskell-Dowland, P.: Ecu-ioht: a dataset for analyzing cyberattacks in internet of health things. Ad Hoc Netw. 122, 102621 (2021)","journal-title":"Ad Hoc Netw."},{"issue":"8","key":"2_CR3","doi-asserted-by":"publisher","first-page":"476","DOI":"10.1016\/j.tcm.2018.11.011","volume":"29","author":"B Alexander","year":"2019","unstructured":"Alexander, B., Haseeb, S., Baranchuk, A.: Are implanted electronic devices hackable? Trends Cardiovasc. Med. 29(8), 476\u2013480 (2019)","journal-title":"Trends Cardiovasc. Med."},{"issue":"1","key":"2_CR4","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/s10207-023-00805-9","volume":"23","author":"AA Alharbi","year":"2024","unstructured":"Alharbi, A.A.: Federated transfer learning for attack detection for internet of medical things. Int. J. Inf. Secur. 23(1), 81\u2013100 (2024)","journal-title":"Int. J. Inf. Secur."},{"key":"2_CR5","doi-asserted-by":"publisher","first-page":"165130","DOI":"10.1109\/ACCESS.2020.3022862","volume":"8","author":"A Alsaedi","year":"2020","unstructured":"Alsaedi, A., Moustafa, N., Tari, Z., Mahmood, A., Anwar, A.: Ton_iot telemetry dataset: a new generation dataset of iot and iiot for data-driven intrusion detection systems. IEEE Access 8, 165130\u2013165150 (2020)","journal-title":"IEEE Access"},{"issue":"6","key":"2_CR6","doi-asserted-by":"publisher","first-page":"1110","DOI":"10.3390\/healthcare10061110","volume":"10","author":"E Ashraf","year":"2022","unstructured":"Ashraf, E., Areed, N.F., Salem, H., Abdelhay, E.H., Farouk, A.: Fidchain: federated intrusion detection system for blockchain-enabled iot healthcare applications. Healthcare 10(6), 1110 (2022)","journal-title":"Healthcare"},{"issue":"14","key":"2_CR7","doi-asserted-by":"publisher","first-page":"4591","DOI":"10.3390\/s24144591","volume":"24","author":"K Begum","year":"2024","unstructured":"Begum, K., Mozumder, M., Joo, M.I., Kim, H.C.: Bflids: blockchain-driven federated learning for intrusion detection in iomt networks. Sensors 24(14), 4591 (2024)","journal-title":"Sensors"},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"Belenguer, A., Navaridas, J., Pascual, J.A.: A review of federated learning in intrusion detection systems for iot. arXiv preprint arXiv:2204.12443 (2022)","DOI":"10.2139\/ssrn.4261807"},{"key":"2_CR9","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.2414","volume":"10","author":"R Bensaid","year":"2024","unstructured":"Bensaid, R., Labraoui, N., Ari, A., Saidi, H., Emati, J., Maglaras, L.: Sa-flids: secure and authenticated federated learning-based intelligent network intrusion detection system for smart healthcare. PeerJ Comput. Sci. 10, e2414 (2024)","journal-title":"PeerJ Comput. Sci."},{"key":"2_CR10","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2024.101351","volume":"28","author":"S Dadkhah","year":"2024","unstructured":"Dadkhah, S., Neto, E., Ferreira, R., Molokwu, R.C., Sadeghi, S., Ghorbani, A.A.: Ciciomt 2024: a benchmark dataset for multi-protocol security assessment in iomt. Internet Things 28, 101351 (2024)","journal-title":"Internet Things"},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"DP, M.K., NagaSireesha, J., Venkatesh, B., Siddiqua, A., et\u00a0al.: Hierarchical federated learning-based method for privacy-preserving in the healthcare environment. In: 2023 International Conference on Evolutionary Algorithms and Soft Computing Techniques (EASCT), pp.\u00a01\u20135. IEEE (2023)","DOI":"10.1109\/EASCT59475.2023.10393636"},{"key":"2_CR12","doi-asserted-by":"publisher","first-page":"40281","DOI":"10.1109\/ACCESS.2022.3165809","volume":"10","author":"MA Ferrag","year":"2022","unstructured":"Ferrag, M.A., Friha, O., Hamouda, D., Maglaras, L., Janicke, H.: Edge-iiotset: a new comprehensive realistic cyber security dataset of iot and iiot applications for centralized and federated learning. IEEE Access 10, 40281\u201340306 (2022)","journal-title":"IEEE Access"},{"key":"2_CR13","doi-asserted-by":"crossref","unstructured":"Guerra-Manzanares, A., Medina-Galindo, J., Bahsi, H., N\u00f5mm, S.: Medbiot: generation of an iot botnet dataset in a medium-sized iot network. In: ICISSP, pp. 207\u2013218 (2020)","DOI":"10.5220\/0009187802070218"},{"key":"2_CR14","doi-asserted-by":"publisher","first-page":"106576","DOI":"10.1109\/ACCESS.2020.3000421","volume":"8","author":"AA Hady","year":"2020","unstructured":"Hady, A.A., Ghubaish, A., Salman, T., Unal, D., Jain, R.: Intrusion detection system for healthcare systems using medical and network data: a comparison study. IEEE Access 8, 106576\u2013106584 (2020)","journal-title":"IEEE Access"},{"key":"2_CR15","doi-asserted-by":"crossref","unstructured":"Halperin, D., et al.: Pacemakers and implantable cardiac defibrillators: software radio attacks and zero-power defenses. In: 2008 IEEE Symposium on Security and Privacy (sp 2008), pp. 129\u2013142. IEEE (2008)","DOI":"10.1109\/SP.2008.31"},{"key":"2_CR16","unstructured":"Hernandez-Ramos, J.L., et al.: Intrusion detection based on federated learning: a systematic review. arXiv preprint arXiv:2308.09522 (2023)"},{"key":"2_CR17","doi-asserted-by":"publisher","unstructured":"Hussain, F., et al.: IoT Healthcare Security Dataset (2021). https:\/\/doi.org\/10.21227\/9w13-2t13","DOI":"10.21227\/9w13-2t13"},{"issue":"9","key":"2_CR18","doi-asserted-by":"publisher","first-page":"3025","DOI":"10.3390\/s21093025","volume":"21","author":"F Hussain","year":"2021","unstructured":"Hussain, F., et al.: A framework for malicious traffic detection in iot healthcare environment. Sensors 21(9), 3025 (2021)","journal-title":"Sensors"},{"key":"2_CR19","doi-asserted-by":"crossref","unstructured":"Idrissi, I., Azizi, M., Moussaoui, O.: A stratified iot deep learning based intrusion detection system. In: 2022 2nd International Conference on Innovative Research in Applied Science, Engineering and Technology (IRASET), pp.\u00a01\u20138. IEEE (2022)","DOI":"10.1109\/IRASET52964.2022.9738045"},{"key":"2_CR20","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1016\/j.comcom.2024.02.023","volume":"218","author":"I Ioannou","year":"2024","unstructured":"Ioannou, I., et al.: Gemlids-miot: a green effective machine learning intrusion detection system based on federated learning for medical iot network security hardening. Comput. Commun. 218, 209\u2013239 (2024)","journal-title":"Comput. Commun."},{"key":"2_CR21","doi-asserted-by":"crossref","unstructured":"Johnson, A.E., et al.: Mimic-iii, a freely accessible critical care database. Sci. Data 3(1), 1\u20139 (2016)","DOI":"10.1038\/sdata.2016.35"},{"key":"2_CR22","doi-asserted-by":"publisher","unstructured":"Kahn, M.: Diabetes. UCI Machine Learning Repository. https:\/\/doi.org\/10.24432\/C5T59G","DOI":"10.24432\/C5T59G"},{"key":"2_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2023.102002","volume":"101","author":"IA Khan","year":"2024","unstructured":"Khan, I.A., et al.: Fed-inforce-fusion: a federated reinforcement-based fusion model for security and privacy protection of iomt networks against cyber-attacks. Inf. Fusion 101, 102002 (2024)","journal-title":"Inf. Fusion"},{"key":"2_CR24","doi-asserted-by":"publisher","first-page":"779","DOI":"10.1016\/j.future.2019.05.041","volume":"100","author":"N Koroniotis","year":"2019","unstructured":"Koroniotis, N., Moustafa, N., Sitnikova, E., Turnbull, B.: Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-iot dataset. Future Gener. Comput. Syst. 100, 779\u2013796 (2019)","journal-title":"Future Gener. Comput. Syst."},{"issue":"17","key":"2_CR25","doi-asserted-by":"publisher","first-page":"3461","DOI":"10.3390\/electronics13173461","volume":"13","author":"M Kumar","year":"2024","unstructured":"Kumar, M., Kim, S.: Securing the internet of health things: embedded federated learning-driven long short-term memory for cyberattack detection. Electronics 13(17), 3461 (2024)","journal-title":"Electronics"},{"key":"2_CR26","doi-asserted-by":"publisher","first-page":"101574","DOI":"10.1109\/ACCESS.2021.3097247","volume":"9","author":"J Lansky","year":"2021","unstructured":"Lansky, J., et al.: Deep learning-based intrusion detection systems: a systematic review. IEEE Access 9, 101574\u2013101599 (2021)","journal-title":"IEEE Access"},{"key":"2_CR27","unstructured":"Li, C., Raghunathan, A., Jha, N.K.: Hijacking an insulin pump: security attacks and defenses for a diabetes therapy system. In: 2011 IEEE 13th International Conference on e-health Networking, Applications and Services, pp. 150\u2013156. IEEE (2011)"},{"issue":"5","key":"2_CR28","doi-asserted-by":"publisher","first-page":"8182","DOI":"10.1109\/JIOT.2019.2935189","volume":"6","author":"F Meneghello","year":"2019","unstructured":"Meneghello, F., Calore, M., Zucchetto, D., Polese, M., Zanella, A.: Iot: Internet of threats? A survey of practical security vulnerabilities in real iot devices. IEEE Internet Things J. 6(5), 8182\u20138201 (2019)","journal-title":"IEEE Internet Things J."},{"key":"2_CR29","doi-asserted-by":"crossref","unstructured":"Moody, G.B.: Physionet. In: Encyclopedia of Computational Neuroscience, pp. 2806\u20132808. Springer, Heidelberg (2022)","DOI":"10.1007\/978-1-0716-1006-0_496"},{"issue":"1","key":"2_CR30","doi-asserted-by":"publisher","first-page":"67","DOI":"10.3390\/electronics14010067","volume":"14","author":"F Mosaiyebzadeh","year":"2024","unstructured":"Mosaiyebzadeh, F., et al.: Privacy-preserving federated learning-based intrusion detection system for ioht devices. Electronics 14(1), 67 (2024)","journal-title":"Electronics"},{"key":"2_CR31","doi-asserted-by":"crossref","unstructured":"Moustafa, N., Slay, J.: UNSW-NB15: a comprehensive data set for network intrusion detection systems (unsw-nb15 network data set). In: 2015 Military Communications and Information Systems Conference (MilCIS), pp.\u00a01\u20136. IEEE (2015)","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"2_CR32","doi-asserted-by":"crossref","unstructured":"Otoum, Y., Wan, Y., Nayak, A.: Federated transfer learning-based ids for the internet of medical things (iomt). In: 2021 IEEE Globecom Workshops (GC Wkshps), pp.\u00a01\u20136. IEEE (2021)","DOI":"10.1109\/GCWkshps52748.2021.9682118"},{"key":"2_CR33","doi-asserted-by":"crossref","unstructured":"Parimala, E.H., Bosco, V.J.P., Kumar, P.R.V., Kolluru, V., et\u00a0al.: Real-time adaptive intrusion detection system [rtpids] for internet of things using federated learning and blockchain. In: 2024 5th International Conference on Data Intelligence and Cognitive Informatics (ICDICI), pp. 298\u2013305. IEEE (2024)","DOI":"10.1109\/ICDICI62993.2024.10810807"},{"key":"2_CR34","doi-asserted-by":"crossref","unstructured":"Puat, H.A.M., Rahman, N.A.A.: IOMT: a review of pacemaker vulnerabilities and security strategy. In: Journal of Physics Conference Series, vol.\u00a01712, p. 012009 (2020)","DOI":"10.1088\/1742-6596\/1712\/1\/012009"},{"key":"2_CR35","doi-asserted-by":"publisher","first-page":"454","DOI":"10.1016\/j.wneu.2016.05.010","volume":"92","author":"L Pycroft","year":"2016","unstructured":"Pycroft, L., et al.: Brainjacking: implant security issues in invasive neuromodulation. World Neurosurg. 92, 454\u2013462 (2016)","journal-title":"World Neurosurg."},{"issue":"3","key":"2_CR36","doi-asserted-by":"publisher","first-page":"2041","DOI":"10.1109\/TII.2021.3093905","volume":"18","author":"P Radoglou-Grammatikis","year":"2021","unstructured":"Radoglou-Grammatikis, P., et al.: Modeling, detecting, and mitigating threats against industrial healthcare systems: a combined software defined networking and reinforcement learning approach. IEEE Trans. Ind. Inf. 18(3), 2041\u20132052 (2021)","journal-title":"IEEE Trans. Ind. Inf."},{"key":"2_CR37","doi-asserted-by":"crossref","unstructured":"Rathore, H., Al-Ali, A., Mohamed, A., Du, X., Guizani, M.: DLRT: deep learning approach for reliable diabetic treatment. In: GLOBECOM 2017-2017 IEEE Global Communications Conference, pp.\u00a01\u20136. IEEE (2017)","DOI":"10.1109\/GLOCOM.2017.8255028"},{"key":"2_CR38","doi-asserted-by":"crossref","unstructured":"Rehman, A., Abbas, S., Khan, M., Ghazal, T.M., Adnan, K.M., Mosavi, A.: A secure healthcare 5.0 system based on blockchain technology entangled with federated learning technique. Comput. Biol. Med. 150, 106019 (2022)","DOI":"10.1016\/j.compbiomed.2022.106019"},{"key":"2_CR39","unstructured":"Samarakoon, S., et al.: 5g-nidd: a comprehensive network intrusion detection dataset generated over 5g wireless network. arXiv preprint arXiv:2212.01298 (2022)"},{"key":"2_CR40","unstructured":"Schneble, W., Thamilarasu, G.: Attack detection using federated learning in medical cyber-physical systems. In: Proceedings of 28th International Conference on Computer and Communication Networks ICCCN), vol.\u00a029, pp.\u00a01\u20138 (2019)"},{"issue":"1","key":"2_CR41","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1109\/TSMCA.2009.2029559","volume":"40","author":"C Seiffert","year":"2009","unstructured":"Seiffert, C., Khoshgoftaar, T.M., Van Hulse, J., Napolitano, A.: Rusboost: a hybrid approach to alleviating class imbalance. IEEE Trans. Syst. Man Cybern.-Part A: Syst. Hum. 40(1), 185\u2013197 (2009)","journal-title":"IEEE Trans. Syst. Man Cybern.-Part A: Syst. Hum."},{"key":"2_CR42","doi-asserted-by":"crossref","unstructured":"Shah, Y., Sengupta, S.: A survey on classification of cyber-attacks on iot and iiot devices. In: 2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), pp. 0406\u20130413. IEEE (2020)","DOI":"10.1109\/UEMCON51285.2020.9298138"},{"key":"2_CR43","first-page":"108","volume":"1","author":"I Sharafaldin","year":"2018","unstructured":"Sharafaldin, I., Lashkari, A.H., Ghorbani, A.A., et al.: Toward generating a new intrusion detection dataset and intrusion traffic characterization. ICISSp 1, 108\u2013116 (2018)","journal-title":"ICISSp"},{"key":"2_CR44","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2023.110227","volume":"140","author":"A Si-Ahmed","year":"2023","unstructured":"Si-Ahmed, A., Al-Garadi, M.A., Boustia, N.: Survey of machine learning based intrusion detection methods for internet of medical things. Appl. Soft Comput. 140, 110227 (2023)","journal-title":"Appl. Soft Comput."},{"key":"2_CR45","doi-asserted-by":"crossref","unstructured":"Siniosoglou, I., Sarigiannidis, P., Argyriou, V., Lagkas, T., Goudos, S.K., Poveda, M.: Federated intrusion detection in ng-iot healthcare systems: an adversarial approach. In: ICC 2021-IEEE International Conference on Communications, pp.\u00a01\u20136. IEEE (2021)","DOI":"10.1109\/ICC42927.2021.9500578"},{"key":"2_CR46","doi-asserted-by":"crossref","unstructured":"Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.A.: A detailed analysis of the kdd cup 99 data set. In: 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, pp.\u00a01\u20136. IEEE (2009)","DOI":"10.1109\/CISDA.2009.5356528"},{"issue":"1","key":"2_CR47","first-page":"1","volume":"2","author":"P Tyagi","year":"2023","unstructured":"Tyagi, P., et al.: Using federated artificial intelligence system of intrusion detection for iot healthcare system based on blockchain. Int. J. Data Inf. Intell. Comput. 2(1), 1\u201310 (2023)","journal-title":"Int. J. Data Inf. Intell. Comput."},{"key":"2_CR48","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2022.100516","volume":"38","author":"MA Umer","year":"2022","unstructured":"Umer, M.A., Junejo, K.N., Jilani, M.T., Mathur, A.P.: Machine learning for intrusion detection in industrial control systems: applications, challenges, and recommendations. Int. J. Crit. Infrastruct. Prot. 38, 100516 (2022)","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"issue":"22","key":"2_CR49","doi-asserted-by":"publisher","first-page":"6578","DOI":"10.3390\/s20226578","volume":"20","author":"I Vaccari","year":"2020","unstructured":"Vaccari, I., Chiola, G., Aiello, M., Mongelli, M., Cambiaso, E.: Mqttset, a new dataset for machine learning techniques on mqtt. Sensors 20(22), 6578 (2020)","journal-title":"Sensors"},{"key":"2_CR50","doi-asserted-by":"crossref","unstructured":"Wang, T., et al.: Federated learning-based information leakage risk detection for secure medical internet of things. ACM Trans. Internet Technol. (2024)","DOI":"10.1145\/3639466"},{"key":"2_CR51","doi-asserted-by":"crossref","unstructured":"Zaabar, B., Cheikhrouhou, O., Abid, M.: Intrusion detection system for iomt through blockchain-based federated learning. In: 2022 15th International Conference on Security of Information and Networks (SIN), pp. 01\u201308. IEEE (2022)","DOI":"10.1109\/SIN56466.2022.9970536"},{"issue":"21","key":"2_CR52","doi-asserted-by":"publisher","first-page":"8280","DOI":"10.3390\/s22218280","volume":"22","author":"M Zubair","year":"2022","unstructured":"Zubair, M., et al.: Secure bluetooth communication in smart healthcare systems: a novel community dataset and intrusion detection system. Sensors 22(21), 8280 (2022)","journal-title":"Sensors"}],"container-title":["Communications in Computer and Information Science","Engineering Applications of Neural Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-96196-0_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,21]],"date-time":"2025-06-21T18:13:40Z","timestamp":1750529620000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-96196-0_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031961953","9783031961960"],"references-count":52,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-96196-0_2","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"22 June 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"EANN","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Engineering Applications of Neural Networks","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Limassol","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Cyprus","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 June 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 June 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"eann2025a","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/eannconf.org\/2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}