{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T15:22:45Z","timestamp":1772119365836,"version":"3.50.1"},"reference-count":62,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2023,1,5]],"date-time":"2023-01-05T00:00:00Z","timestamp":1672876800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,5]],"date-time":"2023-01-05T00:00:00Z","timestamp":1672876800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001852","name":"Indo-French Centre for the Promotion of Advanced Research","doi-asserted-by":"publisher","award":["IFC\/4132\/RCF 2019\/716"],"award-info":[{"award-number":["IFC\/4132\/RCF 2019\/716"]}],"id":[{"id":"10.13039\/501100001852","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2023,5]]},"DOI":"10.1007\/s00500-022-07779-1","type":"journal-article","created":{"date-parts":[[2023,1,5]],"date-time":"2023-01-05T16:03:26Z","timestamp":1672934606000},"page":"5503-5520","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":22,"title":["Illegal activity detection on bitcoin transaction using deep learning"],"prefix":"10.1007","volume":"27","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9100-6437","authenticated-orcid":false,"given":"Pranav","family":"Nerurkar","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,1,5]]},"reference":[{"key":"7779_CR1","doi-asserted-by":"crossref","unstructured":"Aiolli F, Conti M, Gangwal A, Polato M (2019) Mind your wallet\u2019s privacy: Identifying bitcoin wallet apps and user\u2019s actions through network traffic analysis. 04","DOI":"10.1145\/3297280.3297430"},{"issue":"3","key":"7779_CR2","doi-asserted-by":"publisher","first-page":"413","DOI":"10.1002\/asmb.2592","volume":"37","author":"K Ajay","year":"2021","unstructured":"Ajay K, Kumar A, Muhammad RG, Pranav N, Sunil B, Waleed A, Ananda KS, Pushpita C, Uttam G (2021) Securing logistics system and supply chain using blockchain. Appl Stochastic Models in Bus Ind 37(3):413\u2013428","journal-title":"Appl Stochastic Models in Bus Ind"},{"key":"7779_CR3","doi-asserted-by":"crossref","unstructured":"Akcora CG, Li Y, Yulia\u00a0RG, Kantarcioglu M (2019) Bitcoinheist: topological data analysis for ransomware detection on the bitcoin blockchain","DOI":"10.24963\/ijcai.2020\/612"},{"key":"7779_CR4","unstructured":"Alqassem I, Rahwan I, Svetinovic D (2018) The anti-social system properties: Bitcoin network data analysis. IEEE Transactions on Systems, Man, and Cybernetics: Systems"},{"key":"7779_CR5","doi-asserted-by":"crossref","unstructured":"Anceaume E, Lajoie-Mazenc T, Ludinard R, Sericola B (2016) Safety analysis of bitcoin improvement proposals. In: 2016 IEEE 15th International Symposium on Network Computing and Applications (NCA), pages 318\u2013325. IEEE","DOI":"10.1109\/NCA.2016.7778636"},{"key":"7779_CR6","doi-asserted-by":"crossref","unstructured":"Bartoletti M, Pes B, Serusi S (2018) Data mining for detecting bitcoin ponzi schemes. In: 2018 Crypto Valley Conference on Blockchain Technology (CVCBT), pages 75\u201384","DOI":"10.1109\/CVCBT.2018.00014"},{"key":"7779_CR7","doi-asserted-by":"crossref","unstructured":"Bistarelli S, Mercanti I, Santini F (2018) A suite of tools for the forensic analysis of bitcoin transactions: Preliminary report. In: European Conference on Parallel Processing, pages 329\u2013341. Springer","DOI":"10.1007\/978-3-030-10549-5_26"},{"key":"7779_CR8","doi-asserted-by":"crossref","unstructured":"Bogner A (2017) Seeing is understanding: anomaly detection in blockchains with visualized features. In: Proceedings of the 2017 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2017 ACM International Symposium on Wearable Computers, pages 5\u20138","DOI":"10.1145\/3123024.3123157"},{"key":"7779_CR9","doi-asserted-by":"crossref","unstructured":"Conti M, Kumar G, Nerurkar P, Saha R, Vigneri L (2022) A survey on security challenges and solutions in the iota. J Netw Comput Appl, page 103383","DOI":"10.1016\/j.jnca.2022.103383"},{"key":"7779_CR10","doi-asserted-by":"crossref","unstructured":"Di Francesco Maesa D, Marino A, Ricci L (2018) The graph structure of bitcoin. In: International Conference on Complex Networks and their Applications, pages 547\u2013558. Springer","DOI":"10.1007\/978-3-030-05414-4_44"},{"issue":"1","key":"7779_CR11","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/s41060-017-0074-x","volume":"6","author":"D Di Francesco","year":"2018","unstructured":"Di Francesco D, Maesa AM, Ricci L (2018) Data-driven analysis of bitcoin properties: exploiting the users graph. Int J Data Sci Anal 6(1):63\u201380","journal-title":"Int J Data Sci Anal"},{"issue":"1","key":"7779_CR12","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1007\/s41109-019-0163-y","volume":"4","author":"D Di Francesco","year":"2019","unstructured":"Di Francesco D, Maesa AM, Ricci L (2019) The bow tie structure of the bitcoin users graph. Appl Netw Sci 4(1):56","journal-title":"Appl Netw Sci"},{"key":"7779_CR13","doi-asserted-by":"crossref","unstructured":"Ermilov D, Panov M, Yanovich Y (2017) Automatic bitcoin address clustering. In: 2017 16th IEEE International Conference on Machine Learning and Applications (ICMLA), pages 461\u2013466. IEEE","DOI":"10.1109\/ICMLA.2017.0-118"},{"issue":"1","key":"7779_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40854-021-00321-6","volume":"8","author":"F Fang","year":"2022","unstructured":"Fang F, Ventre C, Basios M, Kanthan L, Martinez-Rego D, Fan W, Li L (2022) Cryptocurrency trading: a comprehensive survey. Financial Innovation 8(1):1\u201359","journal-title":"Financial Innovation"},{"key":"7779_CR15","doi-asserted-by":"crossref","unstructured":"Gaihre A, Luo Y, Liu H (2018) Do bitcoin users really care about anonymity? an analysis of the bitcoin transaction graph. In: 2018 IEEE International Conference on Big Data (Big Data), pages 1198\u20131207. IEEE","DOI":"10.1109\/BigData.2018.8622442"},{"issue":"5","key":"7779_CR16","doi-asserted-by":"publisher","first-page":"716","DOI":"10.3846\/tede.2019.8740","volume":"25","author":"K Gang","year":"2019","unstructured":"Gang K, ChaoXiangrui PY, Alsaadi Fawaz E, Enrique H-V (2019) Machine learning methods for systemic risk analysis in financial sectors. Technol Econ Dev Econ 25(5):716\u2013742","journal-title":"Technol Econ Dev Econ"},{"key":"7779_CR17","unstructured":"Greaves A, Au B (2015) Using the bitcoin transaction graph to predict the price of bitcoin. No Data"},{"key":"7779_CR18","unstructured":"Hamilton WL, Ying R, Leskovec J (2017) Representation learning on graphs: methods and applications. arXiv preprint arXiv:1709.05584"},{"key":"7779_CR19","doi-asserted-by":"crossref","unstructured":"Harlev MA, Sun\u00a0YH, Langenheldt KC, Mukkamala R, Vatrapu R (2018) Breaking bad: De-anonymising entity types on the bitcoin blockchain using supervised machine learning. In: Proceedings of the 51st Hawaii International Conference on System Sciences","DOI":"10.24251\/HICSS.2018.443"},{"key":"7779_CR20","doi-asserted-by":"crossref","unstructured":"Herrera-Joancomart\u00ed J (2014) Research and challenges on bitcoin anonymity. In:Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance, pages 3\u201316. Springer","DOI":"10.1007\/978-3-319-17016-9_1"},{"issue":"1","key":"7779_CR21","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1080\/07421222.2018.1550550","volume":"36","author":"SYH Hua","year":"2019","unstructured":"Hua SYH, Klaus L, Mikkel H, Rao MR, Ravi V (2019) Regulating cryptocurrencies: a supervised machine learning approach to de-anonymizing the bitcoin blockchain. J Manag Inf Syst 36(1):37\u201373","journal-title":"J Manag Inf Syst"},{"key":"7779_CR22","unstructured":"Hu Y, Seneviratne S, Thilakarathna K, Fukuda K, Seneviratne A (2019) Characterizing and detecting money laundering activities on the bitcoin network. arXiv preprint arXiv:1912.12060"},{"key":"7779_CR23","doi-asserted-by":"crossref","unstructured":"Irwin AS, Turner AB (2018) Illicit bitcoin transactions: challenges in getting to the who, what, when and where. J Money Laundering control","DOI":"10.1108\/JMLC-07-2017-0031"},{"key":"7779_CR24","unstructured":"Janda A (2016) Walletexplorer. com: Smart bicoin block explorer"},{"key":"7779_CR25","doi-asserted-by":"crossref","unstructured":"Jourdan M, Blandin S, Wynter L, Deshpande P (2018) Characterizing entities in the bitcoin blockchain. In: 2018 IEEE International Conference on Data Mining Workshops (ICDMW), pages 55\u201362. IEEE","DOI":"10.1109\/ICDMW.2018.00016"},{"key":"7779_CR26","doi-asserted-by":"crossref","unstructured":"Kanemura K, Toyoda K, Ohtsuki T (2019) Identification of darknet markets\u2019 bitcoin addresses by voting per-address classification results. In: 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), pages 154\u2013158. IEEE","DOI":"10.1109\/BLOC.2019.8751391"},{"key":"7779_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ins.2014.02.137","volume":"275","author":"G Kou","year":"2014","unstructured":"Kou G, Peng Y, Wang G (2014) Evaluation of clustering algorithms for financial risk analysis using mcdm methods. Inf Sci 275:1\u201312","journal-title":"Inf Sci"},{"key":"7779_CR28","doi-asserted-by":"crossref","unstructured":"Kumar Ajay, Kumar A, Nerurkar P, Ghalib MR, Shankar A, Wen Z, Qi X (2020) Empirical analysis of bitcoin network (2016-2020). In: 2020 IEEE\/CIC International Conference on Communications in China (ICCC Workshops), pages 96\u2013101. IEEE","DOI":"10.1109\/ICCCWorkshops49972.2020.9209945"},{"key":"7779_CR29","doi-asserted-by":"crossref","unstructured":"Kumar A, Abhishek K, Nerurkar P, Khosravi MR, Ghalib MR, Shankar A (2021) Big data analytics to identify illegal activities on bitcoin blockchain for iomt. Personal and Ubiquitous Comput, pages 1\u201312","DOI":"10.1007\/s00779-021-01562-z"},{"key":"7779_CR30","doi-asserted-by":"publisher","first-page":"520","DOI":"10.1007\/978-981-15-2777-7_42","volume-title":"Blockchain and Trustworthy Systems","author":"C Lee","year":"2020","unstructured":"Lee C, Maharjan S, Ko K, Hong JW (2020) Toward detecting illegal transactions on bitcoin using machine-learning methods. In: Zheng Zibin, Dai Hong-Ning, Tang Mingdong, Chen Xiangping (eds) Blockchain and Trustworthy Systems. Singapore. Springer Singapore, pp 520\u2013533"},{"key":"7779_CR31","unstructured":"Liang J, Li L, Luan S, Gan L, Zeng D (2019) Bitcoin exchange addresses identification and its application in online drug trading regulation"},{"key":"7779_CR32","doi-asserted-by":"crossref","unstructured":"Li T, Kou G, Peng Y, Philip SY (2021) An integrated cluster detection, optimization, and interpretation approach for financial data. IEEE Transactions on Cybernetics","DOI":"10.1109\/TCYB.2021.3109066"},{"key":"7779_CR33","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1016\/j.asoc.2021.107952","volume":"113","author":"F Liu","year":"2021","unstructured":"Liu F, Li Y, Li B, Li J, Xie H (2021) Bitcoin transaction strategy construction based on deep reinforcement learning. Appl Soft Comput 113:107\u2013952","journal-title":"Appl Soft Comput"},{"key":"7779_CR34","doi-asserted-by":"crossref","unstructured":"LLiu T, Ge J, Wu Y, Dai B, Li L, Yao Z, Wen J, Shi H, (2020) A new bitcoin address association method using a two-level learner model. In: Wen Sheng, Zomaya Albert, Yang Laurence T (eds) Algorithms and Architectures for Parallel Processing. Cham. Springer International Publishing, pp 349\u2013364","DOI":"10.1007\/978-3-030-38961-1_31"},{"key":"7779_CR35","doi-asserted-by":"crossref","unstructured":"Maesa DD, Marino A, Ricci L (2016) Uncovering the bitcoin blockchain: an analysis of the full users graph. In: 2016 IEEE International Conference on Data Science and Advanced Analytics (DSAA), pages 537\u2013546. IEEE","DOI":"10.1109\/DSAA.2016.52"},{"issue":"4","key":"7779_CR36","doi-asserted-by":"publisher","first-page":"3416","DOI":"10.1109\/COMST.2018.2842460","volume":"20","author":"C Mauro","year":"2018","unstructured":"Mauro C, Sandeep KE, Chhagan L, Sushmita R (2018) A survey on security and privacy issues of bitcoin. IEEE Commun Surv Tutorials 20(4):3416\u20133452","journal-title":"IEEE Commun Surv Tutorials"},{"issue":"1","key":"7779_CR37","first-page":"1","volume":"5","author":"X Min","year":"2019","unstructured":"Min X, Chen X, Kou G (2019) A systematic review of blockchain. Financial Innovation 5(1):1\u201314","journal-title":"Financial Innovation"},{"key":"7779_CR38","doi-asserted-by":"crossref","unstructured":"Monamo PM, Marivate V, Twala B (2016) A multifaceted approach to bitcoin fraud detection: Global and local outliers. In: 2016 15th IEEE International Conference on Machine Learning and Applications (ICMLA), pages 188\u2013194. IEEE","DOI":"10.1109\/ICMLA.2016.0039"},{"key":"7779_CR39","volume-title":"Bitcoin: a peer-to-peer electronic cash system","author":"S Nakamoto","year":"2019","unstructured":"Nakamoto S (2019) Bitcoin: a peer-to-peer electronic cash system. Technical report, Manubot"},{"key":"7779_CR40","doi-asserted-by":"crossref","unstructured":"Nan L, Tao D (2018) Bitcoin mixing detection using deep autoencoder. In: 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC), pages 280\u2013287","DOI":"10.1109\/DSC.2018.00047"},{"key":"7779_CR41","doi-asserted-by":"publisher","first-page":"3824","DOI":"10.1007\/s10489-020-02048-w","volume":"51","author":"P Nerurkar","year":"2021","unstructured":"Nerurkar P, Bhirud S, Patel D, Ludinard R, Busnel Y, Kumari S (2021) Supervised learning model for identifying illegal activities in bitcoin. Appl Intell 51:3824\u20133843","journal-title":"Appl Intell"},{"key":"7779_CR42","doi-asserted-by":"crossref","unstructured":"Nerurkar P, Busnel Y, Ludinard R, Shah K, Bhirud S, Patel D (2020) Detecting illicit entities in bitcoin using supervised learning of ensemble decision trees. In: Proceedings of the 2020 10th international conference on information communication and management, pages 25\u201330","DOI":"10.1145\/3418981.3418984"},{"key":"7779_CR43","doi-asserted-by":"crossref","unstructured":"Nerurkar P, Patel D, Busnel Y, Ludinard R, Kumari S, Khan MK (2021) Dissecting bitcoin blockchain: empirical analysis of bitcoin network (2009\u20132020). volume 177, page 102940. Elsevier","DOI":"10.1016\/j.jnca.2020.102940"},{"key":"7779_CR44","doi-asserted-by":"crossref","unstructured":"Paquet-Clouston M, Romiti M, Haslhofer B, Charvat T (2019) Spams meet cryptocurrencies: sextortion in the bitcoin ecosystem. In: Proceedings of the 1st ACM Conference on Advances in Financial Technologies, pages 76\u201388","DOI":"10.1145\/3318041.3355466"},{"key":"7779_CR45","unstructured":"Pham T, Lee S (2016) Anomaly detection in bitcoin network using unsupervised learning methods. arXiv preprint arXiv:1611.03941"},{"key":"7779_CR46","doi-asserted-by":"crossref","unstructured":"Phetsouvanh S, Oggier F, Datta A (2018) Egret: extortion graph exploration techniques in the bitcoin network. In: 2018 IEEE International Conference on Data Mining Workshops (ICDMW), pages 244\u2013251","DOI":"10.1109\/ICDMW.2018.00043"},{"issue":"9","key":"7779_CR47","doi-asserted-by":"publisher","first-page":"1374","DOI":"10.1093\/comjnl\/bxy001","volume":"61","author":"A Pinna","year":"2018","unstructured":"Pinna A, Tonelli R, Orr\u00fa M, Marchesi M (2018) A petri nets model for blockchain analysis. Comput J 61(9):1374\u20131388","journal-title":"Comput J"},{"key":"7779_CR48","doi-asserted-by":"crossref","unstructured":"Portnoff RS, Huang DY, Doerfler P, Afroz S, McCoy D (2017) Backpage and bitcoin: uncovering human traffickers. In: KDD \u201917","DOI":"10.1145\/3097983.3098082"},{"issue":"5","key":"7779_CR49","doi-asserted-by":"publisher","first-page":"1798","DOI":"10.1093\/rfs\/hhz015","volume":"32","author":"F Sean","year":"2019","unstructured":"Sean F, Karlsen Jonathan R, Putni\u0146\u0161 T\u0101lis J (2019) Sex, drugs, and bitcoin: how much illegal activity is financed through cryptocurrencies? Rev Financial Stud 32(5):1798\u20131853","journal-title":"Rev Financial Stud"},{"issue":"1","key":"7779_CR50","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40854-020-00217-x","volume":"7","author":"H Sebasti\u00e3o","year":"2021","unstructured":"Sebasti\u00e3o H, Godinho P (2021) Forecasting and trading cryptocurrencies with machine learning under changing market conditions. Financial Innovation 7(1):1\u201330","journal-title":"Financial Innovation"},{"key":"7779_CR51","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1007\/978-3-030-05063-4_15","volume-title":"Algorithms and Architectures for Parallel Processing","author":"W Shao","year":"2018","unstructured":"Shao W, Li H, Chen M, Jia C, Liu C, Wang Z (2018) Identifying bitcoin users using deep neural network. In: Jaideep Vaidya, Jin Li (eds) Algorithms and Architectures for Parallel Processing. Springer International Publishing, Cham, pp 178\u2013192"},{"key":"7779_CR52","doi-asserted-by":"crossref","unstructured":"Turner A, Irwin AS(2018) Bitcoin transactions: a digital discovery of illicit activity on the blockchain. J Financial Crime","DOI":"10.1108\/JFC-12-2016-0078"},{"key":"7779_CR53","doi-asserted-by":"crossref","unstructured":"Vasek M, Moore T (2015) There\u2019s no free lunch, even using bitcoin: Tracking the popularity and profits of virtual currency scams. In Rainer B\u00f6hme and Tatsuaki Okamoto, editors, Financial Cryptography and Data Security, pages 44\u201361, Berlin, Heidelberg. Springer Berlin Heidelberg","DOI":"10.1007\/978-3-662-47854-7_4"},{"key":"7779_CR54","unstructured":"Weber M, Domeniconi G, Chen J, Weidele DK, Bellei C, Robinson T, Leiserson CE (2019) Anti-money laundering in bitcoin: experimenting with graph convolutional networks for financial forensics. arXiv preprint arXiv:1908.02591"},{"issue":"200895","key":"7779_CR55","first-page":"12","volume":"31","author":"Y Wu","year":"2019","unstructured":"Wu Y, Luo A, Xu D (2019) Identifying suspicious addresses in bitcoin thefts. Digital Investigation 31(200895):12","journal-title":"Digital Investigation"},{"key":"7779_CR56","unstructured":"Wu Z, Pan S, Chen F, Long G, Zhang C, Yu PS (2019) A comprehensive survey on graph neural networks. arXiv preprint arXiv:1901.00596"},{"key":"7779_CR57","unstructured":"Wu Y, Tao F, Liu L, Gu J, Panneerselvam J, Zhu R, Shahzad MN (2020) A bitcoin transaction network analytic method for future blockchain forensic investigation. IEEE Transactions on Network Science and Engineering, pages 1\u20131"},{"key":"7779_CR58","doi-asserted-by":"crossref","unstructured":"Yang L, Dong X, Xing S, Zheng J, Gu X, Song X (2019) An abnormal transaction detection mechanim on bitcoin. In: 2019 International Conference on Networking and Network Applications (NaNA), pages 452\u2013457. IEEE","DOI":"10.1109\/NaNA.2019.00083"},{"key":"7779_CR59","doi-asserted-by":"crossref","unstructured":"Yin HS, Vatrapu R(2017) A first estimation of the proportion of cybercriminal entities in the bitcoin ecosystem using supervised machine learning. In: 2017 IEEE International Conference on Big Data (Big Data), pages 3690\u20133699. IEEE","DOI":"10.1109\/BigData.2017.8258365"},{"key":"7779_CR60","doi-asserted-by":"crossref","unstructured":"Zarpel\u00e3o BB, Miani RS, Rajarajan M (2019) Detection of bitcoin-based botnets using a one-class classifier. In: Olivier Blazy and Chan\u00a0Yeob Yeun, editors, Information Security Theory and Practice, pages 174\u2013189, Cham. Springer International Publishing","DOI":"10.1007\/978-3-030-20074-9_13"},{"key":"7779_CR61","unstructured":"Zayuelas\u00a0Mu\u00f1oz J (2019) Detection of bitcoin miners from network measurements. B.S. thesis, Universitat Polit\u00e8cnica de Catalunya"},{"key":"7779_CR62","unstructured":"Zhang Z, Zhou T, Xie Z (2018) Bitscope: Scaling bitcoin address de-anonymization using multi-resolution clustering"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-022-07779-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00500-022-07779-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-022-07779-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,11]],"date-time":"2024-10-11T14:42:03Z","timestamp":1728657723000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00500-022-07779-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,5]]},"references-count":62,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2023,5]]}},"alternative-id":["7779"],"URL":"https:\/\/doi.org\/10.1007\/s00500-022-07779-1","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-1454891\/v1","asserted-by":"object"}]},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"value":"1432-7643","type":"print"},{"value":"1433-7479","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,1,5]]},"assertion":[{"value":"20 December 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 January 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have influenced the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"The authors declare that they have complied with ethical standards of the journal during their research.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Standards"}}]}}