{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T20:58:08Z","timestamp":1762981088103},"reference-count":56,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2021,3,16]],"date-time":"2021-03-16T00:00:00Z","timestamp":1615852800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,3,16]],"date-time":"2021-03-16T00:00:00Z","timestamp":1615852800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimedia Systems"],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.1007\/s00530-021-00771-z","type":"journal-article","created":{"date-parts":[[2021,3,16]],"date-time":"2021-03-16T08:03:35Z","timestamp":1615881815000},"page":"1905-1924","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Deep learning based cyber bullying early detection using distributed denial of service flow"],"prefix":"10.1007","volume":"28","author":[{"given":"Muhammad Hassan","family":"Zaib","sequence":"first","affiliation":[]},{"given":"Faisal","family":"Bashir","sequence":"additional","affiliation":[]},{"given":"Kashif Naseer","family":"Qureshi","sequence":"additional","affiliation":[]},{"given":"Sumaira","family":"Kausar","sequence":"additional","affiliation":[]},{"given":"Muhammad","family":"Rizwan","sequence":"additional","affiliation":[]},{"given":"Gwanggil","family":"Jeon","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,3,16]]},"reference":[{"issue":"1","key":"771_CR1","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1007\/s12652-019-01235-z","volume":"11","author":"MS Aliero","year":"2020","unstructured":"Aliero, M.S., Ghani, I., Qureshi, K.N., Rohani, M.F.A.: An algorithm for detecting SQL injection vulnerability using black-box testing. J Ambient Intell Humaniz Comput 11(1), 249\u2013266 (2020)","journal-title":"J Ambient Intell Humaniz Comput"},{"issue":"4","key":"771_CR2","doi-asserted-by":"publisher","first-page":"2297","DOI":"10.1007\/s11277-020-07151-2","volume":"112","author":"MS Aliero","year":"2020","unstructured":"Aliero, M.S., Qureshi, K.N., Pasha, M.F., Ghani, I., Yauri, R.A.: Systematic review analysis on SQLIA detection and prevention approaches. Wirel Pers Commun 112(4), 2297\u20132333 (2020)","journal-title":"Wirel Pers Commun"},{"key":"771_CR3","doi-asserted-by":"crossref","unstructured":"Hasan, A., Qureshi, K.: Internet of things device authentication scheme using hardware serialization. In: 2018 International conference on applied and engineering mathematics (ICAEM), pp. 109\u2013114. IEEE (2018)","DOI":"10.1109\/ICAEM.2018.8536286"},{"key":"771_CR4","doi-asserted-by":"crossref","unstructured":"Iqbal, S., Qureshi, K.N., Kanwal, N., Jeon, G.: Collaborative energy efficient zone\u2010based routing protocol for multihop internet of things. Trans Emerg Telecommun Technol, p. e3885 (2020)","DOI":"10.1002\/ett.3885"},{"key":"771_CR5","doi-asserted-by":"crossref","unstructured":"Nafea, H., Kifayat, K., Shi, Q., Qureshi, K.N., Askwith, B.: Efficient non-linear covert channel detection in TCP data streams. IEEE Access (2019)","DOI":"10.1109\/ACCESS.2019.2961609"},{"key":"771_CR6","doi-asserted-by":"crossref","unstructured":"Qureshi, K.N., Bashir, M.U., Lloret, J., Leon, A.: Optimized cluster-based dynamic energy-aware routing protocol for wireless sensor networks in agriculture precision. J. Sens. 2020, (2020)","DOI":"10.1155\/2020\/9040395"},{"key":"771_CR7","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/978-3-030-02384-3_2","volume-title":"Empirical approach to machine learning","author":"PP Angelov","year":"2019","unstructured":"Angelov, P.P., Gu, X.: Brief introduction to statistical machine learning. In: Empirical approach to machine learning, pp. 17\u201367. Springer, Berlin (2019)"},{"issue":"7","key":"771_CR8","doi-asserted-by":"publisher","first-page":"1645","DOI":"10.1016\/j.future.2013.01.010","volume":"29","author":"J Gubbi","year":"2013","unstructured":"Gubbi, J., Buyya, R., Marusic, S., Palaniswami, M.: Internet of things (IoT): a vision, architectural elements, and future directions. Fut. Gener. Comput. Syst. 29(7), 1645\u20131660 (2013)","journal-title":"Fut. Gener. Comput. Syst."},{"issue":"2","key":"771_CR9","doi-asserted-by":"publisher","first-page":"1153","DOI":"10.1109\/COMST.2015.2494502","volume":"18","author":"AL Buczak","year":"2015","unstructured":"Buczak, A.L., Guven, E.: A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Commun. Surv. Tutor. 18(2), 1153\u20131176 (2015)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"771_CR10","doi-asserted-by":"crossref","unstructured":"Qureshi, K.N., Bashir, F., Abdullah, A.H.: Provision of security in vehicular ad hoc networks through an intelligent secure routing scheme. In: 2017 International conference on frontiers of information technology (FIT), pp. 200\u2013205, IEEE (2017)","DOI":"10.1109\/FIT.2017.00043"},{"key":"771_CR11","doi-asserted-by":"crossref","unstructured":"Wang, Q., Balasingham, I.: Wireless sensor networks\u2013an introduction, wireless sensor networks: application-centric design. In: Tan, Y.K. (Ed.) InTech, ISBN: 978-953-307-321-7 (2010)","DOI":"10.5772\/13225"},{"key":"771_CR12","doi-asserted-by":"crossref","unstructured":"Satpute, K., Agrawal, S., Agrawal, J., Sharma, S.: A survey on anomaly detection in network intrusion detection system using particle swarm optimization based machine learning techniques. In: Proceedings of the international conference on frontiers of intelligent computing: theory and applications (FICTA), pp. 441\u2013452, Springer (2013)","DOI":"10.1007\/978-3-642-35314-7_50"},{"key":"771_CR13","unstructured":"Cashell, B., Jackson, W.D., Jickling, M., Webel, B.: The economic impact of cyber-attacks. Congressional research service documents, CRS RL32331, Washington, DC, vol. 2 (2004)"},{"key":"771_CR14","unstructured":"Wang, P., Wen, G., Yu, X., Yu, W., Wan, Y., Synchronization of resilient complex networks under attacks. In: IEEE transactions on systems, man, and cybernetics: systems (2019)"},{"key":"771_CR15","doi-asserted-by":"crossref","unstructured":"Radanliev, P., De Roure, D.C., Maple, C., Nurse, J.R., Nicolescu, R., Ani, U.: Cyber risk in IoT systems (2019)","DOI":"10.20944\/preprints201903.0104.v1"},{"key":"771_CR16","doi-asserted-by":"crossref","unstructured":"Tirado, E., Turpin, B., Beltz, C., Roshon, P., Judge, R., Gagneja, K., A new distributed brute-force password cracking technique. In: International conference on future network systems and security, pp. 117\u2013127, Springer (2018)","DOI":"10.1007\/978-3-319-94421-0_9"},{"key":"771_CR17","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1109\/TSE.1984.5010241","volume":"3","author":"VD Gligor","year":"1984","unstructured":"Gligor, V.D.: A note on denial-of-service in operating systems. IEEE Trans. Softw. Eng. 3, 320\u2013324 (1984)","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"2","key":"771_CR18","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/997150.997156","volume":"34","author":"J Mirkovic","year":"2004","unstructured":"Mirkovic, J., Reiher, P.: A taxonomy of DDoS attack and DDoS defense mechanisms. ACM SIGCOMM Comput. Commun. Rev. 34(2), 39\u201353 (2004)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"issue":"1\u20132","key":"771_CR19","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/j.cose.2008.08.003","volume":"28","author":"P Garcia-Teodoro","year":"2009","unstructured":"Garcia-Teodoro, P., Diaz-Verdejo, J., Maci\u00e1-Fern\u00e1ndez, G., V\u00e1zquez, E.: Anomaly-based network intrusion detection: techniques, systems and challenges. Comput Secur 28(1\u20132), 18\u201328 (2009)","journal-title":"Comput Secur"},{"issue":"4","key":"771_CR20","doi-asserted-by":"publisher","first-page":"917","DOI":"10.1177\/1536867X1601600407","volume":"16","author":"N Guenther","year":"2016","unstructured":"Guenther, N., Schonlau, M.: Support vector machines. Stata J. 16(4), 917\u2013937 (2016)","journal-title":"Stata J."},{"key":"771_CR21","first-page":"23","volume-title":"Deep learning with R","author":"A Ghatak","year":"2019","unstructured":"Ghatak, A.: Introduction to neural networks. In: Deep learning with R, pp. 23\u201363. Springer, Berlin (2019)"},{"issue":"1","key":"771_CR22","doi-asserted-by":"publisher","first-page":"1842","DOI":"10.21275\/v5i1.NOV153131","volume":"5","author":"SD Jadhav","year":"2016","unstructured":"Jadhav, S.D., Channe, H.: Comparative study of K-NN, naive Bayes and decision tree classification techniques. Int. J. Sci. Res. (IJSR) 5(1), 1842\u20131845 (2016)","journal-title":"Int. J. Sci. Res. (IJSR)"},{"issue":"5","key":"771_CR23","doi-asserted-by":"publisher","first-page":"683","DOI":"10.1109\/72.159058","volume":"3","author":"SK Pal","year":"1992","unstructured":"Pal, S.K., Mitra, S.: Multilayer perceptron, fuzzy sets, and classification. IEEE Trans. Neural Netw. 3(5), 683\u2013697 (1992)","journal-title":"IEEE Trans. Neural Netw."},{"key":"771_CR24","doi-asserted-by":"crossref","unstructured":"Sharafaldin, I., Lashkari, A.H., Ghorbani, A.A.: Toward generating a new intrusion detection dataset and intrusion traffic characterization. In: ICISSP, pp. 108\u2013116 (2018)","DOI":"10.5220\/0006639801080116"},{"key":"771_CR25","doi-asserted-by":"publisher","first-page":"21954","DOI":"10.1109\/ACCESS.2017.2762418","volume":"5","author":"C Yin","year":"2017","unstructured":"Yin, C., Zhu, Y., Fei, J., He, X.: A deep learning approach for intrusion detection using recurrent neural networks. IEEE Access 5, 21954\u201321961 (2017)","journal-title":"IEEE Access"},{"key":"771_CR26","doi-asserted-by":"publisher","first-page":"38367","DOI":"10.1109\/ACCESS.2018.2854599","volume":"6","author":"Z Wang","year":"2018","unstructured":"Wang, Z.: Deep learning-based intrusion detection with adversaries. IEEE Access 6, 38367\u201338384 (2018)","journal-title":"IEEE Access"},{"issue":"1","key":"771_CR27","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/TETCI.2017.2772792","volume":"2","author":"N Shone","year":"2018","unstructured":"Shone, N., Ngoc, T.N., Phai, V.D., Shi, Q.: A deep learning approach to network intrusion detection. IEEE Trans. Emerg. Top. Comput. Intell. 2(1), 41\u201350 (2018)","journal-title":"IEEE Trans. Emerg. Top. Comput. Intell."},{"key":"771_CR28","doi-asserted-by":"crossref","unstructured":"Javaid, A., Niyaz, Q., Sun, W., Alam, M.: A deep learning approach for network intrusion detection system. In: Proceedings of the 9th EAI international conference on bio-inspired information and communications technologies (formerly BIONETICS), pp. 21\u201326 (2016)","DOI":"10.4108\/eai.3-12-2015.2262516"},{"key":"771_CR29","doi-asserted-by":"crossref","unstructured":"Draper-Gil, G., Lashkari, A.H., Mamun, M.S.I., Ghorbani, A.A.: Characterization of encrypted and vpn traffic using time-related. In: Proceedings of the 2nd international conference on information systems security and privacy (ICISSP), pp. 407\u2013414 (2016)","DOI":"10.5220\/0005740704070414"},{"key":"771_CR30","doi-asserted-by":"crossref","unstructured":"Lashkari, A.H., Kadir, A.F.A., Gonzalez, H., Mbah, K.F., Ghorbani, A.A.: Towards a network-based framework for android malware detection and characterization. In: 2017 15th Annual Conference on Privacy, Security and Trust (PST), pp. 233\u201323309, IEEE (2017)","DOI":"10.1109\/PST.2017.00035"},{"key":"771_CR31","doi-asserted-by":"crossref","unstructured":"Lashkari, A.H., Draper-Gil, G., Mamun, M.S.I., Ghorbani, A.A.: Characterization of tor traffic using time based features. In: ICISSP, pp. 253\u2013262 (2017)","DOI":"10.5220\/0005740704070414"},{"issue":"3","key":"771_CR32","doi-asserted-by":"publisher","first-page":"e2050","DOI":"10.1002\/nem.2050","volume":"29","author":"A Pekta\u015f","year":"2019","unstructured":"Pekta\u015f, A., Acarman, T.: A deep learning method to detect network intrusion through flow-based features. Int. J. Netw. Manag. 29(3), e2050 (2019)","journal-title":"Int. J. Netw. Manag."},{"key":"771_CR33","doi-asserted-by":"crossref","unstructured":"Ustebay, S., Turgut, Z., Aydin, M.A.: Cyber attack detection by using neural network approaches: shallow neural network, deep neural network and autoencoder. In: International conference on computer networks, pp. 144\u2013155, Springer (2019)","DOI":"10.1007\/978-3-030-21952-9_11"},{"issue":"5","key":"771_CR34","first-page":"5514","volume":"10","author":"K Farhana","year":"2020","unstructured":"Farhana, K., Rahman, M., Ahmed, M.T.: An intrusion detection system for packet and flow based networks using deep neural network approach. Int. J. Electr. Comput. Eng. 10(5), 5514 (2020)","journal-title":"Int. J. Electr. Comput. Eng."},{"issue":"1","key":"771_CR35","first-page":"37","volume":"15","author":"G Nadiammai","year":"2014","unstructured":"Nadiammai, G., Hemalatha, M.: Effective approach toward intrusion detection system using data mining techniques. Egypt. Inf. J. 15(1), 37\u201350 (2014)","journal-title":"Egypt. Inf. J."},{"issue":"8","key":"771_CR36","first-page":"21","volume":"3","author":"S Mazraeh","year":"2016","unstructured":"Mazraeh, S., Ghanavati, M., Neysi, S.H.N.: Intrusion detection system with decision tree and combine method algorithm. Int. Acad. J. Sci. Eng. 3(8), 21\u201331 (2016)","journal-title":"Int. Acad. J. Sci. Eng."},{"key":"771_CR37","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1016\/j.neucom.2016.06.021","volume":"214","author":"C Guo","year":"2016","unstructured":"Guo, C., Ping, Y., Liu, N., Luo, S.-S.: A two-level hybrid approach for intrusion detection. Neurocomputing 214, 391\u2013400 (2016)","journal-title":"Neurocomputing"},{"key":"771_CR38","doi-asserted-by":"crossref","unstructured":"Neupane, N., Shakya, S.: Comparative analysis of backpropagation algorithm variants for network intrusion detection. In: 2017 International conference on computing, communication and automation (ICCCA), pp. 726\u2013729, IEEE (2017)","DOI":"10.1109\/CCAA.2017.8229917"},{"key":"771_CR39","doi-asserted-by":"publisher","first-page":"484","DOI":"10.1016\/j.ins.2016.04.019","volume":"378","author":"RAR Ashfaq","year":"2017","unstructured":"Ashfaq, R.A.R., Wang, X.-Z., Huang, J.Z., Abbas, H., He, Y.-L.: Fuzziness based semi-supervised learning approach for intrusion detection system. Inf. Sci. 378, 484\u2013497 (2017)","journal-title":"Inf. Sci."},{"key":"771_CR40","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1016\/j.eswa.2016.09.041","volume":"67","author":"WL Al-Yaseen","year":"2017","unstructured":"Al-Yaseen, W.L., Othman, Z.A., Nazri, M.Z.A.: Multi-level hybrid support vector machine and extreme learning machine based on modified K-means for intrusion detection system. Expert Syst. Appl. 67, 296\u2013303 (2017)","journal-title":"Expert Syst. Appl."},{"issue":"1","key":"771_CR41","doi-asserted-by":"publisher","first-page":"1051","DOI":"10.1007\/s00521-016-2418-1","volume":"28","author":"J Kevric","year":"2017","unstructured":"Kevric, J., Jukic, S., Subasi, A.: An effective combining classifier approach using tree algorithms for network intrusion detection. Neural Comput. Appl. 28(1), 1051\u20131058 (2017)","journal-title":"Neural Comput. Appl."},{"issue":"4","key":"771_CR42","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1016\/j.jksus.2018.03.018","volume":"31","author":"M Mazini","year":"2019","unstructured":"Mazini, M., Shirazi, B., Mahdavi, I.: Anomaly network-based intrusion detection system using a reliable hybrid artificial bee colony and AdaBoost algorithms. J. King Saud Univ. Comput. Inf. Sci. 31(4), 541\u2013553 (2019)","journal-title":"J. King Saud Univ. Comput. Inf. Sci."},{"key":"771_CR43","doi-asserted-by":"publisher","first-page":"20255","DOI":"10.1109\/ACCESS.2018.2820092","volume":"6","author":"MH Ali","year":"2018","unstructured":"Ali, M.H., Al Mohammed, B.A.D., Ismail, A., Zolkipli, M.F.: A new intrusion detection system based on fast learning network and particle swarm optimization. IEEE Access 6, 20255\u201320261 (2018)","journal-title":"IEEE Access"},{"key":"771_CR44","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1016\/j.jocs.2017.03.006","volume":"25","author":"S Aljawarneh","year":"2018","unstructured":"Aljawarneh, S., Aldwairi, M., Yassein, M.B.: Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model. J. Comput. Sci. 25, 152\u2013160 (2018)","journal-title":"J. Comput. Sci."},{"issue":"2","key":"771_CR45","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1016\/j.icte.2018.04.003","volume":"4","author":"A Shenfield","year":"2018","unstructured":"Shenfield, A., Day, D., Ayesh, A.: Intelligent intrusion detection systems using artificial neural networks. ICT Express 4(2), 95\u201399 (2018)","journal-title":"ICT Express"},{"issue":"3","key":"771_CR46","first-page":"8","volume":"11","author":"S Gurung","year":"2019","unstructured":"Gurung, S., Ghose, M.K., Subedi, A.: Deep learning approach on network intrusion detection system using NSL-KDD dataset. Int. J. Comput. Netw. Inf. Secur. (IJCNIS) 11(3), 8\u201314 (2019)","journal-title":"Int. J. Comput. Netw. Inf. Secur. (IJCNIS)"},{"key":"771_CR47","doi-asserted-by":"publisher","first-page":"29575","DOI":"10.1109\/ACCESS.2020.2972627","volume":"8","author":"T Su","year":"2020","unstructured":"Su, T., Sun, H., Zhu, J., Wang, S., Li, Y.: BAT: Deep learning methods on network intrusion detection using NSL-KDD dataset. IEEE Access 8, 29575\u201329585 (2020)","journal-title":"IEEE Access"},{"issue":"3","key":"771_CR48","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/BF00994018","volume":"20","author":"C Cortes","year":"1995","unstructured":"Cortes, C., Vapnik, V.: Support-vector networks. Mach. Learn. 20(3), 273\u2013297 (1995)","journal-title":"Mach. Learn."},{"issue":"12","key":"771_CR49","first-page":"1848","volume":"2","author":"S Revathi","year":"2013","unstructured":"Revathi, S., Malathi, A.: A detailed analysis on NSL-KDD dataset using various machine learning techniques for intrusion detection. Int. J. Eng. Res. Technol. (IJERT) 2(12), 1848\u20131853 (2013)","journal-title":"Int. J. Eng. Res. Technol. (IJERT)"},{"key":"771_CR50","doi-asserted-by":"publisher","first-page":"842","DOI":"10.1016\/j.procs.2015.07.490","volume":"57","author":"P Aggarwal","year":"2015","unstructured":"Aggarwal, P., Sharma, S.K.: Analysis of KDD dataset attributes-class wise for intrusion detection. Proc. Comput. Sci. 57, 842\u2013851 (2015)","journal-title":"Proc. Comput. Sci."},{"key":"771_CR51","first-page":"1","volume":"7","author":"J Dem\u0161ar","year":"2006","unstructured":"Dem\u0161ar, J.: Statistical comparisons of classifiers over multiple data sets. J. Mach. Learn. Res. 7, 1\u201330 (2006)","journal-title":"J. Mach. Learn. Res."},{"issue":"7","key":"771_CR52","doi-asserted-by":"publisher","first-page":"5737","DOI":"10.1109\/JIOT.2019.2951365","volume":"7","author":"I Ahmed","year":"2020","unstructured":"Ahmed, I., Din, S., Jeon, G., Piccialli, F.: Exploring deep learning models for overhead view multiple object detection. IEEE Internet Things J. 7(7), 5737\u20135744 (2020)","journal-title":"IEEE Internet Things J."},{"key":"771_CR53","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1016\/j.comnet.2018.05.009","volume":"140","author":"G Li","year":"2018","unstructured":"Li, G., Zhou, Y., Bai, T., Pang, Y., Wu, W., Din, S., Jeon, G.: Performance analysis for low-complexity detection of MIMO vehicle-to-vehicle communication systems. Comput. Netw. 140, 92\u2013100 (2018)","journal-title":"Comput. Netw."},{"key":"771_CR54","doi-asserted-by":"publisher","first-page":"102343","DOI":"10.1016\/j.scs.2020.102343","volume":"61","author":"KN Qureshi","year":"2020","unstructured":"Qureshi, K.N., Rana, S.S., Ahmed, A., Jeon, G.: A novel and secure attacks detection framework for industrial internet of things. Sustain. Cities Soc. 61, 102343 (2020)","journal-title":"Sustain. Cities Soc."},{"issue":"3","key":"771_CR55","doi-asserted-by":"publisher","first-page":"447","DOI":"10.1007\/s11554-018-0783-y","volume":"17","author":"J Wu","year":"2020","unstructured":"Wu, J., Li, J., Jeon, G.: Parallel binocular stereo vision-based GPU accelerated pedestrian detection and distance computation. J. Real Time Image Proc. 17(3), 447\u2013457 (2020)","journal-title":"J. Real Time Image Proc."},{"key":"771_CR56","doi-asserted-by":"crossref","unstructured":"SaiduAliero, M., Qureshi, K.N., Pasha, M.F., Ahmad, A., Jeon, G.: Detection of structure query language injection vulnerability inweb driven database application. Concurrency and computation: practice and experience, p. e5936 (2020)","DOI":"10.1002\/cpe.5936"}],"container-title":["Multimedia Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00530-021-00771-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00530-021-00771-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00530-021-00771-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,23]],"date-time":"2022-11-23T00:23:47Z","timestamp":1669163027000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00530-021-00771-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,16]]},"references-count":56,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2022,12]]}},"alternative-id":["771"],"URL":"https:\/\/doi.org\/10.1007\/s00530-021-00771-z","relation":{},"ISSN":["0942-4962","1432-1882"],"issn-type":[{"value":"0942-4962","type":"print"},{"value":"1432-1882","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,3,16]]},"assertion":[{"value":"27 July 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 February 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 March 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}