{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T05:30:01Z","timestamp":1772602201242,"version":"3.50.1"},"reference-count":51,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2024,2,20]],"date-time":"2024-02-20T00:00:00Z","timestamp":1708387200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,2,20]],"date-time":"2024-02-20T00:00:00Z","timestamp":1708387200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Knowl Inf Syst"],"published-print":{"date-parts":[[2024,6]]},"DOI":"10.1007\/s10115-024-02068-9","type":"journal-article","created":{"date-parts":[[2024,2,20]],"date-time":"2024-02-20T09:03:54Z","timestamp":1708419834000},"page":"3355-3392","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Ontology-Based Layered Rule-Based Network Intrusion Detection System for Cybercrimes Detection"],"prefix":"10.1007","volume":"66","author":[{"given":"Femi Emmanuel","family":"Ayo","sequence":"first","affiliation":[]},{"given":"Joseph Bamidele","family":"Awotunde","sequence":"additional","affiliation":[]},{"given":"Lukman Adebayo","family":"Ogundele","sequence":"additional","affiliation":[]},{"given":"Olakunle Olugbenga","family":"Solanke","sequence":"additional","affiliation":[]},{"given":"Biswajit","family":"Brahma","sequence":"additional","affiliation":[]},{"given":"Ranjit","family":"Panigrahi","sequence":"additional","affiliation":[]},{"given":"Akash Kumar","family":"Bhoi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,2,20]]},"reference":[{"key":"2068_CR1","doi-asserted-by":"crossref","unstructured":"Dixit S, Hussain G (2023) An effective intrusion detection system in cloud computing environment. In: Mobile radio communications and 5G networks: Proceedings of third MRCN 2022. Singapore: Springer Nature Singapore, pp 671\u2013680","DOI":"10.1007\/978-981-19-7982-8_56"},{"issue":"1","key":"2068_CR2","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/s44196-023-00205-w","volume":"16","author":"JB Awotunde","year":"2023","unstructured":"Awotunde JB, Ayo FE, Panigrahi R, Garg A, Bhoi AK, Barsocchi P (2023) A multi-level random forest model-based intrusion detection using fuzzy inference system for internet of things networks. Int J Comput Intell Syst 16(1):31","journal-title":"Int J Comput Intell Syst"},{"key":"2068_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2023.103653","author":"A Belenguer","year":"2023","unstructured":"Belenguer A, Pascual JA, Navaridas J (2023) G\u00f6wFed: a novel federated network intrusion detection system. J Netw Comput Appl. https:\/\/doi.org\/10.1016\/j.jnca.2023.103653","journal-title":"J Netw Comput Appl"},{"key":"2068_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s42400-021-00077-7","volume":"4","author":"A Khraisat","year":"2021","unstructured":"Khraisat A, Alazab A (2021) A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges. Cybersecurity 4:1\u201327","journal-title":"Cybersecurity"},{"key":"2068_CR5","doi-asserted-by":"crossref","unstructured":"Samrin R, Vasumathi D (2017) Review on anomaly-based network intrusion detection system. In: 2017 international conference on electrical, electronics, communication, computer, and optimization techniques (ICEECCOT). IEEE, pp 141\u2013147","DOI":"10.1109\/ICEECCOT.2017.8284655"},{"key":"2068_CR6","doi-asserted-by":"publisher","first-page":"23615","DOI":"10.1007\/s11042-023-14795-2","volume":"82","author":"M Mohy-eddine","year":"2023","unstructured":"Mohy-eddine M, Guezzaz A, Benkirane S, Azrour M (2023) An efficient network intrusion detection model for IoT security using K-NN classifier and feature selection. Multimed Tools Appl 82:23615\u201323633","journal-title":"Multimed Tools Appl"},{"key":"2068_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.119030","volume":"213","author":"MHL Louk","year":"2023","unstructured":"Louk MHL, Tama BA (2023) Dual-IDS: a bagging-based gradient boosting decision tree model for network anomaly intrusion detection system. Expert Syst Appl 213:119030","journal-title":"Expert Syst Appl"},{"key":"2068_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2023.1098684","author":"S Ruiz-Villafranca","year":"2023","unstructured":"Ruiz-Villafranca S, Rold\u00e1n-G\u00f3mez J, Carrillo-Mond\u00e9jar J, G\u00f3mez JMC, Villal\u00f3n JM (2023) A MEC-IIoT intelligent threat detector based on machine learning boosted tree algorithms. Comput Netw. https:\/\/doi.org\/10.1016\/j.comnet.2023.1098684","journal-title":"Comput Netw"},{"issue":"1","key":"2068_CR9","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4150","volume":"32","author":"Z Ahmad","year":"2021","unstructured":"Ahmad Z, Shahid Khan A, Wai Shiang C, Abdullah J, Ahmad F (2021) Network intrusion detection system: a systematic study of machine learning and deep learning approaches. Trans Emerg Telecommun Technol 32(1):e4150","journal-title":"Trans Emerg Telecommun Technol"},{"key":"2068_CR10","doi-asserted-by":"publisher","first-page":"2049","DOI":"10.1016\/j.procs.2023.01.181","volume":"218","author":"N Saran","year":"2023","unstructured":"Saran N, Kesswani N (2023) A comparative study of supervised machine learning classifiers for intrusion detection in internet of things. Proc Comput Sci 218:2049\u20132057","journal-title":"Proc Comput Sci"},{"issue":"4","key":"2068_CR11","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1080\/15536548.2016.1257680","volume":"12","author":"O Folorunso","year":"2016","unstructured":"Folorunso O, Ayo FE, Babalola YE (2016) Ca-NIDS: a network intrusion detection system using combinatorial algorithm approach. J Inform Privacy Secur 12(4):181\u2013196","journal-title":"J Inform Privacy Secur"},{"key":"2068_CR12","doi-asserted-by":"crossref","unstructured":"Nguyen HT, Petrovi\u0107 S, Franke K (2010) A comparison of feature-selection methods for intrusion detection. In: Computer network security: 5th international conference on mathematical methods, models and architectures for computer network security, MMM-ACNS 2010, St. Petersburg, Russia, September 8\u201310, 2010. Proceedings 5\u00a0. Springer Berlin Heidelberg, pp 242\u2013255","DOI":"10.1007\/978-3-642-14706-7_19"},{"key":"2068_CR13","first-page":"80","volume":"44","author":"S Mohammadi","year":"2019","unstructured":"Mohammadi S, Mirvaziri H, Ghazizadeh-Ahsaee M, Karimipour H (2019) Cyber intrusion detection by combined feature selection algorithm. J Inform Secur Appl 44:80\u201388","journal-title":"J Inform Secur Appl"},{"issue":"4","key":"2068_CR14","doi-asserted-by":"publisher","first-page":"2479","DOI":"10.3390\/app13042479","volume":"13","author":"JB Awotunde","year":"2023","unstructured":"Awotunde JB, Folorunso SO, Imoize AL, Odunuga JO, Lee CC, Li CT, Do DT (2023) An ensemble tree-based model for intrusion detection in industrial internet of things networks. Appl Sci 13(4):2479","journal-title":"Appl Sci"},{"key":"2068_CR15","doi-asserted-by":"crossref","unstructured":"More S, Matthews M, Joshi A, Finin T (2012) A knowledge-based approach to intrusion detection modeling. In: 2012 IEEE symposium on security and privacy workshops. IEEE, pp 75\u201381","DOI":"10.1109\/SPW.2012.26"},{"key":"2068_CR16","doi-asserted-by":"crossref","unstructured":"Raskin V, Hempelmann CF, Triezenberg KE, Nirenburg S (2001) Ontology in information security: a useful theoretical foundation and methodological tool. In: Proceedings of the 2001 workshop on New security paradigms, pp 53\u201359","DOI":"10.1145\/508171.508180"},{"issue":"8","key":"2068_CR17","doi-asserted-by":"publisher","first-page":"1899","DOI":"10.3390\/math11081899","volume":"11","author":"FE Ayo","year":"2023","unstructured":"Ayo FE, Awotunde JB, Olalekan OA, Imoize AL, Li CT, Lee CC (2023) CBFISKD: a combinatorial-based fuzzy inference system for keylogger detection. Mathematics 11(8):1899","journal-title":"Mathematics"},{"key":"2068_CR18","doi-asserted-by":"crossref","unstructured":"Suresh P, Logeswaran K, Keerthika P, Devi RM, Sentamilselvan K, Kamalam GK, Muthukrishnan H (2022) Contemporary survey on effectiveness of machine and deep learning techniques for cyber security. In\u00a0Machine learning for biometrics. Academic Press, , pp 177\u2013200","DOI":"10.1016\/B978-0-323-85209-8.00007-9"},{"key":"2068_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/j.cie.2023.109033","volume":"177","author":"V Gupta","year":"2023","unstructured":"Gupta V, Mitra R, Koenig F, Kumar M, Tiwari MK (2023) Predictive maintenance of baggage handling conveyors using IoT. Comput Ind Eng 177:109033","journal-title":"Comput Ind Eng"},{"issue":"2","key":"2068_CR20","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1016\/j.eij.2023.05.002","volume":"24","author":"FE Ayo","year":"2023","unstructured":"Ayo FE, Awotunde JB, Folorunso SO, Adigun MO, Ajagbe SA (2023) A genomic rule-based KNN model for fast flux botnet detection. Egypt Inform J 24(2):313\u2013325","journal-title":"Egypt Inform J"},{"key":"2068_CR21","doi-asserted-by":"crossref","unstructured":"Abdoli F, Kahani M (2009) Ontology-based distributed intrusion detection system. In: 2009 14th International CSI computer conference. IEEE, pp 65\u201370","DOI":"10.1109\/CSICC.2009.5349372"},{"key":"2068_CR22","doi-asserted-by":"crossref","unstructured":"Can O, Unalir MO, Sezer E, Bursa O, Erdogdu B (2017) An ontology-based approach for host intrusion detection systems. In: Metadata and semantic research: 11th international conference, MTSR 2017, Tallinn, Estonia, November 28\u2013December 1, 2017, Proceedings 11. Springer International Publishing, pp 80\u201386","DOI":"10.1007\/978-3-319-70863-8_8"},{"key":"2068_CR23","doi-asserted-by":"crossref","unstructured":"Chowdhury IR, Bhowmik D (2022) Capturing malware behaviour with ontology-based knowledge graphs. In\u00a02022 IEEE conference on dependable and secure computing (DSC). IEEE, pp 1\u20137","DOI":"10.1109\/DSC54232.2022.9888860"},{"issue":"3\u20134","key":"2068_CR24","first-page":"280","volume":"3","author":"N Cuppens-Boulahia","year":"2009","unstructured":"Cuppens-Boulahia N, Cuppens F, Autrel F, Debar H (2009) An ontology-based approach to react to network attacks. Int J Inf Comput Secur 3(3\u20134):280\u2013305","journal-title":"Int J Inf Comput Secur"},{"key":"2068_CR25","doi-asserted-by":"crossref","unstructured":"Patel A, Taghavi M, Bakhtiyari K, J\u00fanior JC (2012) Taxonomy and proposed architecture of intrusion detection and prevention systems for cloud computing. In: Cyberspace Safety and Security: 4th International Symposium, CSS 2012, Melbourne, Australia, December 12-13, 2012. Proceedings 4, Springer Berlin Heidelberg, pp 441\u2013458.","DOI":"10.1007\/978-3-642-35362-8_33"},{"key":"2068_CR26","doi-asserted-by":"crossref","unstructured":"Coppolino L, D\u2019Antonio S, Elia IA, Romano L (2009) From intrusion detection to intrusion detection and diagnosis: An ontology-based approach. In: Software Technologies for Embedded and Ubiquitous Systems: 7th IFIP WG 10.2 International Workshop, SEUS 2009 Newport Beach, CA, USA, November 16-18, 2009 Proceedings 7. Springer Berlin Heidelberg, pp 192\u2013202","DOI":"10.1007\/978-3-642-10265-3_18"},{"key":"2068_CR27","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1016\/j.procs.2021.05.025","volume":"185","author":"L Ashiku","year":"2021","unstructured":"Ashiku L, Dagli C (2021) Network intrusion detection system using deep learning. Proc Comput Sci 185:239\u2013247","journal-title":"Proc Comput Sci"},{"key":"2068_CR28","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102537","volume":"112","author":"W Wang","year":"2022","unstructured":"Wang W, Jian S, Tan Y, Wu Q, Huang C (2022) Representation learning-based network intrusion detection system by capturing explicit and implicit feature interactions. Comput Secur 112:102537","journal-title":"Comput Secur"},{"issue":"1","key":"2068_CR29","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/s11036-021-01843-0","volume":"27","author":"M Sarhan","year":"2022","unstructured":"Sarhan M, Layeghy S, Portmann M (2022) Towards a standard feature set for network intrusion detection system datasets. Mobile Netw Appl 27(1):357\u2013370","journal-title":"Mobile Netw Appl"},{"issue":"18","key":"2068_CR30","doi-asserted-by":"publisher","first-page":"13492","DOI":"10.1016\/j.eswa.2012.07.009","volume":"39","author":"L Koc","year":"2012","unstructured":"Koc L, Mazzuchi TA, Sarkani S (2012) A network intrusion detection system based on a Hidden Na\u00efve Bayes multiclass classifier. Expert Syst Appl 39(18):13492\u201313500","journal-title":"Expert Syst Appl"},{"key":"2068_CR31","doi-asserted-by":"publisher","first-page":"138432","DOI":"10.1109\/ACCESS.2021.3118573","volume":"9","author":"T Wisanwanichthan","year":"2021","unstructured":"Wisanwanichthan T, Thammawichai M (2021) A double-layered hybrid approach for network intrusion detection system using combined naive bayes and SVM. IEEE Access 9:138432\u2013138450","journal-title":"IEEE Access"},{"key":"2068_CR32","doi-asserted-by":"publisher","first-page":"106790","DOI":"10.1109\/ACCESS.2021.3101188","volume":"9","author":"GDC Bertoli","year":"2021","unstructured":"Bertoli GDC, J\u00fanior LAP, Saotome O, Dos Santos AL, Verri FAN, Marcondes CAC, De Oliveira JMP (2021) An end-to-end framework for machine learning-based network intrusion detection system. IEEE Access 9:106790\u2013106805","journal-title":"IEEE Access"},{"key":"2068_CR33","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2022.108156","volume":"102","author":"V Ravi","year":"2022","unstructured":"Ravi V, Chaganti R, Alazab M (2022) Recurrent deep learning-based feature fusion ensemble meta-classifier approach for intelligent network intrusion detection system. Comput Electr Eng 102:108156","journal-title":"Comput Electr Eng"},{"key":"2068_CR34","doi-asserted-by":"crossref","unstructured":"Javaid A, Niyaz Q, Sun W, Alam M (2016) A deep learning approach for network intrusion detection system. In:\u00a0Proceedings of the 9th EAI international conference on bio-inspired information and communications technologies (formerly BIONETICS), pp 21\u201326","DOI":"10.4108\/eai.3-12-2015.2262516"},{"issue":"12","key":"2068_CR35","doi-asserted-by":"publisher","first-page":"9310","DOI":"10.1109\/JIOT.2021.3130434","volume":"9","author":"X Zhou","year":"2021","unstructured":"Zhou X, Liang W, Li W, Yan K, Shimizu S, Kevin I, Wang K (2021) Hierarchical adversarial attacks against graph neural network based IoT network intrusion detection system. IEEE Internet Things J 9(12):9310\u20139319","journal-title":"IEEE Internet Things J"},{"issue":"7","key":"2068_CR36","doi-asserted-by":"publisher","first-page":"1461","DOI":"10.3390\/sym14071461","volume":"14","author":"DN Mhawi","year":"2022","unstructured":"Mhawi DN, Aldallal A, Hassan S (2022) Advanced feature-selection-based hybrid ensemble learning algorithms for network intrusion detection systems. Symmetry 14(7):1461","journal-title":"Symmetry"},{"issue":"1","key":"2068_CR37","first-page":"101","volume":"2","author":"R Shanmugavadivu","year":"2011","unstructured":"Shanmugavadivu R, Nagarajan N (2011) Network intrusion detection system using fuzzy logic. Indian J Comput Sci Eng 2(1):101\u2013111","journal-title":"Indian J Comput Sci Eng"},{"key":"2068_CR38","first-page":"103405","volume":"72","author":"MA Talukder","year":"2023","unstructured":"Talukder MA, Hasan KF, Islam MM, Uddin MA, Akhter A, Yousuf MA, Moni MA (2023) A dependable hybrid machine learning model for network intrusion detection. J Inform Secur Appl 72:103405","journal-title":"J Inform Secur Appl"},{"key":"2068_CR39","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-022-03214-3","author":"I Ortega-Fernandez","year":"2023","unstructured":"Ortega-Fernandez I, Sestelo M, Burguillo JC, Pi\u00f1\u00f3n-Blanco C (2023) Network intrusion detection system for DDoS attacks in ICS using deep autoencoders. Wireless Netw. https:\/\/doi.org\/10.1007\/s11276-022-03214-3","journal-title":"Wireless Netw"},{"issue":"1","key":"2068_CR40","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1007\/s10922-022-09698-w","volume":"31","author":"K Shiomoto","year":"2023","unstructured":"Shiomoto K (2023) Network intrusion detection system based on an adversarial auto-encoder with few labeled training samples. J Netw Syst Manage 31(1):5","journal-title":"J Netw Syst Manage"},{"key":"2068_CR41","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1007\/978-0-387-30164-8","volume-title":"Encyclopedia of Machine Learning","author":"C Sammut","year":"2010","unstructured":"Sammut C, Webb GI (2010) Feature selection. Encyclopedia of Machine Learning. Springer, New York, pp 429\u2013433"},{"issue":"6","key":"2068_CR42","first-page":"267","volume":"29","author":"FE Ayo","year":"2020","unstructured":"Ayo FE, Folorunso SO, Abayomi-Alli AA, Adekunle AO, Awotunde JB (2020) Network intrusion detection based on deep learning model optimized with rule-based hybrid feature selection. Inform Secur J: A Global Perspect 29(6):267\u2013283","journal-title":"Inform Secur J: A Global Perspect"},{"key":"2068_CR43","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/bs.adcom.2016.12.001","volume":"105","author":"LC Leonard","year":"2017","unstructured":"Leonard LC (2017) Chapter one-web-based behavioral modeling for continuous user authentication (CUA). Adv Comput 105:1\u201344","journal-title":"Adv Comput"},{"issue":"1","key":"2068_CR44","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.compeleceng.2013.11.024","volume":"40","author":"G Chandrashekar","year":"2014","unstructured":"Chandrashekar G, Sahin F (2014) A survey on feature selection methods. Comput Electr Eng 40(1):16\u201328","journal-title":"Comput Electr Eng"},{"issue":"2","key":"2068_CR45","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1023\/A:1022602019183","volume":"3","author":"DE Goldberg","year":"1988","unstructured":"Goldberg DE, Holland JH (1988) Genetic algorithms and machine learning. Mach Learn 3(2):95\u201399","journal-title":"Mach Learn"},{"issue":"05","key":"2068_CR46","doi-asserted-by":"publisher","first-page":"539","DOI":"10.1142\/S0218488507004868","volume":"15","author":"R Alcal\u00e1","year":"2007","unstructured":"Alcal\u00e1 R, Gacto MJ, Herrera F, Alcal\u00e1-Fdez J (2007) A multi-objective genetic algorithm for tuning and rule selection to obtain accurate and compact linguistic fuzzy rule-based systems. Int J Uncertainty, Fuzziness Knowled-Based Syst, World Sci: Singapore 15(05):539\u2013557","journal-title":"Int J Uncertainty, Fuzziness Knowled-Based Syst, World Sci: Singapore"},{"key":"2068_CR47","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/j.knosys.2015.01.013","volume":"80","author":"A Fernandez","year":"2015","unstructured":"Fernandez A, Lopez V, del Jesus MJ, Herrera F (2015) Revisiting evolutionary fuzzy systems: taxonomy, applications, new trends and challenges. Knowled-Based Syst 80:109\u2013121","journal-title":"Knowled-Based Syst"},{"key":"2068_CR48","volume-title":"Genetic programming: On the programming of computers by means of natural selection","author":"JR Koza","year":"1992","unstructured":"Koza JR (1992) Genetic programming: On the programming of computers by means of natural selection. MIT, Massachusetts"},{"key":"2068_CR49","doi-asserted-by":"crossref","unstructured":"Navada A, Ansari AN, Patil S, Sonkamble BA (2011) Overview of use of decision tree algorithms in machine learning. In:\u00a02011 IEEE control and system graduate research colloquium, IEEE, pp 37\u201342","DOI":"10.1109\/ICSGRC.2011.5991826"},{"key":"2068_CR50","doi-asserted-by":"publisher","DOI":"10.1016\/j.aap.2021.106034","volume":"153","author":"X Yan","year":"2021","unstructured":"Yan X, He J, Zhang C, Liu Z, Qiao B, Zhang H (2021) Single-vehicle crash severity outcome prediction and determinant extraction using tree-based and other non-parametric models. Accid Anal Prev 153:106034","journal-title":"Accid Anal Prev"},{"key":"2068_CR51","doi-asserted-by":"crossref","unstructured":"Moustafa N, Slay J (2015) UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In: 2015 military communications and information systems conference (MilCIS). IEEE, pp 1\u20136","DOI":"10.1109\/MilCIS.2015.7348942"}],"container-title":["Knowledge and Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10115-024-02068-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10115-024-02068-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10115-024-02068-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,29]],"date-time":"2024-05-29T04:11:47Z","timestamp":1716955907000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10115-024-02068-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2,20]]},"references-count":51,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2024,6]]}},"alternative-id":["2068"],"URL":"https:\/\/doi.org\/10.1007\/s10115-024-02068-9","relation":{},"ISSN":["0219-1377","0219-3116"],"issn-type":[{"value":"0219-1377","type":"print"},{"value":"0219-3116","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,2,20]]},"assertion":[{"value":"18 October 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 January 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 January 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 February 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that there is no conflict of interest regarding the publication of this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}