{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T12:33:38Z","timestamp":1768480418961,"version":"3.49.0"},"reference-count":120,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2025,3,8]],"date-time":"2025-03-08T00:00:00Z","timestamp":1741392000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,3,8]],"date-time":"2025-03-08T00:00:00Z","timestamp":1741392000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/100010661","name":"Horizon 2020 Framework Programme","doi-asserted-by":"publisher","award":["101019645"],"award-info":[{"award-number":["101019645"]}],"id":[{"id":"10.13039\/100010661","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100010661","name":"Horizon 2020 Framework Programme","doi-asserted-by":"publisher","award":["101021727"],"award-info":[{"award-number":["101021727"]}],"id":[{"id":"10.13039\/100010661","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100010661","name":"Horizon 2020 Framework Programme","doi-asserted-by":"publisher","award":["101019645"],"award-info":[{"award-number":["101019645"]}],"id":[{"id":"10.13039\/100010661","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100010661","name":"Horizon 2020 Framework Programme","doi-asserted-by":"publisher","award":["101021727"],"award-info":[{"award-number":["101021727"]}],"id":[{"id":"10.13039\/100010661","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100010661","name":"Horizon 2020 Framework Programme","doi-asserted-by":"publisher","award":["101021727"],"award-info":[{"award-number":["101021727"]}],"id":[{"id":"10.13039\/100010661","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100010661","name":"Horizon 2020 Framework Programme","doi-asserted-by":"publisher","award":["101019645"],"award-info":[{"award-number":["101019645"]}],"id":[{"id":"10.13039\/100010661","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100010661","name":"Horizon 2020 Framework Programme","doi-asserted-by":"publisher","award":["101021727"],"award-info":[{"award-number":["101021727"]}],"id":[{"id":"10.13039\/100010661","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100010661","name":"Horizon 2020 Framework Programme","doi-asserted-by":"publisher","award":["101021727"],"award-info":[{"award-number":["101021727"]}],"id":[{"id":"10.13039\/100010661","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100010661","name":"Horizon 2020 Framework Programme","doi-asserted-by":"publisher","award":["101019645"],"award-info":[{"award-number":["101019645"]}],"id":[{"id":"10.13039\/100010661","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Knowl Inf Syst"],"published-print":{"date-parts":[[2025,6]]},"abstract":"<jats:title>Abstract<\/jats:title>\n          <jats:p>The aim of this work is to provide a systematic literature review of techniques for taxonomy generation across the cybersecurity domain. Cybersecurity taxonomies can be classified into manual and dynamic, each one of which focuses on different characteristics and tails different goals. Under this premise, we investigate the current state of the art in both categories with respect to their characteristics, applications and methods. To this end, we perform a systematic literature review in accordance with an extensive analysis of the tremendous need for dynamic taxonomies in the cybersecurity landscape. This analysis provides key insights into the advantages and limitations of both techniques, and it discusses the datasets which are most commonly used to generate cybersecurity taxonomies.<\/jats:p>","DOI":"10.1007\/s10115-025-02382-w","type":"journal-article","created":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T23:10:16Z","timestamp":1741389016000},"page":"4785-4811","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A comprehensive survey of manual and dynamic approaches for cybersecurity taxonomy generation"],"prefix":"10.1007","volume":"67","author":[{"given":"Arnolnt","family":"Spyros","sequence":"first","affiliation":[]},{"given":"Anna","family":"Kougioumtzidou","sequence":"additional","affiliation":[]},{"given":"Angelos","family":"Papoutsis","sequence":"additional","affiliation":[]},{"given":"Eleni","family":"Darra","sequence":"additional","affiliation":[]},{"given":"Dimitrios","family":"Kavallieros","sequence":"additional","affiliation":[]},{"given":"Athanasios","family":"Tziouvaras","sequence":"additional","affiliation":[]},{"given":"Theodora","family":"Tsikrika","sequence":"additional","affiliation":[]},{"given":"Stefanos","family":"Vrochidis","sequence":"additional","affiliation":[]},{"given":"Ioannis","family":"Kompatsiaris","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,8]]},"reference":[{"key":"2382_CR1","doi-asserted-by":"crossref","unstructured":"Chantzios T, Koloveas P, Skiadopoulos S, Kolokotronis N, Tryfonopoulos C, Bilali V-G, Kavallieros D (2019) The quest for the appropriate cyber-threat intelligence sharing platform. In: International conference on data technologies and applications. https:\/\/api.semanticscholar.org\/CorpusID:202435179","DOI":"10.5220\/0007978103690376"},{"issue":"2","key":"2382_CR2","doi-asserted-by":"publisher","first-page":"1851","DOI":"10.1109\/COMST.2019.2891891","volume":"21","author":"A Alshamrani","year":"2019","unstructured":"Alshamrani A, Myneni S, Chowdhary A, Huang D (2019) A survey on advanced persistent threats: techniques, solutions, challenges, and research opportunities. IEEE Commun Surv Tutor 21(2):1851\u20131877. https:\/\/doi.org\/10.1109\/COMST.2019.2891891","journal-title":"IEEE Commun Surv Tutor"},{"issue":"1","key":"2382_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/19393555.2020.1853855","volume":"31","author":"Y Sadqi","year":"2022","unstructured":"Sadqi Y, Maleh Y (2022) A systematic review and taxonomy of web applications threats. Inf Secur J Glob Persp 31(1):1\u201327","journal-title":"Inf Secur J Glob Persp"},{"key":"2382_CR4","doi-asserted-by":"crossref","unstructured":"Mahaini MI, Li S, Sa\u011flam RB (2019) Building taxonomies based on human-machine teaming: cyber security as an example. In: Proceedings of the 14th international conference on availability, reliability and security, pp 1\u20139","DOI":"10.1145\/3339252.3339282"},{"key":"2382_CR5","doi-asserted-by":"crossref","unstructured":"Mashiane T, Kritzinger E (2019) Cybersecurity behaviour: a conceptual taxonomy. In: Information security theory and practice: 12th IFIP WG 11.2 International Conference, WISTP 2018, Brussels, Belgium, December 10\u201311, 2018, Revised Selected Papers 12. Springer, pp 147\u2013156","DOI":"10.1007\/978-3-030-20074-9_11"},{"key":"2382_CR6","unstructured":"JRC: A Proposal for a European Cybersecurity Taxonomy\u2014publications.jrc.ec.europa.eu. https:\/\/publications.jrc.ec.europa.eu\/repository \/handle\/JRC118089. Accessed 17 June 2024"},{"key":"2382_CR7","doi-asserted-by":"crossref","unstructured":"Page MJ, Moher D, Bossuyt PM, Boutron I, Hoffmann TC, Mulrow CD, Shamseer L, Tetzlaff JM, Akl EA, Brennan SE, et\u00a0al (2021) Prisma 2020 explanation and elaboration: updated guidance and exemplars for reporting systematic reviews. bmj 372","DOI":"10.1136\/bmj.n160"},{"issue":"3","key":"2382_CR8","first-page":"48","volume":"6","author":"M Patel","year":"2019","unstructured":"Patel M, Patel N (2019) Exploring research methodology. Int J Res Review 6(3):48\u201355","journal-title":"Int J Res Review"},{"key":"2382_CR9","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1016\/j.tele.2018.11.006","volume":"36","author":"F Casino","year":"2019","unstructured":"Casino F, Dasaklis TK, Patsakis C (2019) A systematic literature review of blockchain-based applications: current status, classification and open issues. Telem Inform 36:55\u201381","journal-title":"Telem Inform"},{"key":"2382_CR10","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/978-981-16-5301-8_6","volume-title":"Soft computing for security applications","author":"S Tiwari","year":"2022","unstructured":"Tiwari S, Dhanda N, Dev H (2022) A systematic review of adoption of blockchain and machine learning technology and its application. In: Ranganathan G, Fernando X, Shi F, El Allioui Y (eds) Soft computing for security applications. Springer, Singapore, pp 73\u201395"},{"key":"2382_CR11","doi-asserted-by":"crossref","unstructured":"Wohlin C (2014) Guidelines for snowballing in systematic literature studies and a replication in software engineering. In: Proceedings of the 18th international conference on evaluation and assessment in software engineering, pp 1\u201310","DOI":"10.1145\/2601248.2601268"},{"key":"2382_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.accinf.2020.100467","volume":"38","author":"A Chandra","year":"2020","unstructured":"Chandra A, Snowe MJ (2020) A taxonomy of cybercrime: theory and design. Int J Acc Inf Syst 38:100467","journal-title":"Int J Acc Inf Syst"},{"key":"2382_CR13","unstructured":"What is taxonomy? Definition from TechTarget techtarget.com. https:\/\/www.techtarget.com\/searchcontentmanagement \/definition\/taxonomy. Accessed 18 June 2024"},{"key":"2382_CR14","doi-asserted-by":"crossref","unstructured":"Mayr E, Linsley EG, Usinger RL (1953) Methods and principles of systematic zoology","DOI":"10.2307\/1440379"},{"issue":"3","key":"2382_CR15","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1057\/ejis.2012.26","volume":"22","author":"RC Nickerson","year":"2013","unstructured":"Nickerson RC, Varshney U, Muntermann J (2013) A method for taxonomy development and its application in information systems. Eur J Inf Syst 22(3):336\u2013359","journal-title":"Eur J Inf Syst"},{"key":"2382_CR16","doi-asserted-by":"crossref","unstructured":"Mavroeidis V, Bromander S (2017) Cyber threat intelligence model: an evaluation of taxonomies, sharing standards, and ontologies within cyber threat intelligence. In: 2017 European intelligence and security informatics conference (EISIC). IEEE, pp 91\u201398","DOI":"10.1109\/EISIC.2017.20"},{"key":"2382_CR17","unstructured":"NVD - Home\u2014nvd.nist.gov. https:\/\/nvd.nist.gov\/. Accessed 14 June 2024"},{"key":"2382_CR18","unstructured":"CWE - Common Weakness Enumeration\u2014cwe.mitre.org. https:\/\/cwe.mitre.org. Accessed 14 June 2024"},{"key":"2382_CR19","unstructured":"CAPEC - Common Attack Pattern Enumeration and Classification (CAPEC)\u2014capec.mitre.org. https:\/\/capec.mitre.org\/. Accessed 14 June 2024"},{"key":"2382_CR20","unstructured":"MITRE ATT &CK\u2014attack.mitre.org. https:\/\/attack.mitre.org. Accessed 14 June 2024"},{"key":"2382_CR21","doi-asserted-by":"crossref","unstructured":"Krishna CL, Murphy RR (2017) A review on cybersecurity vulnerabilities for unmanned aerial vehicles. In: 2017 IEEE international symposium on safety, security and rescue robotics (SSRR). IEEE, pp 194\u2013199","DOI":"10.1109\/SSRR.2017.8088163"},{"key":"2382_CR22","doi-asserted-by":"crossref","unstructured":"Cho S, Han I, Jeong H, Kim J, Koo S, Oh H, Park M (2018) Cyber kill chain based threat taxonomy and its application on cyber common operational picture. In: 2018 international conference on cyber situational awareness, data analytics and assessment (Cyber SA). IEEE, pp 1\u20138","DOI":"10.1109\/CyberSA.2018.8551383"},{"issue":"2","key":"2382_CR23","first-page":"301","volume":"22","author":"B Narwal","year":"2019","unstructured":"Narwal B, Mohapatra AK, Usmani KA (2019) Towards a taxonomy of cyber threats against target applications. J Stat Manag Syst 22(2):301\u2013325","journal-title":"J Stat Manag Syst"},{"issue":"11s","key":"2382_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3510410","volume":"54","author":"H Kayan","year":"2022","unstructured":"Kayan H, Nunes M, Rana O, Burnap P, Perera C (2022) Cybersecurity of industrial cyber-physical systems: a review. ACM Comput Surv (CSUR) 54(11s):1\u201335","journal-title":"ACM Comput Surv (CSUR)"},{"key":"2382_CR25","unstructured":"Howard JD, Longstaff TA (1998) A common language for computer security incidents. Technical report, Sandia National Lab.(SNL-NM), Albuquerque, NM (United States); Sandia"},{"issue":"1","key":"2382_CR26","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1016\/j.cose.2004.06.011","volume":"24","author":"S Hansman","year":"2005","unstructured":"Hansman S, Hunt R (2005) A taxonomy of network and computer attacks. Comput Secur 24(1):31\u201343","journal-title":"Comput Secur"},{"key":"2382_CR27","doi-asserted-by":"crossref","unstructured":"Meyers C, Powers S, Faissol D (2009) Taxonomies of cyber adversaries and attacks: a survey of incidents and approaches. Technical report, Lawrence Livermore National Lab.(LLNL), Livermore, CA (United States)","DOI":"10.2172\/967712"},{"key":"2382_CR28","unstructured":"Simmons C, Ellis C, Shiva S, Dasgupta D, Wu Q (2009) Avoidit: A cyber attack taxonomy. University of Memphis, Technical Report CS-09-003"},{"key":"2382_CR29","doi-asserted-by":"crossref","unstructured":"Simmons CB, Shiva SG, Bedi HS, Shandilya V (2013) Adapt: a game inspired attack-defense and performance metric taxonomy. In: Security and privacy protection in information processing systems: 28th IFIP TC 11 International Conference, SEC 2013, Auckland, New Zealand, July 8-10, 2013. Proceedings 28. Springer, pp 344\u2013365","DOI":"10.1007\/978-3-642-39218-4_26"},{"issue":"5","key":"2382_CR30","first-page":"30","volume":"100","author":"C Joshi","year":"2014","unstructured":"Joshi C, Singh UK (2014) Admit-a five dimensional approach towards standardization of network and computer attack taxonomies. Int J Comput Appl 100(5):30\u201336","journal-title":"Int J Comput Appl"},{"key":"2382_CR31","doi-asserted-by":"crossref","unstructured":"Rajbahadur GK, Malton AJ, Walenstein A, Hassan AE (2018) A survey of anomaly detection for connected vehicle cybersecurity and safety. In: 2018 IEEE intelligent vehicles symposium (IV). IEEE, pp 421\u2013426","DOI":"10.1109\/IVS.2018.8500383"},{"issue":"10","key":"2382_CR32","doi-asserted-by":"publisher","first-page":"4928","DOI":"10.1007\/s11227-018-2287-8","volume":"74","author":"H Sedjelmaci","year":"2018","unstructured":"Sedjelmaci H, Senouci SM (2018) Cyber security methods for aerial vehicle networks: taxonomy, challenges and solution. J Supercomput 74(10):4928\u20134944","journal-title":"J Supercomput"},{"issue":"6","key":"2382_CR33","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1109\/MCE.2019.2928066","volume":"8","author":"H Thapliyal","year":"2019","unstructured":"Thapliyal H, Mohanty SP, Prowell SJ (2019) Emerging paradigms in vehicular cybersecurity. IEEE Consumer Electron Mag 8(6):81\u201383","journal-title":"IEEE Consumer Electron Mag"},{"key":"2382_CR34","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1016\/j.procs.2017.09.050","volume":"114","author":"M Wu","year":"2017","unstructured":"Wu M, Moon YB (2017) Taxonomy of cross-domain attacks on cybermanufacturing system. Procedia Comput Sci 114:367\u2013374","journal-title":"Procedia Comput Sci"},{"key":"2382_CR35","doi-asserted-by":"crossref","unstructured":"Wu M, Moon YB (2018) Taxonomy for secure cybermanufacturing systems. In: ASME International mechanical engineering congress and exposition, vol 52019. American Society of Mechanical Engineers, pp 002\u201302067","DOI":"10.1115\/IMECE2018-86091"},{"issue":"4","key":"2382_CR36","doi-asserted-by":"publisher","first-page":"495","DOI":"10.1109\/JPROC.2020.3032074","volume":"109","author":"P Mahesh","year":"2020","unstructured":"Mahesh P, Tiwari A, Jin C, Kumar PR, Reddy AN, Bukkapatanam ST, Gupta N, Karri R (2020) A survey of cybersecurity of digital manufacturing. Proc IEEE 109(4):495\u2013516","journal-title":"Proc IEEE"},{"key":"2382_CR37","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1016\/j.jmsy.2023.03.009","volume":"68","author":"MH Rahman","year":"2023","unstructured":"Rahman MH, Wuest T, Shafae M (2023) Manufacturing cybersecurity threat attributes and countermeasures: review, meta-taxonomy, and use cases of cyberattack taxonomies. J Manuf Syst 68:196\u2013208","journal-title":"J Manuf Syst"},{"key":"2382_CR38","doi-asserted-by":"crossref","unstructured":"Huseinovic A, Mrdovic S, Bicakci K, Uludag S (2018) A taxonomy of the emerging denial-of-service attacks in the smart grid and countermeasures. In: 2018 26th telecommunications forum (TELFOR). IEEE, pp 1\u20134","DOI":"10.1109\/TELFOR.2018.8611847"},{"issue":"18","key":"2382_CR39","doi-asserted-by":"publisher","first-page":"6799","DOI":"10.3390\/en15186799","volume":"15","author":"J Ding","year":"2022","unstructured":"Ding J, Qammar A, Zhang Z, Karim A, Ning H (2022) Cyber threats to smart grids: review, taxonomy, potential solutions, and future directions. Energies 15(18):6799","journal-title":"Energies"},{"key":"2382_CR40","doi-asserted-by":"publisher","DOI":"10.1016\/j.rser.2022.112423","volume":"163","author":"HT Reda","year":"2022","unstructured":"Reda HT, Anwar A, Mahmood A (2022) Comprehensive survey and taxonomies of false data injection attacks in smart grids: attack models, targets, and impacts. Renew Sustain Energy Rev 163:112423","journal-title":"Renew Sustain Energy Rev"},{"issue":"3","key":"2382_CR41","first-page":"429","volume":"12","author":"GC Kessler","year":"2018","unstructured":"Kessler GC, Craiger JP, Haass JC (2018) A taxonomy framework for maritime cybersecurity: a demonstration using the automatic identification system. TransNav Int J Mar Navig Saf Sea Transp 12(3):429\u2013437","journal-title":"TransNav Int J Mar Navig Saf Sea Transp"},{"key":"2382_CR42","doi-asserted-by":"publisher","first-page":"128440","DOI":"10.1109\/ACCESS.2020.3007960","volume":"8","author":"G Stergiopoulos","year":"2020","unstructured":"Stergiopoulos G, Gritzalis DA, Limnaios E (2020) Cyber-attacks on the oil & gas sector: a survey on incident assessment and attack patterns. IEEE Access 8:128440\u2013128475","journal-title":"IEEE Access"},{"issue":"1","key":"2382_CR43","first-page":"006","volume":"4","author":"I Agrafiotis","year":"2018","unstructured":"Agrafiotis I, Nurse JR, Goldsmith M, Creese S, Upton D (2018) A taxonomy of cyber-harms: defining the impacts of cyber-attacks and understanding how they propagate. J Cybersecur 4(1):006","journal-title":"J Cybersecur"},{"key":"2382_CR44","doi-asserted-by":"crossref","unstructured":"Harmandeep S, Kumar G (2018) Cybercrimes: a proposed taxonomy and challenges. J Comput Netw Commun 11","DOI":"10.1155\/2018\/1798659"},{"key":"2382_CR45","unstructured":"Hasham S, Joshi S, Mikkelsen D (2019) Financial crime and fraud in the age of cybersecurity. McKinsey & Company 2019"},{"key":"2382_CR46","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102145","volume":"102","author":"JJ Plotnek","year":"2021","unstructured":"Plotnek JJ, Slay J (2021) Cyber terrorism: a homogenized taxonomy and definition. Comput Secur 102:102145","journal-title":"Comput Secur"},{"issue":"2","key":"2382_CR47","first-page":"379","volume":"2","author":"K Phillips","year":"2022","unstructured":"Phillips K, Davidson JC, Farr RR, Burkhardt C, Caneppele S, Aiken MP (2022) Conceptualizing cybercrime: definitions, typologies and taxonomies. For Sci 2(2):379\u2013398","journal-title":"For Sci"},{"key":"2382_CR48","doi-asserted-by":"publisher","first-page":"124134","DOI":"10.1109\/ACCESS.2020.3006172","volume":"8","author":"S Hakak","year":"2020","unstructured":"Hakak S, Khan WZ, Imran M, Choo K-KR, Shoaib M (2020) Have you been a victim of covid-19-related cyber incidents? survey, taxonomy, and mitigation strategies. Ieee Access 8:124134\u2013124144","journal-title":"Ieee Access"},{"issue":"4","key":"2382_CR49","first-page":"865","volume":"15","author":"PN Bahrami","year":"2019","unstructured":"Bahrami PN, Dehghantanha A, Dargahi T, Parizi RM, Choo K-KR, Javadi HH (2019) Cyber kill chain-based taxonomy of advanced persistent threat actors: analogy of tactics, techniques, and procedures. J Inf Process Syst 15(4):865\u2013889","journal-title":"J Inf Process Syst"},{"issue":"16","key":"2382_CR50","doi-asserted-by":"publisher","first-page":"7738","DOI":"10.3390\/app11167738","volume":"11","author":"K Kim","year":"2021","unstructured":"Kim K, Alfouzan FA, Kim H (2021) Cyber-attack scoring model based on the offensive cybersecurity framework. Appl Sci 11(16):7738","journal-title":"Appl Sci"},{"issue":"6","key":"2382_CR51","doi-asserted-by":"publisher","first-page":"3771","DOI":"10.1109\/TEM.2020.2979832","volume":"69","author":"C Onwubiko","year":"2020","unstructured":"Onwubiko C, Ouazzane K (2020) Soter: a playbook for cybersecurity incident management. IEEE Trans Eng Manage 69(6):3771\u20133791","journal-title":"IEEE Trans Eng Manage"},{"issue":"2","key":"2382_CR52","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3303771","volume":"52","author":"I Homoliak","year":"2019","unstructured":"Homoliak I, Toffalini F, Guarnizo J, Elovici Y, Ochoa M (2019) Insight into insiders and it: a survey of insider threat taxonomies, analysis, modeling, and countermeasures. ACM Comput Surv (CSUR) 52(2):1\u201340","journal-title":"ACM Comput Surv (CSUR)"},{"key":"2382_CR53","doi-asserted-by":"crossref","unstructured":"Rea-Guaman A, San\u00a0Feliu T, Calvo-Manzano J, S\u00e1nchez-Garc\u00eda ID (2018) Systematic review: Cybersecurity risk taxonomy. In: Trends and applications in software engineering: proceedings of the 6th international conference on software process improvement (CIMPS 2017) 6. Springer, pp 137\u2013146","DOI":"10.1007\/978-3-319-69341-5_13"},{"key":"2382_CR54","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1007\/s11416-019-00338-7","volume":"15","author":"T Dargahi","year":"2019","unstructured":"Dargahi T, Dehghantanha A, Bahrami PN, Conti M, Bianchi G, Benedetto L (2019) A cyber-kill-chain based taxonomy of crypto-ransomware features. J Comput Virol Hack Techn 15:277\u2013305","journal-title":"J Comput Virol Hack Techn"},{"key":"2382_CR55","doi-asserted-by":"publisher","first-page":"2489","DOI":"10.1007\/s10845-018-1408-9","volume":"30","author":"AE Elhabashy","year":"2019","unstructured":"Elhabashy AE, Wells LJ, Camelio JA, Woodall WH (2019) A cyber-physical attack taxonomy for production systems: a quality control perspective. J Intell Manuf 30:2489\u20132504","journal-title":"J Intell Manuf"},{"key":"2382_CR56","doi-asserted-by":"publisher","first-page":"394","DOI":"10.1016\/j.jocs.2017.10.020","volume":"27","author":"D Kiwia","year":"2018","unstructured":"Kiwia D, Dehghantanha A, Choo K-KR, Slaughter J (2018) A cyber kill chain based taxonomy of banking trojans for evolutionary computational intelligence. J Comput Sci 27:394\u2013409","journal-title":"J Comput Sci"},{"key":"2382_CR57","doi-asserted-by":"crossref","unstructured":"Pan Y, White J, Schmidt D, Elhabashy A, Sturm L, Camelio J, Williams C (2017) Taxonomies for reasoning about cyber-physical attacks in iot-based manufacturing systems","DOI":"10.9781\/ijimai.2017.437"},{"key":"2382_CR58","doi-asserted-by":"publisher","first-page":"398","DOI":"10.1016\/j.cose.2018.07.011","volume":"78","author":"R Heartfield","year":"2018","unstructured":"Heartfield R, Loukas G, Budimir S, Bezemskij A, Fontaine JR, Filippoupolitis A, Roesch E (2018) A taxonomy of cyber-physical threats and impact in the smart home. Comput Secur 78:398\u2013428","journal-title":"Comput Secur"},{"key":"2382_CR59","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102951","volume":"124","author":"B Odeleye","year":"2023","unstructured":"Odeleye B, Loukas G, Heartfield R, Sakellari G, Panaousis E, Spyridonis F (2023) Virtually secure: a taxonomic assessment of cybersecurity challenges in virtual reality environments. Comput Secur 124:102951","journal-title":"Comput Secur"},{"key":"2382_CR60","doi-asserted-by":"crossref","unstructured":"Plachkinova M, Vo A (2022) A taxonomy of cyberattacks against critical infrastructure. J Cybersecur Educ Res Pract 2021(2)","DOI":"10.62915\/2472-2707.1097"},{"issue":"5","key":"2382_CR61","doi-asserted-by":"publisher","first-page":"995","DOI":"10.1016\/j.net.2019.11.001","volume":"52","author":"S Kim","year":"2020","unstructured":"Kim S, Heo G, Zio E, Shin J, Song J (2020) Cyber attack taxonomy for digital environment in nuclear power plants. Nucl Eng Technol 52(5):995\u20131001","journal-title":"Nucl Eng Technol"},{"issue":"6","key":"2382_CR62","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1007\/s12599-023-00811-0","volume":"65","author":"Y Jiang","year":"2023","unstructured":"Jiang Y, Jeusfeld MA, Ding J, Sandahl E (2023) Model-based cybersecurity analysis: extending enterprise modeling to critical infrastructure cybersecurity. Bus Inf Syst Eng 65(6):643\u2013676","journal-title":"Bus Inf Syst Eng"},{"issue":"1","key":"2382_CR63","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1109\/JIOT.2021.3079916","volume":"9","author":"C Xenofontos","year":"2021","unstructured":"Xenofontos C, Zografopoulos I, Konstantinou C, Jolfaei A, Khan MK, Choo K-KR (2021) Consumer, commercial, and industrial iot (in) security: attack taxonomy and case studies. IEEE Internet Things J 9(1):199\u2013221","journal-title":"IEEE Internet Things J"},{"issue":"3","key":"2382_CR64","doi-asserted-by":"publisher","first-page":"1113","DOI":"10.3390\/en16031113","volume":"16","author":"Z Muhammad","year":"2023","unstructured":"Muhammad Z, Anwar Z, Saleem B, Shahid J (2023) Emerging cybersecurity and privacy threats to electric vehicles and their impact on human and environmental sustainability. Energies 16(3):1113","journal-title":"Energies"},{"issue":"13","key":"2382_CR65","doi-asserted-by":"publisher","first-page":"2763","DOI":"10.3390\/app9132763","volume":"9","author":"JC Sapalo Sicato","year":"2019","unstructured":"Sapalo Sicato JC, Sharma PK, Loia V, Park JH (2019) Vpnfilter malware analysis on cyber threat in smart home network. Appl Sci 9(13):2763","journal-title":"Appl Sci"},{"key":"2382_CR66","doi-asserted-by":"crossref","unstructured":"Javaheri D, Fahmideh M, Chizari H, Lalbakhsh P, Hur J (2023) Cybersecurity threats in fintech: a systematic review. Expert Syst Appl 122697","DOI":"10.1016\/j.eswa.2023.122697"},{"key":"2382_CR67","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101790","volume":"93","author":"S Berger","year":"2020","unstructured":"Berger S, B\u00fcrger O, R\u00f6glinger M (2020) Attacks on the industrial internet of things-development of a multi-layer taxonomy. Comput Secur 93:101790","journal-title":"Comput Secur"},{"key":"2382_CR68","doi-asserted-by":"publisher","first-page":"887","DOI":"10.1016\/j.future.2019.03.007","volume":"97","author":"A Qamar","year":"2019","unstructured":"Qamar A, Karim A, Chang V (2019) Mobile malware attacks: review, taxonomy & future directions. Futur Gener Comput Syst 97:887\u2013909","journal-title":"Futur Gener Comput Syst"},{"key":"2382_CR69","doi-asserted-by":"crossref","unstructured":"Djenna A, Sa\u00efdouni DE (2018) Cyber attacks classification in iot-based-healthcare infrastructure. In: 2018 2nd cyber security in networking conference (CSNet). IEEE, pp 1\u20134","DOI":"10.1109\/CSNET.2018.8602974"},{"key":"2382_CR70","doi-asserted-by":"publisher","DOI":"10.1016\/j.aap.2020.105837","volume":"148","author":"SK Khan","year":"2020","unstructured":"Khan SK, Shiwakoti N, Stasinopoulos P, Chen Y (2020) Cyber-attacks in the next-generation cars, mitigation techniques, anticipated readiness and future directions. Acc Anal Prevent 148:105837","journal-title":"Acc Anal Prevent"},{"key":"2382_CR71","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2019.100199","volume":"34","author":"N Pitropakis","year":"2019","unstructured":"Pitropakis N, Panaousis E, Giannetsos T, Anastasiadis E, Loukas G (2019) A taxonomy and survey of attacks against machine learning. Comput Sci Rev 34:100199","journal-title":"Comput Sci Rev"},{"key":"2382_CR72","doi-asserted-by":"publisher","first-page":"406","DOI":"10.1016\/j.comcom.2020.02.008","volume":"153","author":"R Gupta","year":"2020","unstructured":"Gupta R, Tanwar S, Tyagi S, Kumar N (2020) Machine learning models for secure data analytics: a taxonomy and threat model. Comput Commun 153:406\u2013440","journal-title":"Comput Commun"},{"issue":"2","key":"2382_CR73","volume":"1","author":"O Thorat","year":"2021","unstructured":"Thorat O, Parekh N, Mangrulkar R (2021) Taxodacml: taxonomy based divide and conquer using machine learning approach for ddos attack classification. Int J Inf Manag Data Insights 1(2):100048","journal-title":"Int J Inf Manag Data Insights"},{"key":"2382_CR74","doi-asserted-by":"publisher","first-page":"36429","DOI":"10.1109\/ACCESS.2022.3151903","volume":"10","author":"NQ Do","year":"2022","unstructured":"Do NQ, Selamat A, Krejcar O, Herrera-Viedma E, Fujita H (2022) Deep learning for phishing detection: taxonomy, current challenges and future directions. Ieee Access 10:36429\u201336463","journal-title":"Ieee Access"},{"key":"2382_CR75","unstructured":"Pienta D, Thatcher JB, Johnston AC (2018) A taxonomy of phishing: attack types spanning economic, temporal, breadth, and target boundaries"},{"key":"2382_CR76","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s42400-021-00094-6","volume":"4","author":"Z Wang","year":"2021","unstructured":"Wang Z, Zhu H, Liu P, Sun L (2021) Social engineering in cybersecurity: a domain ontology and knowledge graph application examples. Cybersecurity 4:1\u201321","journal-title":"Cybersecurity"},{"key":"2382_CR77","doi-asserted-by":"crossref","unstructured":"Sharafaldin I, Lashkari AH, Hakak S, Ghorbani AA (2019) Developing realistic distributed denial of service (ddos) attack dataset and taxonomy. In: 2019 international carnahan conference on security technology (ICCST). IEEE, pp 1\u20138","DOI":"10.1109\/CCST.2019.8888419"},{"issue":"1","key":"2382_CR78","first-page":"1","volume":"52","author":"M Plachkinova","year":"2023","unstructured":"Plachkinova M (2023) A taxonomy for risk assessment of cyberattacks on critical infrastructure (traci). Commun Assoc Inf Syst 52(1):1","journal-title":"Commun Assoc Inf Syst"},{"key":"2382_CR79","doi-asserted-by":"publisher","first-page":"184560","DOI":"10.1109\/ACCESS.2020.3029280","volume":"8","author":"D Jeong","year":"2020","unstructured":"Jeong D (2020) Artificial intelligence security threat, crime, and forensics: taxonomy and open issues. IEEE Access 8:184560\u2013184574","journal-title":"IEEE Access"},{"key":"2382_CR80","volume":"39","author":"A Derhab","year":"2023","unstructured":"Derhab A, Cheikhrouhou O, Allouch A, Koubaa A, Qureshi B, Ferrag MA, Maglaras L, Khan FA (2023) Internet of drones security: taxonomies, open issues, and future directions. Veh Commun 39:100552","journal-title":"Veh Commun"},{"key":"2382_CR81","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2020.100356","volume":"29","author":"MM Ahmadian","year":"2020","unstructured":"Ahmadian MM, Shajari M, Shafiee MA (2020) Industrial control system security taxonomic framework with application to a comprehensive incidents survey. Int J Crit Infrastruct Prot 29:100356","journal-title":"Int J Crit Infrastruct Prot"},{"key":"2382_CR82","doi-asserted-by":"publisher","first-page":"104650","DOI":"10.1109\/ACCESS.2020.3000179","volume":"8","author":"H Hindy","year":"2020","unstructured":"Hindy H, Brosset D, Bayne E, Seeam AK, Tachtatzis C, Atkinson R, Bellekens X (2020) A taxonomy of network threats and the effect of current datasets on intrusion detection systems. IEEE Access 8:104650\u2013104675","journal-title":"IEEE Access"},{"issue":"2","key":"2382_CR83","doi-asserted-by":"publisher","first-page":"2103","DOI":"10.1109\/JIOT.2018.2869847","volume":"6","author":"Y Lu","year":"2018","unstructured":"Lu Y, Da Xu L (2018) Internet of things (iot) cybersecurity research: a review of current research topics. IEEE Internet Things J 6(2):2103\u20132115","journal-title":"IEEE Internet Things J"},{"key":"2382_CR84","doi-asserted-by":"publisher","first-page":"45820","DOI":"10.1109\/ACCESS.2022.3168972","volume":"10","author":"M Rahouti","year":"2022","unstructured":"Rahouti M, Xiong K, Xin Y, Jagatheesaperumal SK, Ayyash M, Shaheed M (2022) Sdn security review: threat taxonomy, implications, and open challenges. IEEE Access 10:45820\u201345854","journal-title":"IEEE Access"},{"key":"2382_CR85","unstructured":"Ferdinand J, Benham R (2017) The cyber security ecosystem: defining a taxonomy of existing, emerging and future cyber threats"},{"key":"2382_CR86","doi-asserted-by":"crossref","unstructured":"Brar HS, Kumar G (2018) Cybercrimes: a proposed taxonomy and challenges. J Comput Netw Commun 2018(1):1798659","DOI":"10.1155\/2018\/1798659"},{"issue":"3","key":"2382_CR87","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3530977","volume":"25","author":"C Martins","year":"2022","unstructured":"Martins C, Medeiros I (2022) Generating quality threat intelligence leveraging osint and a cyber threat unified taxonomy. ACM Trans Privacy Secur 25(3):1\u201339","journal-title":"ACM Trans Privacy Secur"},{"key":"2382_CR88","doi-asserted-by":"publisher","unstructured":"Kejriwal M, Shen K (2023) In: \u00d6zyer ST, Kaya B (eds.) A Lightweight Global Taxonomy Induction System for E-Commerce Concept Labels, pp 99\u2013114. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-031-33065-0_5","DOI":"10.1007\/978-3-031-33065-0_5"},{"key":"2382_CR89","doi-asserted-by":"crossref","unstructured":"Rastogi N, Dutta S, Zaki M.J, Gittens A, Aggarwal C (2020) Malont: an ontology for malware threat intelligence. In: International workshop on deployable machine learning for security defense. Springer, pp 28\u201344","DOI":"10.1007\/978-3-030-59621-7_2"},{"key":"2382_CR90","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108288","volume":"197","author":"T Madi","year":"2021","unstructured":"Madi T, Alameddine HA, Pourzandi M, Boukhtouta A (2021) Nfv security survey in 5g networks: a three-dimensional threat taxonomy. Comput Netw 197:108288","journal-title":"Comput Netw"},{"key":"2382_CR91","unstructured":"Casey T (2015) Understanding cyber threat motivations to improve defense. Intel White Paper"},{"key":"2382_CR92","unstructured":"Casey T (2007) Threat agent library helps identify information security risks. Intel White Paper 2"},{"key":"2382_CR93","unstructured":"CVE - CVE\u2014cve.mitre.org. https:\/\/cve.mitre.org. Accessed 14 June 2024"},{"key":"2382_CR94","first-page":"486","volume":"2020","author":"J Shen","year":"2020","unstructured":"Shen J, Shen Z, Xiong C, Wang C, Wang K, Han J (2020) Taxoexpan: self-supervised taxonomy expansion with position-enhanced graph neural network. Proc Web Conf 2020:486\u2013497","journal-title":"Proc Web Conf"},{"key":"2382_CR95","doi-asserted-by":"crossref","unstructured":"Meier S, Glinka K (2023) To classify is to interpret: Building taxonomies from heterogeneous data through human-ai collaboration. In: Proceedings of mensch und computer 2023. Association for Computing Machinery, pp 395\u2013401","DOI":"10.1145\/3603555.3608532"},{"key":"2382_CR96","first-page":"2819","volume":"2022","author":"D Lee","year":"2022","unstructured":"Lee D, Shen J, Kang S, Yoon S, Han J, Yu H (2022) Taxocom: topic taxonomy completion with hierarchical discovery of novel topic clusters. Proc ACM Web Conf 2022:2819\u20132829","journal-title":"Proc ACM Web Conf"},{"key":"2382_CR97","unstructured":"Zheng M, Robbins H, Chai Z, Thapa P, Moore T (2018) Cybersecurity research datasets: Taxonomy and empirical analysis. In: 11th USENIX workshop on cyber security experimentation and test (CSET 18)"},{"key":"2382_CR98","doi-asserted-by":"crossref","unstructured":"Kougioumtzidou A, Papoutsis A, Kavallieros D, Mavropoulos T, Tsikrika T, Vrochidis S, Kompatsiaris I (2024) An end-to-end framework for cybersecurity taxonomy and ontology generation and updating. In: 2024 IEEE international conference on cyber security and resilience (CSR). IEEE, pp 247\u2013254","DOI":"10.1109\/CSR61664.2024.10679346"},{"key":"2382_CR99","volume-title":"DARPA intrusion detection scenario specific data sets","author":"M Zissman","year":"2000","unstructured":"Zissman M (2000) DARPA intrusion detection scenario specific data sets. Lincoln Laboratory, Massachusetts Institute of Technology, Lexington"},{"key":"2382_CR100","unstructured":"CAIDA: The CAIDA \u201cDDoS Attack 2007\u201d Dataset. https:\/\/www.caida.org\/catalog\/datasets\/ddos-20070804_dataset\/. Accessed 14 June 2024 (2007)"},{"key":"2382_CR101","doi-asserted-by":"crossref","unstructured":"Wang X, Liu X, Ao S, Li N, Jiang Z, Xu Z, Xiong Z, Xiong M, Zhang X (2020) Dnrti: A large-scale dataset for named entity recognition in threat intelligence. In: 2020 IEEE 19th international conference on trust, security and privacy in computing and communications (TrustCom). IEEE, pp 1842\u20131848","DOI":"10.1109\/TrustCom50675.2020.00252"},{"key":"2382_CR102","doi-asserted-by":"crossref","unstructured":"Wang X, He S, Xiong Z, Wei X, Jiang Z, Chen S, Jiang J (2022) Aptner: A specific dataset for ner missions in cyber threat intelligence field. In: 2022 IEEE 25th international conference on computer supported cooperative work in design (CSCWD). IEEE, pp 1233\u20131238","DOI":"10.1109\/CSCWD54268.2022.9776031"},{"key":"2382_CR103","unstructured":"Vyas S, Hannay J, Bolton A, Burnap PP (2023) Automated cyber defence: a review. arXiv preprint arXiv:2303.04926"},{"key":"2382_CR104","doi-asserted-by":"crossref","unstructured":"Kinyua J, Awuah L (2021) Ai\/ml in security orchestration, automation and response: future research directions. Intell Autom Soft Comput 28(2)","DOI":"10.32604\/iasc.2021.016240"},{"issue":"3","key":"2382_CR105","doi-asserted-by":"publisher","first-page":"410","DOI":"10.3390\/sym12030410","volume":"12","author":"TC Truong","year":"2020","unstructured":"Truong TC, Diep QB, Zelinka I (2020) Artificial intelligence in the cyber domain: Offense and defense. Symmetry 12(3):410","journal-title":"Symmetry"},{"key":"2382_CR106","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40537-020-00318-5","volume":"7","author":"IH Sarker","year":"2020","unstructured":"Sarker IH, Kayes A, Badsha S, Alqahtani H, Watters P, Ng A (2020) Cybersecurity data science: an overview from machine learning perspective. J Big Data 7:1\u201329","journal-title":"J Big Data"},{"key":"2382_CR107","doi-asserted-by":"publisher","first-page":"23817","DOI":"10.1109\/ACCESS.2020.2968045","volume":"8","author":"S Zeadally","year":"2020","unstructured":"Zeadally S, Adi E, Baig Z, Khan IA (2020) Harnessing artificial intelligence capabilities to improve cybersecurity. Ieee Access 8:23817\u201323837","journal-title":"Ieee Access"},{"issue":"17","key":"2382_CR108","doi-asserted-by":"publisher","first-page":"3509","DOI":"10.3390\/electronics13173509","volume":"13","author":"M Goyal","year":"2024","unstructured":"Goyal M, Mahmoud QH (2024) A systematic review of synthetic data generation techniques using generative ai. Electronics 13(17):3509","journal-title":"Electronics"},{"issue":"11","key":"2382_CR109","doi-asserted-by":"publisher","first-page":"722","DOI":"10.3390\/info15110722","volume":"15","author":"K Alfarsi","year":"2024","unstructured":"Alfarsi K, Rasheed S, Ahmad I (2024) Malware classification using few-shot learning approach. Information 15(11):722","journal-title":"Information"},{"issue":"2","key":"2382_CR110","doi-asserted-by":"publisher","first-page":"40","DOI":"10.3390\/technologies11020040","volume":"11","author":"M Iman","year":"2023","unstructured":"Iman M, Arabnia HR, Rasheed K (2023) A review of deep transfer learning and recent advancements. Technologies 11(2):40","journal-title":"Technologies"},{"issue":"2","key":"2382_CR111","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3652594","volume":"27","author":"M Bayer","year":"2024","unstructured":"Bayer M, Kuehn P, Shanehsaz R, Reuter C (2024) Cysecbert: a domain-adapted language model for the cybersecurity domain. ACM Trans Privacy Secur 27(2):1\u201320","journal-title":"ACM Trans Privacy Secur"},{"key":"2382_CR112","doi-asserted-by":"crossref","unstructured":"Sikos LF (2023) Cybersecurity knowledge graphs. Knowl Inf Syst 65(9):3511\u20133531","DOI":"10.1007\/s10115-023-01860-3"},{"key":"2382_CR113","unstructured":"Leszczyna R (2023) Selecting an applicable cybersecurity assessment framework: qualitative metrics-based multiple-factor analysis. J Comput Inf Syst 1\u201316"},{"issue":"5","key":"2382_CR114","doi-asserted-by":"publisher","first-page":"359","DOI":"10.4236\/jsea.2024.175020","volume":"17","author":"M Jaikanth","year":"2024","unstructured":"Jaikanth M, Madisetti VK (2024) A comparative analysis of cybersecurity threat taxonomies for healthcare organizations. J Softw Eng Appl 17(5):359\u2013377","journal-title":"J Softw Eng Appl"},{"issue":"1","key":"2382_CR115","doi-asserted-by":"publisher","first-page":"13098","DOI":"10.1111\/exsy.13098","volume":"40","author":"M Unterkalmsteiner","year":"2023","unstructured":"Unterkalmsteiner M, Adbeen W (2023) A compendium and evaluation of taxonomy quality attributes. Expert Syst 40(1):13098","journal-title":"Expert Syst"},{"issue":"12","key":"2382_CR116","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3571726","volume":"55","author":"MR Rahman","year":"2023","unstructured":"Rahman MR, Hezaveh RM, Williams L (2023) What are the attackers doing now? automating cyberthreat intelligence extraction from text on pace with the changing threat landscape: A survey. ACM Comput Surv 55(12):1\u201336","journal-title":"ACM Comput Surv"},{"key":"2382_CR117","volume":"58","author":"Y Li","year":"2021","unstructured":"Li Y, Cheng J, Huang C, Chen Z, Niu W (2021) Nedetector: automatically extracting cybersecurity neologisms from hacker forums. J Inf Secur Appl 58:102784","journal-title":"J Inf Secur Appl"},{"issue":"11","key":"2382_CR118","doi-asserted-by":"publisher","first-page":"789","DOI":"10.1007\/s12243-022-00926-7","volume":"77","author":"F Charmet","year":"2022","unstructured":"Charmet F, Tanuwidjaja HC, Ayoubi S, Gimenez P-F, Han Y, Jmila H, Blanc G, Takahashi T, Zhang Z (2022) Explainable artificial intelligence for cybersecurity: a literature survey. Ann Telecommun 77(11):789\u2013812","journal-title":"Ann Telecommun"},{"key":"2382_CR119","doi-asserted-by":"crossref","unstructured":"Chen Y, Cui M, Wang D, Cao Y, Yang P, Jiang B, Lu Z, Liu B (2024) A survey of large language models for cyber threat detection. Comput Secur 104016","DOI":"10.1016\/j.cose.2024.104016"},{"issue":"3","key":"2382_CR120","first-page":"489","volume":"8","author":"H Paulheim","year":"2017","unstructured":"Paulheim H (2017) Knowledge graph refinement: a survey of approaches and evaluation methods. Semantic web 8(3):489\u2013508","journal-title":"Semantic web"}],"container-title":["Knowledge and Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10115-025-02382-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10115-025-02382-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10115-025-02382-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,6]],"date-time":"2025-09-06T09:53:14Z","timestamp":1757152394000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10115-025-02382-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,8]]},"references-count":120,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2025,6]]}},"alternative-id":["2382"],"URL":"https:\/\/doi.org\/10.1007\/s10115-025-02382-w","relation":{},"ISSN":["0219-1377","0219-3116"],"issn-type":[{"value":"0219-1377","type":"print"},{"value":"0219-3116","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,3,8]]},"assertion":[{"value":"27 August 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 January 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 February 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 March 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing financial interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}