{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T19:24:38Z","timestamp":1774466678967,"version":"3.50.1"},"reference-count":55,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,9,24]],"date-time":"2023-09-24T00:00:00Z","timestamp":1695513600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,9,24]],"date-time":"2023-09-24T00:00:00Z","timestamp":1695513600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2024,2]]},"DOI":"10.1007\/s10207-023-00752-5","type":"journal-article","created":{"date-parts":[[2023,9,24]],"date-time":"2023-09-24T06:01:31Z","timestamp":1695535291000},"page":"557-575","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":31,"title":["An integrated deep learning model for Ethereum smart contract vulnerability detection"],"prefix":"10.1007","volume":"23","author":[{"given":"Vikas Kumar","family":"Jain","sequence":"first","affiliation":[]},{"given":"Meenakshi","family":"Tripathi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,9,24]]},"reference":[{"key":"752_CR1","doi-asserted-by":"publisher","first-page":"102050","DOI":"10.1016\/j.cose.2020.102050","volume":"99","author":"X Yang","year":"2020","unstructured":"Yang, X., Li, W.: A zero-knowledge-proof-based digital identity management scheme in blockchain. Comput. Secu. 99, 102050 (2020). https:\/\/doi.org\/10.1016\/j.cose.2020.102050","journal-title":"Comput. Secu."},{"issue":"4","key":"752_CR2","doi-asserted-by":"publisher","first-page":"1476","DOI":"10.1109\/TEM.2019.2960829","volume":"67","author":"MS Rahman","year":"2020","unstructured":"Rahman, M.S., Al Omar, A., Bhuiyan, M.Z., Basu, A., Kiyomoto, S., Wang, G.: Accountable cross-border data sharing using blockchain under relaxed trust assumption. IEEE Trans. Eng. Manage. 67(4), 1476\u20131486 (2020). https:\/\/doi.org\/10.1109\/TEM.2019.2960829","journal-title":"IEEE Trans. Eng. Manage."},{"key":"752_CR3","doi-asserted-by":"publisher","unstructured":"Wan, Z., Guan, Z., & Cheng, X.: PRIDE: A Private and Decentralized Usage-Based Insurance Using Blockchain.\u00a02018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), pp. 1349\u20131354, (2018). doi:https:\/\/doi.org\/10.1109\/Cybermatics_2018.2018.00232","DOI":"10.1109\/Cybermatics_2018.2018.00232"},{"key":"752_CR4","unstructured":"Wood, G.: Ethereum: a secure decentralized generalized transaction ledger. Ethereum Project Yellow Paper. (2014) URL https:\/\/ethereum.github.io\/yellowpaper\/paper.pdf. (Accessed 11 Dec 2021)"},{"key":"752_CR5","unstructured":"Buterin, V.: A next generation smart contract & decentralized application platform, (2015). (Accessed 05 Nov 2021)"},{"key":"752_CR6","doi-asserted-by":"publisher","unstructured":"Atzei, N., Bartoletti, M., Cimoli, T.: A survey of attacks on Ethereum smart contracts (SoK). Lecture Notes in Computer Science, pp. 164\u2013186 (2017). https:\/\/doi.org\/10.1007\/978-3-662-54455-6_8","DOI":"10.1007\/978-3-662-54455-6_8"},{"key":"752_CR7","unstructured":"Michael del Castillo: http:\/\/www.coindesk.com\/daoattacked-code-issue-leads-60-million-ether-theft. (Accessed 05 Dec 2021)"},{"key":"752_CR8","unstructured":"SANTIAGO PALLADINO: https:\/\/blog.openzeppelin.com\/on-the-parity-wallet-multisig-hack-405a8c12e8f7\/.(Accessed 11 Dec 2021)"},{"key":"752_CR9","unstructured":"Integer Overflow and Underflow attacks on Smart contracts: https:\/\/dasp.co\/#item-3. (Accessed 15 Dec 2021)"},{"key":"752_CR10","unstructured":"DODOexhelp: https:\/\/dodoexhelp.zendesk.com\/hc\/en-us\/articles\/900004851126v. (Accessed 15 Dec 2021)"},{"key":"752_CR11","unstructured":"Binance Feed. DeFi Protocol DForce Loses $3.6M in Reentrancy Attack. URL: https:\/\/www.binance.com\/en-IN\/feed\/post\/211448. (Accessed 11 Feb 2023)"},{"key":"752_CR12","doi-asserted-by":"publisher","unstructured":"Praitheeshan, P., Pan, L., Yu, J., Liu, J., Doss, R.: Security Analysis Methods on Ethereum Smart Contract Vulnerabilities: A Survey. (2019). https:\/\/doi.org\/10.48550\/arxiv.1908.08605","DOI":"10.48550\/arxiv.1908.08605"},{"key":"752_CR13","unstructured":"Lv, C., Ji, S., Zhang, C., Li, Y., Lee, W., Song, Y., Beyah, R.: The art of the scam: demystifying honeypots in ethereum smart contracts. Proceedings of the 28th USENIX Conference on Security Symposium, USENIX Association, 2019, pp. 1591\u20131607. SEC\u201919"},{"key":"752_CR14","doi-asserted-by":"publisher","unstructured":"Luu, L., Chu, D.H., Olickel, H., Saxena, P., Hobor, A.: Making smart contracts smarter. In: Proceedings of the ACM Conference on Computer and Communications Security. Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Association for Computing Machinery, 2016, pp. 254\u2013269, https:\/\/doi.org\/10.1145\/2976749.2978309. CCS '16","DOI":"10.1145\/2976749.2978309"},{"key":"752_CR15","unstructured":"ConsenSys, Mythril-reversing and bug hunting framework for the ethereum blockchain, 2021, https:\/\/pypi.org\/project\/mythril\/0.22.0. (Accessed 10 Nov 2021)"},{"key":"752_CR16","doi-asserted-by":"publisher","unstructured":"Nikoli\u0107, I., Kolluri, A., Saxena, P., Hobor, A.: Finding the greedy, prodigal, and suicidal contracts at scale. Proceedings of the 34th Annual Computer Security Applications Conference, (2018). https:\/\/doi.org\/10.1145\/3274694","DOI":"10.1145\/3274694"},{"key":"752_CR17","unstructured":"Grossman, S., Abraham, I., Golan-Gueta, G., Michalevsky, Y., Rinetzky, N., Sagiv, M., & Zohar, Y.: Online detection of effectively callback free objects with applications to smart contracts. CoRR, abs\/1801.04032. (2018). http:\/\/arxiv.org\/abs\/1801.04032"},{"key":"752_CR18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2905428","author":"Z Yang","year":"2019","unstructured":"Yang, Z., Lei, H.: FEther: An extensible definitional interpreter for smart-contract verifications in Coq. IEEE Access (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2905428","journal-title":"IEEE Access"},{"key":"752_CR19","doi-asserted-by":"crossref","unstructured":"Amani, S., Bortin, M., B\u00e9gel, M., Staples, M.: Towards verifying ethereum smart contract bytecode in Isabelle\/HOL. In: CPP 2018\u2014Proceedings of the 7th ACM SIGPLAN International Conference on Certified Programs and Proofs, Co-located with POPL 2018 (2018)","DOI":"10.1145\/3176245.3167084"},{"key":"752_CR20","doi-asserted-by":"crossref","unstructured":"Bhargavan, K., Delignat-Lavaud, A., Fournet, C., Gollamudi, A., Gonthier, G., Kobeissi, N., Kulatova, N., Rastogi, A., Sibut-Pinote, T., Swamy, N., Zanella-B\u00e9guelin, S.: Formal verification of smart contracts: Short paper. In: PLAS 2016\u2014Proceedings of the 2016 ACM Workshop on Programming Languages and Analysis for Security, co-located with CCS 2016 (2016)","DOI":"10.1145\/2993600.2993611"},{"key":"752_CR21","doi-asserted-by":"crossref","unstructured":"Jiang, B., Liu, Y., Chan, W.K.: ContractFuzzer: Fuzzing smart contracts for vulnerability detection. In: ASE 2018\u2014Proceedings of the 33rd ACM\/IEEE International Conference on Automated Software Engineering (2018)","DOI":"10.1145\/3238147.3238177"},{"key":"752_CR22","doi-asserted-by":"crossref","unstructured":"Grieco, G., Song, W., Cygan, A., Feist, J., Groce, A.: Echidna: Effective, usable, and fast fuzzing for smart contracts. In: ISSTA 2020\u2014Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and Analysis (2020)","DOI":"10.1145\/3395363.3404366"},{"key":"752_CR23","doi-asserted-by":"publisher","unstructured":"He ETH Zurich, J., Balunovi\u0107 ETH Zurich, M., Ambroladze ETH Zurich, N., anodar, S., Petar Tsankov ETH Zurich, ethzch, Vechev ETH Zurich, M.: Learning to Fuzz from Symbolic Execution with Application to Smart Contracts Learning: \u00a75.2. Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. https:\/\/doi.org\/10.1145\/3319535","DOI":"10.1145\/3319535"},{"key":"752_CR24","doi-asserted-by":"crossref","unstructured":"Sun, Y., Gu, L.: Attention-based machine learning model for smart contract vulnerability detection. Int. J. Phys. Conf. Ser. 1820 012004 (2021)","DOI":"10.1088\/1742-6596\/1820\/1\/012004"},{"key":"752_CR25","doi-asserted-by":"publisher","DOI":"10.1088\/2633-1357\/abcd29","author":"AK Gogineni","year":"2020","unstructured":"Gogineni, A.K., Swayamjyoti, S., Sahoo, D., Sahu, K.K., Kishore, R.: Multi-Class classification of vulnerabilities in smart contracts using AWD-LSTM, with pre-trained encoder inspired from natural language processing. IOP SciNotes. (2020). https:\/\/doi.org\/10.1088\/2633-1357\/abcd29","journal-title":"IOP SciNotes."},{"key":"752_CR26","doi-asserted-by":"publisher","unstructured":"Momeni, P., Wang, Y., Samavi, R.: Machine learning model for smart contracts security analysis. In: 2019 17th International Conference on Privacy, Security and Trust, Fredericton, NB, Canada, (2019), pp. 1\u20136, doi: https:\/\/doi.org\/10.1109\/PST47121.2019.8949045","DOI":"10.1109\/PST47121.2019.8949045"},{"key":"752_CR27","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2021.3095196","author":"Z Liu","year":"2021","unstructured":"Liu, Z., Qian, P., Wang, X., Zhuang, Y., Qiu, L., Wang, X.: Combining graph neural networks with expert knowledge for smart contract vulnerability detection. IEEE Trans Knowl. Data Eng. (2021). https:\/\/doi.org\/10.1109\/TKDE.2021.3095196","journal-title":"IEEE Trans Knowl. Data Eng."},{"key":"752_CR28","doi-asserted-by":"publisher","unstructured":"Wesley Tann, J.W., Han, X.J., Gupta, S. Sen, Ong, Y.S.: Towards Safer Smart Contracts A Sequence Learning Approach to Detecting Vulnerabilities. (2018) https:\/\/doi.org\/10.48550\/arXiv.1811.06632","DOI":"10.48550\/arXiv.1811.06632"},{"key":"752_CR29","doi-asserted-by":"publisher","first-page":"1133","DOI":"10.1109\/TNSE.2020.2968505","volume":"8","author":"W Wang","year":"2021","unstructured":"Wang, W., Song, J., Xu, G., Li, Y., Wang, H., Su, C.: ContractWard: automated vulnerability detection models for Ethereum smart contracts. IEEE Trans Netw Sci Eng. 8, 1133\u20131144 (2021). https:\/\/doi.org\/10.1109\/TNSE.2020.2968505","journal-title":"IEEE Trans Netw Sci Eng."},{"key":"752_CR30","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN52387.2021.9534324","author":"X Yu","year":"2021","unstructured":"Yu, X., Zhao, H., Hou, B., Ying, Z., Wu, B.: DeeSCVHunter: a deep learning-based framework for smart contract vulnerability detection. Proc. Int. Joint Conf. Neur. Netw. (2021). https:\/\/doi.org\/10.1109\/IJCNN52387.2021.9534324","journal-title":"Proc. Int. Joint Conf. Neur. Netw."},{"key":"752_CR31","unstructured":"Jeon, S., Lee, G., Kim, H., Woo, S.S.: SmartConDetect: Highly Accurate Smart Contract Code Vulnerability Detection Mechanism using BERT. (2021)"},{"key":"752_CR32","unstructured":"Scicchitano, F., Liguori, A., Guarascio, M., Ritacco, E., & Manco, G. A deep learning approach for detecting security attacks on Blockchain.\u00a0Italian Conference on Cybersecurity. (2020)"},{"key":"752_CR33","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2969429","author":"P Qian","year":"2020","unstructured":"Qian, P., Liu, Z., He, Q., Zimmermann, R., Wang, X.: Towards automated reentrancy detection for smart contracts based on sequential models. IEEE Access. (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.2969429","journal-title":"IEEE Access."},{"key":"752_CR34","doi-asserted-by":"publisher","unstructured":"Huang, T.H.D.: Hunting the ethereum smart contract: color-inspired inspection of potential attacks. (2018). arXiv:1807.01868. https:\/\/doi.org\/10.48550\/arXiv.1807.01868","DOI":"10.48550\/arXiv.1807.01868"},{"key":"752_CR35","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.109289","author":"L Zhang","year":"2022","unstructured":"Zhang, L., Wang, J., Wang, W., Jin, Z., Su, Y., Chen, H.: Smart contract vulnerability detection combined with multi-objective detection. Comput. Netw. (2022). https:\/\/doi.org\/10.1016\/j.comnet.2022.109289","journal-title":"Comput. Netw."},{"key":"752_CR36","doi-asserted-by":"publisher","first-page":"1296","DOI":"10.1109\/TKDE.2021.3095196","volume":"35","author":"Z Liu","year":"2023","unstructured":"Liu, Z., Qian, P., Wang, X., Zhuang, Y., Qiu, L., Wang, X.: Combining graph neural networks with expert knowledge for smart contract vulnerability detection. IEEE Trans. Knowl. Data Eng. 35, 1296\u20131310 (2023). https:\/\/doi.org\/10.1109\/TKDE.2021.3095196","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"752_CR37","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2023.03.132","author":"W Jie","year":"2023","unstructured":"Jie, W., Chen, Q., Wang, J., Voundi Koe, A.S., Li, J., Huang, P., Wu, Y., Wang, Y.: A novel extended multimodal AI framework towards vulnerability detection in smart contracts. Inf. Sci. NY (2023). https:\/\/doi.org\/10.1016\/j.ins.2023.03.132","journal-title":"Inf. Sci. NY"},{"key":"752_CR38","doi-asserted-by":"publisher","unstructured":"Vaswani, A., Shazeer, N., Parmar, N., Uszkoreit, J., Jones, L., Gomez, A.N., Kaiser, \u0141., Polosukhin, I.: Attention is all you need. In: Advances in Neural Information Processing Systems, (2017). https:\/\/doi.org\/10.48550\/arXiv.1706.03762","DOI":"10.48550\/arXiv.1706.03762"},{"key":"752_CR39","doi-asserted-by":"publisher","unstructured":"Cho, K., van Merri\u00ebnboer, B., Bahdanau, D., Bengio, Y.: On the Properties of Neural Machine Translation: Encoder-Decoder Approaches. Proceedings of SSST 2014\u20148th Workshop on Syntax, Semantics and Structure in Statistical Translation. pp. 103\u2013111 (2014). https:\/\/doi.org\/10.48550\/arxiv.1409.1259","DOI":"10.48550\/arxiv.1409.1259"},{"key":"752_CR40","first-page":"1746","volume":"218","author":"W Wang","year":"2014","unstructured":"Wang, W., Khalil-Ur-Rehman, M., Feng, J., TaoKim, J.Y.: Convolutional neural networks for sentence classification. In EMNLP, J. Plant. Physiol. 218, 1746\u20131751 (2014)","journal-title":"In EMNLP, J. Plant. Physiol."},{"key":"752_CR41","doi-asserted-by":"crossref","unstructured":"Woo Sanghyun and Park, J. and L.J.Y. and K.I.S.: CBAM: Convolutional Block Attention Module. In: Ferrari Vittorio and Hebert, M. and S.C. and W.Y. (ed.) Computer Vision\u2014ECCV 2018. pp. 3\u201319. Springer International Publishing, Cham (2018)","DOI":"10.1007\/978-3-030-01234-2_1"},{"key":"752_CR42","unstructured":"Etherscan, Etherscan China ethereum (ETH) blockchain explorer, 2021. https:\/\/goto.etherscan.com. (Accessed 15 Dec 2021)"},{"key":"752_CR43","doi-asserted-by":"publisher","unstructured":"Durieux, T., Ferreira, J. F., Abreu, R., & Cruz, P. Empirical Review of Automated Analysis Tools on 47,587 Ethereum Smart Contracts.\u00a0Proceedings of the ACM\/IEEE 42nd International Conference on Software Engineering, 530\u2013541. Presented at the Seoul, South Korea. doi:https:\/\/doi.org\/10.1145\/3377811.3380364.(2020)","DOI":"10.1145\/3377811.3380364.(2020"},{"key":"752_CR44","doi-asserted-by":"crossref","unstructured":"Tikhomirov, S., Voskresenskaya, E., Ivanitskiy, I., Takhaviev, R., Marchenko, E., & Alexandrov, Y. (2018). SmartCheck: Static Analysis of Ethereum Smart Contracts.\u00a02018 IEEE\/ACM 1st International Workshop on Emerging Trends in Software Engineering for Blockchain (WETSEB), 9\u201316.","DOI":"10.1145\/3194113.3194115"},{"key":"752_CR45","doi-asserted-by":"publisher","unstructured":"Tsankov, P., Dan, A., Drachsler-Cohen, D., Gervais, A., B\u00fcnzli, F., & Vechev, M. Securify: Practical Security Analysis of Smart Contracts.\u00a0Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 67\u201382. Presented at the Toronto, Canada. (2018). doi:https:\/\/doi.org\/10.1145\/3243734.3243780","DOI":"10.1145\/3243734.3243780"},{"key":"752_CR46","doi-asserted-by":"publisher","unstructured":"Feist, J., Grieco, G., Groce, A.: Slither: A static analysis framework for smart contracts. Proceedings\u20142019 IEEE\/ACM 2nd International Workshop on Emerging Trends in Software Engineering for Blockchain, WETSEB 2019. 8\u201315 (2019). https:\/\/doi.org\/10.1109\/WETSEB.2019.00008","DOI":"10.1109\/WETSEB.2019.00008"},{"issue":"6088","key":"752_CR47","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1038\/323533a0","volume":"323","author":"DE Rumelhart","year":"1986","unstructured":"Rumelhart, D.E., Hinton, G.E., Williams, R.J.: Learning representations by back-propagating errors. Nature 323(6088), 533\u2013536 (1986). https:\/\/doi.org\/10.1038\/323533a0","journal-title":"Nature"},{"key":"752_CR48","doi-asserted-by":"publisher","unstructured":"Niu, Y., Xie, R., Liu, Z., & Sun, M.: Improved word representation learning with sememes. Proceedings of the 55th Annual Meeting of the Association for Computational Linguistics, Vol. 1, pp. 2049\u20132058. (2017). https:\/\/doi.org\/10.18653\/v1\/P17-1187","DOI":"10.18653\/v1\/P17-1187"},{"key":"752_CR49","doi-asserted-by":"publisher","unstructured":"Russell, R., Kim, L., Hamilton, L., Lazovich, T., Harer, J., Ozdemir, O., Ellingwood, P., McConley, M.: Automated vulnerability detection in source code using deep representation learning. Proceedings\u201417th IEEE International Conference on Machine Learning and Applications, ICMLA 2018. pp. 757\u2013762 (2019). https:\/\/doi.org\/10.1109\/ICMLA.2018.00120","DOI":"10.1109\/ICMLA.2018.00120"},{"key":"752_CR50","doi-asserted-by":"publisher","unstructured":"Liao, J.W., Tsai, T.T., He, C.K., & Tien, C.W.: SoliAudit: Smart contract vulnerability assessment based on machine learning and fuzz testing.\u00a0Sixth International Conference on Internet of Things: Systems, Management and Security (IOTSMS), 458\u2013465. (2019). doi:https:\/\/doi.org\/10.1109\/IOTSMS48152.2019.8939256","DOI":"10.1109\/IOTSMS48152.2019.8939256"},{"key":"752_CR51","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1613\/jair.953","volume":"16","author":"NV Chawla","year":"2002","unstructured":"Chawla, N.V., Bowyer, K.W., Hall, L.O., Kegelmeyer, W.P.: Smote: Synthetic minority over-sampling technique. J. Artif. Intell. Res. 16, 321\u2013357 (2002). https:\/\/doi.org\/10.1613\/jair.953","journal-title":"J. Artif. Intell. Res."},{"issue":"1","key":"752_CR52","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1145\/1007730.1007735","volume":"6","author":"GE Batista","year":"2004","unstructured":"Batista, G.E., Prati, R.C., Monard, M.C.: A study of the behavior of several methods for balancing machine learning training data. ACM SIGKDD Explor. Newsl 6(1), 20\u201329 (2004). https:\/\/doi.org\/10.1145\/1007730.1007735","journal-title":"ACM SIGKDD Explor. Newsl"},{"key":"752_CR53","doi-asserted-by":"publisher","unstructured":"Zhuang, Y., Liu, Z., Qian, P., Liu, Q., Wang, X., He, Q.: Smart Contract Vulnerability Detection using Graph Neural Network. IJCAI International Joint Conference on Artificial Intelligence. Vol. 3, pp. 3283\u20133290, (2020) https:\/\/doi.org\/10.24963\/IJCAI.2020\/454","DOI":"10.24963\/IJCAI.2020\/454"},{"key":"752_CR54","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1109\/TSC.2019.2949561","volume":"13","author":"X Wang","year":"2020","unstructured":"Wang, X., He, J., Xie, Z., Zhao, G., Cheung, S.C.: ContractGuard: defend Ethereum smart contracts with embedded intrusion detection. IEEE Trans. Serv. Comput. 13, 314\u2013328 (2020). https:\/\/doi.org\/10.1109\/TSC.2019.2949561","journal-title":"IEEE Trans. Serv. Comput."},{"key":"752_CR55","doi-asserted-by":"crossref","unstructured":"Grossman, S., Abraham, I., Golan-Gueta, G., Michalevsky, Y., Rinetzky, N., Sagiv, M., Zohar, Y.: Online Detection of Effectively Callback Free Objects with Applications to Smart Contracts. CoRR. abs\/1801.04032, (2018)","DOI":"10.1145\/3158136"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-023-00752-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-023-00752-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-023-00752-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,23]],"date-time":"2024-01-23T01:13:08Z","timestamp":1705972388000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-023-00752-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,24]]},"references-count":55,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,2]]}},"alternative-id":["752"],"URL":"https:\/\/doi.org\/10.1007\/s10207-023-00752-5","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,9,24]]},"assertion":[{"value":"19 August 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 September 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest with regard to this manuscript.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}