{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T04:23:55Z","timestamp":1774153435601,"version":"3.50.1"},"reference-count":50,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2024,3,28]],"date-time":"2024-03-28T00:00:00Z","timestamp":1711584000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,3,28]],"date-time":"2024-03-28T00:00:00Z","timestamp":1711584000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"IIT - RENDE"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2024,6]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>Modern vehicles are becoming more appealing to potential intruders due to two primary reasons. Firstly, they are now equipped with various connectivity features like WiFi, Bluetooth, and cellular connections, e.g., LTE and 5G, which expose them to external networks. Secondly, the growing complexity of on-board software increases the potential attack surface. In this article, we introduce CAHOOTv2, a context-sensitive intrusion detection system (IDS), aiming at enhancing the vehicle\u2019s security and protect against potential intrusions. CAHOOTv2 leverages the vehicle\u2019s sensors data, such as the amount of steering, the acceleration and brake inputs, to analyze driver habits and collect environmental information. To demonstrate the validity of the algorithm, we collected driving data from both an artificial intelligence (AI) and 39 humans. We include the AI driver to demonstrate that CAHOOTv2 is able to detect intrusions when the driver is both a human or an AI. The dataset is obtained using a modified version of the MetaDrive simulator, taking into account the presence of an intruder capable of performing the following types of intrusions: denial of service, replay, spoofing, additive and selective attacks. The sensors present in the vehicle are a numerical representation of the environment. The amount of steering, the acceleration and brake inputs given by the driver are based on the environmental situation. The intruder\u2019s input often contradicts the driver\u2019s wishes. CAHOOTv2 uses vehicle sensors to detect this contradiction. We perform several experiments that show the benefits of hyperparameter optimization. Indeed, we use a hyperparameter tuning paradigm to increase detection accuracy combining randomized and exhaustive search of hyperparameters. As a concluding remark, the results of CAHOOTv2 show great promise in detecting intrusions effectively.<\/jats:p>","DOI":"10.1007\/s10207-024-00821-3","type":"journal-article","created":{"date-parts":[[2024,3,28]],"date-time":"2024-03-28T06:01:50Z","timestamp":1711605710000},"page":"2203-2223","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["A context-aware on-board intrusion detection system for smart vehicles"],"prefix":"10.1007","volume":"23","author":[{"given":"Davide","family":"Micale","sequence":"first","affiliation":[]},{"given":"Ilaria","family":"Matteucci","sequence":"additional","affiliation":[]},{"given":"Florian","family":"Fenzl","sequence":"additional","affiliation":[]},{"given":"Roland","family":"Rieke","sequence":"additional","affiliation":[]},{"given":"Giuseppe","family":"Patan\u00e8","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,3,28]]},"reference":[{"key":"821_CR1","doi-asserted-by":"publisher","unstructured":"Akl, N.A., El Khoury, J., Mansour, C.: Trip-based prediction of hybrid electric vehicles velocity using artificial neural networks. In: 2021 IEEE 3rd International Multidisciplinary Conference on Engineering Technology (IMCET), pp. 60\u201365 (2021). https:\/\/doi.org\/10.1109\/IMCET53404.2021.9665641","DOI":"10.1109\/IMCET53404.2021.9665641"},{"key":"821_CR2","doi-asserted-by":"crossref","unstructured":"Al-Jarrah, O.Y., Maple, C., Dianati, M., Oxtoby, D., Mouzakitis, A.: Intrusion detection systems for intra-vehicle networks: A review. IEEE Access 7, 21266\u201321289 (2019)","DOI":"10.1109\/ACCESS.2019.2894183"},{"key":"821_CR3","unstructured":"\u201cAndroid Open Source Project\": What is android automotive? (2023). URL:https:\/\/source.android.com\/docs\/automotive\/start\/what_automotive?hl=en [retrieved: 11, 2023]"},{"issue":"1","key":"821_CR4","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman, L.: Random forests. Mach. Learn. 45(1), 5\u201332 (2001). https:\/\/doi.org\/10.1023\/A:1010933404324","journal-title":"Mach. Learn."},{"key":"821_CR5","unstructured":"\u201cCVE\": Cve-2016-9337 (2016). URL:https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016-9337 [retrieved: 11, 2022]"},{"key":"821_CR6","doi-asserted-by":"publisher","unstructured":"Deveci, M., Pamucar, D., Gokasar, I., K\u00f6ppen, M., Gupta, B.B.: Personal mobility in metaverse with autonomous vehicles using q-rung orthopair fuzzy sets based opa-rafsi model. IEEE Transactions on Intelligent Transportation Systems pp. 1\u201310 (2022). https:\/\/doi.org\/10.1109\/TITS.2022.3186294","DOI":"10.1109\/TITS.2022.3186294"},{"key":"821_CR7","unstructured":"Diess, H.: Levers to unleash value (2020). URL:https:\/\/www.volkswagenag.com\/presence\/investorrelation\/publications\/presentations\/2020\/01-januar\/January_2020_VWAG_Investor_Roadshow.pdf [retrieved: 11, 2022]"},{"key":"821_CR8","doi-asserted-by":"publisher","unstructured":"Donzellini, G., Garavagno, A.M., Oneto, L.: Microprocessor Systems on FPGA, pp. 439\u2013553. Springer International Publishing, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-030-87344-8_5","DOI":"10.1007\/978-3-030-87344-8_5"},{"key":"821_CR9","unstructured":"\u201cEUROPOL\": 31 arrested for stealing cars by hacking keyless tech (2022). URL:https:\/\/www.europol.europa.eu\/media-press\/newsroom\/news\/31-arrested-for-stealing-cars-hacking-keyless-tech [retrieved: 11, 2022]"},{"issue":"7","key":"821_CR10","doi-asserted-by":"publisher","first-page":"4757","DOI":"10.1109\/TITS.2020.3041746","volume":"22","author":"H Fatemidokht","year":"2021","unstructured":"Fatemidokht, H., Rafsanjani, M.K., Gupta, B.B., Hsu, C.H.: Efficient and secure routing protocol based on artificial intelligence algorithms with UAV-assisted for vehicular ad hoc networks in intelligent transportation systems. IEEE Trans. Intell. Transp. Syst. 22(7), 4757\u20134769 (2021). https:\/\/doi.org\/10.1109\/TITS.2020.3041746","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"821_CR11","doi-asserted-by":"publisher","unstructured":"Gmiden, M., Gmiden, M.H., Trabelsi, H.: An intrusion detection method for securing in-vehicle can bus. In: 2016 17th International Conference on Sciences and Techniques of Automatic Control and Computer Engineering (STA), pp. 176\u2013180 (2016). https:\/\/doi.org\/10.1109\/STA.2016.7952095","DOI":"10.1109\/STA.2016.7952095"},{"key":"821_CR12","doi-asserted-by":"publisher","unstructured":"Grimm, D., Stang, M., Sax, E.: Context-aware security for vehicles and fleets: a survey. IEEE Access 9, 101,809-101,846 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3097146","DOI":"10.1109\/ACCESS.2021.3097146"},{"issue":"3","key":"821_CR13","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1108\/JBS-01-2022-0014","volume":"44","author":"S Hollensen","year":"2023","unstructured":"Hollensen, S., Kotler, P., Opresnik, M.: Metaverse: the new marketing universe. J. Bus. Strategy 44(3), 119\u2013125 (2023). https:\/\/doi.org\/10.1108\/JBS-01-2022-0014","journal-title":"J. Bus. Strategy"},{"key":"821_CR14","unstructured":"\u201cInternational Organitation for Standardization: Iso\/iec 27039:2015, information technology \u2014 security techniques \u2014 selection, deployment and operations of intrusion detection and prevention systems (idps) (2015). URL:https:\/\/www.iso.org\/standard\/56889.html [retrieved: 11, 2022]"},{"key":"821_CR15","doi-asserted-by":"crossref","unstructured":"Jeong, S., Lee, S., Lee, H., Kim, H.K.: X-canids: Signal-aware explainable intrusion detection system for controller area network-based in-vehicle network (2023)","DOI":"10.1109\/TVT.2023.3327275"},{"key":"821_CR16","doi-asserted-by":"publisher","unstructured":"Jiang, J., Wang, C., Chattopadhyay, S., Zhang, W.: Road Context-Aware Intrusion Detection System for Autonomous Cars. Lecture Notes in Computer Science p. 124\u2013142 (2020). https:\/\/doi.org\/10.1007\/978-3-030-41579-2_8","DOI":"10.1007\/978-3-030-41579-2_8"},{"key":"821_CR17","doi-asserted-by":"publisher","unstructured":"Kalutarage, H.K., Al-Kadri, M.O., Cheah, M., Madzudzo, G.: Context-aware anomaly detector for monitoring cyber attacks on automotive can bus. In: ACM Computer Science in Cars Symposium, CSCS \u201919. Association for Computing Machinery, New York, NY, USA (2019). https:\/\/doi.org\/10.1145\/3359999.3360496","DOI":"10.1145\/3359999.3360496"},{"key":"821_CR18","doi-asserted-by":"crossref","unstructured":"Kang, M.J., Kang, J.W.: A novel intrusion detection method using deep neural network for in-vehicle network security. In: 2016 IEEE 83rd Vehicular Technology Conference (VTC Spring) (2016)","DOI":"10.1109\/VTCSpring.2016.7504089"},{"key":"821_CR19","doi-asserted-by":"publisher","unstructured":"Karopoulos, G., Kambourakis, G., Chatzoglou, E., Hern\u00e1ndez-Ramos, J.L., Kouliaridis, V.: Demystifying in-vehicle intrusion detection systems: A survey of surveys and a meta-taxonomy. Electronics 11(7) (2022). https:\/\/doi.org\/10.3390\/electronics11071072. https:\/\/www.mdpi.com\/2079-9292\/11\/7\/1072","DOI":"10.3390\/electronics11071072"},{"issue":"4","key":"821_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2382577.2382579","volume":"6","author":"S Kaufman","year":"2012","unstructured":"Kaufman, S., Rosset, S., Perlich, C., Stitelman, O.: Leakage in data mining: formulation, detection, and avoidance. ACM Trans. Knowl. Discov. Data 6(4), 1\u201321 (2012). https:\/\/doi.org\/10.1145\/2382577.2382579","journal-title":"ACM Trans. Knowl. Discov. Data"},{"key":"821_CR21","doi-asserted-by":"publisher","unstructured":"Kondratiev, V., Kuznetsov, A.: An algorithm for intrusion detection into the control system of an unmanned vehicle. In: 2021 International Conference on Information Technology and Nanotechnology (ITNT), pp. 1\u20135 (2021). https:\/\/doi.org\/10.1109\/ITNT52450.2021.9649295","DOI":"10.1109\/ITNT52450.2021.9649295"},{"key":"821_CR22","unstructured":"Levi, M., Allouche, Y., Kontorovich, A.: Advanced analytics for connected cars cyber security. CoRR arxiv:1711.01939 (2017)"},{"key":"821_CR23","doi-asserted-by":"crossref","unstructured":"Li, Q., Peng, Z., Xue, Z., Zhang, Q., Zhou, B.: Metadrive: Composing diverse driving scenarios for generalizable reinforcement learning. arXiv preprint arXiv:2109.12674 (2021)","DOI":"10.1109\/TPAMI.2022.3190471"},{"key":"821_CR24","doi-asserted-by":"publisher","unstructured":"Lo, W., Alqahtani, H., Thakur, K., Almadhor, A., Chander, S., Kumar, G.: A hybrid deep learning based intrusion detection system using spatial-temporal representation of in-vehicle network traffic. Vehicular Communications 35, 100,471 (2022). https:\/\/doi.org\/10.1016\/j.vehcom.2022.100471. https:\/\/www.sciencedirect.com\/science\/article\/pii\/S2214209622000183","DOI":"10.1016\/j.vehcom.2022.100471"},{"key":"821_CR25","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1109\/TSE.2010.60","volume":"37","author":"P Manadhata","year":"2011","unstructured":"Manadhata, P., Wing, J.: An attack surface metric. IEEE Trans. Softw. Eng. 37, 371\u2013386 (2011). https:\/\/doi.org\/10.1109\/TSE.2010.60","journal-title":"IEEE Trans. Softw. Eng."},{"key":"821_CR26","volume-title":"Introductory Statistics","author":"PS Mann","year":"2009","unstructured":"Mann, P.S.: Introductory Statistics. Wiley, New York (2009)"},{"key":"821_CR27","doi-asserted-by":"crossref","unstructured":"Marchetti, M., Stabili, D.: Anomaly detection of CAN bus messages through analysis of id sequences. In: 2017 IEEE Intelligent Vehicles Symposium (IV), pp. 1577\u20131583 (2017)","DOI":"10.1109\/IVS.2017.7995934"},{"key":"821_CR28","doi-asserted-by":"publisher","unstructured":"Micale, D., Costantino, G., Matteucci, I., Fenzl, F., Rieke, R., Patan\u00e8, G.: Cahoot: a context-aware vehicular intrusion detection system. In: 2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 1211\u20131218 (2022). https:\/\/doi.org\/10.1109\/TrustCom56396.2022.00168","DOI":"10.1109\/TrustCom56396.2022.00168"},{"key":"821_CR29","doi-asserted-by":"crossref","unstructured":"Narayanan, S.N., Mittal, S., Joshi, A.: Obd securealert: An anomaly detection system for vehicles. In: IEEE Workshop on Smart Service Systems (SmartSys 2016) (2016)","DOI":"10.1109\/SMARTCOMP.2016.7501710"},{"key":"821_CR30","unstructured":"\u201cNVIDIA\": NVIDIA\u00ae Jetson AGX Xavier$$^{{\\rm TM}}$$. URL:https:\/\/www.nvidia.com\/en-gb\/autonomous-machines\/embedded-systems\/jetson-agx-xavier\/ [retrieved: 07, 2023]"},{"key":"821_CR31","unstructured":"\u201cNVIDIA\": NVIDIA\u00ae Jetson Nano$$^{{\\rm TM}}$$. URL:https:\/\/www.nvidia.com\/en-gb\/autonomous-machines\/embedded-systems\/jetson-nano\/ [retrieved: 07, 2023]"},{"key":"821_CR32","unstructured":"\u201cOfficial Journal of the European Union\": Uniform provisions concerning the approval of vehicles with regards to cybersecurity and cybersecurity management system (2021). URL:http:\/\/data.europa.eu\/eli\/reg\/2021\/387\/oj [retrieved: 11, 2022]"},{"issue":"1","key":"821_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/IJSSCI.291712","volume":"14","author":"P Vijayakumar","year":"2022","unstructured":"Vijayakumar, P., Rajkumar, S.C.: Deep reinforcement learning-based pedestrian and independent vehicle safety fortification using intelligent perception. Int. J. Softw. Sci. Comput. Intell. 14(1), 1\u201333 (2022). https:\/\/doi.org\/10.4018\/IJSSCI.291712","journal-title":"Int. J. Softw. Sci. Comput. Intell."},{"key":"821_CR34","doi-asserted-by":"publisher","unstructured":"Pascale, F., Adinolfi, E.A., Avagliano, M., Bellacosa, E., Coppola, S., Santonicola, E.: Cardian: A context aware cybersecurity system for real time diagnostic intrusion detection using a probabilistic approach with bayesian network. In: 2022 6th International Conference on System Reliability and Safety (ICSRS), pp. 424\u2013429 (2022). https:\/\/doi.org\/10.1109\/ICSRS56243.2022.10067343","DOI":"10.1109\/ICSRS56243.2022.10067343"},{"key":"821_CR35","first-page":"2825","volume":"12","author":"F Pedregosa","year":"2011","unstructured":"Pedregosa, F., Varoquaux, G., Gramfort, A., Michel, V., Thirion, B., Grisel, O., Blondel, M., Prettenhofer, P., Weiss, R., Dubourg, V., Vanderplas, J., Passos, A., Cournapeau, D., Brucher, M., Perrot, M., Duchesnay, E.: Scikit-learn: Machine learning in Python. J. Mach. Learn. Res. 12, 2825\u20132830 (2011)","journal-title":"J. Mach. Learn. Res."},{"key":"821_CR36","unstructured":"Placek, M.: Connected car fleet by region 2021-2035 (2022). URL:https:\/\/www.statista.com\/statistics\/1155517\/global-connected-car-fleet-by-market\/ [retrieved: 11, 2022]"},{"key":"821_CR37","doi-asserted-by":"publisher","unstructured":"Probst, P., Wright, M., Boulesteix, A.L.: Hyperparameters and tuning strategies for random forest. Wiley Interdiscipl. Rev. Data Mining Knowl. Discov. 9, e1301 (2019). https:\/\/doi.org\/10.1002\/widm.1301","DOI":"10.1002\/widm.1301"},{"key":"821_CR38","unstructured":"Quinlan, J.R.: C4.5: Programs for Machine Learning. Morgan Kaufmann Publishers Inc., San Francisco (1993)"},{"key":"821_CR39","doi-asserted-by":"publisher","unstructured":"Rajapaksha, S., Kalutarage, H., Al-Kadri, M.O., Madzudzo, G., Petrovski, A.V.: Keep the moving vehicle secure: Context-aware intrusion detection system for in-vehicle can bus security. In: 2022 14th International Conference on Cyber Conflict: Keep Moving! (CyCon), vol. 700, pp. 309\u2013330 (2022). https:\/\/doi.org\/10.23919\/CyCon55549.2022.9811048","DOI":"10.23919\/CyCon55549.2022.9811048"},{"key":"821_CR40","unstructured":"Reutemann, P.: python-weka-wrapper3 (2020). URL:https:\/\/fracpete.github.io\/python-weka-wrapper3\/index.html [retrieved: 11, 2022]"},{"key":"821_CR41","doi-asserted-by":"crossref","unstructured":"Rieke, R., Seidemann, M., Talla, E.K., Zelle, D., Seeger, B.: Behavior analysis for safety and security in automotive systems. In: Parallel, Distributed and Network-Based Processing (PDP), 2017 25nd Euromicro International Conference on, pp. 381\u2013385. IEEE Computer Society (2017)","DOI":"10.1109\/PDP.2017.67"},{"issue":"1","key":"821_CR42","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/ijcac.295242","volume":"12","author":"R Sharma","year":"2022","unstructured":"Sharma, R., Sharma, T.P., Sharma, A.K.: Detecting and preventing misbehaving intruders in the internet of vehicles. IJCAC 12(1), 1\u201321 (2022). https:\/\/doi.org\/10.4018\/ijcac.295242","journal-title":"IJCAC"},{"key":"821_CR43","unstructured":"\u201cSnap-on Incorporated\": Global obd vehicle communication software manual (2013). URL:https:\/\/www.snapon.com\/Files\/Diagnostics\/UserManuals\/GlobalOBDVehicleCommunicationSoftwareManual_EAZ0025B43.pdf [retrieved: 11, 2022]"},{"key":"821_CR44","doi-asserted-by":"crossref","unstructured":"Taylor, A., Japkowicz, N., Leblanc, S.: Frequency-based anomaly detection for the automotive CAN bus. In: 2015 World Congress on Industrial Control Systems Security (WCICSS), pp. 45\u201349 (2015)","DOI":"10.1109\/WCICSS.2015.7420322"},{"key":"821_CR45","unstructured":"Theissler, A.: Anomaly detection in recordings from in-vehicle networks. In: Proceedings of Big Data Applications and Principles First International Workshop, BIGDAP 2014 Madrid, Spain, September 11-12 2014 (2014)"},{"key":"821_CR46","unstructured":"\u201cThrustmaster\u201d: TMX Force Feedback. URL:https:\/\/www.thrustmaster.com\/products\/tmx-force-feedback\/ [retrieved: 11, 2022]"},{"key":"821_CR47","unstructured":"Weinmann, R.P., Schmotzle, B.: TBONE: for public release on 2021-04-28 (2021). URL:https:\/\/kunnamon.io\/tbone\/ [retrieved: 11, 2022]"},{"key":"821_CR48","unstructured":"Xue, L., Liu, Y., Li, T., Zhao, K., Li, J., Yu, L., Luo, X., Zhou, Y., Gu, G.: SAID: State-aware defense against injection attacks on in-vehicle network. In: 31st USENIX Security Symposium (USENIX Security 22), pp. 1921\u20131938. USENIX Association, Boston, MA (2022). https:\/\/www.usenix.org\/conference\/usenixsecurity22\/presentation\/xue-lei"},{"key":"821_CR49","unstructured":"Zhang, A., Lipton, Z.C., Li, M., Smola, A.J.: Dive into Deep Learning (2020). https:\/\/d2l.ai [retrieved: 11, 2022]"},{"key":"821_CR50","doi-asserted-by":"publisher","unstructured":"Zheng, B., Liang, H., Zhu, Q., Yu, H., Lin, C.W.: Next generation automotive architecture modeling and exploration for autonomous driving. In: 2016 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), pp. 53\u201358 (2016). https:\/\/doi.org\/10.1109\/ISVLSI.2016.126","DOI":"10.1109\/ISVLSI.2016.126"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00821-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-024-00821-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00821-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,26]],"date-time":"2024-05-26T22:13:18Z","timestamp":1716761598000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-024-00821-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3,28]]},"references-count":50,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2024,6]]}},"alternative-id":["821"],"URL":"https:\/\/doi.org\/10.1007\/s10207-024-00821-3","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-2650857\/v1","asserted-by":"object"}]},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,3,28]]},"assertion":[{"value":"28 March 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}