{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T00:33:40Z","timestamp":1771634020644,"version":"3.50.1"},"reference-count":67,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2024,4,10]],"date-time":"2024-04-10T00:00:00Z","timestamp":1712707200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,4,10]],"date-time":"2024-04-10T00:00:00Z","timestamp":1712707200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2024,6]]},"DOI":"10.1007\/s10207-024-00849-5","type":"journal-article","created":{"date-parts":[[2024,4,10]],"date-time":"2024-04-10T09:02:20Z","timestamp":1712739740000},"page":"2333-2351","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Selfish mining attack in blockchain: a systematic literature review"],"prefix":"10.1007","volume":"23","author":[{"given":"Nadisha","family":"Madhushanie","sequence":"first","affiliation":[]},{"given":"Sugandima","family":"Vidanagamachchi","sequence":"additional","affiliation":[]},{"given":"Nalin","family":"Arachchilage","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,4,10]]},"reference":[{"key":"849_CR1","doi-asserted-by":"crossref","unstructured":"Marwa Chaieb, S., Yousfi, P., Lafourcade, Robbana, R.: Verify-your-vote: A verifiable blockchain-based online voting protocol. In Information Systems: 15th European, Mediterranean, and Middle Eastern Conference, EMCIS Limassol, Cyprus, October 4\u20135, 2018, Proceedings 15, pages 16\u201330. Springer, 2019. (2018)","DOI":"10.1007\/978-3-030-11395-7_2"},{"key":"849_CR2","doi-asserted-by":"crossref","unstructured":"Peterson, M., Andel, T., Benton, R.: Towards detection of selfish mining using machine learning. In International Conference on Cyber Warfare and Security, volume 17, pages 237\u2013243, (2022)","DOI":"10.34190\/iccws.17.1.15"},{"key":"849_CR3","unstructured":"Alyssa Hertig: Blockchain\u2019s once-feared 51% attack is now becoming regular. Coindesk com., (2018)"},{"key":"849_CR4","unstructured":"Mark Nesbitt: Deep chain reorganization detected on ethereum classic (etc). Available [online].[Accessed: 1212-2019], (2019)"},{"issue":"2004","key":"849_CR5","first-page":"1","volume":"33","author":"Barbara Kitchenham","year":"2004","unstructured":"Barbara Kitchenham: Procedures for performing systematic reviews. Keele UK Keele Univ. 33(2004), 1\u201326 (2004)","journal-title":"Keele UK Keele Univ."},{"key":"849_CR6","unstructured":"Matthew, J., Page, J.E., McKenzie, P.M., Bossuyt, I., Boutron, T.C., Hoffmann, C.D., Mulrow, L., Shamseer, J.M., Tetzlaff, Elie, A., Akl, Sue, E., Brennan, et al.: The prisma 2020 statement: An updated guideline for reporting systematic reviews. Bmj, 372, (2021)"},{"key":"849_CR7","unstructured":"Adam, Back, et al.: Hashcash-a denial of service counter-measure. (2002)"},{"key":"849_CR8","unstructured":"Hanife Tesnim C\u00b8 al\u0131\u00b8skan: A New Type of Payment in Philanthropy: Blockchain Applications. PhD thesis, Marmara Universitesi (Turkey), (2021)"},{"key":"849_CR9","doi-asserted-by":"crossref","unstructured":"Suman Ghimire and Henry Selvaraj: 26th International Conference on Systems Engineering (ICSEng), pages 1\u20136. IEEE, 2018. (2018)","DOI":"10.1109\/ICSENG.2018.8638208"},{"key":"849_CR10","doi-asserted-by":"crossref","unstructured":"Marko Vukoli\u00b4c: The quest for scalable blockchain fabric: Proof-of-work vs. bft replication. In International workshop on open problems in network security, pages 112\u2013125. Springer, (2015)","DOI":"10.1007\/978-3-319-39028-4_9"},{"key":"849_CR11","unstructured":"Satoshi Nakamoto: Bitcoin: A peer-to-peer electronic cash system. Decentralized Bus. Rev., page 21260, (2008)"},{"key":"849_CR12","doi-asserted-by":"crossref","unstructured":"Kevin Alarc\u00b4on Negy, Peter, R., Rizun: and Emin Gu\u00a8n Sirer. Selfish mining re-examined. In International Conference on Financial Cryptography and Data Security, pages 61\u201378. Springer, (2020)","DOI":"10.1007\/978-3-030-51280-4_5"},{"issue":"7","key":"849_CR13","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1145\/3212998","volume":"61","author":"Ittay Eyal and Emin Gu\u00a8n Sirer","year":"2018","unstructured":"Ittay Eyal and Emin Gu\u00a8n Sirer: Majority is not enough: Bitcoin mining is vulnerable. Commun. ACM. 61(7), 95\u2013102 (2018)","journal-title":"Commun. ACM"},{"key":"849_CR14","doi-asserted-by":"publisher","first-page":"3838","DOI":"10.1109\/ACCESS.2020.3047365","volume":"9","author":"Y Kervins Nicolas","year":"2020","unstructured":"Kervins Nicolas, Y., Wang, G.C., Giakos, B., Wei, Shen, H.: Blockchain system defensive overview for double-spend and selfish mining attacks: A systematic approach. IEEE Access. 9, 3838\u20133857 (2020)","journal-title":"IEEE Access."},{"issue":"3","key":"849_CR15","first-page":"18","volume":"6","author":"BJ Sandi Rahmadika","year":"2018","unstructured":"Sandi Rahmadika, B.J., Kweka, H., Kim, Rhee, K.: A scoping review in defend against selfish mining attack in bitcoin. IT Converg Pract. 6(3), 18\u201326 (2018)","journal-title":"IT Converg Pract."},{"key":"849_CR16","doi-asserted-by":"publisher","first-page":"155630","DOI":"10.1109\/ACCESS.2020.3017716","volume":"8","author":"Y Chen","year":"2020","unstructured":"Chen, Y., Chen, H., Han, M., Liu, B., Chen, Q., Ren, T.: A novel computing power allocation algorithm for blockchain system in multiple mining pools under withholding attack. IEEE Access. 8, 155630\u2013155644 (2020)","journal-title":"IEEE Access."},{"issue":"2","key":"849_CR17","doi-asserted-by":"publisher","first-page":"47","DOI":"10.3390\/fi14020047","volume":"14","author":"M Huanliang Xiong","year":"2022","unstructured":"Huanliang Xiong, M., Chen, C., Wu, Y., Zhao, Yi, W.: Research on progress of blockchain consensus algorithm: A review on recent progress of blockchain consensus algorithms. Future Internet. 14(2), 47 (2022)","journal-title":"Future Internet"},{"key":"849_CR18","unstructured":"Arlene Fink: Conducting Research Literature Reviews: from the Internet to Paper. Sage (2019)"},{"key":"849_CR19","doi-asserted-by":"crossref","unstructured":"Chitu Okoli and Kira Schabram: A guide to conducting a systematic literature review of information systems research. (2010)","DOI":"10.2139\/ssrn.1954824"},{"key":"849_CR20","unstructured":"Justus Randolph: A guide to writing the dissertation literature review. Practical assessment, research, and evaluation, 14(1):13, (2009)"},{"issue":"3","key":"849_CR21","doi-asserted-by":"publisher","first-page":"356","DOI":"10.1177\/1534484305278283","volume":"4","author":"J Richard","year":"2005","unstructured":"Richard, J., Torraco: Writing integrative literature reviews: Guidelines and examples. Hum. Resour. Dev. Rev. 4(3), 356\u2013367 (2005)","journal-title":"Hum. Resour. Dev. Rev."},{"key":"849_CR22","doi-asserted-by":"crossref","unstructured":"Claes Wohlin: Guidelines for snowballing in systematic literature studies and a replication in software engineering. In Proceedings of the 18th international conference on evaluation and assessment in software engineering, pages 1\u201310, (2014)","DOI":"10.1145\/2601248.2601268"},{"key":"849_CR23","doi-asserted-by":"crossref","unstructured":"Hamid Azimy and Ali Ghorbani: Alternative difficulty adjustment algorithms for preventing selfish mining attack. In International Conference on Blockchain, pages 59\u201373. Springer, (2021)","DOI":"10.1007\/978-3-030-96527-3_5"},{"issue":"3","key":"849_CR24","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/s12243-019-00746-2","volume":"75","author":"C Vanessa Chicarino","year":"2020","unstructured":"Vanessa Chicarino, C., Albuquerque, E., Jesus, Rocha, A.: On the detection of selfish mining and stalker attacks in blockchain networks. Ann. Telecommun. 75(3), 143\u2013152 (2020)","journal-title":"Ann. Telecommun."},{"key":"849_CR25","unstructured":"Nicolas, T., Courtois and Lear Bahack:. On subversive miner strategies and block withholding attack in bitcoin digital currency. arXiv preprint arXiv:1402.1718, (2014)"},{"key":"849_CR26","doi-asserted-by":"crossref","unstructured":"Ittay Eyal: The miner\u2019s dilemma. In 2015 IEEE Symposium on Security and Privacy, pages 89\u2013103. IEEE, (2015)","DOI":"10.1109\/SP.2015.13"},{"key":"849_CR27","unstructured":"Jonathan Gal, Maytal, B., Szabo: Majority is not needed: A counterstrategy to selfish mining. arXiv preprint arXiv:2304.06313, (2023)"},{"key":"849_CR28","unstructured":"Cyril Grunspan and Ricardo P\u00b4erez-Marco: On profitability of selfish mining. arXiv preprint arXiv:1805.08281, (2018)"},{"key":"849_CR29","doi-asserted-by":"crossref","unstructured":"Ethan Heilman: One weird trick to stop selfish miners: Fresh bitcoins, a solution for the honest miner. In International Conference on Financial Cryptography and Data Security, pages 161\u2013162. Springer, (2014)","DOI":"10.1007\/978-3-662-44774-1_12"},{"key":"849_CR30","unstructured":"Hou, C., Zhou, M., Ji, Y., Daian, P., Tramer, F.: Giulia Fanti, and Ari Juels. Squirrl: Automating attack analysis on blockchain incentive mechanisms with deep reinforcement learning. arXiv preprint arXiv:01798, 2019. (1912)"},{"issue":"3","key":"849_CR31","doi-asserted-by":"publisher","first-page":"3079","DOI":"10.1109\/TNSM.2021.3073414","volume":"18","author":"X Hongyue Kang","year":"2021","unstructured":"Hongyue Kang, X., Chang, R., Yang, J., Mi\u02c7si\u00b4c, Vojislav, B., Mi\u02c7si\u00b4c: Understanding selfish mining in imperfect bitcoin and ethereum networks with extended forks. IEEE Trans. Netw. Serv. Manage. 18(3), 3079\u20133091 (2021)","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"key":"849_CR32","unstructured":"Muhidul Islam Khan: Deep reinforcement learning for selfish nodes detection in a blockchain"},{"key":"849_CR33","doi-asserted-by":"crossref","unstructured":"Suhyeon Lee and Seungjoo Kim: Countering block with-holding attack efficiently. In IEEE INFOCOM 2019- IEEE Conference on Computer Communications Work-shops (INFOCOM WKSHPS), pages 330\u2013335. IEEE, (2019)","DOI":"10.1109\/INFCOMW.2019.8845116"},{"key":"849_CR34","unstructured":"Suhyeon Lee and Seungjoo Kim: Pooled mining makes selfish mining tricky. Cryptol. ePrint Archive, (2018)"},{"key":"849_CR35","doi-asserted-by":"crossref","unstructured":"Jihye Lee and Yoonjeong Kim: Preventing bitcoin selfish mining using transaction creation time. In 2018 International Conference on Software Security and Assurance (ICSSA), pages 19\u201324. IEEE, (2018)","DOI":"10.1109\/ICSSA45270.2018.00014"},{"issue":"1","key":"849_CR36","doi-asserted-by":"publisher","first-page":"309","DOI":"10.3934\/mbe.2020017","volume":"17","author":"W Liang Liu","year":"2020","unstructured":"Liang Liu, W., Chen, L., Zhang, J.Y., Liu, Qin, J.: A type of block withholding delay attack and the countermeasure based on type-2 fuzzy inference. Math. Biosci. Eng. 17(1), 309\u2013327 (2020)","journal-title":"Math. Biosci. Eng."},{"issue":"8","key":"849_CR37","doi-asserted-by":"publisher","first-page":"1711","DOI":"10.3390\/sym14081711","volume":"14","author":"JM Miodrag","year":"2022","unstructured":"Miodrag, J.M., Wang, L., Xu, S., Milan, Todorovi\u00b4c: An approach for blockchain pool mining employing the consensus protocol robust against block withholding and selfish mining attacks. Symmetry. 14(8), 1711 (2022)","journal-title":"Symmetry"},{"key":"849_CR38","unstructured":"Saghiri, A.N.-J.A.M., and Mohammad Reza Meybodi:. Vdhla: Variable depth hybrid learning automatonits application to defense against the selfish mining attack in bitcoin. arXiv preprint arXiv:2302.12096, (2023)"},{"key":"849_CR39","doi-asserted-by":"crossref","unstructured":"Rafael Pass and Elaine Shi: Fruitchains: A fair blockchain. In Proceedings of the ACM symposium on principles of distributed computing, pages 315\u2013324, (2017)","DOI":"10.1145\/3087801.3087809"},{"key":"849_CR40","doi-asserted-by":"crossref","unstructured":"Saha Reno and Simu Sultana: Preventing selfish mining in public blockchain using alarming block and block interval time approach. In 2022 International Conference on Augmented Intelligence and Sustainable Systems (ICAISS), pages 988\u2013993. IEEE, (2022)","DOI":"10.1109\/ICAISS55157.2022.10010734"},{"key":"849_CR41","doi-asserted-by":"crossref","unstructured":"Fabian Ritz and Alf Zugenmaier: The impact of uncle rewards on selfish mining in ethereum. In 2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), pages 50\u201357. IEEE, (2018)","DOI":"10.1109\/EuroSPW.2018.00013"},{"key":"849_CR42","doi-asserted-by":"crossref","unstructured":"Muhammad Saad, L., Njilla, C., Kamhoua, Mohaisen, A.: Countering selfish mining in blockchains. In. International Conference on Computing, Networking and Communications (ICNC), pages 360\u2013364. IEEE, 2019. (2019)","DOI":"10.1109\/ICCNC.2019.8685577"},{"key":"849_CR43","doi-asserted-by":"crossref","unstructured":"Siamak Solat and Maria Potop-Butucaru: Brief announcement: Zeroblock: Timestamp-free prevention of block-withholding attack in bitcoin. In International Symposium on Stabilization, Safety, and Security of Distributed Systems, pages 356\u2013360. Springer, (2017)","DOI":"10.1007\/978-3-319-69084-1_25"},{"key":"849_CR44","doi-asserted-by":"crossref","unstructured":"Ayelet Sapirshtein, Y., Sompolinsky, Zohar, A.: Optimal selfish mining strategies in bitcoin. In International Conference on Financial Cryptography and Data Security, pages 515\u2013532. Springer, (2016)","DOI":"10.1007\/978-3-662-54970-4_30"},{"key":"849_CR45","doi-asserted-by":"crossref","unstructured":"Sarwar Sayeed and Hector Marco-Gisbert. Assessing blockchain consensus and security mechanisms against the 51% attack. Applied sciences, 9(9):1788 (2019)","DOI":"10.3390\/app9091788"},{"key":"849_CR46","unstructured":"Deepak, K., Tosh, S., Shetty, X., Liang, C.A., Kamhoua, Kevin, A., Kwiat, Njilla, L.: Security implications of blockchain cloud with analysis of block withholding attack. In 2017 17th IEEE\/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID), pages 458\u2013467. IEEE, (2017)"},{"key":"849_CR47","doi-asserted-by":"crossref","unstructured":"Zhaojie Wang, Q., Lv, Z., Lu, Y., Wang, Yue, S.: Forkdec: Accurate detection for selfish mining attacks. Security and Communication Networks, 2021. (2021)","DOI":"10.1155\/2021\/5959698"},{"key":"849_CR48","unstructured":"Ren Zhang and Bart Preneel: Broadcasting intermediate blocks as a defense mechanism against selfish-mine in bitcoin. Cryptol. ePrint Archive, (2015)"},{"key":"849_CR49","doi-asserted-by":"crossref","unstructured":"Ren Zhang and Bart Preneel: Publish or perish: A backward-compatible defense against selfish mining in bitcoin. In Cryptographers\u2019 Track at the RSA Conference, pages 277\u2013292. Springer, (2017)","DOI":"10.1007\/978-3-319-52153-4_16"},{"issue":"1","key":"849_CR50","doi-asserted-by":"publisher","first-page":"422","DOI":"10.3390\/app13010422","volume":"13","author":"L Chencheng Zhou","year":"2022","unstructured":"Chencheng Zhou, L., Xing, Q., Liu, Wang, H.: Effective selfish mining defense strategies to improve bitcoin dependability. Appl. Sci. 13(1), 422 (2022)","journal-title":"Appl. Sci."},{"key":"849_CR51","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ins.2022.04.008","volume":"601","author":"Z Yilei Wang","year":"2022","unstructured":"Yilei Wang, Z., Wang, M., Zhao, X., Han, H., Zhou: Xiaoying Wang, and Arthur Sandor Voundi Koe. Bsm-ether: Bribery selfish mining in blockchain-based healthcare systems. Inf. Sci. 601, 1\u201317 (2022)","journal-title":"Inf. Sci."},{"key":"849_CR52","doi-asserted-by":"publisher","first-page":"28","DOI":"10.3389\/fbloc.2020.00028","volume":"3","author":"Maher Alharby and Aad van Moorsel","year":"2020","unstructured":"Maher Alharby and Aad van Moorsel: Blocksim: An extensible simulation tool for blockchain systems. Front. Blockchain. 3, 28 (2020)","journal-title":"Front. Blockchain"},{"issue":"7","key":"849_CR53","doi-asserted-by":"publisher","first-page":"3596","DOI":"10.1002\/int.22428","volume":"36","author":"Z Tao Li","year":"2021","unstructured":"Tao Li, Z., Wang, G., Yang, Y., Cui, Y., Chen, Yu, X.: Semi-selfish mining based on hidden markov decision process. Int. J. Intell. Syst. 36(7), 3596\u20133612 (2021)","journal-title":"Int. J. Intell. Syst."},{"key":"849_CR54","doi-asserted-by":"crossref","unstructured":"Li, Q.-L., Yan-Xia Chang, and, Zhang, C.: Tree representation, growth rate of blockchain and reward allocation in ethereum with multiple mining pools. arXiv preprint arXiv:2201.10087, (2022)","DOI":"10.1109\/TNSM.2022.3195292"},{"key":"849_CR55","doi-asserted-by":"publisher","first-page":"101956","DOI":"10.1016\/j.cose.2020.101956","volume":"97","author":"X Runkai Yang","year":"2020","unstructured":"Runkai Yang, X., Chang, J., Mi\u02c7si\u00b4c, B., Mi\u02c7si\u00b4c: Assessing blockchain selfish mining in an imperfect network: Honest and selfish miner views. Computers Secur. 97, 101956 (2020)","journal-title":"Computers Secur."},{"key":"849_CR56","doi-asserted-by":"crossref","unstructured":"Arthur Gervais, Ghassan, O., Karame, K., Wu\u00a8st, V., Glykantzis: Hubert Ritzdorf, and Srdjan Capkun. On the security and performance of proof of work blockchains. In Proceedings of the 2016 ACM SIGSAC conference on computer and communications security, pages 3\u201316, (2016)","DOI":"10.1145\/2976749.2978341"},{"key":"849_CR57","unstructured":"Chicarino, V., Jesus, E.F., Albuquerque, C., Rocha, A.: A heuristic for the detection of selfish miner and stalker attacks in blockchains networks. In IEEE Blockchain, Robotics and AI for Networking Security Conference, pages 1\u20136, (2019)"},{"key":"849_CR58","doi-asserted-by":"crossref","unstructured":"Chen Feng and Jianyu Niu: Selfish mining in ethereum. In 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS), pages 1306\u20131316. IEEE, (2019)","DOI":"10.1109\/ICDCS.2019.00131"},{"key":"849_CR59","doi-asserted-by":"crossref","unstructured":"Bienfang, J.C., Fan, J., Migdall, A., Polyakov, S.V.: Single-Photon Generation and Detection: Chap. 1. Introduction, vol. 45. Elsevier Inc. Chapters (2013)","DOI":"10.1016\/B978-0-12-387695-9.00001-9"},{"issue":"2","key":"849_CR60","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1016\/0022-0000(83)90042-9","volume":"27","author":"O Michael","year":"1983","unstructured":"Michael, O., Rabin: Transaction protection by beacons. J. Comput. Syst. Sci. 27(2), 256\u2013267 (1983)","journal-title":"J. Comput. Syst. Sci."},{"issue":"6","key":"849_CR61","doi-asserted-by":"publisher","first-page":"2251","DOI":"10.1007\/s12083-020-00905-6","volume":"13","author":"G Ma","year":"2020","unstructured":"Ma, G., Ge, C., Lu, Zhou: Achieving reliable timestamp in the bitcoin platform. Peer-to-Peer Netw. Appl. 13(6), 2251\u20132259 (2020)","journal-title":"Peer-to-Peer Netw. Appl."},{"key":"849_CR62","unstructured":"Saki Billah: One weird trick to stop selfish miners: Fresh bitcoins, a solution for the honest miner. (2015)"},{"key":"849_CR63","unstructured":"Meni Rosenfeld: Analysis of bitcoin pooled mining reward systems. arXiv preprint arXiv:1112.4980, (2011)"},{"key":"849_CR64","doi-asserted-by":"crossref","unstructured":"Emin Gu\u00a8n Sirer, Willem de Bruijn, Patrick Reynolds, Alan Shieh, Kevin Walsh, Dan Williams, and Fred B Schneider. Logical attestation: an authorization architecture for trustworthy computing. In Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles, pages 249\u2013264, (2011)","DOI":"10.1145\/2043556.2043580"},{"key":"849_CR65","doi-asserted-by":"publisher","first-page":"1503","DOI":"10.1016\/j.ins.2022.07.035","volume":"608","author":"AA Hamid Azimy","year":"2022","unstructured":"Hamid Azimy, A.A., Ghorbani, Bagheri, E.: Preventing proof-of-work mining attacks. Inf. Sci. 608, 1503\u20131523 (2022)","journal-title":"Inf. Sci."},{"key":"849_CR66","doi-asserted-by":"crossref","unstructured":"Hamid Azimy and Ali Ghorbani: Competitive selfish mining. In 2019 17th International Conference on Privacy, Security and Trust (PST), pages 1\u20138. IEEE, (2019)","DOI":"10.1109\/PST47121.2019.8949043"},{"key":"849_CR67","doi-asserted-by":"crossref","unstructured":"Tin Leelavimolsilp, V., Nguyen: Sebastian Stein, and Long Tran-Thanh. Selfish mining in proof-of-work blockchain with multiple miners: An empirical evaluation. In International Conference on Principles and Practice of Multi-Agent Systems, pages 219\u2013234. Springer, (2019)","DOI":"10.1007\/978-3-030-33792-6_14"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00849-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-024-00849-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00849-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,16]],"date-time":"2024-11-16T00:35:55Z","timestamp":1731717355000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-024-00849-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,10]]},"references-count":67,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2024,6]]}},"alternative-id":["849"],"URL":"https:\/\/doi.org\/10.1007\/s10207-024-00849-5","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,4,10]]},"assertion":[{"value":"10 April 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"All authors certify that they have no affiliations with or involvement in any organization or entity with any financial interest or non-financial interest in the subject matter or materials discussed in this manuscript.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"The authors declare that they have no conflict of interest.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants performed by any of the authors.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}