{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T00:30:57Z","timestamp":1773707457034,"version":"3.50.1"},"reference-count":61,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2024,7,13]],"date-time":"2024-07-13T00:00:00Z","timestamp":1720828800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,7,13]],"date-time":"2024-07-13T00:00:00Z","timestamp":1720828800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2024,10]]},"DOI":"10.1007\/s10207-024-00885-1","type":"journal-article","created":{"date-parts":[[2024,7,13]],"date-time":"2024-07-13T18:01:41Z","timestamp":1720893701000},"page":"3179-3198","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Trust attack prevention based on Spark-blockchain in social IoT: a survey"],"prefix":"10.1007","volume":"23","author":[{"given":"Mariam","family":"Masmoudi","sequence":"first","affiliation":[]},{"given":"Ikram","family":"Amous","sequence":"additional","affiliation":[]},{"given":"Corinne Amel","family":"Zayani","sequence":"additional","affiliation":[]},{"given":"Florence","family":"S\u00e8des","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,7,13]]},"reference":[{"key":"885_CR1","volume-title":"A multi-level trust management scheme for the Internet of Things","author":"A Ramanathan","year":"2015","unstructured":"Ramanathan, A.: A multi-level trust management scheme for the Internet of Things. University of Nevada, Las Vegas (2015)"},{"key":"885_CR2","doi-asserted-by":"crossref","unstructured":"Abdelghani, W., Zayani, C. A., Amous, I., S\u00e8des, F., Florence: Trust management in social internet of things: a survey, Conference on e-Business, e-Services and e-Society, pp. 430\u2013441, Springer (2016)","DOI":"10.1007\/978-3-319-45234-0_39"},{"key":"885_CR3","doi-asserted-by":"crossref","unstructured":"Roopa, MS., Pattar, Santosh, Buyya, Rajkumar, Venugopal, Kuppanna Rajuk, Iyengar, SS, Patnaik, LM: Social Internet of Things (SIoT): Foundations, thrust areas, systematic review and future directions, Computer Communications, pp. 32\u201357, Elsevier (2019)","DOI":"10.1016\/j.comcom.2019.03.009"},{"key":"885_CR4","doi-asserted-by":"crossref","unstructured":"Masmoudi, M., Abdelghani, W., Amous, I., S\u00e8des, F., Florence: Deep Learning for Trust-Related Attacks Detection in Social Internet of Things, International Conference on e-Business Engineering, pp. 389\u2013404, Springer (2020)","DOI":"10.1007\/978-3-030-34986-8_28"},{"issue":"8","key":"885_CR5","doi-asserted-by":"publisher","first-page":"3814","DOI":"10.3390\/s23083814","volume":"23","author":"Y Alghofaili","year":"2023","unstructured":"Alghofaili, Y., Rassam, M.A.: A dynamic trust-related attack detection model for IoT devices and services based on the deep long short-term memory technique. Sensors 23(8), 3814 (2023)","journal-title":"Sensors"},{"issue":"23","key":"885_CR6","doi-asserted-by":"publisher","first-page":"3871","DOI":"10.3390\/electronics11233871","volume":"11","author":"S Alam","year":"2022","unstructured":"Alam, S., Zardari, S., Shamsi, J.A.: Blockchain-based trust and reputation management in SIoT. Electronics 11(23), 3871 (2022)","journal-title":"Electronics"},{"key":"885_CR7","doi-asserted-by":"crossref","unstructured":"Abderrahim, O. B., Elhdhili, M. H., Saidane, L.: TMCoI-SIOT: A trust management system based on communities of interest for the social Internet of Things, The 13th international wireless communications and mobile computing conference (IWCMC), pp. 747\u2013752, IEEE (2017)","DOI":"10.1109\/IWCMC.2017.7986378"},{"key":"885_CR8","doi-asserted-by":"crossref","unstructured":"Abdelghani, W., Zayani, C. A., Amous, I., S\u00e8des, F., Florence: Trust evaluation model for attack detection in social internet of things, international conference on risks and security of internet and systems, pp. 48\u201364, Springer (2018)","DOI":"10.1007\/978-3-030-12143-3_5"},{"key":"885_CR9","unstructured":"Lee, G.M., Truong, N.B.: A reputation and knowledge based trust service platform for trustworthy social internet of things, Innovations in Clouds, Internet and Networks. ICIN), MDPI AG (2016)"},{"key":"885_CR10","unstructured":"Masmoudi, M., Zayani, C. A., Amous, I., S\u00e8des, F., Florence: A New Blockchain-Based trust management model, The 25th International Conference on Knowledge-Based and Intelligent Information and Engineering Systems, pp. 389\u2013404, Elsevier (2021)"},{"key":"885_CR11","doi-asserted-by":"crossref","unstructured":"Xia, H., Xiao, F., Zhang, S. S., Hu, C. Q., Cheng, X. Z.: Trustworthiness inference framework in the social Internet of Things: A context-aware approach, IEEE INFOCOM 2019-IEEE Conference on Computer Communications, pp. 838\u2013846, IEEE (2019)","DOI":"10.1109\/INFOCOM.2019.8737491"},{"issue":"3","key":"885_CR12","doi-asserted-by":"publisher","first-page":"1129","DOI":"10.1007\/s12652-019-01256-8","volume":"11","author":"S Talbi","year":"2020","unstructured":"Talbi, S., Bouabdallah, A.: Interest-based trust management scheme for social internet of things. J. Ambient Intell. Humanized Comput. 11(3), 1129\u20131140 (2020)","journal-title":"J. Ambient Intell. Humanized Comput."},{"issue":"11","key":"885_CR13","doi-asserted-by":"publisher","first-page":"155014771988810","DOI":"10.1177\/1550147719888109","volume":"15","author":"ST Bakhsh","year":"2019","unstructured":"Bakhsh, S.T., Alghamdi, S., Alsemmeari, R.A., Hassan, S.R.: An adaptive intrusion detection and prevention system for Internet of Things. Int. J. Distrib. Sensor Netw. 15(11), 1550147719888109 (2019)","journal-title":"Int. J. Distrib. Sensor Netw."},{"key":"885_CR14","doi-asserted-by":"crossref","unstructured":"Azeez, N. A., Bada, T. M., Misra, S., Adewumi, A., Van der Vyver, C., Ahuja, R.: Intrusion detection and prevention systems: an updated review, data management, analytics and innovation, pp. 685\u2013696, Springer (2020)","DOI":"10.1007\/978-981-32-9949-8_48"},{"key":"885_CR15","doi-asserted-by":"crossref","unstructured":"Kenkre, P. S., Pai, A., Colaco, L.: Real time intrusion detection and prevention system, Proceedings of the 3rd international conference on frontiers of intelligent computing: theory and applications (FICTA), pp. 405\u2013411, Springer (2015)","DOI":"10.1007\/978-3-319-11933-5_44"},{"key":"885_CR16","doi-asserted-by":"crossref","unstructured":"Calvaresi, D., Dubovitskaya, A., Calbimonte, J. P., Taveter, K., Schumacher, M.: Multi-agent systems and blockchain: Results from a systematic literature review, international conference on practical applications of agents and multi-agent systems, pp. 110\u2013126, Springer (2018)","DOI":"10.1007\/978-3-319-94580-4_9"},{"key":"885_CR17","unstructured":"Gorasiya, D. V.: Comparison of open-source data stream processing engines: spark streaming, flink and storm, Technical report (2019)"},{"key":"885_CR18","unstructured":"Perera, S., Perera, A., Hakimzadeh, K. : Reproducible experiments for comparing apache flink and apache spark on public clouds, arXiv preprint arXiv:1610.04493 (2016)"},{"key":"885_CR19","unstructured":"Rubin, J.: BTCSpark: Scalable analysis of the Bitcoin blockchain using spark, Dec, 16, pp. 1\u201314 (2015)"},{"key":"885_CR20","unstructured":"Dutta, D., Ch, T., Das, S., Tripathy, B. K.: Social Internet of Things (SIoT): transforming smart object to social object, NCMAC 2015 Conference Proceedings (2015)"},{"key":"885_CR21","doi-asserted-by":"crossref","unstructured":"Gulati, N., Kaur, P. D.: When things become friends: a semantic perspective on the social internet of things, smart innovations in communication and computational sciences, pp. 149\u2013159, Springer (2019)","DOI":"10.1007\/978-981-10-8971-8_15"},{"issue":"4","key":"885_CR22","doi-asserted-by":"publisher","first-page":"694","DOI":"10.1002\/dac.2930","volume":"29","author":"Z Chen","year":"2016","unstructured":"Chen, Z., Ling, R., Huang, C.M., Zhu, X.: A scheme of access service recommendation for the Social Internet of Things. Int. J. Commun. Syst. 29(4), 694\u2013706 (2016)","journal-title":"Int. J. Commun. Syst."},{"key":"885_CR23","unstructured":"Zheng, L., Zhang, H., Han, W., Zhou, X., He, J., Zhang, Z., Wang, J., Technologies, applications, and governance in the internet of things. Internet of things-Global technological and societal trends, From smart environments and spaces to green ICT (2011)"},{"key":"885_CR24","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1109\/TSUSC.2018.2839623","volume":"4","author":"U Jayasinghe","year":"2018","unstructured":"Jayasinghe, U., Lee, G.M., Um, T.W., Shi, Q.: Machine learning based trust computational model for IoT services. IEEE Trans. Sustain. Comput. 4, 39\u201352 (2018)","journal-title":"IEEE Trans. Sustain. Comput."},{"key":"885_CR25","unstructured":"Beldjilali, B: Gestion de Confiance dans le Cloud Computing, Universit\u00e9 d\u2019Oran (2016)"},{"key":"885_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.comcom.2016.10.012","volume":"97","author":"J Guo","year":"2017","unstructured":"Guo, J., Chen, R., Tsai, J.J.: A survey of trust computation models for service management in internet of things systems. Comput. Commun. 97, 1\u201314 (2017)","journal-title":"Comput. Commun."},{"issue":"2","key":"885_CR27","first-page":"57","volume":"5","author":"G Ekbatanifard","year":"2019","unstructured":"Ekbatanifard, G., Yousefi, O.: A novel trust management model in the social internet of things. J. Adv. Comput. Eng. Technol. 5(2), 57\u201370 (2019)","journal-title":"J. Adv. Comput. Eng. Technol."},{"key":"885_CR28","doi-asserted-by":"publisher","first-page":"2501","DOI":"10.1007\/s11277-018-5942-8","volume":"103","author":"CVL Mendoza","year":"2018","unstructured":"Mendoza, C.V.L., Kleinschmidt, J.H.: A distributed trust management mechanism for the Internet of things using a multi-service approach. Wireless Pers. Commun. 103, 2501\u20132513 (2018)","journal-title":"Wireless Pers. Commun."},{"key":"885_CR29","doi-asserted-by":"crossref","unstructured":"Kumar, J Senthil, Sivasankar, G., Nidhyananthan, S Selva: An artificial intelligence approach for enhancing trust between social iot devices in a network, toward social internet of things (SIoT): Enabling Technologies, Architectures and Applications, pp. 183\u2013196, Springer (2020)","DOI":"10.1007\/978-3-030-24513-9_11"},{"key":"885_CR30","doi-asserted-by":"crossref","unstructured":"Kowshalya, A Meena, Valarmathi, ML: Trust management for reliable decision making among social objects in the Social Internet of Things, IET Networks, 6, pp. 75\u201380, Wiley Online Library (2017)","DOI":"10.1049\/iet-net.2017.0021"},{"key":"885_CR31","unstructured":"Dagorn, Nathalie: D\u00e9tection et pr\u00e9vention d\u2019intrusion: pr\u00e9sentation et limites (2006)"},{"key":"885_CR32","doi-asserted-by":"publisher","first-page":"2681","DOI":"10.1007\/s11277-017-4319-8","volume":"96","author":"AM Kowshalya","year":"2017","unstructured":"Kowshalya, A.M., Valarmathi, M.L.: Trust management in the social internet of things. Wireless Pers. Commun. 96, 2681\u20132691 (2017)","journal-title":"Wireless Pers. Commun."},{"issue":"5","key":"885_CR33","doi-asserted-by":"publisher","first-page":"1253","DOI":"10.1109\/TKDE.2013.105","volume":"26","author":"M Nitti","year":"2013","unstructured":"Nitti, M., Girau, R., Atzori, L.: Trustworthiness management in the social internet of things. IEEE Trans. Knowl. Data Eng. 26(5), 1253\u20131266 (2013)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"1","key":"885_CR34","first-page":"3053418","volume":"2019","author":"B Feng","year":"2019","unstructured":"Feng, B., Li, Q., Ji, Y., Guo, D., Meng, X.: Stopping the cyberattack in the early stage: assessing the security risks of social network users. Secur. Commun. Netw. 2019(1), 3053418 (2019)","journal-title":"Secur. Commun. Netw."},{"issue":"1","key":"885_CR35","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1504\/WRSTSD.2022.119322","volume":"18","author":"KR Farishta","year":"2022","unstructured":"Farishta, K.R., Singh, V.K., Rajeswari, D.: XSS attack prevention using machine learning. World Rev. Sci., Technol. Sustain. Dev. 18(1), 45\u201350 (2022)","journal-title":"World Rev. Sci., Technol. Sustain. Dev."},{"issue":"22","key":"885_CR36","doi-asserted-by":"publisher","first-page":"4954","DOI":"10.3390\/s19224954","volume":"19","author":"AS Khan","year":"2019","unstructured":"Khan, A.S., Balan, K., Javed, Y., Tarmizi, S., Abdullah, J.: Secure trust-based blockchain architecture to prevent attacks in VANET. Sensors 19(22), 4954 (2019)","journal-title":"Sensors"},{"key":"885_CR37","doi-asserted-by":"publisher","first-page":"45655","DOI":"10.1109\/ACCESS.2018.2864189","volume":"6","author":"Z Lu","year":"2018","unstructured":"Lu, Z., Liu, W., Wang, Q., Qu, G., Liu, Z.: A privacy-preserving trust model based on blockchain for VANETs. IEEE Access 6, 45655\u201345664 (2018)","journal-title":"IEEE Access"},{"issue":"7","key":"885_CR38","first-page":"204","volume":"9","author":"K Nakayama","year":"2018","unstructured":"Nakayama, K., Moriyama, Y., Oshima, C.: An algorithm that prevents spam attacks using blockchain. Int. J. Adv. Comput. Sci. Appl. 9(7), 204\u2013208 (2018)","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"issue":"18","key":"885_CR39","doi-asserted-by":"publisher","first-page":"6806","DOI":"10.3390\/s22186806","volume":"22","author":"RF Ibrahim","year":"2022","unstructured":"Ibrahim, R.F., Abu Al-Haija, Q., Ahmad, A.: DDoS attack prevention for internet of thing devices using ethereum blockchain technology. Sensors 22(18), 6806 (2022)","journal-title":"Sensors"},{"issue":"4","key":"885_CR40","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4729","volume":"34","author":"B Ilyas","year":"2023","unstructured":"Ilyas, B., Kumar, A., Setitra, M.A., Bensalem, Z.A., Lei, H.: Prevention of DDoS attacks using an optimized deep learning approach in blockchain technology. Trans. Emerg. Telecommun. Technol. 34(4), e4729 (2023)","journal-title":"Trans. Emerg. Telecommun. Technol."},{"key":"885_CR41","doi-asserted-by":"crossref","unstructured":"Ansari, M.F., Sharma, P.K.: Dash, Bibhu. Prevention of phishing attacks using AI-based Cybersecurity Awareness Training, Prevention (2022)","DOI":"10.47893\/IJSSAN.2022.1221"},{"key":"885_CR42","doi-asserted-by":"crossref","unstructured":"Kathirkamanathan, N., Thevarasa, B., Mahadevan, G., Skandhakumar, N., Kuruwitaarachchi, N.: Prevention of DDoS attacks targeting financial services using supervised machine learning and stacked LSTM, International conference for Convergence in Technology (I2CT), pp. 1\u20135, IEEE (2022)","DOI":"10.1109\/I2CT54291.2022.9825228"},{"key":"885_CR43","doi-asserted-by":"publisher","first-page":"4185","DOI":"10.1007\/s11042-021-11740-z","volume":"81","author":"SD Kebede","year":"2022","unstructured":"Kebede, S.D., Tiwari, B., Tiwari, V., Chandravanshi, K.: Predictive machine learning-based integrated approach for DDoS detection and prevention. Multimed. Tools Appl. 81, 4185\u20134211 (2022)","journal-title":"Multimed. Tools Appl."},{"key":"885_CR44","unstructured":"Afanasyev, I., Kolotov, A., Rezin, R., Danilov, K., Kashevnik, A., Jotsov, V.: Blockchain solutions for multi-agent robotic systems: Related work and open questions, Proceedings of the 24th conference of open innovations association FRUCT, 76, FRUCT Oy (2019)"},{"key":"885_CR45","doi-asserted-by":"crossref","unstructured":"Mikroyannidis, A., Third, A., Domingue, J., Bachler, M., Quick, K. A.: Blockchain Applications in Lifelong Learning and the Role of the Semantic Blockchain, Blockchain Technology Applications in Education, pp. 16\u201341, IGI Global (2020)","DOI":"10.4018\/978-1-5225-9478-9.ch002"},{"issue":"1","key":"885_CR46","doi-asserted-by":"publisher","first-page":"155014771982582","DOI":"10.1177\/1550147719825820","volume":"15","author":"R Iqbal","year":"2019","unstructured":"Iqbal, R., Butt, T.A., Afzaal, M., Salah, K.: Trust management in social internet of vehicles: factors, challenges, blockchain, and fog solutions. Int. J. Distrib. Sensor Netw. 15(1), 1550147719825820 (2019)","journal-title":"Int. J. Distrib. Sensor Netw."},{"key":"885_CR47","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1016\/j.pmcj.2020.101131","volume":"62","author":"B Guidi","year":"2020","unstructured":"Guidi, B.: When blockchain meets online social networks. Pervasive Mobile Comput. 62, 101\u2013131 (2020)","journal-title":"Pervasive Mobile Comput."},{"issue":"8","key":"885_CR48","doi-asserted-by":"publisher","first-page":"2575","DOI":"10.3390\/s18082575","volume":"18","author":"A Panarello","year":"2018","unstructured":"Panarello, A., Tapas, N., Merlino, G., Longo, F., Puliafito, A.: Blockchain and iot integration: a systematic survey. Sensors 18(8), 2575 (2018)","journal-title":"Sensors"},{"key":"885_CR49","unstructured":"Smik, B: Blockchain technologies adapted for data manipulation in IoT, Masaryk University Faculty of Informatics (2018)"},{"issue":"19","key":"885_CR50","doi-asserted-by":"publisher","first-page":"10743","DOI":"10.3390\/su131910743","volume":"13","author":"MJ Awan","year":"2021","unstructured":"Awan, M.J., Farooq, U., Babar, H.M.A., Yasin, A., Nobanee, H., Hussain, M., Zain, A.M.: Real-time DDoS attack detection system using big data approach. Sustainability 13(19), 10743 (2021)","journal-title":"Sustainability"},{"issue":"5","key":"885_CR51","doi-asserted-by":"publisher","first-page":"6527","DOI":"10.3233\/JIFS-179733","volume":"38","author":"NV Patil","year":"2020","unstructured":"Patil, N.V., Rama Krishna, C., Kumar, K.: S-DDoS: Apache spark based real-time DDoS detection system. J. Intell. Fuzzy Syst. 38(5), 6527\u20136535 (2020)","journal-title":"J. Intell. Fuzzy Syst."},{"key":"885_CR52","doi-asserted-by":"publisher","first-page":"59657","DOI":"10.1109\/ACCESS.2018.2875045","volume":"6","author":"N Marir","year":"2018","unstructured":"Marir, N., Wang, H., Feng, G., Li, B., Jia, M.: Distributed abnormal behavior detection approach based on deep belief network and ensemble SVM using spark. IEEE Access 6, 59657\u201359671 (2018)","journal-title":"IEEE Access"},{"key":"885_CR53","doi-asserted-by":"crossref","unstructured":"Saravanan, S.: Performance evaluation of classification algorithms in the design of Apache Spark based intrusion detection system, The 5th international conference on communication and electronics systems (ICCES), pp. 443\u2013447, IEEE (2020)","DOI":"10.1109\/ICCES48766.2020.9138066"},{"key":"885_CR54","doi-asserted-by":"crossref","unstructured":"Zhang, H., Dai, S., Li, Y., Zhang, W.: Real-time distributed-random-forest-based network intrusion detection system using Apache spark, The 37th international performance computing and communications conference (IPCCC), pp. 1\u20137, IEEE (2018)","DOI":"10.1109\/PCCC.2018.8711068"},{"key":"885_CR55","doi-asserted-by":"crossref","unstructured":"Masmoudi, M., Amous, I., Zayani, C. A., S\u00e8des, F., Florence: Real-Time Mitigation of Trust-Related Attacks with Blockchain and Apache Spark, The 12th International Conference on Model and Data Engineering, MEDI (2023)","DOI":"10.1007\/978-3-031-49333-1_22"},{"issue":"3","key":"885_CR56","doi-asserted-by":"publisher","first-page":"769","DOI":"10.2298\/CSIS161217028H","volume":"14","author":"D Han","year":"2017","unstructured":"Han, D., Bi, K., Liu, H., Jia, J.: A DDoS attack detection system based on spark framework. Comput. Sci. Inf. Syst. 14(3), 769\u2013788 (2017)","journal-title":"Comput. Sci. Inf. Syst."},{"key":"885_CR57","doi-asserted-by":"publisher","first-page":"572","DOI":"10.1016\/j.procs.2020.08.059","volume":"176","author":"A Abid","year":"2020","unstructured":"Abid, A., Jemili, F.: Intrusion detection based on graph oriented big data analytics. Procedia Comput. Sci. 176, 572\u2013581 (2020)","journal-title":"Procedia Comput. Sci."},{"key":"885_CR58","doi-asserted-by":"crossref","unstructured":"Zhou, B., Li, J., Wu, J., Guo, S., Gu, Y., Li, Z.: Machine-learning-based online distributed denial-of-service attack detection using spark streaming, IEEE international conference on communications (ICC), pp. 1\u20136, IEEE (2018)","DOI":"10.1109\/ICC.2018.8422327"},{"key":"885_CR59","doi-asserted-by":"crossref","unstructured":"Wirz, L., Tanthanathewin, R., Ketphet, A., Fugkeaw, S.: Design and development of A cloud-based IDS using Apache Kafka and Spark Streaming, The 19th International Joint Conference on Computer Science and Software Engineering (JCSSE), pp. 1\u20136, IEEE (2022)","DOI":"10.1109\/JCSSE54890.2022.9836264"},{"issue":"2","key":"885_CR60","doi-asserted-by":"publisher","first-page":"1355","DOI":"10.1007\/s10586-022-03538-x","volume":"25","author":"NV Patil","year":"2022","unstructured":"Patil, N.V., Krishna, C.R., Kumar, K.: SSK-DDoS: distributed stream processing framework based classification system for DDoS attacks. Cluster Comput. 25(2), 1355\u20131372 (2022)","journal-title":"Cluster Comput."},{"key":"885_CR61","doi-asserted-by":"crossref","unstructured":"Assefi, M., Behravesh, E., Liu, G., Tafti, A. P.: Big data machine learning using apache spark MLlib, IEEE international conference on big data (big data), pp. 3492\u20133498 (2017)","DOI":"10.1109\/BigData.2017.8258338"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00885-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-024-00885-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00885-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,24]],"date-time":"2024-11-24T02:05:57Z","timestamp":1732413957000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-024-00885-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,13]]},"references-count":61,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2024,10]]}},"alternative-id":["885"],"URL":"https:\/\/doi.org\/10.1007\/s10207-024-00885-1","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,7,13]]},"assertion":[{"value":"13 July 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"The authors declare full compliance with ethical standards. This article does not contain any studies involving humans or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}