{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T09:40:37Z","timestamp":1770889237687,"version":"3.50.1"},"reference-count":69,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,1,7]],"date-time":"2025-01-07T00:00:00Z","timestamp":1736208000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,7]],"date-time":"2025-01-07T00:00:00Z","timestamp":1736208000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2025,2]]},"DOI":"10.1007\/s10207-024-00974-1","type":"journal-article","created":{"date-parts":[[2025,1,7]],"date-time":"2025-01-07T14:22:53Z","timestamp":1736259773000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Cyber-security gamification in federation of cyber ranges: design, implementation, and evaluation"],"prefix":"10.1007","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1406-602X","authenticated-orcid":false,"given":"Jason","family":"Diakoumakos","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6116-834X","authenticated-orcid":false,"given":"Evangelos","family":"Chaskos","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0660-8431","authenticated-orcid":false,"given":"Nicholas","family":"Kolokotronis","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6094-3308","authenticated-orcid":false,"given":"George","family":"Lepouras","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,1,7]]},"reference":[{"key":"974_CR1","doi-asserted-by":"publisher","unstructured":"Sampaio, A., Rolim, T., Mendon\u00e7a, N. C., Cunha, M.: An approach for evaluating cloud application topologies based on tosca. In: 2016 IEEE 9th International Conference on Cloud Computing (CLOUD), vol. 25, pp. 407\u2013414 (2016) https:\/\/doi.org\/10.1109\/CLOUD.2016.0061","DOI":"10.1109\/CLOUD.2016.0061"},{"issue":"1","key":"974_CR2","doi-asserted-by":"publisher","first-page":"5","DOI":"10.22215\/timreview\/861","volume":"5","author":"M Adams","year":"2015","unstructured":"Adams, M., Makramalla, M.: Cybersecurity skills training: an attacker-centric gamified approach. Technol. Innov. Manag. Rev. 5(1), 5\u201314 (2015). https:\/\/doi.org\/10.22215\/timreview\/861","journal-title":"Technol. Innov. Manag. Rev."},{"key":"974_CR3","unstructured":"Agency, E.D.: Cyber ranges federation project reaches new milestone. (2018). https:\/\/bit.ly\/3cU3Lm2"},{"key":"974_CR4","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1007\/s11036-019-01442-0","volume":"25","author":"M Andreolini","year":"2020","unstructured":"Andreolini, M., Colacino, V.G., Colajanni, M., Marchetti, M.: A framework for the evaluation of trainee performance in cyber range exercises. Mob. Netw. Appl. 25, 236\u2013247 (2020)","journal-title":"Mob. Netw. Appl."},{"key":"974_CR5","unstructured":"arXiv: Scorpion cyber range: Fully customizable cyberexercises, gamification, and learning analytics to train cybersecurity competencies. (2024). https:\/\/arxiv.org\/html\/2401.12594v3"},{"key":"974_CR6","doi-asserted-by":"crossref","unstructured":"Brady, C., Poole, U., M\u2019manga, A.: Gamification of cyber security training-ensuresecure (2022)","DOI":"10.1109\/ICEBE55470.2022.00010"},{"key":"974_CR7","unstructured":"Chai, J., Wang, X.: Fairness with adaptive weights, In: Chaudhuri, K., Jegelka, S., Song, L., Szepesvari, C., Niu, G., Sabato, S. (Eds.), Proceedings of the 39th International Conference on Machine Learning, PMLR. pp. 2853\u20132866 (2022). https:\/\/proceedings.mlr.press\/v162\/chai22a.html"},{"key":"974_CR8","doi-asserted-by":"publisher","unstructured":"Chaskos, E., Diakoumakos, J., Kolokotronis, N., Lepouras, G.: Gamification mechanisms in cyber range and cyber security training environments: a review. In: Bernardes, O., Amorim, V., Moreira, A.C. (eds.) Handbook of Research on Gamification Dynamics and User Experience Design, pp. 363\u2013383. IGI Global (2022). https:\/\/doi.org\/10.4018\/978-1-6684-4291-3.ch017","DOI":"10.4018\/978-1-6684-4291-3.ch017"},{"key":"974_CR9","unstructured":"Circadence: Teach cyber security. (2020). https:\/\/bit.ly\/30YPUpb"},{"key":"974_CR10","doi-asserted-by":"publisher","unstructured":"Compte, A.L., Elizondo, D.A., Watson, T.: A renewed approach to serious games for cyber security. In: 2015 7th International Conference on Cyber Conflict: Architectures in Cyberspace , pp. 203\u2013216 (2015). https:\/\/doi.org\/10.1109\/CYCON.2015.7158478","DOI":"10.1109\/CYCON.2015.7158478"},{"key":"974_CR11","unstructured":"Corp., D.D.T., History, C.: Diutinus defense technologies corp (2019). https:\/\/bit.ly\/38X7cqP"},{"key":"974_CR12","unstructured":"Cyber-MAR: Cyber preparedness actions for a holistic approach and awareness raising in the maritime logistics supply chain d2.1: State of the art cyber range technologies analysis. PdF. (2020). https:\/\/bit.ly\/38ZSNh4"},{"key":"974_CR13","unstructured":"CyberSec4Europe: D7.1 report on existing cyber ranges, requirements. (2020). https:\/\/cybersec4europe.eu\/wp-content\/uploads\/2020\/09\/D7.1-Report-on-existing-cyber-ranges-and-requirement-specification-for-federated-cyber-ranges-v1.0_submitted.pdf"},{"key":"974_CR14","unstructured":"D5-IQ.: Project ares. PdF. (2020). https:\/\/gamifiedcyberlearning.com\/"},{"key":"974_CR15","unstructured":"Davis, A., Leek, T., Zhivich, M., Gwinnup, K., Leonard, W.: The fun and future of ctf. Genetics Selection Evolution (2014)"},{"key":"974_CR16","unstructured":"Davis, J., Magrath, S.: A survey of cyber ranges and testbeds executive (2013)"},{"key":"974_CR17","doi-asserted-by":"publisher","unstructured":"Diakoumakos, J., Chaskos, E., Kolokotronis, N., Lepouras, G.: Cyber-range federation and cyber-security games: A gamification scoring model, In: 2021 IEEE International Conference on Cyber Security and Resilience (CSR), pp. 186\u2013191 (2021). https:\/\/doi.org\/10.1109\/CSR51186.2021.9527972","DOI":"10.1109\/CSR51186.2021.9527972"},{"key":"974_CR18","doi-asserted-by":"publisher","unstructured":"E., C., J., D., N., K., G., L.: Gamification mechanisms in cyber range and cyber security training environments: a review, In: Handbook of Research on Gamification Dynamics and User Experience Design, IGI Global. pp. 363\u2013383 (2022). https:\/\/doi.org\/10.4018\/978-1-6684-4291-3.ch017","DOI":"10.4018\/978-1-6684-4291-3.ch017"},{"key":"974_CR19","unstructured":"ECS: Wg5 paper: Understanding cyber ranges: From hype to reality. (2024). https:\/\/ecs-org.eu\/ecso-uploads\/2023\/05\/2020_SWG-5.1_paper_UnderstandingCyberRanges_final_v1.0-update.pdf"},{"key":"974_CR20","unstructured":"Emk, S.: Echo project summary (2020). https:\/\/bit.ly\/3c51Agp"},{"key":"974_CR21","unstructured":"ENISA: European cybersecurity skills framework role profiles (2022). https:\/\/www.enisa.europa.eu\/publications\/european-cybersecurity-skills-framework-role-profiles"},{"key":"974_CR22","doi-asserted-by":"publisher","first-page":"632","DOI":"10.1007\/978-3-030-11935-5_60","volume-title":"The Challenges of the Digital Transformation in Education","author":"D Fenton","year":"2019","unstructured":"Fenton, D., Traylor, T., Hokanson, G., Straub, J.: Integrating cyber range technologies and certification programs to improve cybersecurity training programs. In: Auer, M.E., Tsiatsos, T. (eds.) The Challenges of the Digital Transformation in Education, pp. 632\u2013643. Springer International Publishing, Cham (2019)"},{"key":"974_CR23","doi-asserted-by":"publisher","unstructured":"Ferguson, B., Tall, A., Olsen, D.: National cyber range overview, In: 2014 IEEE Military Communications Conference, Baltimore, MD, USA. pp. 123\u2013128 (2014).https:\/\/doi.org\/10.1109\/MILCOM.2014.27","DOI":"10.1109\/MILCOM.2014.27"},{"key":"974_CR24","unstructured":"FORESIGHT: Advanced cyber security simulation platform for preparedness training in aviation, power grid and naval environments (2020a). https:\/\/bit.ly\/3xUK4UU"},{"key":"974_CR25","unstructured":"FORESIGHT: Foresight d12.2 - report on existing cyber security and training standards(2020b)"},{"key":"974_CR26","unstructured":"FORESIGHT: Foresight d4.2 - report for learning\/training objectives, methodology and evaluation (2020c)"},{"key":"974_CR27","unstructured":"FORESIGHT: D2.1 state of the art scenario report. (2021a). https:\/\/foresight-h2020.eu\/wp-content\/uploads\/2021\/10\/D2.1-State-of-the-Art-Scenario-Report-I.pdf"},{"key":"974_CR28","unstructured":"FORESIGHT: D9.1 gamification and visualisation modules (i). (2021)b. https:\/\/foresight-h2020.eu\/wp-content\/uploads\/2021\/10\/D9.1-Gamification-and-visualisation-modules-I.pdf"},{"key":"974_CR29","doi-asserted-by":"publisher","unstructured":"Gasiba, T.E., Lechner, U., Rezabek, F., Pinto-Albuquerque, M.: Cybersecurity games for secure programming education in the industry: Gameplay analysis, in: Cybersecurity games for secure programming education in the industry (ICPEC), pp. 10:1\u201310:11 (2020). https:\/\/doi.org\/10.4230\/OASIcs.ICPEC.2020.10","DOI":"10.4230\/OASIcs.ICPEC.2020.10"},{"key":"974_CR30","unstructured":"Giantas, D., Liaropoulos, A.: Cybersecurity in the eu: threats, frameworks and future perspectives (2019)"},{"key":"974_CR31","doi-asserted-by":"publisher","unstructured":"Gonz\u00e1lez, C., Mora, A.: Gamification in intelligent tutoring systems. In: TEEM \u201914 Proceedings of the Second International Conference on Technological Ecosystems for Enhancing Multiculturality (2014). https:\/\/doi.org\/10.1145\/2669711.2669903","DOI":"10.1145\/2669711.2669903"},{"key":"974_CR32","unstructured":"Graziano, A.: About federation of cyber ranges, market places and technology innovation (2020). https:\/\/bit.ly\/3c4nwbq"},{"key":"974_CR33","unstructured":"Hamilton, T.: What is response time testing? how to measure for api tools (2021). https:\/\/bit.ly\/3NZsoPd"},{"key":"974_CR34","unstructured":"Hellman, D.: Measuring algorithmic fairness. Crim. Proced. eJ. (2019). https:\/\/api.semanticscholar.org\/CorpusID:199002104"},{"key":"974_CR35","doi-asserted-by":"publisher","unstructured":"Hendrix, M., Al-Sherbaz, A., Bloom, V.: Game based cyber security training: are serious games suitable for cyber security training? Int. J. Serious Games 3. (2016). https:\/\/doi.org\/10.17083\/ijsg.v3i1.107","DOI":"10.17083\/ijsg.v3i1.107"},{"key":"974_CR36","doi-asserted-by":"crossref","unstructured":"Jelo, M., Helebrandt, P.: Gamification of cyber ranges in cybersecurity education. In: 2022 20th International Conference on Emerging eLearning Technologies and Applications (ICETA) , pp. 280\u2013285 (2022). https:\/\/api.semanticscholar.org\/CorpusID:254737734","DOI":"10.1109\/ICETA57911.2022.9974714"},{"key":"974_CR37","doi-asserted-by":"publisher","unstructured":"Kemmerer, R.: Cybersecurity, in: 25th International Conference on Software Engineering, 2003. Proceedings., pp. 705\u2013715 (2003). https:\/\/doi.org\/10.1109\/ICSE.2003.1201257","DOI":"10.1109\/ICSE.2003.1201257"},{"key":"974_CR38","unstructured":"Kimminich, B.: Hosting a ctf event. (2020). https:\/\/bit.ly\/3x4pxh6"},{"key":"974_CR39","doi-asserted-by":"publisher","unstructured":"Koutsouris, N., Vassilakis, C., Kolokotronis, N.: Cyber-security training evaluation metrics, In: 2021 IEEE International Conference on Cyber Security and Resilience (CSR), pp. 192\u2013197 (2021). https:\/\/doi.org\/10.1109\/CSR51186.2021.9527946","DOI":"10.1109\/CSR51186.2021.9527946"},{"key":"974_CR40","unstructured":"Li, C., Kulkarni, R.: Survey of cybersecurity education through gamification, In: 2016 ASEE Annual Conference & Exposition, ASEE Conferences, New Orleans, Louisiana. p. 25981 (2016). https:\/\/peer.asee.org\/25981"},{"key":"974_CR41","unstructured":"Littledata: What is the average server response time? (2022). https:\/\/bit.ly\/3Nz4Ukc"},{"key":"974_CR42","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/s11416-019-00342-x","volume":"16","author":"R Luh","year":"2020","unstructured":"Luh, R., Temper, M., Tjoa, S., Schrittwieser, S., Janicke, H.: Penquest: a gamified attacker\/defender meta model for cyber security assessment and education. J. Comput. Virol. Hacking Tech. 16, 19\u201361 (2020). https:\/\/doi.org\/10.1007\/s11416-019-00342-x","journal-title":"J. Comput. Virol. Hacking Tech."},{"key":"974_CR43","unstructured":"Moore, M.: Bringing gamification to cyber security training (2022). https:\/\/bit.ly\/2OJ1QJb"},{"key":"974_CR44","unstructured":"Mukherjee, R.: Automate deployment of ctf challenges using ci\/cd (2020). https:\/\/bit.ly\/2NzdhCq"},{"key":"974_CR45","unstructured":"NICE: The cyber range (2024). https:\/\/www.nist.gov\/system\/files\/documents\/2023\/09\/29\/The%20Cyber%20Range_A%20Guide.pdf"},{"key":"974_CR46","doi-asserted-by":"crossref","unstructured":"Oikonomou, N., Mengidis, N., Spanopoulos-Karalexidis, M., Voulgaridis, A., Merialdo, M., Raisr, I., Hanson, K., de\u00a0La\u00a0Vall\u00e9e, P., Tsikrika, T., Vrochidis, S., Votis, K.: Echo federated cyber range: Towards next-generation scalable cyber ranges. In: 2021 IEEE International Conference on Cyber Security and Resilience (CSR) , pp. 403\u2013408 (2021). https:\/\/api.semanticscholar.org\/CorpusID:237445877","DOI":"10.1109\/CSR51186.2021.9527985"},{"key":"974_CR47","doi-asserted-by":"publisher","first-page":"579","DOI":"10.1515\/jhsem-2014-0031","volume":"11","author":"R Ottis","year":"2014","unstructured":"Ottis, R.: Light weight tabletop exercise for cybersecurity education. J. Homel. Secur. Emerg. Manage. 11, 579\u2013592 (2014). https:\/\/doi.org\/10.1515\/jhsem-2014-0031","journal-title":"J. Homel. Secur. Emerg. Manage."},{"key":"974_CR48","unstructured":"Papachristos, C.: Code ctf 2019 the 5th element (2020). https:\/\/bit.ly\/3c5lkjP"},{"key":"974_CR49","unstructured":"paper, E.W.: Understanding cyber ranges: From hype to reality (2020). https:\/\/www.ecs.org\/"},{"key":"974_CR50","doi-asserted-by":"crossref","unstructured":"Pitoura, E., Stefanidis, K., Koutrika, G.: Fairness in rankings and recommendations: an overview (2021). arXiv:2104.05994","DOI":"10.1109\/MDM52706.2021.00013"},{"key":"974_CR51","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1109\/MSP.2018.1870877","volume":"16","author":"B Price","year":"2018","unstructured":"Price, B., Zhivich, M., Thompson, M., Eagle, C.: House rules: designing the scoring algorithm for cyber grand challenge. IEEE Secur. Priv. 16, 23\u201331 (2018). https:\/\/doi.org\/10.1109\/MSP.2018.1870877","journal-title":"IEEE Secur. Priv."},{"key":"974_CR52","unstructured":"PROJECTS, P.: Cyber ranges federations (crf) (2024). https:\/\/www.pesco.europa.eu\/project\/cyber-ranges-federations-crf\/"},{"key":"974_CR53","doi-asserted-by":"publisher","unstructured":"Russo, E., Costa, G., Armando, A.: Scenario design and validation for next generation cyber ranges. In: 2018 IEEE 17th International Symposium on Network Computing and Applications (NCA) , pp. 1\u20134 (2018). https:\/\/doi.org\/10.1109\/NCA.2018.8548324","DOI":"10.1109\/NCA.2018.8548324"},{"key":"974_CR54","doi-asserted-by":"publisher","unstructured":"Russo, E., Costa, G., Armando, A.: Building next generation cyber ranges with crack. Computers and Security 95,(2020). https:\/\/doi.org\/10.1016\/j.cose.2020.101837","DOI":"10.1016\/j.cose.2020.101837"},{"key":"974_CR55","doi-asserted-by":"crossref","unstructured":"Russo, E., Ribaudo, M., Orlich, A., Longo, G., Armando, A.: Cyber range and cyber defense exercises: Gamification meets university students. In: Proceedings of the 2nd International Workshop on Gamification in Software Development, Verification, and Validation (2023). https:\/\/api.semanticscholar.org\/CorpusID:265509327","DOI":"10.1145\/3617553.3617888"},{"key":"974_CR56","doi-asserted-by":"publisher","unstructured":"Saad, W., Han, Z., Debbah, M., Hjorungnes, A.: A distributed merge and split algorithm for fair cooperation in wireless networks, In: ICC Workshops - 2008 IEEE International Conference on Communications Workshops, pp. 311\u2013315 (2008). https:\/\/doi.org\/10.1109\/ICCW.2008.65","DOI":"10.1109\/ICCW.2008.65"},{"key":"974_CR57","unstructured":"SANS: Sans cyber ranges: Cybersecurity simulation training (2024). https:\/\/www.sans.org\/cyber-ranges\/"},{"key":"974_CR58","unstructured":"Sargent, Z.: Csirt-mu (2019). https:\/\/github.com\/CSIRT-MU\/edu-resources"},{"key":"974_CR59","doi-asserted-by":"publisher","unstructured":"Scholefield, S., Shepherd, L.: Gamification techniques for raising cyber security awareness. (2019). https:\/\/doi.org\/10.48550\/arXiv.1903.08454","DOI":"10.48550\/arXiv.1903.08454"},{"key":"974_CR60","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1016\/j.ijhcs.2014.09.006","volume":"74","author":"K Seaborn","year":"2015","unstructured":"Seaborn, K., Fels, D.I.: Gamification in theory and action: a survey. Int. J. Hum Comput Stud. 74, 14\u201331 (2015). https:\/\/doi.org\/10.1016\/j.ijhcs.2014.09.006","journal-title":"Int. J. Hum Comput Stud."},{"key":"974_CR61","doi-asserted-by":"crossref","unstructured":"Sharkov, G., odorova, C.T., Koykov, G., Nikolov, I.P.: Towards a robust and scalable cyber range federation for sectoral cyber\/hybrid exercising: the red ranger and echo collaborative experience. Inf. Secur. Int. J. (2022). https:\/\/api.semanticscholar.org\/CorpusID:252586849","DOI":"10.11610\/isij.5319"},{"key":"974_CR62","doi-asserted-by":"publisher","unstructured":"Swann, M., Rose, J., Bendiab, G., Shiaeles, S., Li, F.: Open source and commercial capture the flag cyber security learning platforms - a case study, In: 2021 IEEE International Conference on Cyber Security and Resilience (CSR), pp. 198\u2013205. (2021). https:\/\/doi.org\/10.1109\/CSR51186.2021.9527941","DOI":"10.1109\/CSR51186.2021.9527941"},{"key":"974_CR63","doi-asserted-by":"publisher","unstructured":"Tillmann, N., Halleux, J., Xie, T., Bishop, J.: Code hunt: Gamifying teaching and learning of computer science at scale, In: In Proceedings of the first ACM conference on Learning at scale conference, Association for Computing Machinery, New York, NY, USA. pp. 221\u2013222 (2014). https:\/\/doi.org\/10.1145\/2556325.2567870","DOI":"10.1145\/2556325.2567870"},{"key":"974_CR64","doi-asserted-by":"crossref","unstructured":"Urias, V.E., Stout, W.M.S., Leeuwen, B.P.V., Lin, H.: Cyber range infrastructure limitations and needs of tomorrow: a position paper. In: 2018 International Carnahan Conference on Security Technology (ICCST) , pp. 1\u20135 (2018). https:\/\/api.semanticscholar.org\/CorpusID:56719420","DOI":"10.1109\/CCST.2018.8585460"},{"key":"974_CR65","doi-asserted-by":"publisher","unstructured":"Vykopal, J., O\u0161lej\u0161ek, R., Celeda, P., Vizvary, M., Tovarn\u00e1k, D.: Kypo cyber range: design and use cases, In: ICSOFT, pp. 310\u2013321 (2017). https:\/\/doi.org\/10.5220\/0006428203100321","DOI":"10.5220\/0006428203100321"},{"key":"974_CR66","unstructured":"Walton, P.: Measure performance: About pagespeed insights (2020). https:\/\/web.dev"},{"key":"974_CR67","unstructured":"WatevrCTF: Watevrctf 2019 (2019). https:\/\/ctf.watevr.xyz\/"},{"key":"974_CR68","unstructured":"Werther, J., Zhivich, M., Leek, T., Zeldovich, N.: Experiences in cyber security education: The mit lincoln laboratory capture-the-flag exercise, In: 4th Workshop on Cyber Security Experimentation and Test (CSET), San Francisco, CA. pp. 12\u201312 (2011)"},{"issue":"6","key":"974_CR69","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3533379","volume":"55","author":"M Zehlike","year":"2023","unstructured":"Zehlike, M., Yang, K., Stoyanovich, J.: Fairness in ranking, part I: score-based ranking. ACM Comput. Surv. 55(6), 1\u201336 (2023). https:\/\/doi.org\/10.1145\/3533379","journal-title":"ACM Comput. Surv."}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00974-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-024-00974-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00974-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,12]],"date-time":"2025-02-12T05:18:54Z","timestamp":1739337534000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-024-00974-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,7]]},"references-count":69,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,2]]}},"alternative-id":["974"],"URL":"https:\/\/doi.org\/10.1007\/s10207-024-00974-1","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1,7]]},"assertion":[{"value":"7 January 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"57"}}