{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T00:17:29Z","timestamp":1760660249137,"version":"build-2065373602"},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2025,8,6]],"date-time":"2025-08-06T00:00:00Z","timestamp":1754438400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,8,6]],"date-time":"2025-08-06T00:00:00Z","timestamp":1754438400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2025,10]]},"DOI":"10.1007\/s10207-025-01104-1","type":"journal-article","created":{"date-parts":[[2025,8,6]],"date-time":"2025-08-06T14:11:44Z","timestamp":1754489504000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A machine learning approach using nonlinear ARX neural networks with Bayesian regularization for epidemic malware dynamics in critical network infrastructures"],"prefix":"10.1007","volume":"24","author":[{"given":"Kiran","family":"Asma","sequence":"first","affiliation":[]},{"given":"Muhammad Asif Zahoor","family":"Raja","sequence":"additional","affiliation":[]},{"given":"Chuan-Yu","family":"Chang","sequence":"additional","affiliation":[]},{"given":"Muhammad Junaid Ali Asif","family":"Raja","sequence":"additional","affiliation":[]},{"given":"Muhammad","family":"Shoaib","sequence":"additional","affiliation":[]},{"given":"Chi-Min","family":"Shu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,8,6]]},"reference":[{"key":"1104_CR1","first-page":"3","volume":"1","author":"R Bleiman","year":"2025","unstructured":"Bleiman, R., Park, H., Rege, A.: Educating students on the behavioral and psychological aspects of romance scam victimization via a social engineering competition. J. Cybersec. Edu. Res. Pract. 1, 3 (2025)","journal-title":"J. Cybersec. Edu. Res. Pract."},{"key":"1104_CR2","doi-asserted-by":"crossref","unstructured":"Luo, Y., He, M. and Wang, X.: ERFS: Efficient feature graph representation for intrusion detection based on flow semantic association.\u00a0IEEE Trans. Cognit. Commun. Netw. (2025)","DOI":"10.1109\/TCCN.2025.3543357"},{"issue":"4","key":"1104_CR3","doi-asserted-by":"publisher","first-page":"2547","DOI":"10.1007\/s10207-024-00854-8","volume":"23","author":"P Borah","year":"2024","unstructured":"Borah, P., Sarmah, U., Bhattacharyya, D.K., Kalita, J.K.: Unmasking the common traits: an ensemble approach for effective malware detection. Int. J. Inf. Secur. 23(4), 2547\u20132557 (2024)","journal-title":"Int. J. Inf. Secur."},{"issue":"5","key":"1104_CR4","doi-asserted-by":"publisher","first-page":"1445","DOI":"10.1007\/s10207-023-00700-3","volume":"22","author":"M Gimenez-Aguilar","year":"2023","unstructured":"Gimenez-Aguilar, M., de Fuentes, J.M., Gonzalez-Manzano, L.: Malicious uses of blockchains by malware: from the analysis to Smart-Zephyrus. Int. J. Inf. Secur. 22(5), 1445\u20131480 (2023)","journal-title":"Int. J. Inf. Secur."},{"key":"1104_CR5","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1016\/j.neucom.2021.08.149","volume":"484","author":"AM del Rey","year":"2022","unstructured":"del Rey, A.M., Vara, R.C., Gonz\u00e1lez, S.R.: A computational propagation model for malware based on the SIR classic model. Neurocomputing 484, 161\u2013171 (2022)","journal-title":"Neurocomputing"},{"issue":"1","key":"1104_CR6","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/s10207-023-00769-w","volume":"23","author":"S Silvestri","year":"2024","unstructured":"Silvestri, S., Islam, S., Amelin, D., Weiler, G., Papastergiou, S., Ciampi, M.: Cyber threat assessment and management for securing healthcare ecosystems using natural language processing. Int. J. Inf. Secur. 23(1), 31\u201350 (2024)","journal-title":"Int. J. Inf. Secur."},{"key":"1104_CR7","doi-asserted-by":"publisher","first-page":"105672","DOI":"10.1016\/j.rinp.2022.105672","volume":"39","author":"J Liu","year":"2022","unstructured":"Liu, J., Saeed, T., Zeb, A.: Delay effect of an e-epidemic SEIRS malware propagation model with a generalized non-monotone incidence rate. Results Phys. 39, 105672 (2022)","journal-title":"Results Phys."},{"issue":"1","key":"1104_CR8","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1007\/s41109-023-00578-z","volume":"8","author":"A Chernikova","year":"2023","unstructured":"Chernikova, A., Gozzi, N., Perra, N., Boboila, S., Eliassi-Rad, T., Oprea, A.: Modeling self-propagating malware with epidemiological models. Appl. Netw. Sci. 8(1), 52 (2023)","journal-title":"Appl. Netw. Sci."},{"issue":"1","key":"1104_CR9","doi-asserted-by":"publisher","first-page":"135","DOI":"10.3390\/math12010135","volume":"12","author":"E Frutos-Bernal","year":"2023","unstructured":"Frutos-Bernal, E., Rodr\u00edguez-Rosa, M., Anciones-Polo, M., Mart\u00edn-del Rey, \u00c1.: Analyzing malware propagation on wireless sensor networks: a new approach using queueing theory and HJ-biplot with a SIRS model. Mathematics 12(1), 135 (2023)","journal-title":"Mathematics"},{"issue":"3","key":"1104_CR10","first-page":"596","volume":"9","author":"E S\u00f6\u011f\u00fct","year":"2024","unstructured":"S\u00f6\u011f\u00fct, E., Tekerek, A., Erdem, O.A.: Machine learning-based DDoS attack detection on SDN-based SCADA systems. Gazi J. Eng. Sci. 9(3), 596\u2013611 (2024)","journal-title":"Gazi J. Eng. Sci."},{"issue":"10","key":"1104_CR11","doi-asserted-by":"publisher","first-page":"5993","DOI":"10.3390\/app13105993","volume":"13","author":"E S\u00f6\u011f\u00fct","year":"2023","unstructured":"S\u00f6\u011f\u00fct, E., Erdem, O.A.: A multi-model proposal for classification and detection of DDoS attacks on SCADA systems. Appl. Sci. 13(10), 5993 (2023)","journal-title":"Appl. Sci."},{"issue":"4","key":"1104_CR12","doi-asserted-by":"publisher","first-page":"2739","DOI":"10.1007\/s10207-024-00856-6","volume":"23","author":"A Akbarzadeh","year":"2024","unstructured":"Akbarzadeh, A., Erdodi, L., Houmb, S.H., Soltvedt, T.G.: Two-stage advanced persistent threat (APT) attack on an IEC 61850 power grid substation. Int. J. Inf. Secur. 23(4), 2739\u20132758 (2024)","journal-title":"Int. J. Inf. Secur."},{"issue":"4","key":"1104_CR13","doi-asserted-by":"publisher","first-page":"833","DOI":"10.1007\/s10207-023-00669-z","volume":"22","author":"FT Chimuco","year":"2023","unstructured":"Chimuco, F.T., Sequeiros, J.B., Lopes, C.G., Sim\u00f5es, T.M., Freire, M.M., In\u00e1cio, P.R.: Secure cloud-based mobile apps: attack taxonomy, requirements, mechanisms, tests and automation. Int. J. Inf. Secur. 22(4), 833\u2013867 (2023)","journal-title":"Int. J. Inf. Secur."},{"key":"1104_CR14","doi-asserted-by":"publisher","first-page":"101565","DOI":"10.1016\/j.cose.2019.07.002","volume":"87","author":"Z Masood","year":"2019","unstructured":"Masood, Z., Samar, R., Raja, M.A.Z.: Design of a mathematical model for the Stuxnet virus in a network of critical control infrastructure. Comput. Secur. 87, 101565 (2019)","journal-title":"Comput. Secur."},{"key":"1104_CR15","doi-asserted-by":"publisher","DOI":"10.55524\/ijircst.2025.13.2.3","author":"Z Jabeen","year":"2025","unstructured":"Jabeen, Z., Mishra, K., Mishra, B.K.: Comparative analysis of AI based antivirus software programs ensuring cyber security. Int. J. Innov. Res. Comput. Sci. Technol. (2025). https:\/\/doi.org\/10.55524\/ijircst.2025.13.2.3","journal-title":"Int. J. Innov. Res. Comput. Sci. Technol."},{"key":"1104_CR16","doi-asserted-by":"publisher","first-page":"1198410","DOI":"10.3389\/fphy.2023.1198410","volume":"11","author":"Y Zhou","year":"2023","unstructured":"Zhou, Y., Wang, Y., Zhou, K., Shen, S.F., Ma, W.X.: Dynamical behaviors of an epidemic model for malware propagation in wireless sensor networks. Front. Phys. 11, 1198410 (2023)","journal-title":"Front. Phys."},{"issue":"7","key":"1104_CR17","doi-asserted-by":"publisher","first-page":"11632","DOI":"10.1109\/JIOT.2023.3331736","volume":"11","author":"G Liu","year":"2023","unstructured":"Liu, G., Tan, Z., Liang, Z., Chen, H., Zhong, X.: Fractional optimal control for malware propagation in Internet of underwater things. IEEE Internet Things J. 11(7), 11632\u201311651 (2023)","journal-title":"IEEE Internet Things J."},{"key":"1104_CR18","doi-asserted-by":"publisher","first-page":"123240","DOI":"10.1016\/j.physa.2019.123240","volume":"540","author":"YS Rao","year":"2020","unstructured":"Rao, Y.S., Keshri, A.K., Mishra, B.K., Panda, T.C.: Distributed denial of service attack on targeted resources in a computer network for critical infrastructure: a differential e-epidemic model. Phys. A Stat. Mech. Appl. 540, 123240 (2020)","journal-title":"Phys. A Stat. Mech. Appl."},{"key":"1104_CR19","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-024-04313-w","author":"AK Yamarthy","year":"2024","unstructured":"Yamarthy, A.K., Koteswararao, C.: Mdepthnet based phishing attack detection using integrated deep learning methodologies for cyber security enhancement. Cluster Comput. (2024). https:\/\/doi.org\/10.1007\/s10586-024-04313-w","journal-title":"Cluster Comput."},{"key":"1104_CR20","doi-asserted-by":"publisher","first-page":"103608","DOI":"10.1016\/j.jnca.2023.103608","volume":"214","author":"G Wu","year":"2023","unstructured":"Wu, G., Xie, L., Zhang, H., Wang, J., Shen, S., Yu, S.: STSIR: an individual-group game-based model for disclosing virus spread in social internet of things. J. Netw. Comput. Appl. 214, 103608 (2023)","journal-title":"J. Netw. Comput. Appl."},{"key":"1104_CR21","doi-asserted-by":"publisher","first-page":"103504","DOI":"10.1016\/j.adhoc.2024.103504","volume":"160","author":"G Wu","year":"2024","unstructured":"Wu, G., Zhang, Y., Zhang, H., Yu, S., Yu, S., Shen, S.: SIHQR model with time delay for worm spread analysis in IIoT-enabled PLC network. Ad Hoc Netw. 160, 103504 (2024)","journal-title":"Ad Hoc Netw."},{"key":"1104_CR22","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1016\/j.matcom.2021.10.004","volume":"193","author":"MAZ Raja","year":"2022","unstructured":"Raja, M.A.Z., Mehmood, A., Ashraf, S., Awan, K.M., Shi, P.: Design of evolutionary finite difference solver for numerical treatment of computer virus propagation with countermeasures model. Math. Comput. Simul 193, 409\u2013430 (2022)","journal-title":"Math. Comput. Simul"},{"key":"1104_CR23","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1016\/j.aej.2024.06.009","volume":"103","author":"I Ahmad","year":"2024","unstructured":"Ahmad, I., Bakar, A.A., Jan, R., Yussof, S.: Dynamic behaviors of a modified computer virus model: insights into parameters and network attributes. Alex. Eng. J. 103, 266\u2013277 (2024)","journal-title":"Alex. Eng. J."},{"key":"1104_CR24","doi-asserted-by":"publisher","DOI":"10.1007\/s42044-024-00198-5","author":"Q Zhu","year":"2024","unstructured":"Zhu, Q., Wan, W., Gan, C., Fan, Z., Yang, L.X.: Simulating Bluetooth virus propagation on the real map via infectious attenuation algorithm and discrete dynamical system. Iran. J. Comput. Sci. (2024). https:\/\/doi.org\/10.1007\/s42044-024-00198-5","journal-title":"Iran. J. Comput. Sci."},{"key":"1104_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2024.128075","author":"L Yang","year":"2024","unstructured":"Yang, L., Song, Q., Liu, Y.: Dynamics analysis of a new fractional-order SVEIR-KS model for computer virus propagation: stability and Hopf bifurcation. Neurocomputing (2024). https:\/\/doi.org\/10.1016\/j.neucom.2024.128075","journal-title":"Neurocomputing"},{"issue":"2","key":"1104_CR26","doi-asserted-by":"publisher","first-page":"2438","DOI":"10.1109\/JIOT.2023.3295016","volume":"11","author":"J Dou","year":"2023","unstructured":"Dou, J., Xie, G., Tian, Z., Cui, L., Yu, S.: Modeling and analyzing the spatial-temporal propagation of malware in mobile wearable IoT networks. IEEE Internet of Things Journal. 11(2), 2438\u20132452 (2023)","journal-title":"IEEE Internet of Things Journal."},{"issue":"5","key":"1104_CR27","doi-asserted-by":"publisher","first-page":"2947","DOI":"10.1007\/s10586-023-04028-4","volume":"26","author":"T Gueye","year":"2023","unstructured":"Gueye, T., Wang, Y., Rehman, M., Mushtaq, R.T., Zahoor, S.: A novel method to detect cyber-attacks in IoT\/IIoT devices on the modbus protocol using deep learning. Cluster Comput. 26(5), 2947\u20132973 (2023)","journal-title":"Cluster Comput."},{"issue":"6","key":"1104_CR28","doi-asserted-by":"publisher","first-page":"5105","DOI":"10.1016\/j.aej.2021.03.055","volume":"60","author":"F Yang","year":"2021","unstructured":"Yang, F., Zhang, Z., Zeb, A.: Hopf bifurcation of a VEIQS worm propagation model in mobile networks with two delays. Alexandria Eng. J. 60(6), 5105\u20135114 (2021)","journal-title":"Alexandria Eng. J."},{"key":"1104_CR29","first-page":"124584","volume":"368","author":"Q Gao","year":"2020","unstructured":"Gao, Q., Zhuang, J.: Stability analysis and control strategies for worm attack in mobile networks via a VEIQS propagation model. Appl. Math. Comput. 368, 124584 (2020)","journal-title":"Appl. Math. Comput."},{"key":"1104_CR30","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1016\/j.matcom.2020.11.005","volume":"182","author":"VM Magagula","year":"2021","unstructured":"Magagula, V.M.: Stability analysis of a virulent code in a network of computers. Math. Comput. Simul 182, 296\u2013315 (2021)","journal-title":"Math. Comput. Simul"},{"key":"1104_CR31","doi-asserted-by":"publisher","first-page":"110481","DOI":"10.1016\/j.comnet.2024.110481","volume":"248","author":"D Nithya","year":"2024","unstructured":"Nithya, D., Madhusudanan, V., Murthy, B.S.N., Geetha, R., Mung, N.X., Dao, N.N., Cho, S.: Delayed dynamics analysis of SEI2RS malware propagation models in cyber\u2013physical systems. Comput. Netw. 248, 110481 (2024)","journal-title":"Comput. Netw."},{"key":"1104_CR32","doi-asserted-by":"publisher","first-page":"21","DOI":"10.56294\/mr202355","volume":"2","author":"D Kumar","year":"2023","unstructured":"Kumar, D., Haque, A., Mishra, K., Islam, F., Mishra, B.K., Ahmad, S.: Exploring the transformative role of artificial intelligence and metaverse in education: a comprehensive review. Metaverse Basic Appl. Res. 2, 21 (2023)","journal-title":"Metaverse Basic Appl. Res."},{"key":"1104_CR33","first-page":"415","volume-title":"The International Conference on Artificial Intelligence and Applied Mathematics in Engineering","author":"ESRA S\u00f6\u011f\u00fct","year":"2022","unstructured":"S\u00f6\u011f\u00fct, E.S.R.A., Erdem, O.A.: Attack detection on testbed for scada security. In: The International Conference on Artificial Intelligence and Applied Mathematics in Engineering, pp. 415\u2013422. Springer International Publishing, Cham (2022)"},{"key":"1104_CR34","doi-asserted-by":"publisher","first-page":"115948","DOI":"10.1016\/j.chaos.2024.115948","volume":"192","author":"K Asma","year":"2025","unstructured":"Asma, K., Raja, M.A.Z., Chang, C.Y., Raja, M.J.A.A., Shoaib, M.: Machine learning-driven exogenous neural architecture for nonlinear fractional cybersecurity awareness model in mobile malware propagation. Chaos Solitons Fractals 192, 115948 (2025)","journal-title":"Chaos Solitons Fractals"},{"issue":"2","key":"1104_CR35","doi-asserted-by":"publisher","first-page":"1119","DOI":"10.1007\/s41939-023-00269-3","volume":"7","author":"I Thapa","year":"2024","unstructured":"Thapa, I., Ghani, S.: Estimation of California bearing ratio for hill highways using advanced hybrid artificial neural network algorithms. Multiscale Multidiscip. Model. Exp. Des. 7(2), 1119\u20131144 (2024)","journal-title":"Multiscale Multidiscip. Model. Exp. Des."},{"key":"1104_CR36","doi-asserted-by":"crossref","unstructured":"Naresh, M., Kumar, V. and Pal, J., 2024. A convolution neural network-based technique for health monitoring of connections of a multi-story 3D steel frame structure. Multiscale Multidiscip. Model. Exp. Des., 7: 1\u201317.","DOI":"10.1007\/s41939-024-00424-4"},{"key":"1104_CR37","doi-asserted-by":"publisher","first-page":"116149","DOI":"10.1016\/j.chaos.2025.116149","volume":"193","author":"MJAA Raja","year":"2025","unstructured":"Raja, M.J.A.A., Hassan, S.A., Chang, C.Y., Shu, C.M., Kiani, A.K., Shoaib, M., Raja, M.A.Z.: A hybrid neural-computational paradigm for complex firing patterns and excitability transitions in fractional Hindmarsh-Rose neuronal models. Chaos Solitons Fractals 193, 116149 (2025)","journal-title":"Chaos Solitons Fractals"},{"issue":"1","key":"1104_CR38","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/s41939-023-00181-w","volume":"7","author":"H Zhang","year":"2024","unstructured":"Zhang, H., Gu, X., Zhang, F., Zhang, L.: Development of a radial basis neural network for the prediction of the compressive strength of high-performance concrete. Multiscale Multidiscip. Model. Exp. Des. 7(1), 109\u2013122 (2024)","journal-title":"Multiscale Multidiscip. Model. Exp. Des."},{"issue":"4","key":"1104_CR39","doi-asserted-by":"publisher","first-page":"671","DOI":"10.1007\/s41939-023-00178-5","volume":"6","author":"G Lawrance","year":"2023","unstructured":"Lawrance, G., Paul, P.S., Mohammed, J., Gunasegeran, M., Sudhagar, P.E.: Prediction of cutting performance using artificial neural network during buffered impact damper-assisted boring process. Multiscale Multidiscip. Model. Exp. Des. 6(4), 671\u2013684 (2023)","journal-title":"Multiscale Multidiscip. Model. Exp. Des."},{"issue":"03","key":"1104_CR40","doi-asserted-by":"publisher","first-page":"2230001","DOI":"10.1142\/S021987622230001X","volume":"20","author":"J Zhang","year":"2023","unstructured":"Zhang, J., Jin, Z., Teng, S., Chen, G., Cui, F.: Structural damage detection using convolutional neural networks based on modal strain energy and population of structures. Int. J. Comput. Methods 20(03), 2230001 (2023)","journal-title":"Int. J. Comput. Methods"},{"key":"1104_CR41","doi-asserted-by":"publisher","first-page":"107192","DOI":"10.1016\/j.bspc.2024.107192","volume":"101","author":"MJAA Raja","year":"2025","unstructured":"Raja, M.J.A.A., Hassan, S.A., Chang, C.Y., Shu, C.M., Kiani, A.K., Shoaib, M., Raja, M.A.Z.: Design of intelligent Bayesian regularized deep cascaded NARX neurostructure for predictive analysis of FitzHugh-Nagumo bioelectrical model in neuronal cell membrane. Biomed. Signal Process. Control 101, 107192 (2025)","journal-title":"Biomed. Signal Process. Control"},{"key":"1104_CR42","doi-asserted-by":"publisher","first-page":"121257","DOI":"10.1016\/j.eswa.2023.121257","volume":"235","author":"AN Akkilic","year":"2024","unstructured":"Akkilic, A.N., Sabir, Z., Bhat, S.A., Bulut, H.: A radial basis deep neural network process using the Bayesian regularization optimization for the monkeypox transmission model. Expert Syst. Appl. 235, 121257 (2024)","journal-title":"Expert Syst. Appl."},{"key":"1104_CR43","doi-asserted-by":"publisher","first-page":"115303","DOI":"10.1016\/j.measurement.2024.115303","volume":"238","author":"TT Truong","year":"2024","unstructured":"Truong, T.T., Airao, J., Hojati, F., Ilvig, C.F., Azarhoushang, B., Karras, P., Aghababaei, R.: Data-driven prediction of tool wear using Bayesian regularized artificial neural networks. Measurement 238, 115303 (2024)","journal-title":"Measurement"},{"key":"1104_CR44","doi-asserted-by":"publisher","first-page":"108904","DOI":"10.1016\/j.engappai.2024.108904","volume":"136","author":"L Ni","year":"2024","unstructured":"Ni, L., Chen, J., Chen, G., Zhao, D., Wang, G., Aphale, S.S.: An explainable neural network integrating Jiles-Atherton and nonlinear auto-regressive exogenous models for modeling universal hysteresis. Eng. Appl. Artif. Intell. 136, 108904 (2024)","journal-title":"Eng. Appl. Artif. Intell."},{"key":"1104_CR45","doi-asserted-by":"publisher","first-page":"102945","DOI":"10.1016\/j.asej.2024.102945","volume":"15","author":"AS Ahmed","year":"2024","unstructured":"Ahmed, A.S., Ahmed, H.M., Nofal, T.A., Darwish, A., Omar, O.A.: Hilfer-Katugampola fractional epidemic model for malware propagation with optimal control. Ain Shams Eng. J. 15, 102945 (2024)","journal-title":"Ain Shams Eng. J."}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01104-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-025-01104-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01104-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T11:37:45Z","timestamp":1760614665000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-025-01104-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,6]]},"references-count":45,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2025,10]]}},"alternative-id":["1104"],"URL":"https:\/\/doi.org\/10.1007\/s10207-025-01104-1","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"type":"print","value":"1615-5262"},{"type":"electronic","value":"1615-5270"}],"subject":[],"published":{"date-parts":[[2025,8,6]]},"assertion":[{"value":"17 July 2025","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 August 2025","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"191"}}