{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T05:06:17Z","timestamp":1769922377962,"version":"3.49.0"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,12,27]],"date-time":"2025-12-27T00:00:00Z","timestamp":1766793600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,12,27]],"date-time":"2025-12-27T00:00:00Z","timestamp":1766793600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2026,2]]},"DOI":"10.1007\/s10207-025-01178-x","type":"journal-article","created":{"date-parts":[[2025,12,27]],"date-time":"2025-12-27T02:02:09Z","timestamp":1766800929000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A secure and scalable home security system using IoT, 6G networks, AI-based hybrid deep learning models, blockchain, and smart contracts"],"prefix":"10.1007","volume":"25","author":[{"given":"Azath","family":"Mubarakali","sequence":"first","affiliation":[]},{"given":"S.","family":"Sharavanan","sequence":"additional","affiliation":[]},{"given":"Hashim","family":"Elshafie","sequence":"additional","affiliation":[]},{"given":"Suresh Babu","family":"Changalasetty","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,12,27]]},"reference":[{"issue":"1","key":"1178_CR1","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1007\/s10209-022-00937-0","volume":"23","author":"LY Rock","year":"2024","unstructured":"Rock, L.Y., Tajudeen, F.P., Chung, Y.W.: Usage and impact of the internet-of-things-based smart home technology: a quality-of-life perspective. Universal Access Inf. Soc. 23(1), 345\u2013364 (2024). https:\/\/doi.org\/10.1007\/s10209-022-00937-0","journal-title":"Universal Access Inf. Soc."},{"issue":"2","key":"1178_CR2","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1109\/MNET.011.2000398","volume":"35","author":"OE Marai","year":"2021","unstructured":"Marai, O.E., Taleb, T., Song, J.: Roads infrastructure digital twin: a step toward smarter cities realization. IEEE Network 35(2), 136\u2013143 (2021). https:\/\/doi.org\/10.1109\/MNET.011.2000398","journal-title":"IEEE Network"},{"issue":"5","key":"1178_CR3","doi-asserted-by":"publisher","first-page":"5571","DOI":"10.1109\/TMC.2023.3314837","volume":"23","author":"F Han","year":"2023","unstructured":"Han, F., Yang, P., Du, H., Li, X.-Y.: Accuth ^+ +: accelerometer-based anti-spoofing voice authentication on wrist-worn wearables. IEEE Trans. Mob. Comput. 23(5), 5571\u20135588 (2023)","journal-title":"IEEE Trans. Mob. Comput."},{"key":"1178_CR4","unstructured":"P. Chen et al., \u201cQoS-oriented Task Offloading in NOMA-based Multi-UAV Cooperative MEC Systems,\u201d IEEE Trans. Wirel. Commun., 2025, Accessed: Nov. 06, 2025. [Online]. Available: https:\/\/ieeexplore.ieee.org\/abstract\/document\/11119140\/"},{"key":"1178_CR5","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102677","volume":"117","author":"B Hammi","year":"2022","unstructured":"Hammi, B., Zeadally, S., Khatoun, R., Nebhen, J.: Survey on smart homes: vulnerabilities, risks, and countermeasures. Comput. Secur. 117, 102677 (2022). https:\/\/doi.org\/10.1016\/j.cose.2022.102677","journal-title":"Comput. Secur."},{"issue":"3","key":"1178_CR6","doi-asserted-by":"publisher","first-page":"611","DOI":"10.1007\/s10207-021-00571-6","volume":"21","author":"N Amraoui","year":"2022","unstructured":"Amraoui, N., Zouari, B.: Anomalous behavior detection-based approach for authenticating smart home system users. Int. J. Inf. Secur. 21(3), 611\u2013636 (2022). https:\/\/doi.org\/10.1007\/s10207-021-00571-6","journal-title":"Int. J. Inf. Secur."},{"key":"1178_CR7","doi-asserted-by":"publisher","first-page":"55098","DOI":"10.1109\/ACCESS.2021.3069707","volume":"9","author":"A Salh","year":"2021","unstructured":"Salh, A., et al.: A survey on deep learning for ultra-reliable and low-latency communications challenges on 6G wireless systems. IEEE Access 9, 55098\u201355131 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3069707","journal-title":"IEEE Access"},{"key":"1178_CR8","unstructured":"Y. Li, Z. Yi, D. Guo, L. Luo, B. Ren, and Q. Zhang, \u201cJoint communication and offloading strategy of CoMP UAV-assisted MEC networks,\u201d IEEE Internet Things J., 2025, Accessed: Nov. 06, 2025. [Online]. Available: https:\/\/ieeexplore.ieee.org\/abstract\/document\/11079927\/"},{"key":"1178_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2024.109420","volume":"138","author":"B Xue","year":"2024","unstructured":"Xue, B., et al.: Perturbation defense ultra high-speed weak target recognition. Eng. Appl. Artif. Intell. 138, 109420 (2024)","journal-title":"Eng. Appl. Artif. Intell."},{"key":"1178_CR10","doi-asserted-by":"publisher","DOI":"10.3390\/jsan11030047","author":"DN Molokomme","year":"2022","unstructured":"Molokomme, D.N., Onumanyi, A.J., Abu-Mahfouz, A.M.: Edge intelligence in smart grids: a survey on architectures, offloading models, cyber security measures, and challenges. J. Sens. Actuator Networks (2022). https:\/\/doi.org\/10.3390\/jsan11030047","journal-title":"J. Sens. Actuator Networks"},{"issue":"12","key":"1178_CR11","doi-asserted-by":"publisher","first-page":"13685","DOI":"10.1109\/TITS.2023.3298110","volume":"24","author":"Z Zhou","year":"2023","unstructured":"Zhou, Z., Wang, Y., Zhou, G., Nam, K., Ji, Z., Yin, C.: A twisted gaussian risk model considering target vehicle longitudinal-lateral motion states for host vehicle trajectory planning. IEEE Trans. Intell. Transp. Syst. 24(12), 13685\u201313697 (2023)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"3","key":"1178_CR12","doi-asserted-by":"publisher","first-page":"1927","DOI":"10.1007\/s10207-024-00827-x","volume":"23","author":"WMAB Wijesundara","year":"2024","unstructured":"Wijesundara, W.M.A.B., Lee, J.-S., Tith, D., Aloupogianni, E., Suzuki, H., Obi, T.: Security-enhanced firmware management scheme for smart home IoT devices using distributed ledger technologies. Int. J. Inf. Secur. 23(3), 1927\u20131937 (2024). https:\/\/doi.org\/10.1007\/s10207-024-00827-x","journal-title":"Int. J. Inf. Secur."},{"key":"1178_CR13","unstructured":"S. Wang, Y. Wang, S. Chen, Z. Zhou, X. Liu, and Z. Li, \u201cInteractive Siamese Network-Based Roadside Perception for Multi-Vehicle Tracking,\u201d IEEE Trans. Intell. Transp. Syst., 2025, Accessed: Nov. 06, 2025. [Online]. Available: https:\/\/ieeexplore.ieee.org\/abstract\/document\/11216006\/"},{"key":"1178_CR14","doi-asserted-by":"publisher","first-page":"52509","DOI":"10.1109\/ACCESS.2023.3276863","volume":"11","author":"D Rani","year":"2023","unstructured":"Rani, D., Gill, N.S., Gulia, P., Arena, F., Pau, G.: Design of an intrusion detection model for IoT-enabled smart home. IEEE Access 11, 52509\u201352526 (2023). https:\/\/doi.org\/10.1109\/ACCESS.2023.3276863","journal-title":"IEEE Access"},{"key":"1178_CR15","doi-asserted-by":"publisher","unstructured":"G. Machhale, P. B.R., and C. N. Modi, \u201cEnhancing Data Security and Privacy through Blockchain and Machine Learning,\u201d in 2024 MIT Art, Design and Technology School of Computing International Conference (MITADTSoCiCon), Apr. 2024, pp. 1\u201310. https:\/\/doi.org\/10.1109\/MITADTSoCiCon60330.2024.10575309.","DOI":"10.1109\/MITADTSoCiCon60330.2024.10575309"},{"issue":"9","key":"1178_CR16","doi-asserted-by":"publisher","first-page":"8720","DOI":"10.1109\/TVT.2021.3098429","volume":"70","author":"X Liu","year":"2021","unstructured":"Liu, X., Wang, Y., Zhou, Z., Nam, K., Wei, C., Yin, C.: Trajectory prediction of preceding target vehicles based on lane crossing and final points generation model considering driving styles. IEEE Trans. Veh. Technol. 70(9), 8720\u20138730 (2021)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"1178_CR17","unstructured":"Q. Hu et al., \u201cVarfvv: View-adaptive real-time interactive free-view video streaming with edge computing,\u201d IEEE J. Sel. Areas Commun., 2025, Accessed: Nov. 06, 2025. [Online]. Available: https:\/\/ieeexplore.ieee.org\/abstract\/document\/10960681\/"},{"issue":"5","key":"1178_CR18","doi-asserted-by":"publisher","DOI":"10.1002\/spy2.308","volume":"6","author":"C Trivedi","year":"2023","unstructured":"Trivedi, C., Rao, U.P., Parmar, K., Bhattacharya, P., Tanwar, S., Sharma, R.: A transformative shift toward blockchain-based IoT environments: consensus, smart contracts, and future directions. SECURITY AND PRIVACY 6(5), e308 (2023). https:\/\/doi.org\/10.1002\/spy2.308","journal-title":"SECURITY AND PRIVACY"},{"key":"1178_CR19","doi-asserted-by":"publisher","DOI":"10.3390\/iot5040038","author":"SA Bkheet","year":"2024","unstructured":"Bkheet, S.A., Agbinya, J.I., Khamis, G.S.M.: Advanced deep learning approach for smart home appliance identification using recurrent neural networks with LSTM. IoT (2024). https:\/\/doi.org\/10.3390\/iot5040038","journal-title":"IoT"},{"key":"1178_CR20","doi-asserted-by":"publisher","DOI":"10.3390\/s21051636","author":"S Mekruksavanich","year":"2021","unstructured":"Mekruksavanich, S., Jitpattanakul, A.: LSTM networks using smartphone data for sensor-based human activity recognition in smart homes. Sensors (2021). https:\/\/doi.org\/10.3390\/s21051636","journal-title":"Sensors"},{"issue":"3","key":"1178_CR21","doi-asserted-by":"publisher","first-page":"2063","DOI":"10.1109\/TII.2021.3082907","volume":"18","author":"L Xu","year":"2022","unstructured":"Xu, L., Zhou, X., Tao, Y., Liu, L., Yu, X., Kumar, N.: Intelligent security performance prediction for IoT-enabled healthcare networks using an improved CNN. IEEE Trans. Ind. Inform. 18(3), 2063\u20132074 (2022). https:\/\/doi.org\/10.1109\/TII.2021.3082907","journal-title":"IEEE Trans. Ind. Inform."},{"key":"1178_CR22","doi-asserted-by":"publisher","unstructured":"N. Elsayed, Z. S. Zaghloul, S. W. Azumah, and C. Li, \u201cIntrusion Detection System in Smart Home Network Using Bidirectional LSTM and Convolutional Neural Networks Hybrid Model,\u201d in 2021 IEEE International Midwest Symposium on Circuits and Systems (MWSCAS), Aug. 2021, pp. 55\u201358. https:\/\/doi.org\/10.1109\/MWSCAS47672.2021.9531683.","DOI":"10.1109\/MWSCAS47672.2021.9531683"},{"issue":"12","key":"1178_CR23","doi-asserted-by":"publisher","first-page":"14053","DOI":"10.1007\/s11227-021-03825-1","volume":"77","author":"H Touqeer","year":"2021","unstructured":"Touqeer, H., Zaman, S., Amin, R., Hussain, M., Al-Turjman, F., Bilal, M.: Smart home security: challenges, issues and solutions at different IoT layers. J. Supercomput. 77(12), 14053\u201314089 (2021). https:\/\/doi.org\/10.1007\/s11227-021-03825-1","journal-title":"J. Supercomput."},{"issue":"12","key":"1178_CR24","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3815","volume":"31","author":"PSF Sheron","year":"2020","unstructured":"Sheron, P.S.F., Sridhar, Kp., Baskar, S., Shakeel, P.M.: A decentralized scalable security framework for end-to-end authentication of future IoT communication. Trans. Emerg. Telecommun. Technol. 31(12), e3815 (2020). https:\/\/doi.org\/10.1002\/ett.3815","journal-title":"Trans. Emerg. Telecommun. Technol."},{"issue":"11","key":"1178_CR25","doi-asserted-by":"publisher","DOI":"10.3390\/s21113784","volume":"21","author":"C Stolojescu-Crisan","year":"2021","unstructured":"Stolojescu-Crisan, C., Crisan, C., Butunoi, B.-P.: An IoT-based smart home automation system. Sensors 21(11), 11 (2021). https:\/\/doi.org\/10.3390\/s21113784","journal-title":"Sensors"},{"issue":"3","key":"1178_CR26","doi-asserted-by":"publisher","first-page":"3401","DOI":"10.1109\/TNSM.2022.3164715","volume":"19","author":"NK Jadav","year":"2022","unstructured":"Jadav, N.K., Gupta, R., Alshehri, M.D., Mankodiya, H., Tanwar, S., Kumar, N.: Deep learning and onion routing-based collaborative intelligence framework for smart homes underlying 6G networks. IEEE Trans. Netw. Serv. Manag. 19(3), 3401\u20133412 (2022). https:\/\/doi.org\/10.1109\/TNSM.2022.3164715","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"issue":"7","key":"1178_CR27","doi-asserted-by":"publisher","first-page":"5442","DOI":"10.1109\/JIOT.2020.3044940","volume":"8","author":"M Wo\u017aniak","year":"2021","unstructured":"Wo\u017aniak, M., Zielonka, A., Sikora, A., Piran, M.J., Alamri, A.: 6G-enabled IoT home environment control using fuzzy rules. IEEE Internet Things J. 8(7), 5442\u20135452 (2021). https:\/\/doi.org\/10.1109\/JIOT.2020.3044940","journal-title":"IEEE Internet Things J."},{"issue":"3","key":"1178_CR28","doi-asserted-by":"publisher","first-page":"5711","DOI":"10.1109\/TCE.2024.3382779","volume":"70","author":"S Selvarajan","year":"2024","unstructured":"Selvarajan, S., Manoharan, H., Khadidos, A.O., Khadidos, A.O., Alshareef, A.M., Alsobhi, A.Y.: Secured 6G communication for consumer electronics with advanced artificial intelligence algorithms. IEEE Trans. Consum. Electron. 70(3), 5711\u20135718 (2024). https:\/\/doi.org\/10.1109\/TCE.2024.3382779","journal-title":"IEEE Trans. Consum. Electron."},{"issue":"01","key":"1178_CR29","first-page":"23","volume":"1","author":"RL Gudivaka","year":"2025","unstructured":"Gudivaka, R.L., Grandhi, S.H., Yaacob, N.B.M.: The authorized block mining-based intrusion detection system in block-chain enabled IOT devices using homomorphic signatures and GRU (gated recurrent units) with CNN hybrid (GRU-CNN): block-chain enabled IOT devices. Int. J. Digit. Innov. Insight Inf. 1(01), 23\u201330 (2025)","journal-title":"Int. J. Digit. Innov. Insight Inf."},{"issue":"1","key":"1178_CR30","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/9307961","volume":"2022","author":"O Taiwo","year":"2022","unstructured":"Taiwo, O., Ezugwu, A.E., Oyelade, O.N., Almutairi, M.S.: Enhanced intelligent smart home control and security system based on deep learning model. Wirel. Commun. Mob. Comput. 2022(1), 9307961 (2022). https:\/\/doi.org\/10.1155\/2022\/9307961","journal-title":"Wirel. Commun. Mob. Comput."},{"issue":"3","key":"1178_CR31","doi-asserted-by":"publisher","DOI":"10.3390\/electronics14030608","volume":"14","author":"H Sabit","year":"2025","unstructured":"Sabit, H.: Artifical intelligence-based smart security system using internet of things for smart home applications. Electronics 14(3), 3 (2025). https:\/\/doi.org\/10.3390\/electronics14030608","journal-title":"Electronics"},{"issue":"3","key":"1178_CR32","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1109\/MNET.011.2000514","volume":"35","author":"MA Khan","year":"2021","unstructured":"Khan, M.A., et al.: A machine learning approach for blockchain-based smart home networks security. IEEE Network 35(3), 223\u2013229 (2021). https:\/\/doi.org\/10.1109\/MNET.011.2000514","journal-title":"IEEE Network"},{"key":"1178_CR33","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1016\/j.comcom.2021.05.024","volume":"176","author":"AK Sahu","year":"2021","unstructured":"Sahu, A.K., Sharma, S., Tanveer, M., Raja, R.: Internet of things attack detection using hybrid deep learning model. Comput. Commun. 176, 146\u2013154 (2021). https:\/\/doi.org\/10.1016\/j.comcom.2021.05.024","journal-title":"Comput. Commun."},{"key":"1178_CR34","doi-asserted-by":"publisher","first-page":"33498","DOI":"10.1109\/ACCESS.2021.3061370","volume":"9","author":"D Syed","year":"2021","unstructured":"Syed, D., Abu-Rub, H., Ghrayeb, A., Refaat, S.S.: Household-level energy forecasting in smart buildings using a novel hybrid deep learning model. IEEE Access 9, 33498\u201333511 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3061370","journal-title":"IEEE Access"},{"key":"1178_CR35","doi-asserted-by":"publisher","first-page":"99837","DOI":"10.1109\/ACCESS.2022.3206425","volume":"10","author":"A Halbouni","year":"2022","unstructured":"Halbouni, A., Gunawan, T.S., Habaebi, M.H., Halbouni, M., Kartiwi, M., Ahmad, R.: CNN-LSTM: hybrid deep neural network for network intrusion detection system. IEEE Access 10, 99837\u201399849 (2022). https:\/\/doi.org\/10.1109\/ACCESS.2022.3206425","journal-title":"IEEE Access"},{"issue":"12","key":"1178_CR36","doi-asserted-by":"publisher","DOI":"10.3390\/s22124522","volume":"22","author":"MS Farooq","year":"2022","unstructured":"Farooq, M.S., Khan, S., Rehman, A., Abbas, S., Khan, M.A., Hwang, S.O.: Blockchain-based smart home networks security empowered with fused machine learning. Sensors 22(12), 12 (2022). https:\/\/doi.org\/10.3390\/s22124522","journal-title":"Sensors"},{"key":"1178_CR37","doi-asserted-by":"publisher","first-page":"103651","DOI":"10.1109\/ACCESS.2021.3098795","volume":"9","author":"A Qashlan","year":"2021","unstructured":"Qashlan, A., Nanda, P., He, X., Mohanty, M.: Privacy-preserving mechanism in smart home using blockchain. IEEE Access 9, 103651\u2013103669 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3098795","journal-title":"IEEE Access"},{"key":"1178_CR38","doi-asserted-by":"publisher","unstructured":"A. Qashlan, P. Nanda, and X. He, \u201cAutomated Ethereum Smart Contract for Block Chain Based Smart Home Security,\u201d in Smart Systems and IoT: Innovations in Computing, A. K. Somani, R. S. Shekhawat, A. Mundra, S. Srivastava, and V. K. Verma, Eds., Singapore: Springer, 2020, pp. 313\u2013326. https:\/\/doi.org\/10.1007\/978-981-13-8406-6_31.","DOI":"10.1007\/978-981-13-8406-6_31"},{"issue":"17","key":"1178_CR39","doi-asserted-by":"publisher","DOI":"10.3390\/su16177253","volume":"16","author":"K Suresh","year":"2024","unstructured":"Suresh, K., et al.: Sustainable resource allocation and base station optimization using hybrid deep learning models in 6G wireless networks. Sustainability 16(17), 17 (2024). https:\/\/doi.org\/10.3390\/su16177253","journal-title":"Sustainability"},{"issue":"21","key":"1178_CR40","doi-asserted-by":"publisher","DOI":"10.3390\/s23218928","volume":"23","author":"T Rathod","year":"2023","unstructured":"Rathod, T., et al.: AI and blockchain-based secure data dissemination architecture for IoT-enabled critical infrastructure. Sensors 23(21), 21 (2023). https:\/\/doi.org\/10.3390\/s23218928","journal-title":"Sensors"},{"key":"1178_CR41","doi-asserted-by":"publisher","unstructured":"M. Chelghoum, G. Bendiab, M. A. Labiod, M. Benmohammed, S. Shiaeles, and A. Mellouk, \u201cBlockchain and AI for Collaborative Intrusion Detection in 6G-enabled IoT Networks,\u201d in 2024 IEEE 25th International Conference on High Performance Switching and Routing (HPSR), Jul. 2024, pp. 179\u2013184. https:\/\/doi.org\/10.1109\/HPSR62440.2024.10635989.","DOI":"10.1109\/HPSR62440.2024.10635989"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01178-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-025-01178-x","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01178-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T16:07:22Z","timestamp":1769875642000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-025-01178-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,27]]},"references-count":41,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,2]]}},"alternative-id":["1178"],"URL":"https:\/\/doi.org\/10.1007\/s10207-025-01178-x","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12,27]]},"assertion":[{"value":"28 August 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 November 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 December 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 January 2026","order":5,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Update","order":6,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The original online version of this article was revised: correct funding note has been added.","order":7,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"15"}}