{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,6]],"date-time":"2026-05-06T23:26:06Z","timestamp":1778109966788,"version":"3.51.4"},"reference-count":58,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2022,1,8]],"date-time":"2022-01-08T00:00:00Z","timestamp":1641600000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,8]],"date-time":"2022-01-08T00:00:00Z","timestamp":1641600000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Appl Intell"],"published-print":{"date-parts":[[2022,7]]},"DOI":"10.1007\/s10489-021-02968-1","type":"journal-article","created":{"date-parts":[[2022,1,8]],"date-time":"2022-01-08T05:02:30Z","timestamp":1641618150000},"page":"9768-9781","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":138,"title":["A tree-based stacking ensemble technique with feature selection for network intrusion detection"],"prefix":"10.1007","volume":"52","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3929-7361","authenticated-orcid":false,"given":"Mamunur","family":"Rashid","sequence":"first","affiliation":[]},{"given":"Joarder","family":"Kamruzzaman","sequence":"additional","affiliation":[]},{"given":"Tasadduq","family":"Imam","sequence":"additional","affiliation":[]},{"given":"Santoso","family":"Wibowo","sequence":"additional","affiliation":[]},{"given":"Steven","family":"Gordon","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,8]]},"reference":[{"issue":"1","key":"2968_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40537-019-0278-0","volume":"7","author":"IH Sarker","year":"2020","unstructured":"Sarker IH, Kayes ASM, Badsha S, Alqahtani H, Watters P, Ng A (2020) Cybersecurity data science: an overview from machine learning perspective. J Big Data 7(1):1\u201329","journal-title":"J Big Data"},{"key":"2968_CR2","unstructured":"Av-test institute, germany, https:\/\/www.av-test.org\/en\/statistics\/malware\/. Accessed 19 Jan 2021"},{"key":"2968_CR3","unstructured":"Juniper research. https:\/\/www.juniperresearch.com\/. White paper: Cybercrime & the Internet of Threats 2019. Accessed on 19 Jan 2021"},{"key":"2968_CR4","volume-title":"performance enhancement of intrusion detection system using bagging ensemble technique with feature selection, 7thieee asia-pacific conference on computer science and data engineering 16-18 December, vol 2020","author":"M Rashid","year":"2020","unstructured":"Rashid M, Kamruzzaman J, Ahmed M, Islam N, Wibowo S, Gordon S (2020) performance enhancement of intrusion detection system using bagging ensemble technique with feature selection, 7thieee asia-pacific conference on computer science and data engineering 16-18 December, vol 2020. Gold Coast, Australia"},{"key":"2968_CR5","doi-asserted-by":"publisher","first-page":"11994","DOI":"10.1016\/j.eswa.2009.05.029","volume":"36","author":"CF Tsai","year":"2009","unstructured":"Tsai CF, Hsu YF, Lin CY, Lin WY (2009) Intrusion detection by machine learning: A review. Expert Syst. Appl. 36:11994\u201312000","journal-title":"Expert Syst. Appl."},{"key":"2968_CR6","doi-asserted-by":"publisher","first-page":"1153","DOI":"10.1109\/COMST.2015.2494502","volume":"18","author":"AL Buczak","year":"2015","unstructured":"Buczak AL, Guven E (2015) A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Commun. Surv. Tutor 18:1153\u20131176","journal-title":"IEEE Commun. Surv. Tutor"},{"key":"2968_CR7","doi-asserted-by":"publisher","first-page":"35365","DOI":"10.1109\/ACCESS.2018.2836950","volume":"6","author":"Y Xin","year":"2018","unstructured":"Xin Y, Kong L, Liu Z, Chen Y, Li Y, Zhu H, Gao M, Hou H, Wang C (2018) Machine learning and deep learning methods for cybersecurity. IEEE Access 6:35365\u201335381","journal-title":"IEEE Access"},{"key":"2968_CR8","doi-asserted-by":"crossref","unstructured":"Sommer R, Paxson V (2010) Outside the closed world: On using machine learning for network intrusion detection. In: Proceedings of the 2010 IEEE Symposium on Security and Privacy, Berkeley\/Oakland, CA USA, 16\u201319 May, 2010, pp 305\u2013316","DOI":"10.1109\/SP.2010.25"},{"key":"2968_CR9","doi-asserted-by":"crossref","unstructured":"Garg A, Maheshwari P (2016) A hybrid intrusion detection system: A review, 10th International Conference on Intelligent Systems and Control (ISCO), pp 1-5","DOI":"10.1109\/ISCO.2016.7726909"},{"issue":"19","key":"2968_CR10","first-page":"101","volume":"118","author":"SK Biswas","year":"2018","unstructured":"Biswas SK (2018) Intrusion detection using machine learning: a comparison study. Int J Pure Appl Math 118(19):101\u2013114","journal-title":"Int J Pure Appl Math"},{"key":"2968_CR11","doi-asserted-by":"crossref","unstructured":"Saxena AK, Sinha S, Shukla P (2017) General study of intrusion detection system and survey of agent-based intrusion detection system, 2017. International Conference on Computing Communication and Automation (ICCCA), pp 471\u2013421","DOI":"10.1109\/CCAA.2017.8229866"},{"issue":"5","key":"2968_CR12","doi-asserted-by":"publisher","first-page":"754","DOI":"10.3390\/sym12050754","volume":"12","author":"IH Sarker","year":"2020","unstructured":"Sarker IH, Abushark YB, Alsolami F, Khan AI (2020) IntruDTree: A Machine Learning Based Cyber Security Intrusion Detection Model. Symmetry 12(5):754","journal-title":"Symmetry"},{"issue":"10","key":"2968_CR13","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1109\/34.58871","volume":"12","author":"LK Hansen","year":"1990","unstructured":"Hansen LK, Salamon P (1990) Neural network ensembles. IEEE Trans Pattern Anal Machine Intell 12(10):993\u20131001","journal-title":"IEEE Trans Pattern Anal Machine Intell"},{"key":"2968_CR14","doi-asserted-by":"crossref","unstructured":"Pham NT, Foo E, Suriadi S, Jeffrey H, Lahza HFM (2018) Improving performance of intrusion detection system using ensemble methods and feature selection. In: Proceedings of the Australasian Computer Science Week Multiconference, pp 1\u20136","DOI":"10.1145\/3167918.3167951"},{"issue":"2","key":"2968_CR15","doi-asserted-by":"publisher","first-page":"07","DOI":"10.14738\/tmlai.42.1882","volume":"4","author":"A Panigrah","year":"2016","unstructured":"Panigrah A, Patra MR (2016) Fuzzy rough classification models for network intrusion detection. Trans Machine Learn Artif Intell 4(2):07\u201307","journal-title":"Trans Machine Learn Artif Intell"},{"issue":"9","key":"2968_CR16","first-page":"481","volume":"8","author":"A Panigrahi","year":"2019","unstructured":"Panigrahi A, Patra M (2019) Anomaly based network intrusion detection using bayes net classifiers. Int J Scientif Technol Res 8(9):481\u2013485","journal-title":"Int J Scientif Technol Res"},{"key":"2968_CR17","doi-asserted-by":"publisher","first-page":"94497","DOI":"10.1109\/ACCESS.2019.2928048","volume":"7","author":"BA Tama","year":"2019","unstructured":"Tama BA, Comuzzi M, Rhee KH (2019) TSE-IDS: A two-stage classifier ensemble for intelligent anomaly-based intrusion detection system. IEEE Access 7:94497\u201394507","journal-title":"IEEE Access"},{"issue":"2","key":"2968_CR18","first-page":"149","volume":"32","author":"BA Tama","year":"2017","unstructured":"Tama BA, Rhee KH (2017) An extensive empirical evaluation of classifier ensembles for intrusion detection task. Comput Syst Sci Eng 32(2):149\u2013158","journal-title":"Comput Syst Sci Eng"},{"key":"2968_CR19","doi-asserted-by":"crossref","unstructured":"Smitha R, Kundapur PP, Hareesha KS (2020) A stacking ensemble for network intrusion detection using heterogeneous datasets. Hindawi security and communication networks 1\u20139","DOI":"10.1155\/2020\/4586875"},{"key":"2968_CR20","doi-asserted-by":"crossref","unstructured":"Paulauskas N, Auskalnis J (2017) Analysis of data pre-processing influence on intrusion detection using NSL-KDD dataset. In: 2017 open conference of electrical, electronic and information sciences (eStream), pp 1\u20135","DOI":"10.1109\/eStream.2017.7950325"},{"issue":"3","key":"2968_CR21","doi-asserted-by":"publisher","first-page":"4815","DOI":"10.1109\/JIOT.2018.2871719","volume":"6","author":"N Moustafa","year":"2019","unstructured":"Moustafa N, Turnbull B, Choo KKR (2019) An ensemble intrusion detection technique based on proposed statistical flow features for protecting network traffic of internet of things. IEEE Internet of Things Journal 6(3):4815\u20134830","journal-title":"IEEE Internet of Things Journal"},{"key":"2968_CR22","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1016\/j.comnet.2018.11.010","volume":"148","author":"F Salo","year":"2019","unstructured":"Salo F, Nassif AB, Essex A (2019) Dimensionality reduction with ig-pca and ensemble classifier for network intrusion detection. Comput Netw 148:164\u2013175","journal-title":"Comput Netw"},{"key":"2968_CR23","doi-asserted-by":"crossref","unstructured":"Zhou Y, Cheng G, Jiang S, Dai M (2020) Building an efficient intrusion detection system based on feature selection and ensemble classifier. Comput Netw p 107247","DOI":"10.1016\/j.comnet.2020.107247"},{"key":"2968_CR24","doi-asserted-by":"crossref","unstructured":"Yang XS (2010) A new metaheuristic bat-inspired algorithm. In: Nature Inspired Cooperative Strategies for Optimization (NICSO 2010). ISBN 978-3-642-24094-2. Springer, Madrid, pp 65\u201374","DOI":"10.1007\/978-3-642-12538-6_6"},{"issue":"24","key":"2968_CR25","doi-asserted-by":"publisher","first-page":"9347","DOI":"10.3390\/ijerph17249347","volume":"17","author":"MM Rashid","year":"2020","unstructured":"Rashid MM, Kamruzzaman J, Hassan MM, Imam T, Gordon S (2020) Cyberattacks Detection in IoT-Based Smart City Applications Using Machine Learning Techniques. International Journal of Environmental Research and Public Health 17 (24): 9347","journal-title":"International Journal of Environmental Research and Public Health"},{"key":"2968_CR26","doi-asserted-by":"crossref","unstructured":"Tavallaee M, Bagheri E, Lu W, Ghorbani AA (2009) A detailed analysis of the kdd cup 99 data set. In: 2009 IEEE symposium on computational intelligence for security and defense applications, pp 1\u20136","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"2968_CR27","unstructured":"NSL-KDD dataset. Available on http:\/\/www.unb.ca\/cic\/research\/datasets\/"},{"key":"2968_CR28","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1080\/19393555.2015.1125974","volume":"25","author":"N Moustafa","year":"2016","unstructured":"Moustafa N, Slay J (2016) The evaluation of Network Anomaly Detection Systems: Statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set. Inf Secur J A Glob Perspectvol 25:18\u201331","journal-title":"Inf Secur J A Glob Perspectvol"},{"key":"2968_CR29","volume-title":"Reliable statistical anomaly detection framework for dealing with large High-Speed network traffic. Ph.D. thesis designing an online university of new south wales","author":"N Moustafa","year":"2017","unstructured":"Moustafa N (2017) Reliable statistical anomaly detection framework for dealing with large High-Speed network traffic. Ph.D. thesis designing an online university of new south wales. Canberra, Australia"},{"key":"2968_CR30","unstructured":"Scikit-Learn Developers. Available online: sklearn.preprocessing. LabelEncoder accessed on 10 June 2020 (2020)"},{"key":"2968_CR31","first-page":"111","volume":"1","author":"S Kotsiantis","year":"2006","unstructured":"Kotsiantis S, Kanellopoulos D, Pintelas P (2006) Data preprocessing for supervised leaning. Int J Comput Sci 1:111\u2013117","journal-title":"Int J Comput Sci"},{"key":"2968_CR32","first-page":"2825","volume":"12","author":"F Pedregosa","year":"2011","unstructured":"Pedregosa F, Varoquaux G, Gramfort A, Michel V, Thirion B, Grisel O, Blondel M, Prettenhofer P, Weiss R, Dubourg V, Vanderplas J, Passos A, Cournapeau D, Brucher M, Perrot M, Duchesnay E (2011) Scikit-learn: Machine Learning in Python. J Machine Learn Res 12:2825\u20132830","journal-title":"J Machine Learn Res"},{"key":"2968_CR33","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1109\/34.58871","volume":"12","author":"LK Hansen","year":"1990","unstructured":"Hansen LK, Salamon P (1990) Neural network ensembles. IEEE Trans Pattern Anal Mach Intell 12:993\u20131001","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"2968_CR34","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1016\/S0893-6080(05)80023-1","volume":"5","author":"DH Wolpert","year":"1992","unstructured":"Wolpert DH (1992) Stacked generalization. Neural Netw. 5:241\u2013259","journal-title":"Neural Netw."},{"key":"2968_CR35","first-page":"372","volume-title":"Extreme gradient boosting based tuning for classification in intrusion detection systems, International Conference on Advances in Computing and Data Sciences","author":"A Bansal","year":"2018","unstructured":"Bansal A, Kaur S (2018) Extreme gradient boosting based tuning for classification in intrusion detection systems, International Conference on Advances in Computing and Data Sciences. Springer, Berlin, pp 372\u2013380"},{"key":"2968_CR36","doi-asserted-by":"crossref","unstructured":"Pham NT, Foo E, Suriadi S, Jeffrey H, Lahza HFH (2018) Improving performance of intrusion detection system using ensemble methods and feature selection. In: Proceedings of the Australasian Computer Science Week Multiconference, pp 1\u20136","DOI":"10.1145\/3167918.3167951"},{"issue":"90","key":"2968_CR37","first-page":"3133","volume":"15","author":"M Fern\u00e1ndez-Delgado","year":"2014","unstructured":"Fern\u00e1ndez-Delgado M, Cernadas E, Barro S, Amorim D (2014) Do we Need Hundreds of Classifiers to Solve Real World Classification Problems? J Machine Learn Res 15(90):3133\u20133181. Accessed: Mar. 21, 2021. [Online]. Available: http:\/\/jmlr.org\/papers\/v15\/delgado14a.html","journal-title":"J Machine Learn Res"},{"issue":"2","key":"2968_CR38","first-page":"412","volume":"18","author":"H Esmaily","year":"2018","unstructured":"Esmaily H, Tayefi M, Doosti H, Ghayour-Mobarhan M, Nezami H, Amirabadizadeh A (2018) A Comparison between Decision Tree and Random Forest in Determining the Risk Factors Associated with Type 2 Diabetes. J Res Health Sci 18(2):412. Accessed: Mar. 21, 2021. [Online]. Available: https:\/\/www.ncbi.nlm.nih.gov\/pmc\/articles\/PMC7204421\/","journal-title":"J Res Health Sci"},{"issue":"5","key":"2968_CR39","first-page":"272","volume":"9","author":"J Ali","year":"2012","unstructured":"Ali J, Khan R, Ahmad N, Maqsood I (2012) Random forests and decision trees. Int J Comput Sci Issues 9(5):272\u201327","journal-title":"Int J Comput Sci Issues"},{"issue":"4","key":"2968_CR40","doi-asserted-by":"publisher","first-page":"580","DOI":"10.3390\/rs10040580","volume":"10","author":"TM Berhane","year":"2018","unstructured":"Berhane TM, et al. (2018) Decision-Tree, Rule-Based, And random forest classification of High-Resolution multispectral imagery for wetland mapping and inventory. Remote Sens (Basel) 10(4):580. https:\/\/doi.org\/10.3390\/rs10040580","journal-title":"Remote Sens (Basel)"},{"issue":"1","key":"2968_CR41","doi-asserted-by":"publisher","first-page":"196","DOI":"10.17148\/IJARCCE.2015.4142","volume":"4","author":"TR Prajwala","year":"2015","unstructured":"Prajwala TR (2015) A comparative study on decision tree and random forest using r tool. IJARCCE 4(1):196\u2013199. https:\/\/doi.org\/10.17148\/IJARCCE.2015.4142","journal-title":"IJARCCE"},{"key":"2968_CR42","doi-asserted-by":"publisher","unstructured":"Chen T, Guestrin C (2016) XGBOost: A Scalable Tree Boosting System. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, New York, NY, USA, pp 785\u2013794. https:\/\/doi.org\/10.1145\/2939672.2939785","DOI":"10.1145\/2939672.2939785"},{"key":"2968_CR43","doi-asserted-by":"publisher","unstructured":"Dhaliwal SS, Nahid A, Abbas R (2018) Effective Intrusion Detection System Using XGBoost, Information, vol. 9, no. 7. Art. no. 7. https:\/\/doi.org\/10.3390\/info9070149","DOI":"10.3390\/info9070149"},{"key":"2968_CR44","doi-asserted-by":"publisher","unstructured":"Chen Z, Jiang F, Cheng Y, Gu X, Liu W, Peng J (2018) XGBoost Classifier for DDoS Attack Detection and Analysis in SDN-Based Cloud. In: 2018 IEEE International Conference on Big Data and Smart Computing (BigComp), pp 251\u2013256. https:\/\/doi.org\/10.1109\/BigComp.2018.00044","DOI":"10.1109\/BigComp.2018.00044"},{"key":"2968_CR45","doi-asserted-by":"publisher","unstructured":"Law A, et al. (2020) Secure Collaborative Training and Inference for XGBoost. In: Proceedings of the 2020 Workshop on Privacy-Preserving Machine Learning in Practice, New York, NY, USA, pp 21\u201326. https:\/\/doi.org\/10.1145\/3411501.3419420","DOI":"10.1145\/3411501.3419420"},{"key":"2968_CR46","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1109\/COMST.2015.2402161","volume":"18","author":"C Kolias","year":"2015","unstructured":"Kolias C, Kambourakis G, Stavrou A, Gritzalis S (2015) Intrusion detection in 802.11 networks: Empirical evaluation of threats and a public dataset. IEEE Commun Surv Tutor 18:184\u2013208","journal-title":"IEEE Commun Surv Tutor"},{"key":"2968_CR47","volume-title":"Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic characterization,ICISSP, pp. 108\u2013116, Jan 22\u201324","author":"I Sharafaldin","year":"2018","unstructured":"Sharafaldin I, Lashkari AH, Ghorbani AA (2018) Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic characterization,ICISSP, pp. 108\u2013116, Jan 22\u201324. Funchal, Portugal"},{"key":"2968_CR48","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1016\/j.eswa.2020.113249","volume":"148","author":"H Alazzam","year":"2020","unstructured":"Alazzam H, Sharieh A, Sabri KE (2020) A feature selection algorithm for intrusion detection system based on pigeon inspired optimizer. Expert Syst Appl 148:113\u2013249","journal-title":"Expert Syst Appl"},{"issue":"3","key":"2968_CR49","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1016\/j.cose.2011.12.012","volume":"31","author":"A Shiravi","year":"2012","unstructured":"Shiravi A, Shiravi H, Tavallaee M, Ghorbani AA (2012) Toward developing a systematic approach to generate benchmark datasets for intrusion detection. Comput Secur 31(3):357\u2013374","journal-title":"Comput Secur"},{"key":"2968_CR50","doi-asserted-by":"crossref","unstructured":"Song J, Takakura H, Okabe Y, Eto M, Inoue D, Nakao K (2011) Statistical analysis of honeypot data and building of kyoto 2006+ dataset for nids evaluation. In: Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, ACM (2011), pp 29\u201336","DOI":"10.1145\/1978672.1978676"},{"key":"2968_CR51","unstructured":"The-NIMS-Dataset, Available: https:\/\/projects.cs.dal.ca\/projectx\/Download.html"},{"issue":"11","key":"2968_CR52","doi-asserted-by":"publisher","first-page":"180","DOI":"10.3390\/fi12110180","volume":"12","author":"A Mahfouz","year":"2020","unstructured":"Mahfouz A, Abuhussein A, Venugopal D, Shiva S (2020) Ensemble classifiers for network intrusion detection using a novel network attack dataset. Future Internet 12(11):180","journal-title":"Future Internet"},{"key":"2968_CR53","doi-asserted-by":"publisher","unstructured":"Taneja M, Davy A (2017) Resource aware placement of IoT application modules in Fog-Cloud Computing Paradigm. In: 2017 IFIP\/IEEE Symposium on Integrated Network and Service Management (IM), May, 2017, pp 1222\u20131228. https:\/\/doi.org\/10.23919\/INM.2017.7987464","DOI":"10.23919\/INM.2017.7987464"},{"issue":"7","key":"2968_CR54","doi-asserted-by":"publisher","first-page":"1158","DOI":"10.1108\/K-10-2016-0302","volume":"46","author":"LW Chao","year":"2017","unstructured":"Chao LW, Shih-Wen K, Chih-Fon T (Jan. 2017) 10 data mining techniques in business applications:brief survey. Kybernetes 46(7):1158\u20131170. https:\/\/doi.org\/10.1108\/K-10-2016-0302","journal-title":"Kybernetes"},{"key":"2968_CR55","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1016\/j.future.2019.02.013","volume":"96","author":"U Noor","year":"2019","unstructured":"Noor U, Anwar Z, Amjad T, Choo K-KR (2019) A machine learning-based FinTech cyber threat attribution framework using high-level indicators of compromise. Futur Gener Comput Syst 96:227\u2013242. https:\/\/doi.org\/10.1016\/j.future.2019.02.013","journal-title":"Futur Gener Comput Syst"},{"issue":"3","key":"2968_CR56","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1023\/B:MACH.0000015881.36452.6e","volume":"54","author":"S D\u017eeroski","year":"2004","unstructured":"D\u017eeroski S, \u017eenko B. (2004) Is combining classifiers with stacking better than selecting the best one?. Mach Learn 54(3):255\u2013273","journal-title":"Mach Learn"},{"key":"2968_CR57","unstructured":"Wilcoxon Rank-Sum Test, https:\/\/www.stat.auckland.ac.nz\/wild\/ChanceEnc\/Ch10.wilcoxon.pdf"},{"issue":"2","key":"2968_CR58","doi-asserted-by":"publisher","first-page":"022022","DOI":"10.1088\/1742-6596\/1168\/2\/022022","volume":"1168","author":"X Ying","year":"2019","unstructured":"Ying X (2019) An overview of overfitting and its solutions. J Phys Conf Series 1168(2):022022. IOP Publishing","journal-title":"J Phys Conf Series"}],"container-title":["Applied Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-021-02968-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10489-021-02968-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-021-02968-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,20]],"date-time":"2022-06-20T07:32:19Z","timestamp":1655710339000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10489-021-02968-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,8]]},"references-count":58,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2022,7]]}},"alternative-id":["2968"],"URL":"https:\/\/doi.org\/10.1007\/s10489-021-02968-1","relation":{},"ISSN":["0924-669X","1573-7497"],"issn-type":[{"value":"0924-669X","type":"print"},{"value":"1573-7497","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1,8]]},"assertion":[{"value":"1 November 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 January 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}