{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T15:58:48Z","timestamp":1774540728329,"version":"3.50.1"},"reference-count":50,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2024,2,17]],"date-time":"2024-02-17T00:00:00Z","timestamp":1708128000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,2,17]],"date-time":"2024-02-17T00:00:00Z","timestamp":1708128000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2024,8]]},"DOI":"10.1007\/s10586-024-04270-4","type":"journal-article","created":{"date-parts":[[2024,2,17]],"date-time":"2024-02-17T11:03:02Z","timestamp":1708167782000},"page":"5913-5931","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":39,"title":["Designing a modified feature aggregation model with hybrid sampling techniques for network intrusion detection"],"prefix":"10.1007","volume":"27","author":[{"given":"NarasimhaSwamy","family":"Biyyapu","sequence":"first","affiliation":[]},{"given":"Esther Jyothi","family":"Veerapaneni","sequence":"additional","affiliation":[]},{"given":"Phani Praveen","family":"Surapaneni","sequence":"additional","affiliation":[]},{"given":"Sai Srinivas","family":"Vellela","sequence":"additional","affiliation":[]},{"given":"Ramesh","family":"Vatambeti","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,2,17]]},"reference":[{"issue":"12","key":"4270_CR1","doi-asserted-by":"publisher","first-page":"9310","DOI":"10.1109\/JIOT.2021.3130434","volume":"9","author":"X Zhou","year":"2021","unstructured":"Zhou, X., Liang, W., Li, W., Yan, K., Shimizu, S., Kevin, I., Wang, K.: Hierarchical adversarial attacks against graph-neural-network-based IoT network intrusion detection system. IEEE Internet Things J. 9(12), 9310\u20139319 (2021)","journal-title":"IEEE Internet Things J."},{"issue":"3","key":"4270_CR2","first-page":"3945","volume":"69","author":"ZK Maseer","year":"2021","unstructured":"Maseer, Z.K., Yusof, R., Mostafa, S.A., Bahaman, N., Musa, O., Al-rimy, B.A.S.: DeepIoT. IDS: hybrid deep learning for enhancing IoT network intrusion detection. Comput. Mater. Contin 69(3), 3945\u20133966 (2021)","journal-title":"Comput. Mater. Contin"},{"issue":"2","key":"4270_CR3","doi-asserted-by":"publisher","first-page":"252","DOI":"10.3390\/jcp1020014","volume":"1","author":"P Papadopoulos","year":"2021","unstructured":"Papadopoulos, P., Thornewill von Essen, O., Pitropakis, N., Chrysoulas, C., Mylonas, A., Buchanan, W.J.: Launching adversarial attacks against network intrusion detection systems for IoT. J. Cybersecur. Priv. 1(2), 252\u2013273 (2021)","journal-title":"J. Cybersecur. Priv."},{"key":"4270_CR4","doi-asserted-by":"publisher","first-page":"1717","DOI":"10.1007\/s11277-021-08717-4","volume":"127","author":"NS Divya","year":"2022","unstructured":"Divya, N.S., Bobba, V., Vatambeti, R.: An adaptive cluster based vehicular routing protocol for secure communication. Wireless Pers. Commun. 127, 1717\u20131736 (2022). https:\/\/doi.org\/10.1007\/s11277-021-08717-4","journal-title":"Wireless Pers. Commun."},{"issue":"21","key":"4270_CR5","doi-asserted-by":"publisher","first-page":"7016","DOI":"10.3390\/s21217016","volume":"21","author":"MA Khan","year":"2021","unstructured":"Khan, M.A., Khan, M.A., Jan, S.U., Ahmad, J., Jamal, S.S., Shah, A.A., Buchanan, W.J.: A deep learning-based intrusion detection system for MQTT-enabled IoT. Sensors 21(21), 7016 (2021)","journal-title":"Sensors"},{"issue":"2","key":"4270_CR6","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1016\/j.icte.2021.04.012","volume":"7","author":"P Nimbalkar","year":"2021","unstructured":"Nimbalkar, P., Kshirsagar, D.: Feature selection for intrusion detection system in Internet-of-Things (IoT). ICT Express 7(2), 177\u2013181 (2021)","journal-title":"ICT Express"},{"key":"4270_CR7","doi-asserted-by":"crossref","unstructured":"Leevy, J. L., Khoshgoftaar, T. M., & Peterson, J. M. (2021, August). Mitigating class imbalance for iot network intrusion detection: a survey. In 2021 IEEE Seventh International Conference on Big Data Computing Service and Applications (BigDataService) (pp. 143\u2013148). IEEE","DOI":"10.1109\/BigDataService52369.2021.00023"},{"issue":"2","key":"4270_CR8","first-page":"1801","volume":"69","author":"N Islam","year":"2021","unstructured":"Islam, N., Farhin, F., Sultana, I., Kaiser, M.S., Rahman, M.S., Mahmud, M., Cho, G.H.: Towards machine learning based intrusion detection in IoT networks. Comput. Mater. Contin. 69(2), 1801 (2021)","journal-title":"Comput. Mater. Contin."},{"key":"4270_CR9","doi-asserted-by":"crossref","unstructured":"Sahar, N., Mishra, R., & Kalam, S. (2021). Deep learning approach-based network intrusion detection system for fog-assisted iot. In Proceedings of international conference on big data, machine learning and their applications: ICBMA 2019 (pp. 39\u201350). Springer Singapore","DOI":"10.1007\/978-981-15-8377-3_4"},{"key":"4270_CR10","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/s12065-019-00291-w","volume":"14","author":"V Kumar","year":"2021","unstructured":"Kumar, V., Das, A.K., Sinha, D.: UIDS: a unified intrusion detection system for IoT environment. Evol. Intel. 14, 47\u201359 (2021)","journal-title":"Evol. Intel."},{"issue":"6","key":"4270_CR11","doi-asserted-by":"publisher","first-page":"1209","DOI":"10.1007\/s00607-021-00912-2","volume":"103","author":"AJ Siddiqui","year":"2021","unstructured":"Siddiqui, A.J., Boukerche, A.: Adaptive ensembles of autoencoders for unsupervised IoT network intrusion detection. Computing 103(6), 1209\u20131232 (2021)","journal-title":"Computing"},{"key":"4270_CR12","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1007\/s12652-021-03298-3","volume":"14","author":"R Vatambeti","year":"2023","unstructured":"Vatambeti, R., Sanshi, S., Krishna, D.P.: An efficient clustering approach for optimized path selection and route maintenance in mobile ad hoc networks. J Ambient Intell Human Comput 14, 305\u2013319 (2023). https:\/\/doi.org\/10.1007\/s12652-021-03298-3","journal-title":"J Ambient Intell Human Comput"},{"key":"4270_CR13","doi-asserted-by":"crossref","unstructured":"Shukla, A., Ahamad, S., Rao, G. N., Al-Asadi, A. J., Gupta, A., & Kumbhkar, M. (2021, December). Artificial intelligence assisted IoT data intrusion detection. In 2021 4th International Conference on Computing and Communications Technologies (ICCCT) (pp. 330\u2013335). IEEE","DOI":"10.1109\/ICCCT53315.2021.9711795"},{"key":"4270_CR14","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s40860-020-00126-x","volume":"7","author":"PK Keserwani","year":"2021","unstructured":"Keserwani, P.K., Govil, M.C., Pilli, E.S., Govil, P.: A smart anomaly-based intrusion detection system for the Internet of Things (IoT) network using GWO\u2013PSO\u2013R.F. model. J. Reliab. Intell. Environ. 7, 3\u201321 (2021)","journal-title":"J. Reliab. Intell. Environ."},{"key":"4270_CR15","first-page":"1","volume":"2","author":"S Choudhary","year":"2021","unstructured":"Choudhary, S., Dey, A., Kesswani, N.: CRIDS: correlation and regression-based network intrusion detection system for IoT. S.N. Comput. Sci. 2, 1\u20137 (2021)","journal-title":"Comput. Sci."},{"issue":"12","key":"4270_CR16","doi-asserted-by":"publisher","first-page":"9960","DOI":"10.1109\/JIOT.2021.3119055","volume":"9","author":"R Zhao","year":"2021","unstructured":"Zhao, R., Gui, G., Xue, Z., Yin, J., Ohtsuki, T., Adebisi, B., Gacanin, H.: A novel intrusion detection method based on lightweight neural network for internet of things. IEEE Internet Things J. 9(12), 9960\u20139972 (2021)","journal-title":"IEEE Internet Things J."},{"key":"4270_CR17","doi-asserted-by":"publisher","first-page":"38254","DOI":"10.1109\/ACCESS.2021.3063671","volume":"9","author":"J Liu","year":"2021","unstructured":"Liu, J., Yang, D., Lian, M., Li, M.: Research on intrusion detection based on particle swarm optimisation in IoT. IEEE Access 9, 38254\u201338268 (2021)","journal-title":"IEEE Access"},{"key":"4270_CR18","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2021.014774","author":"JD Lee","year":"2021","unstructured":"Lee, J.D., Cha, H.S., Rathore, S., Park, J.H.: M-IDM: a multi-classification based intrusion detection model in healthcare IoT. Comput. Mater. Contin. (2021). https:\/\/doi.org\/10.32604\/cmc.2021.014774","journal-title":"Comput. Mater. Contin."},{"key":"4270_CR19","doi-asserted-by":"publisher","first-page":"142206","DOI":"10.1109\/ACCESS.2021.3120626","volume":"9","author":"AR Gad","year":"2021","unstructured":"Gad, A.R., Nashat, A.A., Barkat, T.M.: Intrusion detection system using machine learning for vehicular ad hoc networks based on ToN-IoT dataset. IEEE Access 9, 142206\u2013142217 (2021)","journal-title":"IEEE Access"},{"issue":"9","key":"4270_CR20","doi-asserted-by":"publisher","first-page":"2987","DOI":"10.3390\/s21092987","volume":"21","author":"R Qaddoura","year":"2021","unstructured":"Qaddoura, R., Al-Zoubi, M.A., Faris, H., Almomani, I.: A multi-layer classification approach for intrusion detection in IoT networks based on deep learning. Sensors 21(9), 2987 (2021)","journal-title":"Sensors"},{"issue":"4","key":"4270_CR21","doi-asserted-by":"publisher","first-page":"1113","DOI":"10.3390\/s21041113","volume":"21","author":"M Zhong","year":"2021","unstructured":"Zhong, M., Zhou, Y., Chen, G.: Sequential model-based intrusion detection system for IoT servers using deep learning methods. Sensors 21(4), 1113 (2021)","journal-title":"Sensors"},{"issue":"2","key":"4270_CR22","doi-asserted-by":"publisher","first-page":"137","DOI":"10.3103\/S0146411621020085","volume":"55","author":"P Kumar","year":"2021","unstructured":"Kumar, P., Gupta, G.P., Tripathi, R.: Design of anomaly-based intrusion detection system using fog computing for IoT network. Autom. Control. Comput. Sci. 55(2), 137\u2013147 (2021)","journal-title":"Autom. Control. Comput. Sci."},{"key":"4270_CR23","doi-asserted-by":"crossref","unstructured":"Aloul, F., Zualkernan, I., Abdalgawad, N., Hussain, L., & Sakhnini, D. (2021, July). Network intrusion detection on the IoT edge using adversarial autoencoders. In 2021 International Conference on Information Technology (ICIT) (pp. 120\u2013125). IEEE","DOI":"10.1109\/ICIT52682.2021.9491694"},{"key":"4270_CR24","doi-asserted-by":"publisher","first-page":"119030","DOI":"10.1016\/j.eswa.2022.119030","volume":"213","author":"MHL Louk","year":"2023","unstructured":"Louk, M.H.L., Tama, B.A.: Dual-IDS: a bagging-based gradient boosting decision tree model for network anomaly intrusion detection system. Expert Syst. Appl. 213, 119030 (2023)","journal-title":"Expert Syst. Appl."},{"key":"4270_CR25","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1016\/j.inffus.2022.09.026","volume":"90","author":"A Thakkar","year":"2023","unstructured":"Thakkar, A., Lohiya, R.: Fusion of statistical importance for feature selection in Deep Neural Network-based Intrusion Detection System. Inf. Fusion 90, 353\u2013363 (2023)","journal-title":"Inf. Fusion"},{"issue":"1","key":"4270_CR26","doi-asserted-by":"publisher","first-page":"867","DOI":"10.32604\/iasc.2023.026769","volume":"35","author":"G Logeswari","year":"2023","unstructured":"Logeswari, G., Bose, S., Anitha, T.: An intrusion detection system for sdn using machine learning. Intell. Autom. Soft Comput. 35(1), 867\u2013880 (2023)","journal-title":"Intell. Autom. Soft Comput."},{"issue":"1","key":"4270_CR27","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1007\/s10922-022-09697-x","volume":"31","author":"S Mahadik","year":"2023","unstructured":"Mahadik, S., Pawar, P.M., Muthalagu, R.: Efficient intelligent intrusion detection system for heterogeneous internet of things (HetIoT). J. Netw. Syst. Manage. 31(1), 2 (2023)","journal-title":"J. Netw. Syst. Manage."},{"issue":"1","key":"4270_CR28","doi-asserted-by":"publisher","first-page":"272","DOI":"10.1007\/s10489-022-03361-2","volume":"53","author":"J Cui","year":"2023","unstructured":"Cui, J., Zong, L., Xie, J., Tang, M.: A novel multi-module integrated intrusion detection system for high-dimensional imbalanced data. Appl. Intell. 53(1), 272\u2013288 (2023)","journal-title":"Appl. Intell."},{"key":"4270_CR29","first-page":"103405","volume":"72","author":"MA Talukder","year":"2023","unstructured":"Talukder, M.A., Hasan, K.F., Islam, M.M., Uddin, M.A., Akhter, A., Yousuf, M.A., Moni, M.A.: A dependable hybrid machine learning model for network intrusion detection. J. Inf. Secur. Appl. 72, 103405 (2023)","journal-title":"J. Inf. Secur. Appl."},{"issue":"1","key":"4270_CR30","first-page":"702","volume":"72","author":"S Venkatesan","year":"2023","unstructured":"Venkatesan, S.: Design an intrusion detection system based on feature selection using ML algorithms. Math. Stat. Eng. Appl. 72(1), 702\u2013710 (2023)","journal-title":"Math. Stat. Eng. Appl."},{"key":"4270_CR31","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1016\/j.comcom.2022.12.010","volume":"199","author":"SM Kasongo","year":"2023","unstructured":"Kasongo, S.M.: A deep learning technique for intrusion detection system using a Recurrent Neural Networks based framework. Comput. Commun. 199, 113\u2013125 (2023)","journal-title":"Comput. Commun."},{"issue":"2","key":"4270_CR32","doi-asserted-by":"publisher","first-page":"34","DOI":"10.3390\/computers12020034","volume":"12","author":"A Awajan","year":"2023","unstructured":"Awajan, A.: A novel deep learning-based intrusion detection system for IOT networks. Computers 12(2), 34 (2023)","journal-title":"Computers"},{"key":"4270_CR33","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3237661","author":"A Heidari","year":"2023","unstructured":"Heidari, A., Navimipour, N.J., Unal, M.: A secure intrusion detection platform using blockchain and radial basis function neural networks for internet of drones. IEEE Internet Things J. (2023). https:\/\/doi.org\/10.1109\/JIOT.2023.3237661","journal-title":"IEEE Internet Things J."},{"issue":"1","key":"4270_CR34","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40537-023-00694-8","volume":"10","author":"Y Yin","year":"2023","unstructured":"Yin, Y., Jang-Jaccard, J., Xu, W., Singh, A., Zhu, J., Sabrina, F., Kwak, J.: IGRF-RFE: a hybrid feature selection method for MLP-based network intrusion detection on UNSW-NB15 dataset. J. Big Data 10(1), 1\u201326 (2023)","journal-title":"J. Big Data"},{"key":"4270_CR35","doi-asserted-by":"publisher","first-page":"118745","DOI":"10.1016\/j.eswa.2022.118745","volume":"213","author":"OA Alghanam","year":"2023","unstructured":"Alghanam, O.A., Almobaideen, W., Saadeh, M., Adwan, O.: An improved PIO feature selection algorithm for IoT network intrusion detection system based on ensemble learning. Expert Syst. Appl. 213, 118745 (2023)","journal-title":"Expert Syst. Appl."},{"issue":"1","key":"4270_CR36","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1007\/s10207-022-00634-2","volume":"22","author":"S Mohamed","year":"2023","unstructured":"Mohamed, S., Ejbali, R.: Deep SARSA-based reinforcement learning approach for anomaly network intrusion detection system. Int. J. Inf. Secur. 22(1), 235\u2013247 (2023)","journal-title":"Int. J. Inf. Secur."},{"issue":"1","key":"4270_CR37","doi-asserted-by":"publisher","first-page":"559","DOI":"10.1007\/s10586-022-03607-1","volume":"26","author":"M Jeyaselvi","year":"2023","unstructured":"Jeyaselvi, M., Dhanaraj, R.K., Sathya, M., Memon, F.H., Krishnasamy, L., Dev, K., Qureshi, N.M.F.: A highly secured intrusion detection system for IoT using EXPSO-STFA feature selection for LAANN to detect attacks. Clust. Comput. 26(1), 559\u2013574 (2023)","journal-title":"Clust. Comput."},{"issue":"15","key":"4270_CR38","doi-asserted-by":"publisher","first-page":"6836","DOI":"10.3390\/s23156836","volume":"23","author":"M Priyadharshini","year":"2023","unstructured":"Priyadharshini, M., Banu, A.F., Sharma, B., Chowdhury, S., Rabie, K., Shongwe, T.: Hybrid multi-label classification model for medical applications based on adaptive synthetic data and ensemble learning. Sensors 23(15), 6836 (2023)","journal-title":"Sensors"},{"key":"4270_CR39","doi-asserted-by":"publisher","first-page":"116158","DOI":"10.1016\/j.eswa.2021.116158","volume":"191","author":"L Abualigah","year":"2022","unstructured":"Abualigah, L., AbdElaziz, M., Sumari, P., Geem, Z.W., Gandomi, A.H.: Reptile search algorithm (RSA): a nature-inspired meta-heuristic optimiser. Expert Syst. Appl. 191, 116158 (2022)","journal-title":"Expert Syst. Appl."},{"key":"4270_CR40","unstructured":"M. K. Putchala, \u2018\u2018Deep learning approach for intrusion detection system 687 (IDS) in the Internet of Things (IoT) network using gated recurrent neural networks (GRU),\u2019\u2019 M.S. thesis, Dept. Comput. Sci. Eng., Wright State Univ., Dayton, OH, USA, 2017"},{"key":"4270_CR41","unstructured":"D. I. Edeh, \u2018\u2018Network intrusion detection system using deep learning technique,\u2019\u2019 M.S. thesis, Dept. Comput., Univ. Turku, Turku, Finland, 2021"},{"key":"4270_CR42","doi-asserted-by":"publisher","first-page":"19572","DOI":"10.1109\/ACCESS.2022.3151248","volume":"10","author":"A Halbouni","year":"2022","unstructured":"Halbouni, A., Gunawan, T.S., Habaebi, M.H., Halbouni, M., Kartiwi, M., Ahmad, R.: \u2018Machine learning and deep learning approaches for cybersecuriy: a review.\u2019 IEEE Access 10, 19572\u201319585 (2022)","journal-title":"IEEE Access"},{"key":"4270_CR43","doi-asserted-by":"crossref","unstructured":"I. Almomani, B. Al-Kasasbeh, and M. Al-Akhras, \u2018\u2018WSN-DS: A dataset for intrusion detection systems in wireless sensor networks,\u2019\u2019 J. Sensors, vol. 2016, Aug. 2016, Art. no. 4731953","DOI":"10.1155\/2016\/4731953"},{"key":"4270_CR44","doi-asserted-by":"crossref","unstructured":"Chhabra, M., & Kumar, R. (2022). A Smart Healthcare System Based on Classifier DenseNet 121 Model to Detect Multiple Diseases. In Mobile Radio Communications and 5G Networks: Proceedings of Second MRCN 2021 (pp. 297\u2013312). Singapore: Springer Nature Singapore","DOI":"10.1007\/978-981-16-7018-3_23"},{"key":"4270_CR45","doi-asserted-by":"publisher","first-page":"6473507","DOI":"10.1155\/2022\/6473507","volume":"2022","author":"A Dahou","year":"2022","unstructured":"Dahou, A., AbdElaziz, M., Chelloug, S.A., Awadallah, M.A., Al-Betar, M.A., Al-qaness, M.A., Forestiero, A.: Intrusion detection system for IoT based on deep learning and modified reptile search algorithm. Comput. Intell. Neurosci. 2022, 6473507 (2022)","journal-title":"Comput. Intell. Neurosci."},{"key":"4270_CR46","doi-asserted-by":"publisher","first-page":"126419","DOI":"10.1016\/j.energy.2022.126419","volume":"266","author":"J Xiong","year":"2023","unstructured":"Xiong, J., Peng, T., Tao, Z., Zhang, C., Song, S., Nazir, M.S.: A dual-scale deep learning model based on ELM-BiLSTM and improved reptile search algorithm for wind power prediction. Energy 266, 126419 (2023)","journal-title":"Energy"},{"key":"4270_CR47","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1016\/j.knosys.2015.12.022","volume":"96","author":"S Mirjalili","year":"2016","unstructured":"Mirjalili, S.: SCA: a sine cosine algorithm for solving optimisation problems. Knowl. Based Syst. 96, 120\u2013133 (2016)","journal-title":"Knowl. Based Syst."},{"key":"4270_CR48","doi-asserted-by":"crossref","unstructured":"Chechkin, A.; Metzler, R.; Klafter, J.; Gonchar, V.Y. Introduction to the Theory L\u00e9vy Flights. In Anomalous Transport: Foundations and Applications; Wiley-VCH: Weinheim, Germany, 2008","DOI":"10.1002\/9783527622979.ch5"},{"key":"4270_CR49","doi-asserted-by":"publisher","first-page":"1616","DOI":"10.1016\/j.cor.2011.09.026","volume":"40","author":"X-S Yang","year":"2013","unstructured":"Yang, X.-S., Deb, S.: Multiobjective cuckoo search for design optimisation. Comput. Oper. Res. 40, 1616\u20131624 (2013)","journal-title":"Comput. Oper. Res."},{"key":"4270_CR50","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1016\/j.ins.2021.03.060","volume":"568","author":"X Kan","year":"2021","unstructured":"Kan, X., Fan, Y., Fang, Z., Cao, L., Xiong, N.N., Yang, D., Li, X.: A novel IoT network intrusion detection approach based on adaptive particle swarm optimisation convolutional neural network. Inf. Sci. 568, 147\u2013162 (2021)","journal-title":"Inf. Sci."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-024-04270-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-024-04270-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-024-04270-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,12]],"date-time":"2024-08-12T14:37:49Z","timestamp":1723473469000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-024-04270-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2,17]]},"references-count":50,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2024,8]]}},"alternative-id":["4270"],"URL":"https:\/\/doi.org\/10.1007\/s10586-024-04270-4","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,2,17]]},"assertion":[{"value":"2 October 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 December 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 January 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 February 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no relevant financial or non-financial interests to disclose.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"NA","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Research involving Human Participants and\/or Animals"}},{"value":"The submitted work is original and has not been published elsewhere in any form or language.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}