{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T14:34:09Z","timestamp":1776350049408,"version":"3.51.2"},"reference-count":61,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2025,6,16]],"date-time":"2025-06-16T00:00:00Z","timestamp":1750032000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,6,16]],"date-time":"2025-06-16T00:00:00Z","timestamp":1750032000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2025,9]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>\n                    The widespread adoption of microservice architectures has given rise to a new set of software security challenges. These challenges stem from the unique features inherent in microservices. It is important to systematically assess and address these software security issues through effective security risk assessments. However, existing risk assessment approaches, such as expert-based manual assessment, prove inefficient in accurately evaluating the security risks of microservices. Furthermore, the absence of security vulnerability metrics hampers the evaluation of these risks. To address these issues, we propose\n                    <jats:italic>CyberWise Predictor<\/jats:italic>\n                    , a framework designed for predicting and assessing security risks associated with microservice architectures. Our framework employs transformers, which are deep learning-based natural language processing models, to analyze descriptions of vulnerabilities for predicting vulnerability metrics to assess security risks. Our experimental evaluation shows the effectiveness of\n                    <jats:italic>CyberWise Predictor<\/jats:italic>\n                    , achieving an average accuracy of\n                    <jats:bold>92%<\/jats:bold>\n                    in automatically predicting vulnerability metrics for their risk assessment.\n                  <\/jats:p>","DOI":"10.1007\/s10586-024-05092-0","type":"journal-article","created":{"date-parts":[[2025,6,16]],"date-time":"2025-06-16T12:10:41Z","timestamp":1750075841000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Towards deep learning enabled cybersecurity risk assessment for microservice architectures"],"prefix":"10.1007","volume":"28","author":[{"given":"Majid","family":"Abdulsatar","sequence":"first","affiliation":[]},{"given":"Hussain","family":"Ahmad","sequence":"additional","affiliation":[]},{"given":"Diksha","family":"Goel","sequence":"additional","affiliation":[]},{"given":"Faheem","family":"Ullah","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,16]]},"reference":[{"key":"5092_CR1","doi-asserted-by":"crossref","unstructured":"Pimentel, E., Pereira, W., Maia, P.H.M., Cort\u00e9s, M.I., et\u00a0al.: Self-Adaptive Microservice-based Systems-Landscape and Research Opportunities. In: International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS) IEEE. p. 167\u2013178 (2021)","DOI":"10.1109\/SEAMS51251.2021.00030"},{"key":"5092_CR2","doi-asserted-by":"crossref","unstructured":"Rossi, F., Cardellini, V., Presti, F.L., Nardelli, M.: Dynamic multi-metric thresholds for scaling applications using reinforcement learning. IEEE Transactions on Cloud Computing (2022)","DOI":"10.1109\/TCC.2022.3163357"},{"issue":"9","key":"5092_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3558001","volume":"55","author":"H Ahmad","year":"2023","unstructured":"Ahmad, H., Dharmadasa, I., Ullah, F., Babar, M.A.: A review on c3i systems\u2019 security: vulnerabilities, attacks, and countermeasures. ACM Comput. Surv. 55(9), 1\u201338 (2023)","journal-title":"ACM Comput. Surv."},{"key":"5092_CR4","doi-asserted-by":"crossref","unstructured":"Ahmad, H., Treude, C., Wagner, M., Szabo, C.: Smart HPA: A Resource-Efficient Horizontal Pod Auto-scaler for Microservice Architectures. arXiv preprint arXiv:2403.07909 (2024)","DOI":"10.2139\/ssrn.4918202"},{"key":"5092_CR5","doi-asserted-by":"crossref","unstructured":"Ahmad, H., Treude, C., Wagner, M., Szabo, C.: Towards Resource-Efficient Reactive and Proactive Auto-Scaling for Microservice Architectures. Available at SSRN 4918202 (2024)","DOI":"10.2139\/ssrn.4918202"},{"key":"5092_CR6","doi-asserted-by":"publisher","first-page":"20357","DOI":"10.1109\/ACCESS.2022.3152803","volume":"10","author":"G Blinowski","year":"2022","unstructured":"Blinowski, G., Ojdowska, A., Przyby\u0142ek, A.: Monolithic vs. microservice architecture: a performance and scalability evaluation. IEEE Access 10, 20357\u201320374 (2022)","journal-title":"IEEE Access"},{"issue":"17","key":"5092_CR7","doi-asserted-by":"publisher","first-page":"7856","DOI":"10.3390\/app11177856","volume":"11","author":"V Bushong","year":"2021","unstructured":"Bushong, V., Abdelfattah, A.S., Maruf, A.A., Das, D., Lehman, A., Jaroszewski, E., et al.: On microservice analysis and architecture evolution: a systematic mapping study. Appl. Sci. 11(17), 7856 (2021)","journal-title":"Appl. Sci."},{"key":"5092_CR8","doi-asserted-by":"publisher","first-page":"1225","DOI":"10.1016\/j.procs.2021.01.320","volume":"181","author":"N Mateus-Coelho","year":"2021","unstructured":"Mateus-Coelho, N., Cruz-Cunha, M., Ferreira, L.G.: Security in microservices architectures. Proc. Comput. Sci. 181, 1225\u20131236 (2021)","journal-title":"Proc. Comput. Sci."},{"issue":"204","key":"5092_CR9","first-page":"800","volume":"800","author":"R Chandramouli","year":"2019","unstructured":"Chandramouli, R.: Microservices-based application systems. NIST Spec. Publ. 800(204), 800\u2013204 (2019)","journal-title":"NIST Spec. Publ."},{"key":"5092_CR10","doi-asserted-by":"crossref","unstructured":"Montesi, F., Weber, J.: From the decorator pattern to circuit breakers in microservices. In: Proceedings of the 33rd Annual ACM Symposium on Applied Computing. p. 1733\u20131735 (2018)","DOI":"10.1145\/3167132.3167427"},{"key":"5092_CR11","unstructured":"Jayalath, R.K., Ahmad, H., Goel, D., Syed, M.S., Ullah, F.: Microservice vulnerability analysis: a literature review with empirical insights. IEEE Access (2024)"},{"key":"5092_CR12","doi-asserted-by":"crossref","unstructured":"Dragoni, N., Giallorenzo, S., Lafuente, A.L., Mazzara, M., Montesi, F., Mustafin, R et\u00a0al.: Microservices: yesterday, today, and tomorrow. Present and ulterior software engineering p. 195\u2013216 (2017)","DOI":"10.1007\/978-3-319-67425-4_12"},{"key":"5092_CR13","doi-asserted-by":"crossref","unstructured":"Aksu, M.U., Dilek, M.H., Tatl\u0131, E\u0130., Bicakci, K., Dirik, H.I., Demirezen, M.U., et\u00a0al.: A quantitative CVSS-based cyber security risk assessment methodology for IT systems. In: 2017 International Carnahan Conference on Security Technology (ICCST) IEEE. p. 1\u20138 (2017)","DOI":"10.1109\/CCST.2017.8167819"},{"key":"5092_CR14","doi-asserted-by":"crossref","unstructured":"Ahmad, H., Ullah, F., Jafri, R.: A Survey on Immersive Cyber Situational Awareness Systems. arXiv preprint arXiv:2408.07456 (2024)","DOI":"10.3390\/jcp5020033"},{"key":"5092_CR15","doi-asserted-by":"crossref","unstructured":"He, X., Yang, X.: Authentication and authorization of end user in microservice architecture. In: Journal of Physics: Conference Series, vol. 910 IOP Publishing; p. 012060 (2017)","DOI":"10.1088\/1742-6596\/910\/1\/012060"},{"key":"5092_CR16","doi-asserted-by":"crossref","unstructured":"Torkura, K.A., Sukmana, M.I., Cheng, F., Meinel, C.: Cavas: Neutralizing application and container security vulnerabilities in the cloud native era. In: Security and Privacy in Communication Networks: 14th International Conference, SecureComm 2018, Singapore, Singapore, August 8-10, 2018, Proceedings, Part I Springer; p. 471\u2013490 (2018)","DOI":"10.1007\/978-3-030-01701-9_26"},{"key":"5092_CR17","unstructured":"National Vulnerability\u00a0Database VM; Last Access: Dec 2023. https:\/\/nvd.nist.gov\/vuln-metrics\/cvss#"},{"key":"5092_CR18","unstructured":"National Vulnerability\u00a0Database GI; Last Access: Dec 2023. https:\/\/nvd.nist.gov\/general"},{"key":"5092_CR19","doi-asserted-by":"crossref","unstructured":"Duan, X., Ge, M., Le, T.H.M., Ullah, F., Gao, S., Lu, X., et\u00a0al.: Automated security assessment for the internet of things. In: 2021 IEEE 26th Pacific Rim International Symposium on Dependable Computing (PRDC) IEEE. p. 47\u201356 (2021)","DOI":"10.1109\/PRDC53464.2021.00016"},{"issue":"1 & 2","key":"5092_CR20","doi-asserted-by":"publisher","first-page":"27","DOI":"10.56471\/slujst.v4i.266","volume":"4","author":"HD Abubakar","year":"2022","unstructured":"Abubakar, H.D., Umar, M., Bakale, M.A.: Sentiment classification: review of text vectorization methods: Bag of words, Tf-Idf, Word2vec and Doc2vec. SLU J. Sci. Technol. 4(1 & 2), 27\u201333 (2022)","journal-title":"SLU J. Sci. Technol."},{"key":"5092_CR21","first-page":"81","volume":"12","author":"VV Vegesna","year":"2023","unstructured":"Vegesna, V.V.: Utilising VAPT Technologies (Vulnerability Assessment & Penetration Testing) as a method for actively preventing cyberattacks. Int. J. Manage. Technol. Eng. 12, 81\u201394 (2023)","journal-title":"Int. J. Manage. Technol. Eng."},{"key":"5092_CR22","doi-asserted-by":"crossref","unstructured":"Wolf, T., Debut, L., Sanh, V., Chaumond, J., Delangue, C., Moi, A., et\u00a0al.: Transformers: State-of-the-art natural language processing. In: Proceedings of the 2020 conference on empirical methods in natural language processing: system demonstrations;. p. 38\u201345 (2020)","DOI":"10.18653\/v1\/2020.emnlp-demos.6"},{"key":"5092_CR23","doi-asserted-by":"crossref","unstructured":"Wolf, T., Debut, L., Sanh, V., Chaumond, J., Delangue, C., Moi, A., et\u00a0al.: Huggingface\u2019s transformers: State-of-the-art natural language processing. arXiv preprint arXiv:1910.03771 (2019)","DOI":"10.18653\/v1\/2020.emnlp-demos.6"},{"key":"5092_CR24","unstructured":"package\u00a0of CyberWise\u00a0Predictor R;. https:\/\/github.com\/MajidAbdulsatar\/CyberWise-Predictor"},{"key":"5092_CR25","unstructured":"Model CPD;. https:\/\/github.com\/MajidAbdulsatar\/CyberWise-Predictor-DL-model-finetuner"},{"key":"5092_CR26","doi-asserted-by":"crossref","unstructured":"Shah, S., Mehtre, B.: An automated approach to vulnerability assessment and penetration testing using net-nirikshak 1.0. In: 2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies IEEE. p. 707\u2013712 (2014)","DOI":"10.1109\/ICACCCT.2014.7019182"},{"key":"5092_CR27","doi-asserted-by":"crossref","unstructured":"Blinowski, G.J., Piotrowski, P.: CVE based classification of vulnerable IoT systems. In: Theory and Applications of Dependable Computer Systems: Proceedings of the Fifteenth International Conference on Dependability of Computer Systems DepCoS-RELCOMEX, June 29\u2013July 3, 2020, Brun\u00f3w, Poland 15 Springer. p. 82\u201393 (2020)","DOI":"10.1007\/978-3-030-48256-5_9"},{"key":"5092_CR28","unstructured":"Guo, F., Yu, Y., Chiueh, Tc.: Automated and safe vulnerability assessment. In: 21st Annual Computer Security Applications Conference (ACSAC\u201905) IEEE. p. 10\u2013pp (2005)"},{"key":"5092_CR29","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1016\/j.jnca.2017.01.033","volume":"83","author":"M Ge","year":"2017","unstructured":"Ge, M., Hong, J.B., Guttmann, W., Kim, D.S.: A framework for automating security analysis of the internet of things. J. Netw. Comput. Appl. 83, 12\u201327 (2017)","journal-title":"J. Netw. Comput. Appl."},{"key":"5092_CR30","unstructured":"Sahner, R.A., Trivedi, K., Puliafito, A.: Performance and reliability analysis of computer systems: an example-based approach using the SHARPE software package. Springer Science & Business Media (2012)"},{"key":"5092_CR31","unstructured":"Singh, U.K., Joshi, C.: Quantitative security risk evaluation using CVSS metrics by estimation of frequency and maturity of exploit. In: Proceedings of the World Congress on Engineering and Computer Science, vol.\u00a01; p. 19\u201321 (2016)"},{"key":"5092_CR32","doi-asserted-by":"crossref","unstructured":"Cam, H.: Risk assessment by dynamic representation of vulnerability, exploitation, and impact. In: Cyber Sensing 2015, vol. 9458 SPIE. p. 71\u201379 (2015)","DOI":"10.1117\/12.2177405"},{"issue":"7","key":"5092_CR33","doi-asserted-by":"publisher","first-page":"2555","DOI":"10.3390\/app10072555","volume":"10","author":"H Yang","year":"2020","unstructured":"Yang, H., Park, S., Yim, K., Lee, M.: Better not to use vulnerability\u2019s reference for exploitability prediction. Appl. Sci. 10(7), 2555 (2020)","journal-title":"Appl. Sci."},{"key":"5092_CR34","unstructured":"Edkrantz, M.: Predicting exploit likelihood for cyber vulnerabilities with machine learning (2015)"},{"key":"5092_CR35","doi-asserted-by":"crossref","unstructured":": Bullough, B.L., Yanchenko, A.K., Smith, C.L., Zipkin, J.R.: Predicting exploitation of disclosed software vulnerabilities using open-source data. In: Proceedings of the 3rd ACM on International Workshop on Security and Privacy Analytics; p. 45\u201353 (2017)","DOI":"10.1145\/3041008.3041009"},{"key":"5092_CR36","doi-asserted-by":"crossref","unstructured":"Nowak, M., Walkowski, M., Sujecki, S.: Conversion of CVSS Base Score from 2.0 to 3.1. In: 2021 International Conference on Software, Telecommunications and Computer Networks (SoftCOM) IEEE. p. 1\u20133 (2021)","DOI":"10.23919\/SoftCOM52868.2021.9559092"},{"key":"5092_CR37","doi-asserted-by":"publisher","first-page":"100415","DOI":"10.1016\/j.cosrev.2021.100415","volume":"41","author":"A Hannousse","year":"2021","unstructured":"Hannousse, A., Yahiouche, S.: Securing microservices and microservice architectures: a systematic mapping study. Comput. Sci. Rev. 41, 100415 (2021)","journal-title":"Comput. Sci. Rev."},{"key":"5092_CR38","doi-asserted-by":"publisher","first-page":"52976","DOI":"10.1109\/ACCESS.2019.2911732","volume":"7","author":"S Sultan","year":"2019","unstructured":"Sultan, S., Ahmad, I., Dimitriou, T.: Container security: issues, challenges, and the road ahead. IEEE Access 7, 52976\u201352996 (2019)","journal-title":"IEEE Access"},{"key":"5092_CR39","doi-asserted-by":"crossref","unstructured":"Ibrahim, A., Bozhinoski, S., Pretschner, A.: Attack graph generation for microservice architecture. In: Proceedings of the 34th ACM\/SIGAPP symposium on applied computing. p. 1235\u20131242 (2019)","DOI":"10.1145\/3297280.3297401"},{"key":"5092_CR40","doi-asserted-by":"crossref","unstructured":"Yarygina, T., Bagge, A.H.: Overcoming security challenges in microservice architectures. In: 2018 IEEE Symposium on Service-Oriented System Engineering (SOSE) IEEE. p. 11\u201320 (2018)","DOI":"10.1109\/SOSE.2018.00011"},{"issue":"4","key":"5092_CR41","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3579639","volume":"32","author":"A Rahman","year":"2023","unstructured":"Rahman, A., Shamim, S.I., Bose, D.B., Pandita, R.: Security misconfigurations in open source kubernetes manifests: an empirical study. ACM Trans. Softw. Eng. Methodol. 32(4), 1\u201336 (2023)","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"5092_CR42","doi-asserted-by":"crossref","unstructured":"Budigiri, G., Baumann, C., M\u00fchlberg, J.T., Truyen, E., Joosen, W.: Network policies in kubernetes: Performance evaluation and security analysis. In: 2021 Joint European Conference on Networks and Communications & 6G Summit (EuCNC\/6G Summit) IEEE. p. 407\u2013412 (2021)","DOI":"10.1109\/EuCNC\/6GSummit51104.2021.9482526"},{"key":"5092_CR43","doi-asserted-by":"crossref","unstructured":"Nkomo, P., Coetzee, M.: Software development activities for secure microservices. In: Computational Science and Its Applications\u2013ICCSA 2019: 19th International Conference, Saint Petersburg, Russia, July 1\u20134, 2019, Proceedings, Part V 19 Springer. p. 573\u2013585 (2019)","DOI":"10.1007\/978-3-030-24308-1_46"},{"issue":"22","key":"5092_CR44","doi-asserted-by":"publisher","first-page":"e4436","DOI":"10.1002\/cpe.4436","volume":"31","author":"D Yu","year":"2019","unstructured":"Yu, D., Jin, Y., Zhang, Y., Zheng, X.: A survey on security issues in services communication of Microservices-enabled fog applications. Concurr. Comput. Prac. Exp. 31(22), e4436 (2019)","journal-title":"Concurr. Comput. Prac. Exp."},{"key":"5092_CR45","doi-asserted-by":"crossref","unstructured":"Torkura, K.A., Sukmana, M.I., Meinel, C.: Integrating continuous security assessments in microservices and cloud native applications. In: Proceedings of the10th International Conference on Utility and Cloud Computing. p. 171\u2013180 (2017)","DOI":"10.1145\/3147213.3147229"},{"key":"5092_CR46","unstructured":"Kubernetes, T.: Kubernetes. Kubernetes Retrieved May;24:2019 (2019)"},{"key":"5092_CR47","unstructured":"Sock Shop; Last Access: Nov. (2023). https:\/\/github.com\/microservices-demo\/microservices-demo"},{"key":"5092_CR48","unstructured":"van Hoorn, A., Ferme, V., Schulz, H.: Continuous Performance Testing for Microservices. HPI Future SOC Lab\u2013Proceedings 2018 2023;(151):105"},{"issue":"13","key":"5092_CR49","doi-asserted-by":"publisher","first-page":"7891","DOI":"10.3390\/app13137891","volume":"13","author":"J Nobre","year":"2023","unstructured":"Nobre, J., Pires, E.S., Reis, A.: Anomaly detection in microservice-based systems. Appl. Sci. 13(13), 7891 (2023)","journal-title":"Appl. Sci."},{"key":"5092_CR50","doi-asserted-by":"crossref","unstructured":"Aksu, M., Dilek, M.H., Tatl\u0131, E., Bicakci, K., Dirik, H., Demirezen, M., et\u00a0al.: A quantitative CVSS-based cyber security risk assessment methodology for IT systems; p. 1\u20138 (2017)","DOI":"10.1109\/CCST.2017.8167819"},{"issue":"4","key":"5092_CR51","doi-asserted-by":"publisher","first-page":"1096","DOI":"10.3390\/s18041096","volume":"18","author":"Z Wu","year":"2018","unstructured":"Wu, Z., Guo, Y., Lin, W., Yu, S., Ji, Y.: A weighted deep representation learning model for imbalanced fault diagnosis in cyber-physical systems. Sensors 18(4), 1096 (2018)","journal-title":"Sensors"},{"key":"5092_CR52","doi-asserted-by":"publisher","first-page":"1937","DOI":"10.1007\/s11063-018-09977-1","volume":"50","author":"YS Aurelio","year":"2019","unstructured":"Aurelio, Y.S., De Almeida, G.M., de Castro, C.L., Braga, A.P.: Learning from imbalanced data sets with weighted cross-entropy function. Neural Proc. Lett. 50, 1937\u20131949 (2019)","journal-title":"Neural Proc. Lett."},{"key":"5092_CR53","unstructured":"Tunstall, L., Von\u00a0Werra, L., Wolf, T.: Natural language processing with transformers. O\u2019Reilly Media, Inc. (2022)"},{"key":"5092_CR54","unstructured":"Devlin, J., Chang, M.W., Lee, K., Toutanova, K.: Bert: Pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805 (2018)"},{"key":"5092_CR55","unstructured":"Yang, Z., Dai, Z., Yang, Y., Carbonell, J., Salakhutdinov, R.R., Le, Q.V.: Xlnet: Generalized autoregressive pretraining for language understanding. Advances in neural information processing systems ;32 (2019)"},{"key":"5092_CR56","unstructured":"Liu, Y., Ott, M., Goyal, N., Du, J., Joshi, M., Chen, D., et\u00a0al.: Roberta: A robustly optimized bert pretraining approach. arXiv preprint arXiv:1907.11692 (2019)"},{"key":"5092_CR57","unstructured":"S\u00a0R Peter\u00a0Mell, K.S.: A complete guide to the common vulnerability scoring system; Last Access (2023). https:\/\/www.first.org\/cvss\/v2\/guide"},{"issue":"1","key":"5092_CR58","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1108\/eb026526","volume":"28","author":"Jones K Sparck","year":"1972","unstructured":"Sparck, Jones K.: A statistical interpretation of term specificity and its application in retrieval. J. Doc. 28(1), 11\u201321 (1972)","journal-title":"J. Doc."},{"key":"5092_CR59","unstructured":"Mikolov, T., Sutskever, I., Chen, K., Corrado, G.S., Dean, J.: Distributed representations of words and phrases and their compositionality. Advances in neural information processing systems; 26 (2013)"},{"key":"5092_CR60","doi-asserted-by":"crossref","unstructured":"Yosifova, V., Tasheva, A., Trifonov, R.: Predicting Vulnerability Type in Common Vulnerabilities and Exposures (CVE) Database with Machine Learning Classifiers. In: 2021 12th National Conference with International Participation (ELECTRONICA); . p. 1\u20136 (2021)","DOI":"10.1109\/ELECTRONICA52725.2021.9513723"},{"key":"5092_CR61","unstructured":"NVIDIA, Train With Mixed Precision; Last Access: (Dec 2023). https:\/\/docs.nvidia.com\/deeplearning\/performance\/mixed-precision-training\/index.html"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-024-05092-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-024-05092-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-024-05092-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,19]],"date-time":"2025-11-19T12:24:46Z","timestamp":1763555086000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-024-05092-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,16]]},"references-count":61,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2025,9]]}},"alternative-id":["5092"],"URL":"https:\/\/doi.org\/10.1007\/s10586-024-05092-0","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6,16]]},"assertion":[{"value":"7 August 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 November 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 December 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 June 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 November 2025","order":6,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Update","order":7,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"This article was originally published under the subscription model but it is now published under an Open Access license.","order":8,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no competing interests to disclose.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interests"}}],"article-number":"350"}}