{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T17:36:38Z","timestamp":1774719398977,"version":"3.50.1"},"reference-count":58,"publisher":"Springer Science and Business Media LLC","issue":"16","license":[{"start":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T00:00:00Z","timestamp":1760659200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T00:00:00Z","timestamp":1760659200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.1007\/s10586-025-05700-7","type":"journal-article","created":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T16:04:47Z","timestamp":1760717087000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A multi-agent-based DDoS detection and defense system design with federated learning and blockchain in public cloud network environment"],"prefix":"10.1007","volume":"28","author":[{"given":"Hakan","family":"Aydin","sequence":"first","affiliation":[]},{"given":"Muhammed Ali","family":"Aydin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,17]]},"reference":[{"key":"5700_CR1","unstructured":"NIST: National Institute of Standards and Technology. The NIST DefShurmaninition of Cloud Computing (NIST Special Publication 800\u2013\u2009145). (2011). https:\/\/nvlpubs.nist.gov\/nistpubs\/Legacy\/SP\/nistspecialpublication800-145.pdf"},{"key":"5700_CR2","doi-asserted-by":"crossref","unstructured":"Buyya, R., Broberg, J., Goscinski, A.M. (eds.): Cloud computing: Principles and paradigms. Wiley (2010)","DOI":"10.1002\/9780470940105"},{"key":"5700_CR3","volume-title":"Network security essentials: applications and standards","author":"W Stallings","year":"2016","unstructured":"Stallings, W.: Network security essentials: applications and standards. Pearson (2016)"},{"key":"5700_CR4","unstructured":"Masolo, C.: Cloudfare detects a record 71 million request-per-second DDoS attack. (2023). https:\/\/blog.cloudflare.com\/cloudflare-mitigates-record-breaking-71-million-request-per-second-ddos-attack\/\/. Accessed: 08 Feb 2025"},{"key":"5700_CR5","doi-asserted-by":"publisher","first-page":"36191","DOI":"10.1109\/ACCESS.2020.2974293","volume":"8","author":"J Li","year":"2020","unstructured":"Li, J., Liu, M., Xue, Z., Fan, X., He, X.: RTVD: A real-time volumetric detection scheme for DDoS in the internet of things. IEEE Access. 8, 36191\u201336201 (2020)","journal-title":"IEEE Access."},{"key":"5700_CR6","unstructured":"Cloudflare: DDoS threat report for 2023 Q2 (2023). https:\/\/blog.cloudflare.com\/ddos-threat-report-2023-q2\/"},{"key":"5700_CR7","unstructured":"Dutta, A., Al-Shaer, E., Chatterjee, S.: Constraints satisfiability driven reinforcement learning for autonomous cyber defense. ArXiv Preprint arXiv: 2104.08994. (2021)"},{"key":"5700_CR8","first-page":"121","volume-title":"International Conference on Artificial General Intelligence","author":"B Fruchart","year":"2020","unstructured":"Fruchart, B., Blanc, B.L.: Cognitive Machinery and Behaviours. In: International Conference on Artificial General Intelligence, pp. 121\u2013130. Springer, Cham (2020)"},{"key":"5700_CR9","doi-asserted-by":"crossref","unstructured":"Boudaoud, K., Labiod, H., Boutaba, R., Guessoum, Z.: Network security management with intelligent agents. In NOMS 2000. 2000 IEEE\/IFIP Network Operations and Management Symposium \u2018The Networked Planet: Management Beyond 2000\u2019 (Cat. No. 00CB37074) (pp. 579\u2013592). IEEE. (2000)","DOI":"10.1109\/NOMS.2000.830415"},{"key":"5700_CR10","doi-asserted-by":"publisher","first-page":"438","DOI":"10.1016\/j.comcom.2019.11.034","volume":"150","author":"S Karapoola","year":"2020","unstructured":"Karapoola, S., Vairam, P.K., Raman, S., Kamakoti, V.: Net-Police: A network patrolling service for effective mitigation of volumetric DDoS attacks. Comput. Commun. 150, 438\u2013454 (2020)","journal-title":"Comput. Commun."},{"issue":"4","key":"5700_CR11","doi-asserted-by":"publisher","first-page":"2235","DOI":"10.1007\/s11277-024-11009-2","volume":"134","author":"H Azzaoui","year":"2024","unstructured":"Azzaoui, H., Boukhamla, A.Z.E., Perazzo, P., Alazab, M., Ravi, V.: A lightweight cooperative intrusion detection system for RPL-based IoT. Wireless Pers. Commun. 134(4), 2235\u20132258 (2024)","journal-title":"Wireless Pers. Commun."},{"key":"5700_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.122544","volume":"241","author":"O Pandithurai","year":"2024","unstructured":"Pandithurai, O., Venkataiah, C., Tiwari, S., Ramanjaneyulu, N.: DDoS attack prediction using a honey Badger optimization algorithm based feature selection and Bi-LSTM in cloud environment. Expert Systems with Applications 241, 122544 (2024)","journal-title":"Expert Systems with Applications"},{"issue":"1","key":"5700_CR13","first-page":"107","volume":"3","author":"E Mosqueira-Rey","year":"2009","unstructured":"Mosqueira-Rey, E., Alonso-Betanzos, A., Guijarro-Berdinas, B., Alonso-Rios, D., Lago-Pineiro, J.: A Snort-based agent for a JADE multi-agent intrusion detection system. Int. J. Intell. Inf. Database Syst. 3(1), 107\u2013121 (2009)","journal-title":"Int. J. Intell. Inf. Database Syst."},{"key":"5700_CR14","doi-asserted-by":"crossref","unstructured":"Katata, F.B., Kadhi, E., N., Ghedira, K.: Distributed agent architecture for intrusion detection based on new metrics. In 2009 Third International Conference on Network and System Security (pp. 321\u2013327). IEEE. (2009)","DOI":"10.1109\/NSS.2009.50"},{"key":"5700_CR15","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1016\/j.neucom.2011.07.031","volume":"88","author":"CM Ou","year":"2012","unstructured":"Ou, C.M.: Host-based intrusion detection systems adapted from agent-based artificial immune systems. Neurocomputing. 88, 78\u201386 (2012)","journal-title":"Neurocomputing"},{"key":"5700_CR16","unstructured":"Guarino, A.: Autonomous intelligent agents in cyber offence. In 2013 5th International Conference on Cyber Conflict (CYCON 2013) (pp. 1\u201312). IEEE. (2013)"},{"issue":"6","key":"5700_CR17","first-page":"1333","volume":"33","author":"Z Balogh","year":"2014","unstructured":"Balogh, Z., Gatial, E., Hluch\u00fd, L., Toegl, R., Pirker, M., Hein, D.: Agent-based cloud resource management for secure cloud infrastructures. Comput. Inform. 33(6), 1333\u20131355 (2014)","journal-title":"Comput. Inform."},{"key":"5700_CR18","unstructured":"Booker, L.B., Musman, S.A.: A model-based, decision-theoretic perspective on automated cyber response. (2020). arXiv preprint arXiv: 2002.08957."},{"key":"5700_CR19","doi-asserted-by":"crossref","unstructured":"Mezghani, S., Ktata, F.B.: A distributed intelligent agent based intrusion detection system using deep learning algorithms. In Proceedings of the 2nd International Conference on Digital Tools & Uses Congress (pp. 1\u20134). (2020)","DOI":"10.1145\/3423603.3424054"},{"key":"5700_CR20","doi-asserted-by":"publisher","first-page":"1200","DOI":"10.1016\/j.promfg.2020.10.168","volume":"51","author":"G Lyu","year":"2020","unstructured":"Lyu, G., Fazlirad, A., Brennan, R.W.: Multi-agent modeling of cyber-physical systems for IEC 61499 based distributed automation. Procedia Manufacturing 51, 1200\u20131206 (2020)","journal-title":"Procedia Manufacturing"},{"issue":"6","key":"5700_CR21","doi-asserted-by":"publisher","first-page":"657","DOI":"10.1007\/s10207-019-00482-7","volume":"19","author":"K Sethi","year":"2020","unstructured":"Sethi, K., Sai Rupesh, E., Kumar, R., Bera, P., Venu Madhav, Y.: A context-aware robust intrusion detection system: A reinforcement learning-based approach. Int. J. Inf. Secur. 19(6), 657\u2013678 (2020)","journal-title":"Int. J. Inf. Secur."},{"key":"5700_CR22","doi-asserted-by":"publisher","first-page":"181560","DOI":"10.1109\/ACCESS.2020.3026260","volume":"8","author":"G Thamilarasu","year":"2020","unstructured":"Thamilarasu, G., Odesile, A., Hoang, A.: An intrusion detection system for internet of medical things. IEEE Access. 8, 181560\u2013181576 (2020)","journal-title":"IEEE Access."},{"issue":"4A","key":"5700_CR23","doi-asserted-by":"publisher","first-page":"655","DOI":"10.34028\/iajit\/17\/4A\/10","volume":"17","author":"MM Shurman","year":"2020","unstructured":"Shurman, M.M., Khrais, R.M., Yateem, A.A.: DoS and DDoS attack detection using deep learning and IDS. The International Arab Journal of Information Technology 17(4A), 655\u2013661 (2020)","journal-title":"The International Arab Journal of Information Technology"},{"key":"5700_CR24","doi-asserted-by":"publisher","first-page":"83765","DOI":"10.1109\/ACCESS.2020.2992044","volume":"8","author":"MP Novaes","year":"2020","unstructured":"Novaes, M.P., Carvalho, L.F., Lloret, J., Proen\u00e7a, M.L.: Long Short-Term memory and fuzzy logic for anomaly detection and mitigation in Software-Defined network environment. IEEE Access 8, 83765\u201383781 (2020)","journal-title":"IEEE Access"},{"key":"5700_CR25","unstructured":"Kumar, K., Behal, S.: Distributed denial of service attack detection using deep learning approaches. In 2021 8th International Conference on Computing for Sustainable Global Development (INDIACom) (pp. 491\u2013495). IEEE. (2021)"},{"key":"5700_CR26","doi-asserted-by":"crossref","unstructured":"Zhang, M., Li, G., Wang, S., Liu, C., Chen, A., Hu, H., Wu, J.: Poseidon: Mitigating volumetric ddos attacks with programmable switches. In the 27th Network and Distributed System Security Symposium (NDSS 2020). (2020)","DOI":"10.14722\/ndss.2020.24007"},{"key":"5700_CR27","unstructured":"Metge, A., Maille, N., Le Blanc, B.: Operators and autonomous intelligent agents: human individual characteristics shape the team\u2019s efficiency. In AICA 2021. (2021)"},{"key":"5700_CR28","unstructured":"Thomson, R., Cranford, A., E. and, Lebiere, C.: Achieving Active Cybersecurity through Agent-Based Cognitive Models for Detection and Defense. (2021)"},{"key":"5700_CR29","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2021.102923","volume":"61","author":"K Sethi","year":"2021","unstructured":"Sethi, K., Madhav, Y.V., Kumar, R., Bera, P.: Attention based multi-agent intrusion detection systems using reinforcement learning. Journal of Information Security and Applications 61, 102923 (2021)","journal-title":"Journal of Information Security and Applications"},{"key":"5700_CR30","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102725","volume":"118","author":"H Ayd\u0131n","year":"2022","unstructured":"Ayd\u0131n, H., Orman, Z., Ayd\u0131n, M.A.: A long short-term memory (LSTM)-based distributed denial of service (DDoS) detection and defense system design in a public cloud network environment. Computers & Security 118, 102725 (2022)","journal-title":"Computers & Security"},{"issue":"8","key":"5700_CR31","doi-asserted-by":"publisher","first-page":"9965","DOI":"10.1007\/s13369-021-06484-9","volume":"47","author":"A Prasad","year":"2022","unstructured":"Prasad, A., Chandra, S.: VMFCVD: An optimized framework to combat volumetric DDoS attacks using machine learning. Arab. J. Sci. Eng. 47(8), 9965\u20139983 (2022)","journal-title":"Arab. J. Sci. Eng."},{"key":"5700_CR32","doi-asserted-by":"crossref","unstructured":"Gaur, V., Kumar, R.: DDoSLSTM: Detection of Distributed Denial of Service Attacks on IoT Devices using LSTM Model. In 2022 International Conference on Communication, Computing and Internet of Things (IC3IoT) (pp. 01\u201307). IEEE. (2022)","DOI":"10.1109\/IC3IOT53935.2022.9767889"},{"key":"5700_CR33","doi-asserted-by":"crossref","unstructured":"Subramanian, M., Vadivel, K.S., Sowmya, R.: Performance Evaluation of Deep Learning Models in Detection of Distributed Denial of Service Attacks. In 2021 5th International Conference on Electronics, Communication and Aerospace Technology (ICECA) (pp. 652\u2013658). IEEE. (2021)","DOI":"10.1109\/ICECA52323.2021.9676091"},{"key":"5700_CR34","doi-asserted-by":"crossref","unstructured":"Sinthuja, M., Suthendran, K.: DDoS Attack Detection using Enhanced Long-Short Term Memory with Hybrid Machine Learning Algorithms. In 2022 3rd International Conference on Smart Electronics and Communication (ICOSEC) (pp. 1213\u20131218). IEEE. (2022)","DOI":"10.1109\/ICOSEC54921.2022.9951976"},{"key":"5700_CR35","volume-title":"An efficient hybrid-dnn for ddos detection and classification in software-defined iiot networks","author":"A Zainudin","year":"2022","unstructured":"Zainudin, A., Ahakonye, L.A.C., Akter, R., Kim, D.S., Lee, J.M.: An efficient hybrid-dnn for ddos detection and classification in software-defined iiot networks. IEEE Internet of Things Journal (2022)"},{"key":"5700_CR36","doi-asserted-by":"crossref","unstructured":"Ahamed, I., Ahamad, F., Palade, V., Ahamed, A.: Neural network-based distributed denial of service (DDoS) attack detection in smart home networks. In 6th Smart Cities Symposium (SCS 2022) (Vol. 2022, pp. 174\u2013179). IET. (2022)","DOI":"10.1049\/icp.2023.0394"},{"issue":"6","key":"5700_CR37","doi-asserted-by":"publisher","DOI":"10.3390\/s23063333","volume":"23","author":"R Abu Bakar","year":"2023","unstructured":"Abu Bakar, R., Huang, X., Javed, M.S., Hussain, S., Majeed, M.F.: An intelligent Agent-Based detection system for DDoS attacks using automatic feature extraction and selection. Sensors 23(6), 3333 (2023)","journal-title":"Sensors"},{"key":"5700_CR38","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2023.108961","volume":"111","author":"H Ayd\u0131n","year":"2023","unstructured":"Ayd\u0131n, H., Ayd\u0131n, G.Z.G., Sertba\u015f, A., Ayd\u0131n, M.A.: Internet of things security: A multi-agent-based defense system design. Computers and Electrical Engineering 111, 108961 (2023)","journal-title":"Computers and Electrical Engineering"},{"key":"5700_CR39","doi-asserted-by":"crossref","unstructured":"Mell, P., Grance, T.: The NIST definition of cloud computing. (2011)","DOI":"10.6028\/NIST.SP.800-145"},{"key":"5700_CR40","first-page":"224","volume":"321","author":"G Boss","year":"2007","unstructured":"Boss, G., Malladi, P., Quan, D., Legregni, L., Hall, H.: Cloud computing. IBM White Paper. 321, 224\u2013231 (2007)","journal-title":"IBM White Paper"},{"issue":"1","key":"5700_CR41","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.jnca.2012.09.004","volume":"36","author":"HJ Liao","year":"2013","unstructured":"Liao, H.J., Lin, C.H.R., Lin, Y.C., Tung, K.Y.: Intrusion detection system: A comprehensive review. Journal of Network and Computer Applications 36(1), 16\u201324 (2013)","journal-title":"Journal of Network and Computer Applications"},{"key":"5700_CR42","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1016\/j.comnet.2015.02.026","volume":"81","author":"B Wang","year":"2015","unstructured":"Wang, B., Zheng, Y., Lou, W., Hou, Y.T.: DDoS attack protection in the era of cloud computing and software-defined networking. Comput. Netw. 81, 308\u2013319 (2015)","journal-title":"Comput. Netw."},{"key":"5700_CR43","volume-title":"The Department of Defense and the power of cloud computing: Weighing acceptable cost versus acceptable risk","author":"SC Dudash","year":"2016","unstructured":"Dudash, S.C.: The Department of Defense and the power of cloud computing: Weighing acceptable cost versus acceptable risk. Air Command and Staff College Maxwell AFB United States (2016)"},{"key":"5700_CR44","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1016\/j.jnca.2016.11.027","volume":"79","author":"A Singh","year":"2017","unstructured":"Singh, A., Chatterjee, K.: Cloud security issues and challenges: A survey. J. Netw. Comput. Appl. 79, 88\u2013115 (2017)","journal-title":"J. Netw. Comput. Appl."},{"key":"5700_CR45","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1007\/978-1-4842-8236-6_2","volume-title":"Cloud Attack Vectors","author":"MJ Haber","year":"2022","unstructured":"Haber, M.J., Chappell, B., Hills, C.: Cloud computing. In: Cloud Attack Vectors, pp. 9\u201325. Apress, Berkeley, CA (2022)"},{"key":"5700_CR46","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1016\/j.comcom.2017.03.010","volume":"107","author":"G Somani","year":"2017","unstructured":"Somani, G., Gaur, M.S., Sanghi, D., Conti, M., Buyya, R.: DDoS attacks in cloud computing: Issues, taxonomy, and future directions. Computer Communications 107, 30\u201348 (2017)","journal-title":"Computer Communications"},{"key":"5700_CR47","unstructured":"Cisco Annual Internet Report, 2018\u20132023:\u00a0https:\/\/www.cisco.com\/c\/en\/us\/solutions\/collateral\/executive-perspectives\/annual-internet-report\/white-paper-c11-741490.html\u00a0"},{"key":"5700_CR48","doi-asserted-by":"crossref","unstructured":"Jansen, W., Grance, T.: Guidelines on security and privacy in public cloud computing. (2011)","DOI":"10.6028\/NIST.SP.800-144"},{"key":"5700_CR49","volume-title":"Cloud computing for dummies","author":"JS Hurwitz","year":"2020","unstructured":"Hurwitz, J.S., Kirsch, D.: Cloud computing for dummies. Wiley (2020)"},{"key":"5700_CR50","doi-asserted-by":"crossref","unstructured":"Zhou, M., Zhang, R., Xie, W., Qian, W., Zhou, A.: Security and privacy in cloud computing: A survey. In 2010 Sixth International Conference on Semantics, Knowledge and Grids (pp. 105\u2013112). IEEE. (2010)","DOI":"10.1109\/SKG.2010.19"},{"issue":"2","key":"5700_CR51","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/997150.997156","volume":"34","author":"J Mirkovic","year":"2004","unstructured":"Mirkovic, J., Reiher, P.: A taxonomy of DDoS attack and DDoS defense mechanisms. ACM SIGCOMM Computer Communication Review 34(2), 39\u201353 (2004)","journal-title":"ACM SIGCOMM Computer Communication Review"},{"issue":"3","key":"5700_CR52","doi-asserted-by":"publisher","first-page":"1805","DOI":"10.1007\/s11277-023-10848-9","volume":"133","author":"N Aslam","year":"2023","unstructured":"Aslam, N., Srivastava, S., Gore, M.M.: ONOS DDoS defender: A comparative analysis of existing DDoS attack datasets using ensemble approach. Wireless Pers. Commun. 133(3), 1805\u20131827 (2023)","journal-title":"Wireless Pers. Commun."},{"key":"5700_CR53","doi-asserted-by":"crossref","unstructured":"Kott, A., Th\u00e9ron, P., Dra\u0161ar, M., Dushku, E., LeBlanc, B., Losiewicz, P., Rzadca, K.: Autonomous intelligent cyber-defense agent (aica) reference architecture. release 2.0. arXiv preprint arXiv: 1803.10664. (2018)","DOI":"10.1177\/1548512919886163"},{"issue":"10","key":"5700_CR54","doi-asserted-by":"publisher","first-page":"2313","DOI":"10.1140\/epjst\/e2019-900046-x","volume":"228","author":"K Smagulova","year":"2019","unstructured":"Smagulova, K., James, A.P.: A survey on LSTM memristive neural network architectures and applications. The European Physical Journal Special Topics 228(10), 2313\u20132324 (2019)","journal-title":"The European Physical Journal Special Topics"},{"key":"5700_CR55","doi-asserted-by":"crossref","unstructured":"Mohawesh, R., Maqsood, S., Jararweh, Y., Salameh, H.B.: Federated Learning Support for Cybersecurity: Fundamentals, Applications, and Opportunities. In 2023 International Conference on Intelligent Computing, Communication, Networking and Services (ICCNS) (pp. 50\u201356). IEEE. (2023)","DOI":"10.1109\/ICCNS58795.2023.10193279"},{"key":"5700_CR56","first-page":"33","volume":"90","author":"PR Norvig","year":"2002","unstructured":"Norvig, P.R., Intelligence, S.A., Rani, M., Nayak, R., Vyas, O.P.: An ontology-based adaptive personalized e-learning system, assisted by software agents on cloud storage. Knowledge-Based Systems 90, 33\u201348 (2002)","journal-title":"Knowledge-Based Systems"},{"key":"5700_CR57","unstructured":"Canadian Institute for Cybersecurity: DDoS evaluation dataset (CICDDoS 2019). [Online]. (2019). Available: https:\/\/www.unb.ca\/cic\/datasets\/ddos-2019.html"},{"issue":"8","key":"5700_CR58","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"S Hochreiter","year":"1997","unstructured":"Hochreiter, S., Schmidhuber, J.: Long short-term memory. Neural Comput. 9(8), 1735\u20131780 (1997)","journal-title":"Neural Comput."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05700-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-025-05700-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05700-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T14:15:11Z","timestamp":1764771311000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-025-05700-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,17]]},"references-count":58,"journal-issue":{"issue":"16","published-print":{"date-parts":[[2025,12]]}},"alternative-id":["5700"],"URL":"https:\/\/doi.org\/10.1007\/s10586-025-05700-7","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,17]]},"assertion":[{"value":"3 March 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 June 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 August 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 October 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}],"article-number":"1018"}}