{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T15:26:12Z","timestamp":1773933972306,"version":"3.50.1"},"reference-count":47,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T00:00:00Z","timestamp":1763683200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T00:00:00Z","timestamp":1763683200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2026,2]]},"DOI":"10.1007\/s10586-025-05855-3","type":"journal-article","created":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T18:57:10Z","timestamp":1763751430000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["ABO optimized hybrid Trans-CNN-Bi-GRU approach for intrusion detection in IoT networks: a privacy-preserving solution"],"prefix":"10.1007","volume":"29","author":[{"given":"R. Pavithra","family":"Guru","sequence":"first","affiliation":[]},{"given":"Thomas M.","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Mithileysh","family":"Sathiyanarayanan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,11,21]]},"reference":[{"key":"5855_CR1","doi-asserted-by":"publisher","first-page":"111434","DOI":"10.1016\/j.asoc.2024.111434","volume":"155","author":"YK Saheed","year":"2024","unstructured":"Saheed, Y.K., et al.: Modified genetic algorithm and fine-tuned long short-term memory network for intrusion detection in the internet of things networks with edge capabilities. Applied Soft Computing 155, 111434 (2024). https:\/\/doi.org\/10.1016\/j.asoc.2024.111434. (ISSN 1568-4946)","journal-title":"Applied Soft Computing"},{"issue":"8","key":"5855_CR2","doi-asserted-by":"publisher","first-page":"284","DOI":"10.3390\/fi16080284","volume":"16","author":"SM Tseng","year":"2024","unstructured":"Tseng, S.M., et al.: Multi-class intrusion detection based on transformer for IoT networks using CIC-IoT-2023 dataset. Future Internet 16(8), 284 (2024). https:\/\/doi.org\/10.3390\/fi16080284","journal-title":"Future Internet"},{"key":"5855_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.aei.2024.102685","volume":"62","author":"M Shahin","year":"2024","unstructured":"Shahin, M., et al.: Advancing network security in industrial IoT: a deep dive into AI-enabled intrusion detection systems. Advanced Engineering Informatics 62, 102685 (2024). https:\/\/doi.org\/10.1016\/j.aei.2024.102685","journal-title":"Advanced Engineering Informatics"},{"issue":"1","key":"5855_CR4","doi-asserted-by":"publisher","first-page":"386","DOI":"10.1038\/s41598-024-51154-z","volume":"14","author":"OBJ Rabie","year":"2024","unstructured":"Rabie, O.B.J., et al.: A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models. Scientific Reports 14(1), 386 (2024). https:\/\/doi.org\/10.1038\/s41598-024-51154-z","journal-title":"Scientific Reports"},{"issue":"1","key":"5855_CR5","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1186\/s40537-024-00892-y","volume":"11","author":"J Li","year":"2024","unstructured":"Li, J., et al.: Optimizing IoT intrusion detection system: feature selection versus feature extraction in machine learning. Journal of Big Data 11(1), 36 (2024). https:\/\/doi.org\/10.1186\/s40537-024-00892-y","journal-title":"Journal of Big Data"},{"key":"5855_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2025.100750","volume":"57","author":"M Adil","year":"2025","unstructured":"Adil, M., Farouk, A., Ali, A., Song, H., Jin, Z.: Securing Tomorrow of Next-Generation Technologies with Biometrics, State-of-The-Art Techniques, Open Challenges, and Future Research Directions. Computer Science Review 57, 100750 (2025)","journal-title":"Computer Science Review"},{"key":"5855_CR7","doi-asserted-by":"publisher","first-page":"100395","DOI":"10.1016\/j.array.2025.100395","volume":"26","author":"F Naveed","year":"2025","unstructured":"Naveed, F., Masih, A., Mahmood, J., Ahmed, M., Ali, A., Saddiqa, A., Agbozo, E.: Sustainable AI for plant disease classification using ResNet18 in few-shot learning. Array. 26, 100395 (2025)","journal-title":"Array"},{"issue":"22","key":"5855_CR8","doi-asserted-by":"publisher","first-page":"62159","DOI":"10.1007\/s11042-023-16436-0","volume":"83","author":"C Hazman","year":"2024","unstructured":"Hazman, C., et al.: Toward an intrusion detection model for IoT-based smart environments. Multimedia Tools and Applications 83(22), 62159\u201362180 (2024). https:\/\/doi.org\/10.1007\/s11042-023-16436-0","journal-title":"Multimedia Tools and Applications"},{"key":"5855_CR9","doi-asserted-by":"publisher","first-page":"103598","DOI":"10.1016\/j.cose.2023.103598","volume":"137","author":"J Azimjonov","year":"2024","unstructured":"Azimjonov, J., et al.: Designing accurate lightweight intrusion detection systems for IoT networks using fine-tuned linear SVM and feature selectors. Computers & Security 137, 103598 (2024). https:\/\/doi.org\/10.1016\/j.cose.2023.103598. (ISSN 0167\u20134048)","journal-title":"Computers & Security"},{"issue":"3","key":"5855_CR10","doi-asserted-by":"publisher","first-page":"2673","DOI":"10.1007\/s10586-023-04102-x","volume":"27","author":"AV Hanafi","year":"2024","unstructured":"Hanafi, A.V.: Intrusion detection in Internet of things using improved binary golden jackal optimization algorithm and LSTM. Cluster Computing 27(3), 2673\u20132690 (2024). https:\/\/doi.org\/10.1007\/s10586-023-04102-x","journal-title":"Cluster Computing"},{"issue":"4","key":"5855_CR11","doi-asserted-by":"publisher","first-page":"5459","DOI":"10.1007\/s10586-023-04223-3","volume":"27","author":"M Nanjappan","year":"2024","unstructured":"Nanjappan, M., et al.: DeepLG SecNet: utilizing deep LSTM and GRU with secure network for enhanced intrusion detection in IoT environments. Cluster Computing 27(4), 5459\u20135471 (2024). https:\/\/doi.org\/10.1007\/s10586-023-04223-3","journal-title":"Cluster Computing"},{"key":"5855_CR12","doi-asserted-by":"publisher","first-page":"31505","DOI":"10.1007\/s11042-023-16662-6","volume":"83","author":"V Saravanan","year":"2024","unstructured":"Saravanan, V., et al.: IoT-based blockchain intrusion detection using optimized recurrent neural network. MTA. 83, 31505\u201331526 (2024). https:\/\/doi.org\/10.1007\/s11042-023-16662-6","journal-title":"MTA"},{"issue":"3","key":"5855_CR13","doi-asserted-by":"publisher","first-page":"22287","DOI":"10.48084\/etasr.10287","volume":"15","author":"AA Al-Maari","year":"2025","unstructured":"Al-Maari, A.A., Abdulnabi, M., Nathan, Y., Ali, A., Ali, U., Khan, M.: Optimized Credit Card Fraud Detection Leveraging Ensemble Machine Learning Methods. Engineering, Technology & Applied Science Research 15(3), 22287\u201322294 (2025)","journal-title":"Engineering, Technology & Applied Science Research"},{"key":"5855_CR14","doi-asserted-by":"publisher","first-page":"1545528","DOI":"10.3389\/fmed.2025.1545528","volume":"12","author":"R Ullah","year":"2025","unstructured":"Ullah, R., Sarwar, N., Alatawi, M.N., Alsadhan, A.A., Alwageed, S., Khan, H., M., Ali, A.: Advancing personalized diagnosis and treatment using deep learning architecture. Front. Med. 12, 1545528 (2025)","journal-title":"Front. Med."},{"key":"5855_CR15","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-024-19695-7","author":"Z Cao","year":"2024","unstructured":"Cao, Z., et al.: Using the ToN-IoT dataset to develop a new intrusion detection system for industrial IoT devices. Multimedia Tools and Applications (2024). https:\/\/doi.org\/10.1007\/s11042-024-19695-7","journal-title":"Multimedia Tools and Applications"},{"key":"5855_CR16","doi-asserted-by":"publisher","first-page":"2921","DOI":"10.1007\/s12083-024-01721-y","volume":"17","author":"M Ramesh Kumar","year":"2024","unstructured":"Ramesh Kumar, M., et al.: Securing IoT networks: A robust intrusion detection system leveraging feature selection and LGBM. Peer-to-Peer Networking and Applications 17, 2921\u20132943 (2024). https:\/\/doi.org\/10.1007\/s12083-024-01721-y","journal-title":"Peer-to-Peer Networking and Applications"},{"issue":"13","key":"5855_CR17","doi-asserted-by":"publisher","first-page":"4152","DOI":"10.3390\/s24134152","volume":"24","author":"F Ullah","year":"2024","unstructured":"Ullah, F., et al.: Enhanced network intrusion detection system for internet of things security using multimodal big data representation with transfer learning and game theory. Sensors 24(13), 4152 (2024). https:\/\/doi.org\/10.3390\/s24134152","journal-title":"Sensors"},{"key":"5855_CR18","doi-asserted-by":"publisher","unstructured":"Ahmed, O.: Enhancing intrusion detection in wireless sensor networks through machine learning techniques and context awareness integration.\u00a0International Journal of Mathematics, Statistics, and Computer Science,\u00a02, 244-258\u00a0(2024).\u00a0https:\/\/doi.org\/10.59543\/ijmscs.v2i.10377","DOI":"10.59543\/ijmscs.v2i.10377"},{"issue":"1","key":"5855_CR19","doi-asserted-by":"publisher","first-page":"19776","DOI":"10.48084\/etasr.9148","volume":"15","author":"S Hussain","year":"2025","unstructured":"Hussain, S., Sarwar, N., Ali, A., Khan, H., Din, I., Alqahtani, A.M., Ali, A.: An Enhanced Random Forest (ERF)-based Machine Learning Framework for Resampling, Prediction, and Classification of Mobile Applications using Textual Features. Engineering, Technology & Applied Science Research 15(1), 19776\u201319781 (2025)","journal-title":"Engineering, Technology & Applied Science Research"},{"key":"5855_CR20","doi-asserted-by":"crossref","unstructured":"Adil, M., Farouk, A., Abulkasim, H., Ali, A., Song, H., Jin, Z.: NG-ICPS: Next Generation Industrial-CPS, Security Threats in the Era of Artificial Intelligence, Open Challenges with Future Research Directions. IEEE Internet of Things Journal (2024)","DOI":"10.1109\/JIOT.2024.3486659"},{"key":"5855_CR21","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2023.107132","volume":"127","author":"J Wu","year":"2024","unstructured":"Wu, J., et al.: An intelligent IoT intrusion detection system using HeInit-WGAN and SSO-BNMCNN based multivariate feature analysis. Engineering Applications of Artificial Intelligence 127, 107132 (2024). https:\/\/doi.org\/10.1016\/j.engappai.2023.107132","journal-title":"Engineering Applications of Artificial Intelligence"},{"key":"5855_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2024.111785","volume":"294","author":"K Hassini","year":"2024","unstructured":"Hassini, K., et al.: An end-to-end learning approach for enhancing intrusion detection in Industrial-Internet of Things. Knowledge-Based Systems 294, 111785 (2024). https:\/\/doi.org\/10.1016\/j.knosys.2024.111785","journal-title":"Knowledge-Based Systems"},{"issue":"14","key":"5855_CR23","doi-asserted-by":"publisher","first-page":"25136","DOI":"10.1109\/JIOT.2024.3395629","volume":"11","author":"Y Wu","year":"2024","unstructured":"Wu, Y., et al.: Masinet: Network intrusion detection for iot security based on meta-learning framework. IEEE Internet of Things Journal 11(14), 25136\u201325146 (2024). https:\/\/doi.org\/10.1109\/JIOT.2024.3395629","journal-title":"IEEE Internet of Things Journal"},{"key":"5855_CR24","doi-asserted-by":"publisher","first-page":"30839","DOI":"10.1109\/ACCESS.2024.3369237","volume":"12","author":"LA Maghrabi","year":"2024","unstructured":"Maghrabi, L.A., et al.: Automated network intrusion detection for internet of things: Security enhancements. IEEE Access 12, 30839\u201330851 (2024). https:\/\/doi.org\/10.1109\/ACCESS.2024.3369237","journal-title":"IEEE Access"},{"issue":"1","key":"5855_CR25","doi-asserted-by":"publisher","first-page":"11703","DOI":"10.1038\/s41598-024-62435-y","volume":"14","author":"A Aldaej","year":"2024","unstructured":"Aldaej, A., et al.: Ensemble technique of intrusion detection for IoT-edge platform. Scientific Reports 14(1), 11703 (2024). https:\/\/doi.org\/10.1038\/s41598-024-62435-y","journal-title":"Scientific Reports"},{"key":"5855_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2024.103713","volume":"81","author":"W Li","year":"2024","unstructured":"Li, W., et al.: Designing energy-aware collaborative intrusion detection in IoT networks. Journal of Information Security and Applications 81, 103713 (2024). https:\/\/doi.org\/10.1016\/j.jisa.2024.103713","journal-title":"Journal of Information Security and Applications"},{"issue":"2","key":"5855_CR27","doi-asserted-by":"publisher","first-page":"34","DOI":"10.3390\/computers12020034","volume":"12","author":"A Awajan","year":"2023","unstructured":"Awajan, A., et al.: A novel deep learning-based intrusion detection system for IOT networks. Computers 12(2), 34 (2023). https:\/\/doi.org\/10.3390\/computers12020034","journal-title":"Computers"},{"key":"5855_CR28","doi-asserted-by":"publisher","first-page":"109724","DOI":"10.1016\/j.comnet.2023.109724","volume":"228","author":"R Yang","year":"2023","unstructured":"Yang, R., et al.: Efficient intrusion detection toward IoT networks using cloud\u2013edge collaboration. Computer Networks 228, 109724 (2023). https:\/\/doi.org\/10.1016\/j.comnet.2023.109724. (ISSN 1389\u2009\u2013\u20091286)","journal-title":"Computer Networks"},{"key":"5855_CR29","doi-asserted-by":"publisher","first-page":"121751","DOI":"10.1016\/j.eswa.2023.121751","volume":"238","author":"B Sharma","year":"2024","unstructured":"Sharma, B., et al.: Explainable artificial intelligence for intrusion detection in IoT networks: A deep learning based approach. Expert Systems with Applications 238, 121751 (2024). https:\/\/doi.org\/10.1016\/j.eswa.2023.121751","journal-title":"Expert Systems with Applications"},{"key":"5855_CR30","doi-asserted-by":"publisher","first-page":"100819","DOI":"10.1016\/j.iot.2023.100819","volume":"22","author":"S Fraihat","year":"2023","unstructured":"Fraihat, S., et al.: Intrusion detection system for large-scale IoT NetFlow networks using machine learning with modified Arithmetic Optimization Algorithm. Internet of Things 22, 100819 (2023). https:\/\/doi.org\/10.1016\/j.iot.2023.100819","journal-title":"Internet of Things"},{"key":"5855_CR31","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-024-01776-x","author":"G Indra","year":"2024","unstructured":"Indra, G., et al.: An ensemble learning approach for intrusion detection in IoT-based smart cities. Peer-to-Peer Networking and Applications (2024). https:\/\/doi.org\/10.1007\/s12083-024-01776-x","journal-title":"Peer-to-Peer Networking and Applications"},{"key":"5855_CR32","doi-asserted-by":"publisher","unstructured":"FL-IDPP: A Federated Learning Based Intrusion Detection Approach with Privacy Preservation: Trans. Emerg. Telecommunications Technol., 36(1), e70039. https:\/\/doi.org\/10.1002\/ett.70039","DOI":"10.1002\/ett.70039"},{"key":"5855_CR33","doi-asserted-by":"publisher","unstructured":"Mazid, A., et al.: Enhanced intrusion detection framework for securing IoT network using principal component analysis and CNN. Inf. Secur. J. A Glob. Perspect. 1\u201321 (2024). https:\/\/doi.org\/10.1080\/19393555.2024.2408256","DOI":"10.1080\/19393555.2024.2408256"},{"key":"5855_CR34","unstructured":"https:\/\/www.kaggle.com\/datasets\/azalhowaide\/iot-dataset-for-intrusion-detection-systems-ids accessed on 16th May 2024"},{"issue":"4","key":"5855_CR35","doi-asserted-by":"publisher","first-page":"930","DOI":"10.3390\/electronics12040930","volume":"12","author":"C Wang","year":"2023","unstructured":"Wang, C., et al.: Intrusion detection system based on one-class support vector machine and gaussian mixture model. Electronics 12(4), 930 (2023). https:\/\/doi.org\/10.3390\/electronics12040930","journal-title":"Electronics"},{"key":"5855_CR36","doi-asserted-by":"publisher","unstructured":"Kapil, S., et al.: Network intrusion detection system using random forest and PCA, IJARCCE, ISSN (O) 2278\u2009\u2013\u20091021, ISSN (P) 2319\u20135940, (2022). https:\/\/doi.org\/10.17148\/IJARCCE.2022.116100","DOI":"10.17148\/IJARCCE.2022.116100"},{"issue":"02","key":"5855_CR37","first-page":"22","volume":"12","author":"Y Jadhav","year":"2024","unstructured":"Jadhav, Y., et al.: Network intrusion detection system using decision tree. JNS 12(02), 22\u201333 (2024)","journal-title":"JNS"},{"issue":"2","key":"5855_CR38","doi-asserted-by":"publisher","first-page":"131","DOI":"10.4018\/IJISP.2021040107","volume":"15","author":"R Taguelmimt","year":"2021","unstructured":"Taguelmimt, R., et al.: DS-kNN: An intrusion detection system based on a distance sum-based K-nearest neighbors. International Journal of Information Security and Privacy (IJISP) 15(2), 131\u2013144 (2021). https:\/\/doi.org\/10.4018\/IJISP.2021040107","journal-title":"International Journal of Information Security and Privacy (IJISP)"},{"key":"5855_CR39","doi-asserted-by":"publisher","first-page":"100233","DOI":"10.1016\/j.dajour.2023.100233","volume":"7","author":"M Vishwakarma","year":"2023","unstructured":"Vishwakarma, M., et al.: A new two-phase intrusion detection system with Na\u00efve Bayes machine learning for data classification and elliptic envelop method for anomaly detection. Decision Analytics Journal 7, 100233 (2023). https:\/\/doi.org\/10.1016\/j.dajour.2023.100233","journal-title":"Decision Analytics Journal"},{"key":"5855_CR40","doi-asserted-by":"publisher","first-page":"123027","DOI":"10.1016\/j.eswa.2023.123027","volume":"245","author":"R Devendiran","year":"2024","unstructured":"Devendiran, R., et al.: Dugat-LSTM: Deep learning based network intrusion detection system using chaotic optimization strategy. Expert Systems with Applications 245, 123027 (2024). https:\/\/doi.org\/10.1016\/j.eswa.2023.123027","journal-title":"Expert Systems with Applications"},{"key":"5855_CR41","doi-asserted-by":"publisher","unstructured":"Alrayes, F. S., et.: CNN Channel Attention Intrusion Detection System Using NSL-KDD Dataset.\u00a0Computers, Materials & Continua,\u00a079(3), 4318-4347 (2024).\u00a0https:\/\/doi.org\/10.32604\/cmc.2024.050586","DOI":"10.32604\/cmc.2024.050586"},{"key":"5855_CR42","doi-asserted-by":"publisher","unstructured":"Purushotam Naidu, K., et al.: Intrusion Detection System Using Gated Recurrent Neural Network.\u00a0International Journal of Software Computing and Testing,\u00a010(1), 1-8p. (2024).\u00a0https:\/\/doi.org\/10.37628\/IJSCT","DOI":"10.37628\/IJSCT"},{"issue":"1","key":"5855_CR43","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1016\/j.dcan.2023.03.008","volume":"10","author":"F Ullah","year":"2024","unstructured":"Ullah, F., et al.: IDS-INT: Intrusion detection system using transformer-based transfer learning for imbalanced network traffic. Digital Communications and Networks 10(1), 190\u2013204 (2024). https:\/\/doi.org\/10.1016\/j.dcan.2023.03.008","journal-title":"Digital Communications and Networks"},{"issue":"1","key":"5855_CR44","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1016\/j.dcan.2023.03.008","volume":"10","author":"F Ullah","year":"2024","unstructured":"Ullah, F., Ullah, S., Srivastava, G., Lin, J.C.-W.: IDS-INT: Intrusion detection system using transformer-based transfer learning for imbalanced network traffic. Digit. Commun. Netw. 10(1), 190\u2013204 (2024)","journal-title":"Digit. Commun. Netw."},{"issue":"1","key":"5855_CR45","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-024-72049-z","volume":"14","author":"A Qaddos","year":"2024","unstructured":"Qaddos, A., Yaseen, M.U., Al-Shamayleh, A.S., Imran, M., Akhunzada, A., Alharthi, S.Z.: A novel intrusion detection framework for optimizing IoT security. Sci. Rep. 14(1), 21789 (2024)","journal-title":"Sci. Rep."},{"issue":"9","key":"5855_CR46","doi-asserted-by":"publisher","first-page":"2725","DOI":"10.3390\/s25092725","volume":"25","author":"C Zhang","year":"2025","unstructured":"Zhang, C., Li, J., Wang, N., Zhang, D.: Research on intrusion detection method based on transformer and CNN-BiLSTM in internet of things. Sensors. 25(9), 2725 (2025)","journal-title":"Sensors"},{"key":"5855_CR47","doi-asserted-by":"publisher","DOI":"10.1016\/j.eij.2023.100423","volume":"25","author":"M Alazab","year":"2024","unstructured":"Alazab, M., Khurma, R.A., Castillo, P.A., Abu-Salih, B., Mart\u00edn, A., Camacho, D.: An effective networks intrusion detection approach based on hybrid Harris Hawks and multi-layer perceptron. Egyptian Informatics Journal 25, 100423 (2024)","journal-title":"Egyptian Informatics Journal"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05855-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-025-05855-3","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05855-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T13:08:56Z","timestamp":1773925736000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-025-05855-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,21]]},"references-count":47,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,2]]}},"alternative-id":["5855"],"URL":"https:\/\/doi.org\/10.1007\/s10586-025-05855-3","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11,21]]},"assertion":[{"value":"28 March 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 November 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 November 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 November 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}}],"article-number":"50"}}