{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T19:39:41Z","timestamp":1770925181344,"version":"3.50.1"},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T00:00:00Z","timestamp":1770854400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T00:00:00Z","timestamp":1770854400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/100019679","name":"Manisa Celal Bayar University","doi-asserted-by":"crossref","id":[{"id":"10.13039\/100019679","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2026,6]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>Secure computation offloading is challenging because sensitive data can be exposed to malicious users, especially when the risk of data leakage arises during transmission or processing in untrusted edge environments. Therefore, in this paper, we present a novel content-aware data leakage prevention framework that classifies computational tasks into low, medium, and high sensitivity levels. We propose to address the trade-off between energy consumption and privacy under time constraints by integrating digital twin technology for dynamic and real-time network control. Compared with traditional edge computing and IoT environments, digital twin networks provide a virtualized, continuously synchronized representation of physical entities and enables more precise, context-aware decision-making for task offloading and security management. This bidirectional mapping between the physical and virtual worlds allows for proactive risk detection, adaptive privacy control, and optimized resource allocation, which are not achievable in conventional edge or IoT systems. In this regard, we utilize the digital twin\u2019s real-time, synchronized representation of physical entities to design an energy and privacy-aware task scheduling scheme and minimize data leakage risks in digital twin edge networks. To achieve these, we analytically model both energy consumption and task processing delay using the M\/M\/1 queuing model. Furthermore, we propose an energy and privacy-aware genetic algorithm-based task scheduling algorithm designed to minimize energy consumption and latency while maximizing privacy in digital twin edge networks. Under strict latency constraints, numerical results show that while the conventional approach can handle up to 400 tasks, the proposed model scales efficiently to 600 tasks by prioritizing energy efficiency and privacy, and improves scalability by 1.5 times. Here, increasing the number of iterations has a much more positive effect than increasing the number of chromosomes. It achieves at most 84% privacy gain and acceptable 0.197 watts energy consumption in the topology with 0.58 second response time. In addition, the proposed approach offers the ability to further improve processing time and privacy gains through digital twin monitoring.<\/jats:p>","DOI":"10.1007\/s10586-026-05950-z","type":"journal-article","created":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T18:59:42Z","timestamp":1770922782000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Secure computation offloading for data leakage prevention in digital twin edge networks"],"prefix":"10.1007","volume":"29","author":[{"given":"M\u00fcge","family":"Erel-\u00d6z\u00e7evik","sequence":"first","affiliation":[]},{"given":"Elif","family":"Bozkaya-Aras","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,12]]},"reference":[{"key":"5950_CR1","doi-asserted-by":"publisher","unstructured":"Bozkaya-Aras, E., Erel-\u00d6z\u00e7evik, M.: Markov chain-based data privacy prioritizing for task scheduling in digital twin edge networks. In: 2024 6th International Conference on Blockchain Computing and Applications (BCCA), pp. 236\u2013243 (2024). https:\/\/doi.org\/10.1109\/BCCA62388.2024.10844415","DOI":"10.1109\/BCCA62388.2024.10844415"},{"key":"5950_CR2","doi-asserted-by":"publisher","unstructured":"Bozkaya, E., Bilen, T., Erel-\u00d6z\u00e7evik, M., \u00d6z\u00e7evik, Y.: Energy-aware task scheduling for digital twin edge networks in 6g. In: 2023 International Conference on Smart Applications, Communications and Networking (SmartNets), pp. 1\u20136 (2023). https:\/\/doi.org\/10.1109\/SmartNets58706.2023.10215892","DOI":"10.1109\/SmartNets58706.2023.10215892"},{"key":"5950_CR3","unstructured":"ITU: Security requirements for iot service platform, series x: Data networks, open system communiactions and security, secure applications and services (2) \u2013 internet of things (iot) security. Technical report, Telecommunication Standardization Sector of ITU (January 2022)"},{"key":"5950_CR4","doi-asserted-by":"publisher","unstructured":"Pal, S., Hitchens, M., Rabehaja, T., Mukhopadhyay, S.: Security requirements for the internet of things: A systematic approach. Sensors 20(20) (2020) https:\/\/doi.org\/10.3390\/s20205897","DOI":"10.3390\/s20205897"},{"key":"5950_CR5","doi-asserted-by":"publisher","unstructured":"Tel\u00e7eken, M., Bozkaya-Aras, E.: A trustworthy federated learning model: Client selection for iot edge networks. In: 2024 Innovations in Intelligent Systems and Applications Conference (ASYU), pp. 1\u20136 (2024). https:\/\/doi.org\/10.1109\/ASYU62119.2024.10756968","DOI":"10.1109\/ASYU62119.2024.10756968"},{"key":"5950_CR6","doi-asserted-by":"publisher","unstructured":"Bolat-Ak\u00e7a, B., Bozkaya, E.: Software-defined intrusion detection system for ddos attacks in iot edge networks. In: 2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech), pp. 0672\u20130677 (2023). https:\/\/doi.org\/10.1109\/DASC\/PiCom\/CBDCom\/Cy59711.2023.10361494","DOI":"10.1109\/DASC\/PiCom\/CBDCom\/Cy59711.2023.10361494"},{"key":"5950_CR7","volume-title":"Regulation (eu) 2016\/679 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing directive 95\/46\/ec","author":"GDP Regulation","year":"2016","unstructured":"Regulation, G.D.P.: Regulation (eu) 2016\/679 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing directive 95\/46\/ec. Technical report, EU Council (April (2016)"},{"key":"5950_CR8","unstructured":"Guidelines, D.b.r.: Iso\/iec 27400\/27402 cybersecurity. Technical report, IoT security and privacy (2023)"},{"key":"5950_CR9","doi-asserted-by":"publisher","unstructured":"Zekiye, A., Bankaoglu, O.S., Bouachir, O., \u00d6zkasap, O., Aloqaily, M.: Analysis of blockchain assisted energy sharing algorithms with realistic data across microgrids. In: 2024 6th International Conference on Blockchain Computing and Applications (BCCA), pp. 310\u2013317 (2024). https:\/\/doi.org\/10.1109\/BCCA62388.2024.10844382","DOI":"10.1109\/BCCA62388.2024.10844382"},{"key":"5950_CR10","doi-asserted-by":"publisher","unstructured":"Bolat-Ak\u00e7a, B., Bozkaya-Aras, E.: Digital twin-assisted intelligent anomaly detection system for internet of things. Ad Hoc Networks 158, 103484 (2024) https:\/\/doi.org\/10.1016\/j.adhoc.2024.103484","DOI":"10.1016\/j.adhoc.2024.103484"},{"key":"5950_CR11","doi-asserted-by":"publisher","unstructured":"Bozkaya-Aras, E.: Digital twin-enabled age of information-aware scheduling for industrial iot edge networks. Pervasive and Mobile Computing 112, 102083 (2025) https:\/\/doi.org\/10.1016\/j.pmcj.2025.102083","DOI":"10.1016\/j.pmcj.2025.102083"},{"key":"5950_CR12","doi-asserted-by":"publisher","unstructured":"Bozkaya, E., Erel-\u00d6z\u00e7evik, M., Bilen, T., \u00d6z\u00e7evik, Y.: Proof of evaluation-based energy and delay aware computation offloading for digital twin edge network. Ad Hoc Networks 149, 103254 (2023) https:\/\/doi.org\/10.1016\/j.adhoc.2023.103254","DOI":"10.1016\/j.adhoc.2023.103254"},{"issue":"1","key":"5950_CR13","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1109\/LWC.2018.2845882","volume":"8","author":"J Xu","year":"2019","unstructured":"Xu, J., Yao, J.: Exploiting physical-layer security for multiuser multicarrier computation offloading. IEEE Wireless Communications Letters 8(1), 9\u201312 (2019). https:\/\/doi.org\/10.1109\/LWC.2018.2845882","journal-title":"IEEE Wireless Communications Letters"},{"key":"5950_CR14","doi-asserted-by":"publisher","unstructured":"Bozkaya-Aras, E.: Blockchain-based secure content caching and computation for edge computing. IEEE Access 12, 47619\u201347629 (2024) https:\/\/doi.org\/10.1109\/ACCESS.2024.3383474","DOI":"10.1109\/ACCESS.2024.3383474"},{"key":"5950_CR15","doi-asserted-by":"publisher","unstructured":"Song, Z., Ma, H., Zhang, R., Xu, W., Li, J.: Everything under control: Secure data sharing mechanism for cloud-edge computing. IEEE Transactions on Information Forensics and Security 18, 2234\u20132249 (2023) https:\/\/doi.org\/10.1109\/TIFS.2023.3266164","DOI":"10.1109\/TIFS.2023.3266164"},{"issue":"2","key":"5950_CR16","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1109\/LCOMM.2023.3347218","volume":"28","author":"M Wu","year":"2024","unstructured":"Wu, M., Li, K., Qian, L., Wu, Y., Lee, I.: Secure computation offloading and service caching in mobile edge computing networks. IEEE Commun. Lett. 28(2), 432\u2013436 (2024). https:\/\/doi.org\/10.1109\/LCOMM.2023.3347218","journal-title":"IEEE Commun. Lett."},{"issue":"5","key":"5950_CR17","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1109\/MNET.2025.3526556","volume":"39","author":"SD Okegbile","year":"2025","unstructured":"Okegbile, S.D., Gao, H., Talabi, O., Cai, J., Yi, C., Niyato, D., Shen, X.: Fles: A federated learning-enhanced semantic communication framework for mobile aigc-driven human digital twins. IEEE Network 39(5), 238\u2013246 (2025). https:\/\/doi.org\/10.1109\/MNET.2025.3526556","journal-title":"IEEE Network"},{"issue":"11","key":"5950_CR18","doi-asserted-by":"publisher","first-page":"12221","DOI":"10.1109\/TMC.2025.3582755","volume":"24","author":"R Chen","year":"2025","unstructured":"Chen, R., Yi, C., Zhou, F., Kang, J., Wu, Y., Niyato, D.: Federated digital twin construction via distributed sensing: A game-theoretic online optimization with overlapping coalitions. IEEE Trans. Mob. Comput. 24(11), 12221\u201312238 (2025). https:\/\/doi.org\/10.1109\/TMC.2025.3582755","journal-title":"IEEE Trans. Mob. Comput."},{"issue":"6","key":"5950_CR19","doi-asserted-by":"publisher","first-page":"8234","DOI":"10.1109\/TVT.2023.3237204","volume":"72","author":"Y Li","year":"2023","unstructured":"Li, Y., Zeng, D., Gu, L., Zhu, A., Chen, Q., Yu, S.: Pasto: Enabling secure and efficient task offloading in trustzone-enabled edge clouds. IEEE Trans. Veh. Technol. 72(6), 8234\u20138238 (2023). https:\/\/doi.org\/10.1109\/TVT.2023.3237204","journal-title":"IEEE Trans. Veh. Technol."},{"key":"5950_CR20","doi-asserted-by":"publisher","unstructured":"Roshan, R., Matam, R., Mukherjee, M., Lloret, J., Tripathy, S.: A secure task-offloading framework for cooperative fog computing environment. In: GLOBECOM 2020 - 2020 IEEE Global Communications Conference, pp. 1\u20136 (2020). https:\/\/doi.org\/10.1109\/GLOBECOM42002.2020.9322509","DOI":"10.1109\/GLOBECOM42002.2020.9322509"},{"issue":"5","key":"5950_CR21","doi-asserted-by":"publisher","first-page":"6907","DOI":"10.1109\/TVT.2023.3236327","volume":"72","author":"M Wu","year":"2023","unstructured":"Wu, M., Song, Q., Guo, L., Lee, I.: Energy-efficient secure computation offloading in wireless powered mobile edge computing systems. IEEE Trans. Veh. Technol. 72(5), 6907\u20136912 (2023). https:\/\/doi.org\/10.1109\/TVT.2023.3236327","journal-title":"IEEE Trans. Veh. Technol."},{"key":"5950_CR22","doi-asserted-by":"publisher","unstructured":"Yang, N., Fan, X., Puthal, D., He, X., Nanda, P., Guo, S.: A novel collaborative task offloading scheme for secure and sustainable mobile cloudlet networks. IEEE Access 6, 44175\u201344189 (2018) https:\/\/doi.org\/10.1109\/ACCESS.2018.2853634","DOI":"10.1109\/ACCESS.2018.2853634"},{"issue":"6","key":"5950_CR23","doi-asserted-by":"publisher","first-page":"4054","DOI":"10.1109\/TWC.2020.2979456","volume":"19","author":"X He","year":"2020","unstructured":"He, X., Jin, R., Dai, H.: Physical-layer assisted secure offloading in mobile-edge computing. IEEE Trans. Wireless Commun. 19(6), 4054\u20134066 (2020). https:\/\/doi.org\/10.1109\/TWC.2020.2979456","journal-title":"IEEE Trans. Wireless Commun."},{"issue":"4","key":"5950_CR24","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1109\/MNET.2024.3507157","volume":"39","author":"H Xiang","year":"2025","unstructured":"Xiang, H., Yi, C., Wu, K., Chen, J., Cai, J., Niyato, D., Shen, X.: Realizing immersive communications in human digital twin by edge computing empowered tactile internet: Visions and case study. IEEE Network 39(4), 271\u2013279 (2025). https:\/\/doi.org\/10.1109\/MNET.2024.3507157","journal-title":"IEEE Network"},{"issue":"21","key":"5950_CR25","doi-asserted-by":"publisher","first-page":"34749","DOI":"10.1109\/JIOT.2024.3421918","volume":"11","author":"J Chen","year":"2024","unstructured":"Chen, J., Shi, Y., Yi, C., Du, H., Kang, J., Niyato, D.: Generative-ai-driven human digital twin in iot healthcare: A comprehensive survey. IEEE Internet Things J. 11(21), 34749\u201334773 (2024). https:\/\/doi.org\/10.1109\/JIOT.2024.3421918","journal-title":"IEEE Internet Things J."},{"issue":"2","key":"5950_CR26","doi-asserted-by":"publisher","first-page":"1095","DOI":"10.1109\/COMST.2023.3244674","volume":"25","author":"B Mao","year":"2023","unstructured":"Mao, B., Liu, J., Wu, Y., Kato, N.: Security and privacy on 6g network edge: A survey. IEEE Communications Surveys & Tutorials 25(2), 1095\u20131127 (2023). https:\/\/doi.org\/10.1109\/COMST.2023.3244674","journal-title":"IEEE Communications Surveys & Tutorials"},{"issue":"2","key":"5950_CR27","doi-asserted-by":"publisher","first-page":"1159","DOI":"10.1109\/TNSM.2021.3122147","volume":"19","author":"Z Liao","year":"2022","unstructured":"Liao, Z., Pang, X., Zhang, J., Xiong, B., Wang, J.: Blockchain on security and forensics management in edge computing for iot: A comprehensive survey. IEEE Trans. Netw. Serv. Manage. 19(2), 1159\u20131175 (2022). https:\/\/doi.org\/10.1109\/TNSM.2021.3122147","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"issue":"4","key":"5950_CR28","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1109\/MNET.2023.3326099","volume":"38","author":"Z Lyu","year":"2024","unstructured":"Lyu, Z., Cheng, C., Lv, H., Song, H.: Blockchain based intelligent resource management in distributed digital twins cloud. IEEE Network 38(4), 143\u2013150 (2024). https:\/\/doi.org\/10.1109\/MNET.2023.3326099","journal-title":"IEEE Network"},{"issue":"4","key":"5950_CR29","doi-asserted-by":"publisher","first-page":"4128","DOI":"10.1109\/JIOT.2024.3482870","volume":"12","author":"C Xu","year":"2025","unstructured":"Xu, C., Zhang, P., Xia, X., Kong, L., Zeng, P., Yu, H.: Digital-twin-assisted intelligent secure task offloading and caching in blockchain-based vehicular edge computing networks. IEEE Internet Things J. 12(4), 4128\u20134143 (2025). https:\/\/doi.org\/10.1109\/JIOT.2024.3482870","journal-title":"IEEE Internet Things J."},{"issue":"22","key":"5950_CR30","doi-asserted-by":"publisher","first-page":"36168","DOI":"10.1109\/JIOT.2024.3455089","volume":"11","author":"Y Yigit","year":"2024","unstructured":"Yigit, Y., Maglaras, L.A., Buchanan, W.J., Canberk, B., Shin, H., Duong, T.Q.: Ai-enhanced digital twin framework for cyber-resilient 6g internet of vehicles networks. IEEE Internet Things J. 11(22), 36168\u201336181 (2024). https:\/\/doi.org\/10.1109\/JIOT.2024.3455089","journal-title":"IEEE Internet Things J."},{"key":"5950_CR31","doi-asserted-by":"publisher","unstructured":"Erel-\u00d6z\u00e7evik, M., Bozkaya-Aras, E.: Digital twin-empowered service provisioning framework for cloud-assisted internet of things. In: 2025 IEEE International Conference on Communications Workshops (ICC Workshops), pp. 1092\u20131097 (2025). https:\/\/doi.org\/10.1109\/ICCWorkshops67674.2025.11162421","DOI":"10.1109\/ICCWorkshops67674.2025.11162421"},{"key":"5950_CR32","doi-asserted-by":"publisher","unstructured":"Bozkaya-Aras, E.: Optimizing service migration in iot edge networks: Digital twin-based computation and energy-efficient approach. In: 2025 IEEE Wireless Communications and Networking Conference (WCNC), pp. 1\u20136 (2025). https:\/\/doi.org\/10.1109\/WCNC61545.2025.10978782","DOI":"10.1109\/WCNC61545.2025.10978782"},{"issue":"12","key":"5950_CR33","doi-asserted-by":"publisher","first-page":"12262","DOI":"10.1109\/TMC.2024.3406607","volume":"23","author":"Y Yang","year":"2024","unstructured":"Yang, Y., Shi, Y., Yi, C., Cai, J., Kang, J., Niyato, D., Shen, X.: Dynamic human digital twin deployment at the edge for task execution: A two-timescale accuracy-aware online optimization. IEEE Trans. Mob. Comput. 23(12), 12262\u201312279 (2024). https:\/\/doi.org\/10.1109\/TMC.2024.3406607","journal-title":"IEEE Trans. Mob. Comput."},{"key":"5950_CR34","doi-asserted-by":"publisher","unstructured":"Bozkaya-Aras, E., Onel, T., Eriskin, L., Karatas, M.: Intelligent human activity recognition for healthcare digital twin. Internet of Things 30, 101497 (2025) https:\/\/doi.org\/10.1016\/j.iot.2025.101497","DOI":"10.1016\/j.iot.2025.101497"},{"key":"5950_CR35","doi-asserted-by":"publisher","unstructured":"Bozkaya, E.: A digital twin framework for edge server placement in mobile edge computing. In: 2023 4th International Informatics and Software Engineering Conference (IISEC), pp. 1\u20136 (2023). https:\/\/doi.org\/10.1109\/IISEC59749.2023.10390994","DOI":"10.1109\/IISEC59749.2023.10390994"},{"key":"5950_CR36","doi-asserted-by":"publisher","unstructured":"Bozkaya, E., Canberk, B., Schmid, S.: Digital twin-empowered resource allocation for 6g-enabled massive iot. In: 2023 IEEE International Conference on Communications Workshops (ICC Workshops), pp. 727\u2013732 (2023). https:\/\/doi.org\/10.1109\/ICCWorkshops57953.2023.10283649","DOI":"10.1109\/ICCWorkshops57953.2023.10283649"},{"key":"5950_CR37","doi-asserted-by":"crossref","unstructured":"Bolat-Ak\u00e7a, B., Bozkaya-Aras, E., Canberk, B., Buchanan, B., Schmid, S.: An intelligent digital twin model for attack detection in zero-touch 6g networks. In: 2024 IEEE International Conference on Communications Workshops (ICC Workshops) (2024)","DOI":"10.1109\/ICCWorkshops59551.2024.10615338"},{"key":"5950_CR38","doi-asserted-by":"publisher","DOI":"10.1002\/9781118625651","volume-title":"Fundamentals of Queueing Theory","author":"D Gross","year":"2008","unstructured":"Gross, D., Shortle, J.F., Thompson, J.M., Harris, C.M.: Fundamentals of Queueing Theory, 4th edn. Wiley-Interscience, New York, NY, USA (2008)","edition":"4"},{"issue":"1","key":"5950_CR39","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/JCN.2019.000046","volume":"22","author":"N Kiran","year":"2020","unstructured":"Kiran, N., Pan, C., Wang, S., Yin, C.: Joint resource allocation and computation offloading in mobile edge computing for sdn based wireless networks. Journal of Communications and Networks 22(1), 1\u201311 (2020). https:\/\/doi.org\/10.1109\/JCN.2019.000046","journal-title":"Journal of Communications and Networks"},{"key":"5950_CR40","doi-asserted-by":"publisher","unstructured":"Sabella, D., Nikaein, N., Huang, A., Xhembulla, J., Malnati, G., Scarpina, S.: A hierarchical mec architecture: Experimenting the raven use-case. In: 2018 IEEE 87th Vehicular Technology Conference (VTC Spring), pp. 1\u20135 (2018). https:\/\/doi.org\/10.1109\/VTCSpring.2018.8417826","DOI":"10.1109\/VTCSpring.2018.8417826"},{"key":"5950_CR41","doi-asserted-by":"publisher","unstructured":"Spatharakis, D., Dimolitsas, I., Dechouniotis, D., Papathanail, G., Fotoglou, I., Papadimitriou, P., Papavassiliou, S.: A scalable edge computing architecture enabling smart offloading for location based services. Pervasive and Mobile Computing 67, 101217 (2020) https:\/\/doi.org\/10.1016\/j.pmcj.2020.101217","DOI":"10.1016\/j.pmcj.2020.101217"},{"key":"5950_CR42","doi-asserted-by":"publisher","unstructured":"Bolat-Ak\u00e7a, B., Tel\u00e7eken, N.M., Bozkaya-Aras, E.: Digital twin-enabled federated misbehavior detection model for internet of vehicles networks. In: 2025 IEEE 36th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), pp. 1\u20136. (2025) https:\/\/doi.org\/10.1109\/PIMRC62392.2025.11275116","DOI":"10.1109\/PIMRC62392.2025.11275116"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-026-05950-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-026-05950-z","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-026-05950-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T18:59:44Z","timestamp":1770922784000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-026-05950-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,12]]},"references-count":42,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2026,6]]}},"alternative-id":["5950"],"URL":"https:\/\/doi.org\/10.1007\/s10586-026-05950-z","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,12]]},"assertion":[{"value":"24 April 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 January 2026","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 January 2026","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 February 2026","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics declaration"}}],"article-number":"145"}}