{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,20]],"date-time":"2026-01-20T03:09:29Z","timestamp":1768878569467,"version":"3.49.0"},"reference-count":55,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2022,9,20]],"date-time":"2022-09-20T00:00:00Z","timestamp":1663632000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,9,20]],"date-time":"2022-09-20T00:00:00Z","timestamp":1663632000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61872312"],"award-info":[{"award-number":["61872312"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61972335"],"award-info":[{"award-number":["61972335"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62002309"],"award-info":[{"award-number":["62002309"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Empir Software Eng"],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.1007\/s10664-022-10216-4","type":"journal-article","created":{"date-parts":[[2022,9,20]],"date-time":"2022-09-20T09:04:03Z","timestamp":1663664643000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["SPVF: security property assisted vulnerability fixing via attention-based models"],"prefix":"10.1007","volume":"27","author":[{"given":"Zhou","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Lili","family":"Bo","sequence":"additional","affiliation":[]},{"given":"Xiaoxue","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Xiaobing","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Tao","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Bin","family":"Li","sequence":"additional","affiliation":[]},{"given":"Jiale","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Sicong","family":"Cao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,9,20]]},"reference":[{"key":"10216_CR1","doi-asserted-by":"publisher","unstructured":"Abhinav K, Sharvani V, Dubey A, D\u2019Souza M, Bhardwaj N, Jain S, Arora V (2021) Repairnet: contextual sequence-to-sequence network for automated program repair. In: Roll I, McNamara DS, Sosnovsky SA, Luckin R, Dimitrova V (eds) Artificial intelligence in education - 22nd international conference, AIED 2021, Utrecht, The Netherlands, June 14\u201318, 2021, Proceedings, Part I, Lecture notes in computer science, vol 12748. Springer, pp 3\u201315. https:\/\/doi.org\/10.1007\/978-3-030-78292-4_1","DOI":"10.1007\/978-3-030-78292-4_1"},{"key":"10216_CR2","unstructured":"Bahdanau D, Cho K, Bengio Y (2015) Neural machine translation by jointly learning to align and translate. In: 3rd international conference on learning representations, ICLR 2015, San Diego, CA, USA, May 7\u20139, 2015, Conference Track Proceedings"},{"key":"10216_CR3","doi-asserted-by":"crossref","unstructured":"Bird S, Loper E (2004) NLTK: the natural language toolkit. In: Proceedings of the 42nd annual meeting of the association for computational linguistics, Barcelona, Spain, July 21\u201326, 2004 - Poster and Demonstration. ACL","DOI":"10.3115\/1219044.1219075"},{"issue":"106","key":"10216_CR4","doi-asserted-by":"publisher","first-page":"576","DOI":"10.1016\/j.infsof.2021.106576","volume":"136","author":"S Cao","year":"2021","unstructured":"Cao S, Sun X, Bo L, Wei Y, Li B (2021) BGNN4VD: constructing bidirectional graph neural-network for vulnerability detection. Inf Softw Technol 136(106):576. https:\/\/doi.org\/10.1016\/j.infsof.2021.106576","journal-title":"Inf Softw Technol"},{"key":"10216_CR5","doi-asserted-by":"publisher","unstructured":"Cao S, Sun X, Bo L, Wu R, Li B, Tao C (2022) MVD: memory-related vulnerability detection based on flow-sensitive graph neural networks. In: 44th IEEE\/ACM 44th international conference on software engineering, ICSE 2022, Pittsburgh, PA, USA, May 25\u201327, 2022. IEEE, pp 1456\u20131468. https:\/\/doi.org\/10.1145\/3510003.3510219","DOI":"10.1145\/3510003.3510219"},{"key":"10216_CR6","unstructured":"Chakraborty S, Krishna R, Ding Y, Ray B (2020) Deep learning based vulnerability detection: are we there yet? arxiv:2009.07235"},{"key":"10216_CR7","unstructured":"Chen Z, Kommrusch S, Monperrus M (2019) Using sequence-to-sequence learning for repairing C vulnerabilities. arxiv:1912.02015"},{"key":"10216_CR8","doi-asserted-by":"publisher","unstructured":"Chen Z, Kommrusch S, Monperrus M (2022) Neural transfer learning for repairing security vulnerabilities in c code. IEEE Trans Softw Eng. https:\/\/doi.org\/10.1109\/TSE.2019.2940179. arXiv:2104.08308","DOI":"10.1109\/TSE.2019.2940179"},{"issue":"9","key":"10216_CR9","doi-asserted-by":"publisher","first-page":"1943","DOI":"10.1109\/TSE.2019.2940179","volume":"47","author":"Z Chen","year":"2021","unstructured":"Chen Z, Kommrusch S, Tufano M, Pouchet L, Poshyvanyk D, Monperrus M (2021) Sequencer: sequence-to-sequence learning for end-to-end program repair. IEEE Trans Software Eng 47(9):1943\u20131959. https:\/\/doi.org\/10.1109\/TSE.2019.2940179","journal-title":"IEEE Trans Software Eng"},{"issue":"3","key":"10216_CR10","doi-asserted-by":"publisher","first-page":"38:1","DOI":"10.1145\/3436877","volume":"30","author":"X Cheng","year":"2021","unstructured":"Cheng X, Wang H, Hua J, Xu G, Sui Y (2021) Deepwukong: statically detecting software vulnerabilities using deep graph neural network. ACM Trans Softw Eng Methodol 30(3):38:1\u201338:33","journal-title":"ACM Trans Softw Eng Methodol"},{"key":"10216_CR11","unstructured":"Chi J, Qu Y, Liu T, Zheng Q, Yin H (2020) Seqtrans: automatic vulnerability fix via sequence to sequence learning. arxiv:2010.10805. Accessed May 2021"},{"key":"10216_CR12","doi-asserted-by":"publisher","unstructured":"Cooper N, Bernal-C\u00e1rdenas C, Chaparro O, Moran K, Poshyvanyk D (2021) It takes two to TANGO: combining visual and textual information for detecting duplicate video-based bug reports. In: 43rd IEEE\/ACM international conference on software engineering, ICSE 2021, Madrid, Spain, 22\u201330 May 2021. IEEE, pp 957\u2013969. https:\/\/doi.org\/10.1109\/ICSE43902.2021.00091","DOI":"10.1109\/ICSE43902.2021.00091"},{"key":"10216_CR13","unstructured":"CVE (2021) Common vulnerabilities and exposures. https:\/\/cve.mitre.org\/. Accessed May 2021"},{"key":"10216_CR14","unstructured":"CWE (2021a) Common weakness enumeration. https:\/\/cwe.mitre.org\/. Accessed May 2021"},{"key":"10216_CR15","unstructured":"CWE (2021b) CWE: the category by research concepts. https:\/\/cwe.mitre.org\/data\/definitions\/1000.html. Accessed May 2021"},{"key":"10216_CR16","doi-asserted-by":"publisher","unstructured":"Delamore B, Ko RKL (2015) A global, empirical analysis of the shellshock vulnerability in web applications. In: 2015 IEEE Trustcom\/bigdataSE\/ISPA, Helsinki, Finland, August 20\u201322, 2015, vol 1. IEEE, pp 1129\u20131135. https:\/\/doi.org\/10.1109\/Trustcom.2015.493","DOI":"10.1109\/Trustcom.2015.493"},{"key":"10216_CR17","doi-asserted-by":"publisher","unstructured":"Durumeric Z, Kasten J, Adrian D, Halderman JA, Bailey M, Li F, Weaver N, Amann J, Beekman J, Payer M, Paxson V (2014) The matter of heartbleed. In: Proceedings of the 2014 internet measurement conference, IMC 2014, Vancouver, BC, Canada, November 5\u20137, 2014. ACM, pp 475\u2013488. https:\/\/doi.org\/10.1145\/2663716.2663755","DOI":"10.1145\/2663716.2663755"},{"key":"10216_CR18","unstructured":"Exploit-DB (2021a) Online enrollment management system in php and paypal 1.0. https:\/\/www.exploit-db.com\/exploits\/50557. Accessed Dec 2021"},{"key":"10216_CR19","unstructured":"Exploit-DB (2021b) Exploit database. https:\/\/www.exploit-db.com\/. Accessed Dec 2021"},{"key":"10216_CR20","doi-asserted-by":"crossref","unstructured":"Fan J, Li Y, Wang S, Nguyen TN (2020) A C\/C++ code vulnerability dataset with code changes and CVE summaries. In: MSR \u201920: 17th international conference on mining software repositories, Seoul, Republic of Korea, 29\u201330 June, 2020. ACM, pp 508\u2013512","DOI":"10.1145\/3379597.3387501"},{"key":"10216_CR21","doi-asserted-by":"publisher","unstructured":"Freitag M, Al-Onaizan Y (2017) Beam search strategies for neural machine translation. In: Luong T, Birch A, Neubig G, Finch AM (eds) Proceedings of the first workshop on neural machine translation, NMT@ACL 2017, Vancouver, Canada, August 4, 2017. Association for Computational Linguistics, pp 56\u201360. https:\/\/doi.org\/10.18653\/v1\/w17-3207","DOI":"10.18653\/v1\/w17-3207"},{"key":"10216_CR22","unstructured":"Github (2007) Github: a code hosting platform for version control and collaboration. https:\/\/github.com\/"},{"key":"10216_CR23","unstructured":"Harer J, Ozdemir O, Lazovich T, Reale CP, Russell RL, Kim LY, Chin SP (2018) Learning to repair software vulnerabilities with generative adversarial networks. In: Advances in neural information processing systems 31: annual conference on neural information processing systems 2018, NeurIPS 2018, December 3\u20138, 2018, Montr\u00e9al, canada, pp 7944\u20137954"},{"key":"10216_CR24","doi-asserted-by":"crossref","unstructured":"Huang Z, Lie D, Tan G, Jaeger T (2019) Using safety properties to generate vulnerability patches. In: 2019 IEEE symposium on security and privacy, SP 2019, San Francisco, CA, USA, May 19\u201323, 2019. IEEE, pp 539\u2013554","DOI":"10.1109\/SP.2019.00071"},{"key":"10216_CR25","doi-asserted-by":"publisher","unstructured":"Jiang N, Lutellier T, Tan L (2021) CURE: code-aware neural machine translation for automatic program repair. In: 43rd IEEE\/ACM international conference on software engineering, ICSE 2021, Madrid, Spain, 22\u201330 May 2021. IEEE, pp 1161\u20131173. https:\/\/doi.org\/10.1109\/ICSE43902.2021.00107","DOI":"10.1109\/ICSE43902.2021.00107"},{"key":"10216_CR26","unstructured":"Kingma DP, Ba J (2015) Adam: a method for stochastic optimization. In: 3rd international conference on learning representations, ICLR 2015, San Diego, CA, USA, May 7\u20139, 2015, Conference Track Proceedings. arXiv:1412.6980"},{"issue":"3","key":"10216_CR27","doi-asserted-by":"publisher","first-page":"1980","DOI":"10.1007\/s10664-019-09780-z","volume":"25","author":"A Koyuncu","year":"2020","unstructured":"Koyuncu A, Liu K, Bissyand\u00e9 TF, Kim D, Klein J, Monperrus M, Traon YL (2020) Fixminer: mining relevant fix patterns for automated program repair. Empir Softw Eng 25(3):1980\u20132024. https:\/\/doi.org\/10.1007\/s10664-019-09780-z","journal-title":"Empir Softw Eng"},{"issue":"1","key":"10216_CR28","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1007\/s10515-022-00325-1","volume":"29","author":"B Li","year":"2022","unstructured":"Li B, Wei Y, Sun X, Bo L, Chen D, Tao C (2022) Towards the identification of bug entities and relations in bug reports. Autom Softw Eng 29(1):24. https:\/\/doi.org\/10.1007\/s10515-022-00325-1","journal-title":"Autom Softw Eng"},{"key":"10216_CR29","doi-asserted-by":"crossref","unstructured":"Li F, Paxson V (2017) A large-scale empirical study of security patches. In: Proceedings of the 2017 ACM SIGSAC conference on computer and communications security, CCS 2017, Dallas, TX, USA, October 30\u2013November 03, 2017. ACM, pp 2201\u20132215","DOI":"10.1145\/3133956.3134072"},{"key":"10216_CR30","doi-asserted-by":"publisher","unstructured":"Li Y, Wang S, Tien N (2021) Vulnerability detection with fine-grained interpretations, pp 292\u2013303. https:\/\/doi.org\/10.1145\/3468264.3468597","DOI":"10.1145\/3468264.3468597"},{"key":"10216_CR31","doi-asserted-by":"crossref","unstructured":"Li Z, Zou D, Xu S, Ou X, Jin H, Wang S, Deng Z, Zhong Y (2018) Vuldeepecker: a deep learning-based system for vulnerability detection. arxiv:1801.01681","DOI":"10.14722\/ndss.2018.23158"},{"key":"10216_CR32","doi-asserted-by":"crossref","unstructured":"Lutellier T, Pham HV, Pang L, Li Y, Wei M, Tan L (2020) Coconut: combining context-aware neural translation models using ensemble for program repair. In: ISSTA \u201920: 29th ACM SIGSOFT international symposium on software testing and analysis, virtual event, USA, July 18\u201322, 2020. ACM, pp 101\u2013114","DOI":"10.1145\/3395363.3397369"},{"key":"10216_CR33","doi-asserted-by":"publisher","unstructured":"Mesbah A, Rice A, Johnston E, Glorioso N, Aftandilian E (2019) Deepdelta: learning to repair compilation errors. In: Dumas M, Pfahl D, Apel S, Russo A (eds) Proceedings of the ACM joint meeting on european software engineering conference and symposium on the foundations of software engineering, ESEC\/SIGSOFT FSE 2019, Tallinn, Estonia, August 26\u201330, 2019. ACM, pp 925\u2013936. https:\/\/doi.org\/10.1145\/3338906.3340455","DOI":"10.1145\/3338906.3340455"},{"issue":"1","key":"10216_CR34","first-page":"17:1","volume":"51","author":"M Monperrus","year":"2018","unstructured":"Monperrus M (2018) Automatic software repair: a bibliography. ACM Comput Surv 51(1):17:1\u201317:24","journal-title":"ACM Comput Surv"},{"issue":"110","key":"10216_CR35","doi-asserted-by":"publisher","first-page":"538","DOI":"10.1016\/j.jss.2020.110538","volume":"163","author":"Z Ni","year":"2020","unstructured":"Ni Z, Li B, Sun X, Chen T, Tang B, Shi X (2020) Analyzing bug fix for automatic bug cause classification. J Syst Softw 163(110):538. https:\/\/doi.org\/10.1016\/j.jss.2020.110538","journal-title":"J Syst Softw"},{"key":"10216_CR36","doi-asserted-by":"crossref","unstructured":"Ott M, Edunov S, Baevski A, Fan A, Gross S, Ng N, Grangier D, Auli M (2019) Fairseq: a fast, extensible toolkit for sequence modeling. In: Proceedings of the 2019 conference of the North American Chapter of the association for computational linguistics: human language technologies, NAACL-HLT 2019, Minneapolis, MN, USA, June 2\u20137, 2019, Demonstrations. Association for Computational Linguistics, pp 48\u201353","DOI":"10.18653\/v1\/N19-4009"},{"key":"10216_CR37","unstructured":"Palo Alto Networks (2021) The state of exploit development: 80% of exploits publish faster than cves. https:\/\/unit42.paloaltonetworks.com\/state-of-exploit-development\/. Accessed Dec 2021"},{"key":"10216_CR38","doi-asserted-by":"publisher","unstructured":"Pradel M, Murali V, Qian R, Machalica M, Meijer E, Chandra S (2020) Scaffle: bug localization on millions of files. In: Khurshid S, Pasareanu CS (eds) ISSTA \u201920: 29th ACM SIGSOFT international symposium on software testing and analysis, virtual event, USA, July 18\u201322, 2020. ACM, pp 225\u2013236. https:\/\/doi.org\/10.1145\/3395363.3397356","DOI":"10.1145\/3395363.3397356"},{"key":"10216_CR39","unstructured":"Python (2021) Python program analysis by Microsoft. https:\/\/github.com\/microsoft\/python-program-analysis"},{"key":"10216_CR40","doi-asserted-by":"crossref","unstructured":"See A, Liu PJ, Manning CD (2017) Get to the point: summarization with pointer generator networks. In: Proceedings of the 55th annual meeting of the association for computational linguistics, ACL 2017, Vancouver, Canada, July 30\u2013August 4, Volume 1: Long Papers. Association for Computational Linguistics, pp 1073\u20131083","DOI":"10.18653\/v1\/P17-1099"},{"issue":"1","key":"10216_CR41","doi-asserted-by":"publisher","first-page":"19,102:1","DOI":"10.1007\/s11432-017-9459-5","volume":"62","author":"X Sun","year":"2019","unstructured":"Sun X, Peng X, Zhang K, Liu Y, Cai Y (2019) How security bugs are fixed and what can be improved: an empirical study with mozilla. Sci China Inf Sci 62(1):19,102:1\u201319,102:3. https:\/\/doi.org\/10.1007\/s11432-017-9459-5","journal-title":"Sci China Inf Sci"},{"key":"10216_CR42","doi-asserted-by":"publisher","unstructured":"Tarlow D, Moitra S, Rice A, Chen Z, Manzagol P, Sutton C, Aftandilian E (2020) Learning to fix build errors with graph2diff neural networks. In: ICSE \u201920: 42nd international conference on software engineering, workshops, Seoul, Republic of Korea, 27 June\u201319 July, 2020. ACM, pp 19\u201320. https:\/\/doi.org\/10.1145\/3387940.3392181","DOI":"10.1145\/3387940.3392181"},{"key":"10216_CR43","unstructured":"Transformer (2020) https:\/\/en.wikipedia.org\/wiki\/Transformer_(machine_learning_model). Accessed May 2021"},{"key":"10216_CR44","doi-asserted-by":"publisher","unstructured":"Tufano M, Watson C, Bavota G, Penta MD, White M, Poshyvanyk D (2018) An empirical investigation into learning bug-fixing patches in the wild via neural machine translation. In: Proceedings of the 33rd ACM\/IEEE international conference on automated software engineering, ASE 2018, Montpellier, France, September 3\u20137, 2018. ACM, pp 832\u2013837. https:\/\/doi.org\/10.1145\/3238147.3240732","DOI":"10.1145\/3238147.3240732"},{"key":"10216_CR45","unstructured":"Vaswani A, Shazeer N, Parmar N, Uszkoreit J, Jones L, Gomez AN, Kaiser L, Polosukhin I (2017) Attention is all you need. In: Advances in neural information processing systems 30: annual conference on neural information processing systems 2017, December 4\u20139, 2017, Long Beach, CA, USA, pp 5998\u20136008"},{"key":"10216_CR46","unstructured":"Vudenc (2021) Vulnerability detection with deep learning on a natural codebase. https:\/\/github.com\/LauraWartschinski\/VulnerabilityDetection. Accessed May 2021"},{"key":"10216_CR47","doi-asserted-by":"publisher","unstructured":"Wartschinski L (2019) Vudenc - python corpus for word2vec. https:\/\/doi.org\/10.5281\/ZENODO.3559480. Accessed May 2021","DOI":"10.5281\/ZENODO.3559480"},{"key":"10216_CR48","doi-asserted-by":"publisher","unstructured":"Wei Y, Sun X, Bo L, Cao S, Xia X, Li B (2021) A comprehensive study on security bug characteristics. J Softw Evol Process 33(10). https:\/\/doi.org\/10.1002\/smr.2376","DOI":"10.1002\/smr.2376"},{"key":"10216_CR49","unstructured":"Wikipedia (2021) Scripting language by wikipedia. https:\/\/en.wikipedia.org\/wiki\/Scripting_language. Accessed Dec 2021"},{"key":"10216_CR50","doi-asserted-by":"publisher","unstructured":"Xin Q, Reiss SP (2017) Leveraging syntax-related code for automated program repair. In: Rosu G, Penta MD, Nguyen TN (eds) Proceedings of the 32nd IEEE\/ACM international conference on automated software engineering, ASE 2017, Urbana, IL, USA, October 30\u2013November 03, 2017. IEEE Computer Society, pp 660\u2013670. https:\/\/doi.org\/10.1109\/ASE.2017.8115676","DOI":"10.1109\/ASE.2017.8115676"},{"key":"10216_CR51","unstructured":"Yamaguchi F Joern: a platform for robust analysis of c\/c++ code. https:\/\/github.com\/octopus-platform\/joern\/tree\/master"},{"key":"10216_CR52","doi-asserted-by":"publisher","unstructured":"Yamaguchi F, Golde N, Arp D, Rieck K (2014) Modeling and discovering vulnerabilities with code property graphs. In: 2014 IEEE symposium on security and privacy, SP 2014, Berkeley, CA, USA, May 18\u201321, 2014. IEEE Computer Society, pp 590\u2013604. https:\/\/doi.org\/10.1109\/SP.2014.44","DOI":"10.1109\/SP.2014.44"},{"key":"10216_CR53","unstructured":"Yang S, Wang Y, Chu X (2020) A survey of deep learning techniques for neural machine translation. arxiv:2002.07526"},{"key":"10216_CR54","unstructured":"Yasunaga M, Liang P (2020) Graph-based, self-supervised program repair from diagnostic feedback. In: Proceedings of the 37th international conference on machine learning, ICML 2020, 13\u201318 July 2020, Virtual Event, Proceedings of machine learning research, vol 119, pp 10,799\u201310,808. PMLR"},{"issue":"6","key":"10216_CR55","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1007\/s10664-021-10010-8","volume":"26","author":"C Zhou","year":"2021","unstructured":"Zhou C, Li B, Sun X, Bo L (2021) Why and what happened? Aiding bug comprehension with automated category and causal link identification. Empir Softw Eng 26(6):118. https:\/\/doi.org\/10.1007\/s10664-021-10010-8","journal-title":"Empir Softw Eng"}],"container-title":["Empirical Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-022-10216-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10664-022-10216-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-022-10216-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,21]],"date-time":"2022-11-21T02:12:10Z","timestamp":1668996730000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10664-022-10216-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,20]]},"references-count":55,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2022,12]]}},"alternative-id":["10216"],"URL":"https:\/\/doi.org\/10.1007\/s10664-022-10216-4","relation":{},"ISSN":["1382-3256","1573-7616"],"issn-type":[{"value":"1382-3256","type":"print"},{"value":"1573-7616","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,9,20]]},"assertion":[{"value":"20 July 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 September 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Conflict of Interests"}}],"article-number":"171"}}