{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T21:04:53Z","timestamp":1770239093005,"version":"3.49.0"},"reference-count":69,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2024,2,23]],"date-time":"2024-02-23T00:00:00Z","timestamp":1708646400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,2,23]],"date-time":"2024-02-23T00:00:00Z","timestamp":1708646400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61972359"],"award-info":[{"award-number":["61972359"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62002328"],"award-info":[{"award-number":["62002328"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62132014"],"award-info":[{"award-number":["62132014"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Zhejiang Provincial Key Research and Development Program of China","award":["2022C01045"],"award-info":[{"award-number":["2022C01045"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Empir Software Eng"],"published-print":{"date-parts":[[2024,3]]},"DOI":"10.1007\/s10664-024-10447-7","type":"journal-article","created":{"date-parts":[[2024,2,23]],"date-time":"2024-02-23T12:02:51Z","timestamp":1708689771000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["An empirical study of attack-related events in DeFi projects development"],"prefix":"10.1007","volume":"29","author":[{"given":"Dongming","family":"Xiang","sequence":"first","affiliation":[]},{"given":"Yuanchang","family":"Lin","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6058-1586","authenticated-orcid":false,"given":"Liming","family":"Nie","sequence":"additional","affiliation":[]},{"given":"Yaowen","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Zhengzi","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Zuohua","family":"Ding","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,2,23]]},"reference":[{"key":"10447_CR1","unstructured":"ABertoG, MEA (2019) Aave protocol. https:\/\/github.com\/aave\/aave-protocol\/"},{"key":"10447_CR2","doi-asserted-by":"crossref","unstructured":"Ahmadjee S, Mera-G\u2019omez C, Bahsoon R (2021) Assessing smart contracts security technical debts. 2021 IEEE\/ACM International Conference on Technical Debt (TechDebt), pp\u00a06\u201315","DOI":"10.1109\/TechDebt52882.2021.00010"},{"key":"10447_CR3","unstructured":"Alireza Kirill AEA (2019) Tornado.cash. https:\/\/github.com\/tornadocash"},{"issue":"7","key":"10447_CR4","doi-asserted-by":"publisher","first-page":"216","DOI":"10.3390\/fi14070216","volume":"14","author":"YI Alzoubi","year":"2022","unstructured":"Alzoubi YI, Al-Ahmad A, Kahtan H, Jaradat A (2022) Internet of things and blockchain integration: security, privacy, technical, and design challenges. Future Internet 14(7):216","journal-title":"Future Internet"},{"key":"10447_CR5","doi-asserted-by":"crossref","unstructured":"Barbereau T, Smethurst R, Papageorgiou O, Rieger A, Fridgen G (2022) Defi, not so decentralized: the measured distribution of voting rights","DOI":"10.24251\/HICSS.2022.734"},{"key":"10447_CR6","unstructured":"Berg JA, Fritsch R, Heimbach L, Wattenhofer R (2022) An empirical study of market inefficiencies in uniswap and sushiswap. arXiv:2203.07774"},{"key":"10447_CR7","doi-asserted-by":"crossref","unstructured":"Carapella F, Dumas E, Gerszten J, Swem N, Wall L (2022) Decentralized finance (defi): transformative potential & associated risks","DOI":"10.17016\/FEDS.2022.057"},{"key":"10447_CR8","doi-asserted-by":"crossref","unstructured":"Carter N, Jeng L (2021) Defi protocol risks: the paradox of defi. Regtech, suptech and beyond: innovation and technology in financial services\u201d riskbooks\u2013forthcoming Q 3","DOI":"10.2139\/ssrn.3866699"},{"key":"10447_CR9","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1109\/TSE.2020.2989002","volume":"48","author":"J Chen","year":"2019","unstructured":"Chen J, Xia X, Lo D, Grundy J, Luo X, Chen T (2019) Defining smart contract defects on ethereum. IEEE Trans Softw Eng 48:327\u2013345","journal-title":"IEEE Trans Softw Eng"},{"key":"10447_CR10","unstructured":"DeFiLlama (2022) Defillama. https:\/\/defillama.com\/"},{"key":"10447_CR11","unstructured":"Ellis S, Juels A, Nazarov S (2017) Chainlink: a decentralized oracle network. Retrieved March 11, 2018"},{"key":"10447_CR12","unstructured":"Ethereum (2023) Decentralized finance (defi). https:\/\/ethereum.org\/en\/defi\/ (2023)"},{"key":"10447_CR13","doi-asserted-by":"crossref","unstructured":"Gao J, Liu H, Liu C, Li Q, Guan Z, Chen Z (2019) Easyflow: keep ethereum away from overflow. In: 2019 IEEE\/ACM 41st international conference on software engineering: companion proceedings (ICSE-Companion), IEEE, pp\u00a023\u201326","DOI":"10.1109\/ICSE-Companion.2019.00029"},{"key":"10447_CR14","doi-asserted-by":"crossref","unstructured":"Han J, Huang S, Zhong Z (2021) Trust in defi: an empirical study of the decentralized exchange. Available at SSRN 3896461","DOI":"10.2139\/ssrn.3896461"},{"key":"10447_CR15","doi-asserted-by":"crossref","unstructured":"He D, Wu R, Li X, Chan S, Guizani M (2023) Detection of vulnerabilities of blockchain smart contracts. IEEE Internet of Things J","DOI":"10.1109\/JIOT.2023.3241544"},{"key":"10447_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10664-021-10017-1","volume":"27","author":"L Hu","year":"2022","unstructured":"Hu L, Wong WE, Kuhn DR, Kacker RN, Li S (2022) Ct-iot: a combinatorial testing-based path selection framework for effective iot testing. Empir Softw Eng 27:1\u201338","journal-title":"Empir Softw Eng"},{"key":"10447_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102343","volume":"108","author":"X Hu","year":"2021","unstructured":"Hu X, Zhuang Y, Lin SW, Zhang F, Kan S, Cao Z (2021) A security type verifier for smart contracts. Comput Secur 108:102343","journal-title":"Comput Secur"},{"key":"10447_CR18","doi-asserted-by":"crossref","unstructured":"Ivanov N, Li C, Yan Q, Sun Z, Cao Z, Luo X (2023) Security threat mitigation for smart contracts: a comprehensive survey. ACM Comput Surv","DOI":"10.1145\/3593293"},{"key":"10447_CR19","first-page":"46","volume":"26","author":"JR Jensen","year":"2021","unstructured":"Jensen JR, von Wachter V, Ross O (2021) An introduction to decentralized finance (defi). Complex Syst Inf Model Q 26:46\u201354","journal-title":"Complex Syst Inf Model Q"},{"key":"10447_CR20","unstructured":"jflatow hayesgm mea (2019) Compound finance. https:\/\/compound.finance\/"},{"key":"10447_CR21","doi-asserted-by":"crossref","unstructured":"Kaur G, Habibi\u00a0Lashkari A, Sharafaldin I, Habibi\u00a0Lashkari Z (2023) Smart contracts and defi security and threats. In: Understanding cybersecurity management in decentralized finance: challenges, strategies, and trends, Springer, pp\u00a091\u2013111","DOI":"10.1007\/978-3-031-23340-1_5"},{"key":"10447_CR22","unstructured":"Keele S, et\u00a0al. (2007) Guidelines for performing systematic literature reviews in software engineering"},{"key":"10447_CR23","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.967","volume":"8","author":"MQ Khan","year":"2022","unstructured":"Khan MQ, Shahid A, Uddin MI, Roman M, Alharbi A, Alosaimi W, Almalki J, Alshahrani SM (2022) Impact analysis of keyword extraction using contextual word embedding. PeerJ Comput Sci 8:e967","journal-title":"PeerJ Comput Sci"},{"key":"10447_CR24","doi-asserted-by":"crossref","unstructured":"Krupa T, Ries M, Kotuliak I, Bencel R et\u00a0al (2021) Security issues of smart contracts in ethereum platforms. In: 2021 28th Conference of Open Innovations Association (FRUCT), IEEE, pp\u00a0208\u2013214","DOI":"10.23919\/FRUCT50888.2021.9347617"},{"key":"10447_CR25","doi-asserted-by":"crossref","unstructured":"Li W, Bu J, Li X, Chen X (2022) Security analysis of defi: vulnerabilities, attacks and advances. arXiv:2205.09524","DOI":"10.1109\/Blockchain55522.2022.00075"},{"key":"10447_CR26","doi-asserted-by":"crossref","unstructured":"Li W, Bu J, Li X, Peng H, Niu Y, Chen X (2022) A survey of defi security: challenges and opportunities. arXiv:2206.11821","DOI":"10.1016\/j.jksuci.2022.10.028"},{"key":"10447_CR27","doi-asserted-by":"publisher","unstructured":"Lin Y (2023) DeFi development process. https:\/\/doi.org\/10.57760\/sciencedb.07518","DOI":"10.57760\/sciencedb.07518"},{"key":"10447_CR28","doi-asserted-by":"crossref","unstructured":"Liu B, Szalachowski P, Zhou J (2021) A first look into defi oracles. In: 2021 IEEE international conference on decentralized applications and infrastructures (DAPPS), IEEE, pp\u00a039\u201348","DOI":"10.1109\/DAPPS52256.2021.00010"},{"key":"10447_CR29","unstructured":"MaartenGr shengbo-ma mea (2020) Keybert. https:\/\/github.com\/MaartenGr\/keyBERT"},{"key":"10447_CR30","doi-asserted-by":"crossref","unstructured":"Maouchi Y, Charfeddine L, El Montasser G (2022) Understanding digital bubbles amidst the covid-19 pandemic: evidence from defi and nfts. Finance Res Lett 47:102584","DOI":"10.1016\/j.frl.2021.102584"},{"key":"10447_CR31","doi-asserted-by":"crossref","unstructured":"McKight PE, Najab J (2010) Kruskal-wallis test. The corsini encyclopedia of psychology pp\u00a01\u20131","DOI":"10.1002\/9780470479216.corpsy0491"},{"key":"10447_CR32","unstructured":"Meegan X, Koens T (2021) Lessons learned from decentralised finance (defi). ING. URL: https:\/\/new.ingwb.com\/binaries\/content\/assets\/insights\/themes\/distributed-ledger-technology\/defi_white_paper_v2.0.pdf"},{"key":"10447_CR33","unstructured":"Meister BK, Price HC (2022) Yields: the galapagos syndrome of cryptofinance. arXiv:2202.10265"},{"key":"10447_CR34","unstructured":"MetaTrustLabs (2023) Metascore. https:\/\/alpha.metatrust.io\/score"},{"key":"10447_CR35","unstructured":"Metelski D, Sobieraj J (2022) Valuations of decentralised finance (defi) protocols: a panel data study investigating defi\u2019s key performance indicators"},{"key":"10447_CR36","doi-asserted-by":"crossref","unstructured":"Nath K (2022) Evolution of the internet from web 1.0 to metaverse: the good, the bad and the ugly","DOI":"10.36227\/techrxiv.19743676.v1"},{"key":"10447_CR37","doi-asserted-by":"publisher","first-page":"1864","DOI":"10.1007\/s10664-019-09796-5","volume":"25","author":"GA Oliva","year":"2020","unstructured":"Oliva GA, Hassan AE, Jiang ZM (2020) an exploratory study of smart contracts in the ethereum blockchain platform. Empir Softw Eng 25:1864\u20131904","journal-title":"Empir Softw Eng"},{"issue":"1","key":"10447_CR38","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1016\/j.icte.2019.08.002","volume":"7","author":"O Pal","year":"2021","unstructured":"Pal O, Alam B, Thakur V, Singh S (2021) Key management for blockchain technology. ICT Express 7(1):76\u201380","journal-title":"ICT Express"},{"key":"10447_CR39","unstructured":"PANews (2022) Edg finance attacked incident. https:\/\/www.panewslab.com\/zh\/articledetails\/t3k6b3m6.html"},{"key":"10447_CR40","unstructured":"PeckShield (2018) Peckshield. https:\/\/peckshield.com\/"},{"key":"10447_CR41","unstructured":"Qin K, Zhou L, Afonin Y, Lazzaretti L, Gervais A (2021) Cefi vs. defi\u2013comparing centralized to decentralized finance. arXiv:2106.08157"},{"key":"10447_CR42","doi-asserted-by":"crossref","unstructured":"Qin K, Zhou L, Gamito P, Jovanovic P, Gervais A (2021) An empirical study of defi liquidations: incentives, risks, and instabilities. In: Proceedings of the 21st ACM internet measurement conference, pp\u00a0336\u2013350","DOI":"10.1145\/3487552.3487811"},{"key":"10447_CR43","unstructured":"QuillAudits (2022) Stader nearx attacked incident. https:\/\/medium.com\/quillhash\/decoding-a-830-000-exploit-quillaudits-c70d1ecfd562"},{"key":"10447_CR44","first-page":"230","volume-title":"Euro-Par 2021: parallel processing workshops: Euro-Par 2021 international workshops, Lisbon, Portugal, August 30\u201331, 2021","author":"M Raikwar","year":"2022","unstructured":"Raikwar M, Gligoroski D (2022) Dos attacks on blockchain ecosystem. Euro-Par 2021: parallel processing workshops: Euro-Par 2021 international workshops, Lisbon, Portugal, August 30\u201331, 2021. Springer, Revised Selected Papers, pp 230\u2013242"},{"key":"10447_CR45","doi-asserted-by":"crossref","unstructured":"Said KS, Nie L, Ajibode AA, Zhou X (2020) Gui testing for mobile applications: objectives, approaches and challenges. In: Proceedings of the 12th Asia-Pacific Symposium on Internetware, pp\u00a051\u201360","DOI":"10.1145\/3457913.3457931"},{"key":"10447_CR46","unstructured":"Samreen NF, Alalfi MH (2021) A survey of security vulnerabilities in ethereum smart contracts. arXiv:2105.06974"},{"key":"10447_CR47","unstructured":"SCORECHAIN (2022) curve finance attacked incident. https:\/\/www.scorechain.com\/blog\/curve-finance-dns-hack"},{"key":"10447_CR48","doi-asserted-by":"crossref","unstructured":"Sifra EM (2022) Security vulnerabilities and countermeasures of smart contracts: a survey. In: 2022 IEEE international conference on blockchain (Blockchain), IEEE, pp\u00a0512\u2013515","DOI":"10.1109\/Blockchain55522.2022.00080"},{"key":"10447_CR49","unstructured":"SlowMist (2018) Slow mist. https:\/\/hacked.slowmist.io\/ (2018)"},{"key":"10447_CR50","unstructured":"Solidity (2023) Solidity considerations. https:\/\/docs.soliditylang.org\/en\/v0.8.20\/security-considerations.html"},{"key":"10447_CR51","doi-asserted-by":"crossref","unstructured":"Tolmach P, Li Y, Lin SW, Liu Y (2021) Formal analysis of composable defi protocols. In: International conference on financial cryptography and data security, Springer, pp\u00a0149\u2013161","DOI":"10.1007\/978-3-662-63958-0_13"},{"key":"10447_CR52","doi-asserted-by":"crossref","unstructured":"Torres CF, Sch\u00fctte J, State R (2018) Osiris: hunting for integer bugs in ethereum smart contracts. In: Proceedings of the 34th annual computer security applications conference, pp\u00a0664\u2013676","DOI":"10.1145\/3274694.3274737"},{"key":"10447_CR53","doi-asserted-by":"crossref","unstructured":"Treleaven P, Greenwood A, Pithadia H, Xu J (2022) Web 3.0 tokenization and decentralized finance (defi). Available at SSRN 4037471","DOI":"10.2139\/ssrn.4037471"},{"key":"10447_CR54","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1016\/j.comcom.2021.03.008","volume":"172","author":"AL Vivar","year":"2021","unstructured":"Vivar AL, Orozco ALS, Villalba LJG (2021) A security framework for ethereum smart contracts. Comput Commun 172:119\u2013129","journal-title":"Comput Commun"},{"key":"10447_CR55","doi-asserted-by":"crossref","unstructured":"Wan Z, Xia X, Lo D, Chen J, Luo X, Yang X (2021) Smart contract security: a practitioners\u2019 perspective. In: 2021 IEEE\/ACM 43rd international conference on software engineering (ICSE), IEEE, pp\u00a01410\u20131422","DOI":"10.1109\/ICSE43902.2021.00127"},{"key":"10447_CR56","doi-asserted-by":"crossref","unstructured":"Wang D, Wu S, Lin Z, Wu L, Yuan X, Zhou Y, Wang H, Ren K (2020) Towards understanding flash loan and its applications in defi ecosystem. arXiv:2010.12252","DOI":"10.1145\/3457977.3460301"},{"key":"10447_CR57","first-page":"55","volume-title":"China cyber security annual conference","author":"H Wang","year":"2018","unstructured":"Wang H, Wang Y, Cao Z, Li Z, Xiong G (2018) An overview of blockchain security analysis. China cyber security annual conference. Springer, Singapore, pp 55\u201372"},{"key":"10447_CR58","doi-asserted-by":"crossref","unstructured":"Wang Y, Chen X, Huang Y, Zhu HN, Bian J, Zheng Z (2023) An empirical study on real bug fixes from solidity smart contract projects. J Syst Softw 111787","DOI":"10.1016\/j.jss.2023.111787"},{"key":"10447_CR59","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.107978","volume":"191","author":"Y Wen","year":"2021","unstructured":"Wen Y, Lu F, Liu Y, Huang X (2021) Attacks and countermeasures on blockchains: a survey from layering perspective. Comput Netw 191:107978","journal-title":"Comput Netw"},{"key":"10447_CR60","doi-asserted-by":"crossref","unstructured":"Werner SM, Perez D, Gudgeon L, Klages-Mundt A, Harz D, Knottenbelt WJ (2021) Sok: decentralized finance (defi). arXiv:2101.08778","DOI":"10.1145\/3558535.3559780"},{"key":"10447_CR61","unstructured":"Wu S, Wang D, He J, Zhou Y, Wu L, Yuan X, He Q, Ren K (2021) Defiranger: detecting price manipulation attacks on defi applications. arXiv:2104.15068"},{"key":"10447_CR62","doi-asserted-by":"crossref","unstructured":"Wu T, Shen L, Peng X, Shen B, Li Z (2020) Group activity matching with blockchain backed credible commitment. In: Proceedings of the 12th Asia-pacific symposium on internetware, pp\u00a081\u201390","DOI":"10.1145\/3457913.3457923"},{"key":"10447_CR63","unstructured":"Xu TA, Xu J (2022) A short survey on business models of decentralized finance (defi) protocols. arXiv:2202.07742"},{"key":"10447_CR64","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.IR.8202","author":"D Yaga","year":"2018","unstructured":"Yaga D, Mell P, Roby N, Scarfone K (2018). Blockchain technology overview. https:\/\/doi.org\/10.6028\/NIST.IR.8202","journal-title":"Blockchain technology overview."},{"issue":"4","key":"10447_CR65","first-page":"481","volume":"42","author":"Y Yuan","year":"2016","unstructured":"Yuan Y, Wang FY et al (2016) Blockchain: the state of the art and future trends. Acta Autom Sin 42(4):481\u2013494","journal-title":"Acta Autom Sin"},{"key":"10447_CR66","doi-asserted-by":"crossref","unstructured":"Zhang H, Merino LH, Estrada-Galinanes V, Ford B (2022) Flash freezing flash boys: countering blockchain front-running. In: 2022 IEEE 42nd international conference on distributed computing systems workshops (ICDCSW), IEEE, pp\u00a090\u201395","DOI":"10.1109\/ICDCSW56584.2022.00026"},{"key":"10447_CR67","doi-asserted-by":"crossref","unstructured":"Zhao Y, Kang X, Li T, Chu CK, Wang H (2022) Towards trustworthy defi oracles: past, present and future. arXiv:2201.02358","DOI":"10.1109\/ACCESS.2022.3179374"},{"issue":"4","key":"10447_CR68","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1504\/IJWGS.2018.10016848","volume":"14","author":"Z Zheng","year":"2018","unstructured":"Zheng Z, Xie S, Dai H, Chen X, Wang H (2018) Blockchain challenges and opportunities: a survey. Int J Web Grid Serv 14(4):352\u2013375. https:\/\/doi.org\/10.1504\/IJWGS.2018.10016848","journal-title":"Int J Web Grid Serv"},{"key":"10447_CR69","doi-asserted-by":"crossref","unstructured":"Zhou L, Xiong X, Ernstberger J, Chaliasos S, Wang Z, Wang Y, Qin K, Wattenhofer R, Song D, Gervais A (2023) Sok: decentralized finance (defi) attacks. In: 2023 IEEE symposium on security and privacy (SP), IEEE, pp\u00a02444\u20132461","DOI":"10.1109\/SP46215.2023.10179435"}],"container-title":["Empirical Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-024-10447-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10664-024-10447-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-024-10447-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,23]],"date-time":"2024-03-23T02:21:38Z","timestamp":1711160498000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10664-024-10447-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2,23]]},"references-count":69,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2024,3]]}},"alternative-id":["10447"],"URL":"https:\/\/doi.org\/10.1007\/s10664-024-10447-7","relation":{},"ISSN":["1382-3256","1573-7616"],"issn-type":[{"value":"1382-3256","type":"print"},{"value":"1573-7616","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,2,23]]},"assertion":[{"value":"17 January 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 February 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"49"}}