{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,25]],"date-time":"2026-04-25T14:23:37Z","timestamp":1777127017682,"version":"3.51.4"},"reference-count":53,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,5,19]],"date-time":"2025-05-19T00:00:00Z","timestamp":1747612800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,5,19]],"date-time":"2025-05-19T00:00:00Z","timestamp":1747612800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"name":"Key Natural Science Foundation of Anhui Wenda University of information Engineering","award":["XZR2024A17"],"award-info":[{"award-number":["XZR2024A17"]}]},{"name":"Key Natural Science Foundation of Anhui Province: Research on Task Offloading Optimization Strategy Based on MEC","award":["2024AH050598"],"award-info":[{"award-number":["2024AH050598"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Discov Computing"],"DOI":"10.1007\/s10791-025-09593-3","type":"journal-article","created":{"date-parts":[[2025,5,19]],"date-time":"2025-05-19T15:21:42Z","timestamp":1747668102000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Multi modal data fusion defense strategy for campus network security: research on Kolmogorov Arnold Networks combined with B-spline function"],"prefix":"10.1007","volume":"28","author":[{"given":"Zhiying","family":"Hu","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Lifeng","family":"Wang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Xiaomei","family":"Ding","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Lihong","family":"Zhao","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Minghe","family":"Xue","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2025,5,19]]},"reference":[{"key":"9593_CR1","first-page":"222","volume":"11","author":"J Yu","year":"2024","unstructured":"Yu J. Design of Bi LSTM algorithm for network security intrusion detection. Microcomput Appl. 2024;11:222\u20135.","journal-title":"Microcomput Appl"},{"key":"9593_CR2","doi-asserted-by":"publisher","first-page":"161","DOI":"10.16184\/j.cnki.comprg.2024.11.048","volume":"11","author":"Y Zhao","year":"2024","unstructured":"Zhao Y, Hu Y. Research and optimization of network intrusion detection methods based on deep learning. Comput Program Skills Maint. 2024;11:161\u20134. https:\/\/doi.org\/10.16184\/j.cnki.comprg.2024.11.048.","journal-title":"Comput Program Skills Maint"},{"key":"9593_CR3","first-page":"28","volume":"11","author":"X Li","year":"2024","unstructured":"Li X. Design and implementation of a deep learning network security intrusion detection system. Inf Syst Eng. 2024;11:28\u201331.","journal-title":"Inf Syst Eng"},{"key":"9593_CR4","doi-asserted-by":"publisher","DOI":"10.14188\/j.1671-8836.2024.0043","author":"H Yang","year":"2024","unstructured":"Yang H, Zhang H, Hu Z, Cheng X. A review of research on network anomaly traffic detection based on deep learning. J Wuhan Univ. 2024. https:\/\/doi.org\/10.14188\/j.1671-8836.2024.0043.","journal-title":"J Wuhan Univ"},{"key":"9593_CR5","doi-asserted-by":"publisher","first-page":"191","DOI":"10.14016\/j.cnki.1001-9227.2024.10.191","volume":"10","author":"B Liu","year":"2024","unstructured":"Liu B. Application of deep learning-based text classification method in automated management of network security information. Autom Instrum. 2024;10:191\u20135. https:\/\/doi.org\/10.14016\/j.cnki.1001-9227.2024.10.191.","journal-title":"Autom Instrum"},{"key":"9593_CR6","first-page":"42","volume":"10","author":"Y Qi","year":"2024","unstructured":"Qi Y. Overview and prospect of network security situation assessment technology based on artificial intelligence. Confid Sci Technol. 2024;10:42\u20138.","journal-title":"Confid Sci Technol"},{"key":"9593_CR7","doi-asserted-by":"publisher","first-page":"195","DOI":"10.16009\/j.cnki.cn13-1295\/tq.2022.10.068","volume":"10","author":"Y Yang","year":"2024","unstructured":"Yang Y. Research on campus network security protection based on cloud computing algorithms. Inf Rec Mater. 2024;10:195\u20137. https:\/\/doi.org\/10.16009\/j.cnki.cn13-1295\/tq.2022.10.068.","journal-title":"Inf Rec Mater"},{"key":"9593_CR8","doi-asserted-by":"publisher","first-page":"267","DOI":"10.19772\/j.cnki.2096-4455.2024.9.079","volume":"09","author":"D Li","year":"2024","unstructured":"Li D. Adaptive network security protection strategy based on deep reinforcement learning. Electron Compon Inf Technol. 2024;09:267\u20139. https:\/\/doi.org\/10.19772\/j.cnki.2096-4455.2024.9.079.","journal-title":"Electron Compon Inf Technol"},{"key":"9593_CR9","first-page":"71","volume":"09","author":"F Yan","year":"2024","unstructured":"Yan F. Research on network security attack and defense confrontation based on deep learning. China Inf. 2024;09:71\u20132.","journal-title":"China Inf"},{"key":"9593_CR10","first-page":"410","volume":"09","author":"J Wen","year":"2024","unstructured":"Wen J. Campus network security risk assessment and predictive analysis based on deep learning. Electron Technol. 2024;09:410\u20132.","journal-title":"Electron Technol"},{"key":"9593_CR11","first-page":"49","volume":"09","author":"Y Chen","year":"2024","unstructured":"Chen Y. Network security technology and applications based on artificial intelligence. Netw Secur Inf. 2024;09:49\u201351.","journal-title":"Netw Secur Inf"},{"key":"9593_CR12","first-page":"41","volume":"09","author":"J Zhou","year":"2024","unstructured":"Zhou J, Xue Y, Yang B, Time, Fang K. Network security knowledge graph entity recognition method based on deep learning BiLSTM CRF model. Netw Secur Technol Appl. 2024;09:41\u20134.","journal-title":"Netw Secur Technol Appl"},{"key":"9593_CR13","doi-asserted-by":"publisher","first-page":"37","DOI":"10.16009\/j.cnki.cn13-1295\/tq.2024.09.056","volume":"09","author":"X Zhang","year":"2024","unstructured":"Zhang X. Research on network security situation awareness technology based on artificial intelligence in the big data environment. Inf Rec Mater. 2024;09:37\u20139. https:\/\/doi.org\/10.16009\/j.cnki.cn13-1295\/tq.2024.09.056.","journal-title":"Inf Rec Mater"},{"key":"9593_CR14","first-page":"135","volume":"16","author":"P Ma","year":"2024","unstructured":"Ma P, Fu J, Yu W, Chen B. Research and implementation of deep learning algorithms in network security situation awareness models. Inf Comput. 2024;16:135\u20138.","journal-title":"Inf Comput"},{"key":"9593_CR15","first-page":"24","volume":"08","author":"Y Liu","year":"2024","unstructured":"Liu Y, Zhai R, Gong K. Research on the application of anomaly detection in network security protection. Postal Telecommun Design Technol. 2024;08:24\u20138.","journal-title":"Postal Telecommun Design Technol"},{"key":"9593_CR16","first-page":"59","volume":"04","author":"Y Wang","year":"2024","unstructured":"Wang Y, Tan Y, Zheng X. Research on active defense strategies for network security based on deep learning. Ind Inf Secur. 2024;04:59\u201366.","journal-title":"Ind Inf Secur"},{"key":"9593_CR17","doi-asserted-by":"publisher","first-page":"22","DOI":"10.19358\/j.issn.2097-1788.2024.08.004","volume":"08","author":"C Zhu","year":"2024","unstructured":"Zhu C, Zhu X, Zhu L, Xu X. Design of ransomware defense architecture for smart campus based on deep learning. Netw Secur Data Gov. 2024;08:22\u20137. https:\/\/doi.org\/10.19358\/j.issn.2097-1788.2024.08.004.","journal-title":"Netw Secur Data Gov"},{"key":"9593_CR18","first-page":"8","volume":"15","author":"J Xu","year":"2024","unstructured":"Xu J. Design of network anomaly traffic detection model under deep learning. Inf Comput. 2024;15:8\u201311.","journal-title":"Inf Comput"},{"key":"9593_CR19","doi-asserted-by":"publisher","DOI":"10.11772\/j.issn.1001-9081.2024020229","author":"M Deng","year":"2024","unstructured":"Deng M, Kan Y, Sun C, Xu H, Fan S, Zhou X. Overview of network intrusion detection systems based on deep learning. Comput App. 2024. https:\/\/doi.org\/10.11772\/j.issn.1001-9081.2024020229.","journal-title":"Comput App"},{"key":"9593_CR20","first-page":"95","volume":"07","author":"J Wang","year":"2024","unstructured":"Wang J, Dong X. Research on threat identification method for rail transit network security based on deep learning. Electron Qual. 2024;07:95\u20139.","journal-title":"Electron Qual"},{"key":"9593_CR21","first-page":"123","volume":"13","author":"D Wang","year":"2024","unstructured":"Wang D. Research on the application of artificial intelligence technology in network security threat detection and defense. Inf Comput. 2024;13:123\u20135.","journal-title":"Inf Comput"},{"key":"9593_CR22","doi-asserted-by":"publisher","first-page":"146","DOI":"10.16009\/j.cnki.cn13-1295\/tq.2024.06.053","volume":"06","author":"Y Zhu","year":"2024","unstructured":"Zhu Y. The application and practice of artificial intelligence technology in campus network security. Inf Rec Mater. 2024;06:146\u20138. https:\/\/doi.org\/10.16009\/j.cnki.cn13-1295\/tq.2024.06.053.","journal-title":"Inf Rec Mater"},{"key":"9593_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/J.COSE.2024.103747","author":"ZT Pritee","year":"2024","unstructured":"Pritee ZT, Anik MH, Alam SB, Jim JR, Kabir MM, Mridha MF. Machine learning and deep learning for user authentication and authorization in cybersecurity: a state-of-the-art review. Comput Secur. 2024. https:\/\/doi.org\/10.1016\/J.COSE.2024.103747.","journal-title":"Comput Secur"},{"key":"9593_CR24","doi-asserted-by":"publisher","DOI":"10.2478\/AMNS.2023.2.00954","author":"C Song","year":"2024","unstructured":"Song C. Model construction and analysis of deep learning-based cybersecurity awareness enhancement for college students. Appl Math Nonlinear Sci. 2024. https:\/\/doi.org\/10.2478\/AMNS.2023.2.00954.","journal-title":"Appl Math Nonlinear Sci"},{"key":"9593_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/J.NEUCOM.2023.126904","author":"A Miranda-Garc\u00eda","year":"2024","unstructured":"Miranda-Garc\u00eda A, Rego AZ, Pastor-L\u00f3pez I, Sanz B, Tellaeche A, Gaviria J, Bringas PG. Deep learning applications on cybersecurity: a practical approach. Neurocomputing. 2024. https:\/\/doi.org\/10.1016\/J.NEUCOM.2023.126904.","journal-title":"Neurocomputing"},{"key":"9593_CR26","doi-asserted-by":"publisher","DOI":"10.1108\/IJICC-12-2022-0312","author":"WC Chanhemo","year":"2023","unstructured":"Chanhemo WC, Mohsini MH, Mjahidi MM, Rashidi FU. Deep learning for SDN-enabled campus networks: proposed solutions, challenges, and future directions. Int J Intell Comput Cybern. 2023. https:\/\/doi.org\/10.1108\/IJICC-12-2022-0312.","journal-title":"Int J Intell Comput Cybern"},{"key":"9593_CR27","doi-asserted-by":"publisher","DOI":"10.1016\/J.SOLENER.2023.111921","author":"P Kumar","year":"2023","unstructured":"Kumar P, Kumar R, Aljuhani A, Javeed D, Jolfaei A, Islam AKMN. Digital twin-driven SDN for smart grid: a deep learning integrated blockchain for cybersecurity. Sol Energy. 2023. https:\/\/doi.org\/10.1016\/J.SOLENER.2023.111921.","journal-title":"Sol Energy"},{"key":"9593_CR28","doi-asserted-by":"publisher","DOI":"10.1007\/S10586-023-04069-9","author":"R Taheri","year":"2023","unstructured":"Taheri R, Ahmed H, Arslan E. Deep learning for the security of software-defined networks: a review. Cluster Comput. 2023. https:\/\/doi.org\/10.1007\/S10586-023-04069-9.","journal-title":"Cluster Comput"},{"key":"9593_CR29","doi-asserted-by":"publisher","first-page":"98","DOI":"10.19850\/j.cnki.2096-4706.2023.07.025","volume":"07","author":"Y Wang","year":"2023","unstructured":"Wang Y, Gu G, Sun Y, Lu Y. Design and implementation of SDN campus network based on deep reinforcement learning. Modern Inf Technol. 2023;07:98\u2013100. https:\/\/doi.org\/10.19850\/j.cnki.2096-4706.2023.07.025.","journal-title":"Modern Inf Technol"},{"key":"9593_CR30","first-page":"93","volume":"02","author":"J Wang","year":"2023","unstructured":"Wang J, Li K, Yang X. Exploration of the new generation network architecture model for smart campus in universities. China Educ Inf. 2023;02:93\u2013100.","journal-title":"China Educ Inf"},{"key":"9593_CR31","doi-asserted-by":"publisher","DOI":"10.1016\/J.COMPELECENG.2022.108406","author":"S Qamar","year":"2022","unstructured":"Qamar S. Healthcare data analysis by feature extraction and classification using deep learning with cloud-based cybersecurity. Comput Electr Eng. 2022. https:\/\/doi.org\/10.1016\/J.COMPELECENG.2022.108406.","journal-title":"Comput Electr Eng"},{"key":"9593_CR32","doi-asserted-by":"publisher","first-page":"1098","DOI":"10.1080\/24725854.2021.1987593","volume":"54","author":"N Gaw","year":"2021","unstructured":"Gaw N, Yousefi S, Reisi Gahrooei M. Multimodal data fusion for systems improvement: a review. IISE Trans. 2021;54:1098\u2013116. https:\/\/doi.org\/10.1080\/24725854.2021.1987593.","journal-title":"IISE Trans"},{"key":"9593_CR33","doi-asserted-by":"publisher","unstructured":"Agrafiotis G, Kalafatidis S, Giapantzis K, Lalas A, Votis K. Advancing cybersecurity with ai: A multimodal fusion approach for intrusion detection systems. In\u00a02024 IEEE International Mediterranean Conference on Communications and Networking (MeditCom) IEEE. 2024: 51\u201356 https:\/\/doi.org\/10.1109\/MeditCom61057.2024.10621237","DOI":"10.1109\/MeditCom61057.2024.10621237"},{"key":"9593_CR34","doi-asserted-by":"publisher","unstructured":"Tao X. Multi-modal big data security fusion method based on privacy ASE encryption algorithm and width learning. 2024 5th International Conference on Information Science, Parallel and Distributed Systems (ISPDS). 2024: 239\u2013242. https:\/\/doi.org\/10.1109\/ISPDS62779.2024.10667508","DOI":"10.1109\/ISPDS62779.2024.10667508"},{"key":"9593_CR35","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3649447","volume":"56","author":"F Zhao","year":"2024","unstructured":"Zhao F, Zhang C, Geng B. Deep multimodal data fusion. ACM Comput Surv. 2024;56:1\u201336. https:\/\/doi.org\/10.1145\/3649447.","journal-title":"ACM Comput Surv"},{"key":"9593_CR36","doi-asserted-by":"publisher","unstructured":"Sahu G, Vechtomova O. Dynamic fusion for multimodal data. ArXiv, abs\/1911.03821. 2019. https:\/\/doi.org\/10.48550\/arXiv.1911.03821","DOI":"10.48550\/arXiv.1911.03821"},{"key":"9593_CR37","doi-asserted-by":"publisher","DOI":"10.1016\/J.COMNET.2022.109032","author":"M Macas","year":"2022","unstructured":"Macas M, Wu C, Fuertes W. A survey on deep learning for cybersecurity: progress, challenges, and opportunities. Comput Netw. 2022. https:\/\/doi.org\/10.1016\/J.COMNET.2022.109032.","journal-title":"Comput Netw"},{"key":"9593_CR38","unstructured":"Liu X. Research on long tail relationship extraction in network security knowledge graph (Master's thesis, Huazhong University of Science and Technology). 2022. https:\/\/kns.cnki.net\/KCMS\/detail\/detail.aspx?dbname=CMFD202302&filename=1023475105.nh."},{"key":"9593_CR39","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-200111","author":"SK Vikas","year":"2022","unstructured":"Vikas SK, Vandana MR. Enhancement of email spam detection using improved deep learning algorithms for cybersecurity. J Comput Secur. 2022. https:\/\/doi.org\/10.3233\/JCS-200111.","journal-title":"J Comput Secur"},{"key":"9593_CR40","doi-asserted-by":"publisher","DOI":"10.3390\/S22010360","author":"THH Aldhyani","year":"2022","unstructured":"Aldhyani THH, Alkahtani H. Attacks to autonomous vehicles: a deep learning algorithm for cybersecurity. Sensors. 2022. https:\/\/doi.org\/10.3390\/S22010360.","journal-title":"Sensors"},{"key":"9593_CR41","doi-asserted-by":"publisher","DOI":"10.15803\/IJNC.12.2_467","author":"M Mbow","year":"2022","unstructured":"Mbow M, Koide H, Sakurai K. Handling class imbalance problem in intrusion detection system based on deep learning. Int J Netw Comput. 2022. https:\/\/doi.org\/10.15803\/IJNC.12.2_467.","journal-title":"Int J Netw Comput"},{"key":"9593_CR42","doi-asserted-by":"publisher","DOI":"10.2197\/IPSJJIP.30.636","author":"H Suryotrisongko","year":"2022","unstructured":"Suryotrisongko H, Musashi Y, Tsuneda A, Sugitani K. Adversarial robustness in hybrid quantum-classical deep learning for botnet DGA detection. J Inf Process. 2022. https:\/\/doi.org\/10.2197\/IPSJJIP.30.636.","journal-title":"J Inf Process"},{"key":"9593_CR43","doi-asserted-by":"publisher","DOI":"10.32985\/IJECES.12.SI.2","author":"SMA Mustafa","year":"2021","unstructured":"Mustafa SMA, Khairuddin MA, Mohd RI, Ismail MN, Shukran MA, Sajak AA. SIEM network behaviour monitoring framework using deep learning approach for campus network infrastructure. Int J Electr Comput Eng Syst. 2021. https:\/\/doi.org\/10.32985\/IJECES.12.SI.2.","journal-title":"Int J Electr Comput Eng Syst"},{"key":"9593_CR44","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-200095","author":"G Li","year":"2021","unstructured":"Li G, Sharma P, Pan L, Rajasegarar S, Karmakar C, Patterson N. Deep learning algorithms for cybersecurity applications: a survey. J Comput Secur. 2021. https:\/\/doi.org\/10.3233\/JCS-200095.","journal-title":"J Comput Secur"},{"key":"9593_CR45","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3040968","author":"S Rathore","year":"2021","unstructured":"Rathore S, Park JH. A blockchain-based deep learning approach for cybersecurity in next generation industrial cyber-physical systems. IEEE Trans Ind Inf. 2021. https:\/\/doi.org\/10.1109\/TII.2020.3040968.","journal-title":"IEEE Trans Ind Inf"},{"key":"9593_CR46","doi-asserted-by":"publisher","DOI":"10.4018\/IJCWT.2020040105","author":"YN Imamverdiyev","year":"2020","unstructured":"Imamverdiyev YN, Abdullayeva FJ. Deep learning in cybersecurity: challenges and approaches. Int J Cyber Warfare Terror. 2020. https:\/\/doi.org\/10.4018\/IJCWT.2020040105.","journal-title":"Int J Cyber Warfare Terror"},{"issue":"5","key":"9593_CR47","first-page":"3292","volume":"8","author":"S Vanjire","year":"2020","unstructured":"Vanjire S, Lakshmi M. FNN and auto encoder deep learning-based algorithm for Android cybersecurity. Int J Recent Technol Eng. 2020;8(5):3292\u20136.","journal-title":"Int J Recent Technol Eng"},{"key":"9593_CR48","doi-asserted-by":"publisher","first-page":"67","DOI":"10.16644\/j.cnki.cn33-1094\/tp.2019.09.020","volume":"09","author":"N Mei","year":"2019","unstructured":"Mei N, Fan Z, Huang X. Analysis and research on students\u2019 online behavior on campus network. Comput Age. 2019;09:67\u201370. https:\/\/doi.org\/10.16644\/j.cnki.cn33-1094\/tp.2019.09.020.","journal-title":"Comput Age"},{"key":"9593_CR49","first-page":"189","volume":"02","author":"R Liu","year":"2019","unstructured":"Liu R, Tian Y, Zhang C. Network behavior recognition based on stacked autoencoder. J Hefei Univ Technol. 2019;02:189\u201394.","journal-title":"J Hefei Univ Technol"},{"key":"9593_CR50","doi-asserted-by":"crossref","unstructured":"Sagduyu YE, Shi Y, Erpek T. IoT network security from the perspective of adversarial deep learning. CoRR. 2019.","DOI":"10.1109\/SAHCN.2019.8824956"},{"key":"9593_CR51","doi-asserted-by":"crossref","unstructured":"Pingle A, Piplai A, Mittal S, Joshi A, Holt J, Zak R. RelExt: Relation extraction using deep learning approaches for cybersecurity knowledge graph improvement. CoRR. 2019.","DOI":"10.1145\/3341161.3343519"},{"key":"9593_CR52","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2836950","author":"X Yang","year":"2018","unstructured":"Yang X, Kong L, Liu Z, Chen Y, Li Y, Zhu H, Wang C. Machine learning and deep learning methods for cybersecurity. IEEE Access. 2018. https:\/\/doi.org\/10.1109\/ACCESS.2018.2836950.","journal-title":"IEEE Access"},{"key":"9593_CR53","first-page":"165","volume":"03","author":"C Zhou","year":"2016","unstructured":"Zhou C, Luan X, Xiao J. Domain name query behavior vector space embedding based on deep learning. J Commun. 2016;03:165\u201374.","journal-title":"J Commun"}],"container-title":["Discover Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10791-025-09593-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10791-025-09593-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10791-025-09593-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,19]],"date-time":"2025-05-19T15:21:56Z","timestamp":1747668116000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10791-025-09593-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,19]]},"references-count":53,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["9593"],"URL":"https:\/\/doi.org\/10.1007\/s10791-025-09593-3","relation":{},"ISSN":["2948-2992"],"issn-type":[{"value":"2948-2992","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,5,19]]},"assertion":[{"value":"31 December 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 May 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 May 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"83"}}