{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T07:13:55Z","timestamp":1760080435160,"version":"3.37.3"},"reference-count":53,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2020,10,31]],"date-time":"2020-10-31T00:00:00Z","timestamp":1604102400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,10,31]],"date-time":"2020-10-31T00:00:00Z","timestamp":1604102400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100004489","name":"Mitacs","doi-asserted-by":"publisher","award":["IT11704"],"award-info":[{"award-number":["IT11704"]}],"id":[{"id":"10.13039\/501100004489","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Dalhousie NIMS Lab"},{"name":"Solana Networks"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Netw Syst Manage"],"published-print":{"date-parts":[[2021,1]]},"DOI":"10.1007\/s10922-020-09566-5","type":"journal-article","created":{"date-parts":[[2020,10,31]],"date-time":"2020-10-31T04:39:11Z","timestamp":1604119151000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Machine Learning Based Classification Accuracy of Encrypted Service Channels: Analysis of Various Factors"],"prefix":"10.1007","volume":"29","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6435-6933","authenticated-orcid":false,"given":"Ali","family":"Safari Khatouni","sequence":"first","affiliation":[]},{"given":"Nabil","family":"Seddigh","sequence":"additional","affiliation":[]},{"given":"Biswajit","family":"Nandy","sequence":"additional","affiliation":[]},{"given":"Nur","family":"Zincir-Heywood","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,31]]},"reference":[{"key":"9566_CR1","doi-asserted-by":"publisher","first-page":"1326","DOI":"10.1016\/j.comnet.2010.12.002","volume":"55","author":"R Alshammari","year":"2011","unstructured":"Alshammari, R., Zincir-Heywood, A.N.: Can encrypted traffic be identified without port numbers, ip addresses and payload inspection? Comput. Netw. 55, 1326\u20131350 (2011)","journal-title":"Comput. Netw."},{"key":"9566_CR2","doi-asserted-by":"crossref","unstructured":"Matthews, P., Rosenberg, J., Wing, D., Mahy, R.: Session traversal utilities for NAT (STUN). In: RFC 5389, no. 5389 in Request for Comments, RFC Editor, (October 2008)","DOI":"10.17487\/rfc5389"},{"key":"9566_CR3","doi-asserted-by":"crossref","unstructured":"Safari Khatouni, A., Trevisan, M., Regano, L., Viticchi\u00e9, A.: Privacy issues of ISPs in the modern web. In: 2017 8th IEEE annual information technology, electronics and mobile communication conference (IEMCON), pp. 588\u2013594, (October 2017)","DOI":"10.1109\/IEMCON.2017.8117145"},{"key":"9566_CR4","doi-asserted-by":"crossref","unstructured":"Trevisan, M., Giordano, D., Drago, I., Mellia, M., Munafo, M.: Five years at the edge: Watching internet from the isp network. In: Proceedings of the 14th international conference on emerging networking experiments and technologies, CoNEXT \u201918, (New York, NY, USA), pp. 1\u201312, ACM, (December 2018)","DOI":"10.1145\/3281411.3281433"},{"key":"9566_CR5","doi-asserted-by":"crossref","unstructured":"Trevisan, M., Giordano, D., Drago, I., Mellia, M., Munafo, M.: Five years at the edge: Watching internet from the isp network. In: Proceedings of the 14th international conference on emerging networking experiments and technologies, CoNEXT \u201918, (New York, NY, USA), pp. 1\u201312, ACM, (December 2018)","DOI":"10.1145\/3281411.3281433"},{"key":"9566_CR6","doi-asserted-by":"crossref","unstructured":"Rescorla, E., Schiffman, A.M.: The secure HyperText transfer protocol. RFC 2660, (Aug. 1999)","DOI":"10.17487\/rfc2660"},{"key":"9566_CR7","doi-asserted-by":"crossref","unstructured":"Burschka, S., Dupasquier, B.: Tranalyzer: Versatile high performance network traffic analyser. In: 2016 IEEE symposium series on computational intelligence (SSCI), pp. 1\u20138, (December 2016)","DOI":"10.1109\/SSCI.2016.7849909"},{"key":"9566_CR8","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1109\/MNET.2011.5772055","volume":"25","author":"A Finamore","year":"2011","unstructured":"Finamore, A., Mellia, M., Meo, M., Munafo, M.M., Torino, P.D., Rossi, D.: Experiences of Internet traffic monitoring with tstat. IEEE Netw. 25, 8\u201314 (2011)","journal-title":"IEEE Netw."},{"key":"9566_CR9","unstructured":"CERT\/NetSA at Carnegie Mellon University: SiLK (System for Internet-Level Knowledge). http:\/\/tools.netsa.cert.org\/silk. Accessed July 2009."},{"key":"9566_CR10","unstructured":"C.M. University: Argus: the network audit record generation and utilization system. https:\/\/qosient.com\/argus\/. December 1994"},{"key":"9566_CR11","doi-asserted-by":"crossref","unstructured":"Safari Khatouni, A., Zincir-Heywood, N.: Integrating machine learning with off-the-shelf traffic flow features for http\/https traffic classification. In: 2019 the 24th symposium on computers and communications (ISCC), (June 2019)","DOI":"10.1109\/ISCC47284.2019.8969578"},{"key":"9566_CR12","doi-asserted-by":"crossref","unstructured":"Safari Khatouni A., Zincir-Heywood, N.: How much training data is enough to move a ml-based classifier to a different network? Procedia Computer Science, 155, 378\u2013385 (August 2019). In: The 14th international conference on future networks and communications (FNC-2019)","DOI":"10.1016\/j.procs.2019.08.053"},{"key":"9566_CR13","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/j.jnca.2017.11.007","volume":"103","author":"G Aceto","year":"2018","unstructured":"Aceto, G., Ciuonzo, D., Montieri, A., Pescap\u00e9, A.: Multi-classification approaches for classifying mobile app traffic. J. Netw. Comput. Appl. 103, 131\u2013145 (2018)","journal-title":"J. Netw. Comput. Appl."},{"key":"9566_CR14","doi-asserted-by":"publisher","first-page":"106944","DOI":"10.1016\/j.comnet.2019.106944","volume":"165","author":"G Aceto","year":"2019","unstructured":"Aceto, G., Ciuonzo, D., Montieri, A., Pescap\u00e9, A.: Mimetic: mobile encrypted traffic classification using multimodal deep learning. Comput. Netw. 165, 106944 (2019)","journal-title":"Comput. Netw."},{"key":"9566_CR15","unstructured":"Brissaud, P.-O., Francois, J., Chrisment, I., Cholez, T., Bettan, O.: Passive monitoring of https service use. In: CNSM\u201918\u201414th international conference on network and service management, (Rome, Italy), pp. 7, (November 2018)"},{"key":"9566_CR16","unstructured":"Lotfollahi, M., Zade, R.S.H., Siavoshani, M.J., Saberian, M.: Deep packet: a novel approach for encrypted traffic classification using deep learning. CoRR, (September 2017). arXiv:1709.02656"},{"key":"9566_CR17","doi-asserted-by":"crossref","unstructured":"Trevisan, M., Drago, I., Mellia, M., Song, H.H., Baldi, M.: What: a big data approach for accounting of modern web services. In: 2016 IEEE international conference on big data (Big Data), pp. 2740\u20132745, (December 2016)","DOI":"10.1109\/BigData.2016.7840921"},{"key":"9566_CR18","first-page":"1","volume":"PP","author":"M Trevisan","year":"2017","unstructured":"Trevisan, M., Drago, I., Mellia, M., Song, H.H., Baldi, M.: AWESoME: big data for automatic web service management in SDN. IEEE Trans. Netw. Serv. Manag. PP, 1 (2017)","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"9566_CR19","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1016\/j.comnet.2017.03.019","volume":"119","author":"Y Dong Ning","year":"2017","unstructured":"Dong Ning, Y., Jie Zhao, J., Jin, J.: Novel feature selection and classification of internet video traffic based on a hierarchical scheme. Comput. Netw. 119, 102\u2013111 (2017)","journal-title":"Comput. Netw."},{"key":"9566_CR20","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1016\/j.cose.2016.01.006","volume":"59","author":"JJ Davis","year":"2016","unstructured":"Davis, J.J., Foo, E.: Automated feature engineering for http tunnel detection. Comput. Secur. 59, 166\u2013185 (2016)","journal-title":"Comput. Secur."},{"key":"9566_CR21","doi-asserted-by":"crossref","unstructured":"Gonzalez, R., Soriente, C., Laoutaris, N.: User profiling in the time of HTTPS. In: Proceedings of the 2016 internet measurement conference, IMC \u201916, (New York, NY, USA), pp. 373\u2013379, ACM, (November 2016)","DOI":"10.1145\/2987443.2987451"},{"key":"9566_CR22","doi-asserted-by":"publisher","first-page":"2851","DOI":"10.1109\/TMC.2016.2516020","volume":"15","author":"Y Fu","year":"2016","unstructured":"Fu, Y., Xiong, H., Lu, X., Yang, J., Chen, C.: Service usage classification with encrypted internet traffic in mobile messaging apps. IEEE Trans. Mob. Comput. 15, 2851\u20132864 (2016)","journal-title":"IEEE Trans. Mob. Comput."},{"key":"9566_CR23","doi-asserted-by":"crossref","unstructured":"Shbair, W.M., Cholez, T., Francois, J., Chrisment, I.: A multi-level framework to identify https services. In: NOMS 2016 - 2016 IEEE\/IFIP network operations and management symposium, pp. 240\u2013248, (April 2016)","DOI":"10.1109\/NOMS.2016.7502818"},{"key":"9566_CR24","doi-asserted-by":"crossref","unstructured":"Taylor, V.F., Spolaor, R., Conti, M., Martinovic, I.: AppScanner: automatic fingerprinting of smartphone apps from encrypted network traffic. In: 2016 IEEE European symposium on security and privacy (EuroS P), pp. 439\u2013454, (March 2016)","DOI":"10.1109\/EuroSP.2016.40"},{"key":"9566_CR25","doi-asserted-by":"publisher","first-page":"830","DOI":"10.1007\/s10922-014-9324-6","volume":"23","author":"R Alshammari","year":"2015","unstructured":"Alshammari, R., Zincir-Heywood, A.N.: How robust can a machine learning approach be for classifying encrypted voip? J. Netw. Syst. Manag. 23, 830\u2013869 (2015)","journal-title":"J. Netw. Syst. Manag."},{"key":"9566_CR26","doi-asserted-by":"crossref","unstructured":"Wang, Q., Yahyavi, A., Kemme, B., He, W.: I know what you did on your smartphone: inferring app usage over encrypted data traffic. In: 2015 IEEE conference on communications and network security (CNS), pp. 433\u2013441, (September 2015)","DOI":"10.1109\/CNS.2015.7346855"},{"key":"9566_CR27","doi-asserted-by":"crossref","unstructured":"Xu, Q., Liao, Y., Miskovic, S., Mao, Z.M., Baldi, M., Nucci, A., Andrews, T.: Automatic generation of mobile app signatures from traffic observations. In: 2015 IEEE conference on computer communications (INFOCOM), pp. 1481\u20131489, (April 2015)","DOI":"10.1109\/INFOCOM.2015.7218526"},{"key":"9566_CR28","doi-asserted-by":"crossref","unstructured":"Branch, P.A., Heyde, A., Armitage, G.J.: Rapid identification of skype traffic flows. In: Proceedings of the 18th international workshop on network and operating systems support for digital audio and video, NOSSDAV \u201909, (New York, NY, USA), pp. 91\u201396, ACM, June (2009)","DOI":"10.1145\/1542245.1542266"},{"key":"9566_CR29","doi-asserted-by":"publisher","first-page":"790","DOI":"10.1016\/j.comnet.2008.11.016","volume":"53","author":"W Li","year":"2009","unstructured":"Li, W., Canini, M., Moore, A.W., Bolla, R.: Efficient application identification and the temporal and spatial stability of classification schema. Comput. Netw. 53, 790\u2013809 (2009)","journal-title":"Comput. Netw."},{"key":"9566_CR30","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1145\/1129582.1129589","volume":"36","author":"L Bernaille","year":"2006","unstructured":"Bernaille, L., Teixeira, R., Akodkenou, I., Soule, A., Salamatian, K.: Traffic classification on the fly. SIGCOMM Comput. Commun. Rev. 36, 23\u201326 (2006)","journal-title":"SIGCOMM Comput. Commun. Rev."},{"key":"9566_CR31","unstructured":"Pacheco, F., Exposito, E., Gineste, M., Baudoin, C., Aguilar, J.: Towards the deployment of machine learning solutions in network traffic classification: a systematic survey. IEEE Communications Surveys Tutorials, pp. 1\u20131, (November 2018)"},{"key":"9566_CR32","doi-asserted-by":"crossref","unstructured":"Namdev, N., Agrawal, S., Silkari, S.: Recent advancement in machine learning based internet traffic classification. Procedia Computer Science 60, 784\u2013791 (2015). Knowledge-based and intelligent information & engineering systems 19th annual conference, KES-2015, Singapore, September 2015 proceedings","DOI":"10.1016\/j.procs.2015.08.238"},{"key":"9566_CR33","first-page":"355","volume":"25","author":"P Velan","year":"2015","unstructured":"Velan, P., \u010cerm\u00e1k, M., \u010celeda, P., Dra\u0161ar, M.: A survey of methods for encrypted traffic classification and analysis. Network 25, 355\u2013374 (2015)","journal-title":"Network"},{"key":"9566_CR34","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/SURV.2008.080406","volume":"10","author":"TTT Nguyen","year":"2008","unstructured":"Nguyen, T.T.T., Armitage, G.: A survey of techniques for internet traffic classification using machine learning. IEEE Commun. Surv. Tutorials 10, 56\u201376 (2008). Fourth Quarter","journal-title":"IEEE Commun. Surv. Tutorials"},{"issue":"2","key":"9566_CR35","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1109\/TNSM.2019.2899085","volume":"16","author":"G Aceto","year":"2019","unstructured":"Aceto, G., Ciuonzo, D., Montieri, A., Pescap\u00e9, A.: Mobile encrypted traffic classification using deep learning: Experimental evaluation, lessons learned, and challenges. IEEE Trans. Netw. Serv. Manag. 16(2), 445\u2013458 (2019)","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"9566_CR36","unstructured":"Shbair, W.M., Cholez, T., Francois, J., Chrisment, I.: A survey of https traffic and services identification approaches (2020)"},{"issue":"4","key":"9566_CR37","doi-asserted-by":"publisher","first-page":"2658","DOI":"10.1109\/COMST.2018.2843533","volume":"20","author":"M Conti","year":"2018","unstructured":"Conti, M., Li, Q.Q., Maragno, A., Spolaor, R.: The dark side(-channel) of mobile devices: a survey on network traffic analysis. IEEE Commun. Surv. Tutorials 20(4), 2658\u20132713 (2018)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"9566_CR38","unstructured":"Kim, H., Claffy, K., Fomenkov, M., Barman, D., Faloutsos, M., Lee, K.: Internet traffic classification demystified: myths, caveats, and the best practices. In: Proceedings of the 2008 ACM CoNEXT conference, CoNEXT \u201908, (New York, NY, USA), Association for Computing Machinery, (2008)"},{"key":"9566_CR39","doi-asserted-by":"crossref","unstructured":"Datta, J., Kataria N., Hubballi, N.: Network traffic classification in encrypted environment: A case study of google hangout. In: 2015 twenty first national conference on communications (NCC), pp. 1\u20136, February 2015","DOI":"10.1109\/NCC.2015.7084879"},{"key":"9566_CR40","doi-asserted-by":"crossref","unstructured":"Hus\u00e1k, M., Cerm\u00e1k, M., Jirs\u00edk, T., Celeda, P.: Network-based https client identification using ssl\/tls fingerprinting. In: 2015 10th international conference on availability, reliability and security, pp. 389\u2013396, (August 2015)","DOI":"10.1109\/ARES.2015.35"},{"key":"9566_CR41","first-page":"215","volume-title":"Semi-supervised learning","author":"MFA Hady","year":"2013","unstructured":"Hady, M.F.A., Schwenker, F.: Semi-supervised learning, pp. 215\u2013239. Springer, Berlin, Heidelberg (2013)"},{"issue":"3","key":"9566_CR42","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1109\/MWC.2016.1600317WC","volume":"24","author":"N Kato","year":"2017","unstructured":"Kato, N., Fadlullah, Z.M., Mao, B., Tang, F., Akashi, O., Inoue, T., Mizutani, K.: The deep learning vision for heterogeneous network traffic control: proposal, challenges, and future perspective. IEEE Wirel. Commun. 24(3), 146\u2013153 (2017)","journal-title":"IEEE Wirel. Commun."},{"key":"9566_CR43","doi-asserted-by":"crossref","unstructured":"Henderson, P., Islam, R., Bachman, P., Pineau, J., Precup, D., Meger, D.: Deep reinforcement learning that matters (09 2017)","DOI":"10.1609\/aaai.v32i1.11694"},{"key":"9566_CR44","doi-asserted-by":"publisher","first-page":"1390","DOI":"10.1109\/JSYST.2014.2364743","volume":"10","author":"F Haddadi","year":"2016","unstructured":"Haddadi, F., Zincir-Heywood, A.N.: Benchmarking the effect of flow exporters and protocol filters on botnet traffic classification. IEEE Syst. J. 10, 1390\u20131401 (2016)","journal-title":"IEEE Syst. J."},{"key":"9566_CR45","first-page":"2825","volume":"12","author":"F Pedregosa","year":"2011","unstructured":"Pedregosa, F., Varoquaux, G., Gramfort, A., Michel, V., Thirion, B., Grisel, O., Blondel, M., Prettenhofer, P., Weiss, R., Dubourg, V., Vanderplas, J., Passos, A., Cournapeau, D., Brucher, M., Perrot, M., Duchesnay, E.: Scikit-learn: machine learning in Python. J. Mach. Learn. Res. 12, 2825\u20132830 (2011)","journal-title":"J. Mach. Learn. Res."},{"key":"9566_CR46","doi-asserted-by":"crossref","unstructured":"Draper-Gil, G., Lashkari, A.H., Mamun, M.S.I., Ghorbani, A.A.: Characterization of encrypted and vpn traffic using time-related features. In: ICISSP, February (2016)","DOI":"10.5220\/0005740704070414"},{"key":"9566_CR47","unstructured":"Bonfiglio, D., Mellia, M., Meo, M., Rossi, D., Tofanelli, P.: Revealing skype traffic: when randomness plays with you. In: Proceedings of the 2007 conference on applications, technologies, architectures, and protocols for computer communications, SIGCOMM \u201907, (New York, NY, USA), p. 37\u201348, association for computing machinery, (2007)"},{"key":"9566_CR48","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1007\/978-3-319-23528-8_13","volume-title":"Machine Learning and Knowledge Discovery in Databases","author":"A Dal Pozzolo","year":"2015","unstructured":"Dal Pozzolo, A., Caelen, O., Bontempi, G.: When is undersampling effective in unbalanced classification tasks? In: Appice, A., Rodrigues, P.P., Santos Costa, V., Soares, C., Gama, J., Jorge, A. (eds.) Machine Learning and Knowledge Discovery in Databases, pp. 200\u2013215. Springer International Publishing, Cham (2015)"},{"issue":"4\u20135","key":"9566_CR49","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1016\/S0893-6080(00)00026-5","volume":"13","author":"A Hyv\u00e4rinen","year":"2000","unstructured":"Hyv\u00e4rinen, A., Oja, E.: Independent component analysis: algorithms and applications. Neural Netw 13(4\u20135), 411\u201330 (2000)","journal-title":"Neural Netw"},{"key":"9566_CR50","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1371\/journal.pone.0224365","volume":"14","author":"A Vabalas","year":"2019","unstructured":"Vabalas, A., Gowen, E., Poliakoff, E., Casson, A.J.: Machine learning algorithm validation with a limited sample size. PLoS ONE 14, 1\u201320 (2019)","journal-title":"PLoS ONE"},{"key":"9566_CR51","doi-asserted-by":"crossref","unstructured":"Jaber, M., Cascella, R.G., Barakat, C.: Can we trust the inter-packet time for traffic classification? In: 2011 IEEE international conference on communications (ICC), pp. 1\u20135, (June 2011)","DOI":"10.1109\/icc.2011.5963024"},{"key":"9566_CR52","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1007\/978-3-642-13193-6_32","volume-title":"Experimental Algorithms","author":"R Bar Yanai","year":"2010","unstructured":"Bar Yanai, R., Langberg, M., Peleg, D., Roditty, L.: Realtime classification for encrypted traffic. In: Festa, P. (ed.) Experimental Algorithms, pp. 373\u2013385. Springer, Berlin (2010)"},{"key":"9566_CR53","doi-asserted-by":"publisher","first-page":"1999","DOI":"10.1007\/s00500-019-04030-2","volume":"24","author":"M Lotfollahi","year":"2020","unstructured":"Lotfollahi, M., Zade, R.S.H., Siavoshani, M.J., Saberian, M.: Deep packet: a novel approach for encrypted traffic classification using deep learning. Soft Comput. 24, 1999\u20132012 (2020)","journal-title":"Soft Comput."}],"container-title":["Journal of Network and Systems Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-020-09566-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10922-020-09566-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-020-09566-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,25]],"date-time":"2022-11-25T23:30:38Z","timestamp":1669419038000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10922-020-09566-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,31]]},"references-count":53,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,1]]}},"alternative-id":["9566"],"URL":"https:\/\/doi.org\/10.1007\/s10922-020-09566-5","relation":{},"ISSN":["1064-7570","1573-7705"],"issn-type":[{"type":"print","value":"1064-7570"},{"type":"electronic","value":"1573-7705"}],"subject":[],"published":{"date-parts":[[2020,10,31]]},"assertion":[{"value":"11 March 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 September 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 September 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 October 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"8"}}