{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T20:17:39Z","timestamp":1773519459482,"version":"3.50.1"},"reference-count":47,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2023,8,22]],"date-time":"2023-08-22T00:00:00Z","timestamp":1692662400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,8,22]],"date-time":"2023-08-22T00:00:00Z","timestamp":1692662400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100002322","name":"Coordena\u00e7\u00e3o de Aperfei\u00e7oamento de Pessoal de N\u00edvel Superior","doi-asserted-by":"publisher","award":["Finance Code 1"],"award-info":[{"award-number":["Finance Code 1"]}],"id":[{"id":"10.13039\/501100002322","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003593","name":"Conselho Nacional de Desenvolvimento Cient\u00edfico e Tecnol\u00f3gico","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003593","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100017580","name":"Rede Nacional de Ensino e Pesquisa","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100017580","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001807","name":"Funda\u00e7\u00e3o de Amparo \u00e0 Pesquisa do Estado de S\u00e3o Paulo","doi-asserted-by":"publisher","award":["#2020\/05183-0"],"award-info":[{"award-number":["#2020\/05183-0"]}],"id":[{"id":"10.13039\/501100001807","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100008441","name":"CYTED Ciencia y Tecnolog\u00eda para el Desarrollo","doi-asserted-by":"publisher","award":["#519RT0580"],"award-info":[{"award-number":["#519RT0580"]}],"id":[{"id":"10.13039\/501100008441","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Netw Syst Manage"],"published-print":{"date-parts":[[2023,10]]},"DOI":"10.1007\/s10922-023-09769-6","type":"journal-article","created":{"date-parts":[[2023,8,22]],"date-time":"2023-08-22T06:01:50Z","timestamp":1692684110000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Bungee-ML: A Cross-Plane Approach for a Collaborative Defense Against DDoS Attacks"],"prefix":"10.1007","volume":"31","author":[{"given":"Libardo Andrey","family":"Quintero Gonz\u00e1lez","sequence":"first","affiliation":[]},{"given":"Lucas","family":"Castanheira","sequence":"additional","affiliation":[]},{"given":"Jonatas A.","family":"Marques","sequence":"additional","affiliation":[]},{"given":"Alberto E.","family":"Schaeffer-Filho","sequence":"additional","affiliation":[]},{"given":"Luciano","family":"Paschoal Gaspary","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,8,22]]},"reference":[{"key":"9769_CR1","doi-asserted-by":"publisher","first-page":"80813","DOI":"10.1109\/ACCESS.2019.2922196","volume":"7","author":"S Dong","year":"2019","unstructured":"Dong, S., Abbas, K., Jain, R.: A survey on distributed denial of service (DDoS) attacks in SDN and cloud computing environments. IEEE Access 7, 80813\u201380828 (2019)","journal-title":"IEEE Access"},{"key":"9769_CR2","unstructured":"NETSCOUT Arbor\u2019s ATLAS: 14th annual Worldwide Infrastructure Security Report (WISR). https:\/\/www.netscout.com\/report\/. Accessed 2019"},{"key":"9769_CR3","unstructured":"Porter, J.: Telegram blames China for \u2018powerful DDoS attack\u2019 during Hong Kong protests. https:\/\/www.theverge.com\/2019\/6\/13\/18677282\/telegram-ddos-attack-china-hong-kong-protest-pavel-durov-state-actor-sized-cyberattack. Accessed 2019"},{"key":"9769_CR4","doi-asserted-by":"crossref","unstructured":"Kupreev, O., Badovskaya, E., Gutnikov, A.: DDoS attacks in Q2 2020. https:\/\/securelist.com\/ddos-attacks-in-q2-2020\/98077\/. Accessed 2020","DOI":"10.1016\/S1353-4858(20)30111-2"},{"key":"9769_CR5","unstructured":"Amazon: Amazon page speed study. https:\/\/www.contentkingapp.com\/academy\/page-speed-resources\/faq\/amazon-page-speed-study\/. Accessed 24 Sept 2021"},{"key":"9769_CR6","unstructured":"Amazon: Amazon prime day outage. https:\/\/tamebay.com\/2018\/07\/amazon-invited-ddos-attack-on-prime-day.html. Accessed 24 Sept 2021"},{"key":"9769_CR7","doi-asserted-by":"crossref","unstructured":"Bhardwaj, A., Subrahmanyam, G., Avasthi, V., Sastry, H., Goundar, S.: DDoS attacks, new ddos taxonomy and mitigation solutions-a survey. In: 2016 International conference on Signal Processing, Communication, Power and Embedded System (SCOPES), pp. 793\u2013798 (2016). IEEE","DOI":"10.1109\/SCOPES.2016.7955549"},{"key":"9769_CR8","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3116345","author":"D Ding","year":"2021","unstructured":"Ding, D., Savi, M., Siracusa, D.: Tracking normalized network traffic entropy to detect DDoS attacks in p4. IEEE Trans. Dependable Secure Comput. (2021). https:\/\/doi.org\/10.1109\/TDSC.2021.3116345","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"9769_CR9","doi-asserted-by":"publisher","unstructured":"Kamboj, P., Trivedi, M.C., Yadav, V.K., Singh, V.K.: Detection techniques of DDoS attacks: A survey. In: 2017 4th IEEE Uttar Pradesh section international conference on electrical, computer and electronics (UPCON), pp. 675\u2013679 (2017). https:\/\/doi.org\/10.1109\/UPCON.2017.8251130","DOI":"10.1109\/UPCON.2017.8251130"},{"key":"9769_CR10","doi-asserted-by":"publisher","unstructured":"Varalakshmi, I., Thenmozhi, M., Sasi, R.: Detection of distributed denial of service attack in an internet of things environment\u2014A review. In: 2021 international conference on system, computation, automation and networking (ICSCAN), pp. 1\u20136 (2021). https:\/\/doi.org\/10.1109\/ICSCAN53069.2021.9526378","DOI":"10.1109\/ICSCAN53069.2021.9526378"},{"key":"9769_CR11","doi-asserted-by":"publisher","unstructured":"Kousar, H., Mulla, M.M., Shettar, P., Narayan, D.G.: Detection of DDoS attacks in software defined network using decision tree. In: 2021 10th IEEE international conference on Communication Systems and Network Technologies (CSNT), pp. 783\u2013788 (2021). https:\/\/doi.org\/10.1109\/CSNT51715.2021.9509634","DOI":"10.1109\/CSNT51715.2021.9509634"},{"key":"9769_CR12","unstructured":"Mac\u00edas, S.G., Gaspary, L.P., Botero, J.F.: Oracle: An architecture for collaboration of data and control planes to detect DDoS attacks. In: 2021 IFIP\/IEEE international symposium on integrated network management (IM), pp. 962\u2013967 (2021)"},{"key":"9769_CR13","doi-asserted-by":"crossref","unstructured":"Santos da Silva, A., Wickboldt, J.A., Granville, L.Z., Schaeffer-Filho, A.: Atlantic: A framework for anomaly traffic detection, classification, and mitigation in SDN. In: NOMS 2016\u20132016 IEEE\/IFIP network operations and management symposium, pp. 27\u201335 (2016)","DOI":"10.1109\/NOMS.2016.7502793"},{"key":"9769_CR14","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2934468","author":"N Agrawal","year":"2019","unstructured":"Agrawal, N., Tapaswi, S.: Defense mechanisms against DDoS attacks in a cloud computing environment: State-of-the-art and research challenges. IEEE Commun. Surv. Tutor. (2019). https:\/\/doi.org\/10.1109\/COMST.2019.2934468","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"9769_CR15","doi-asserted-by":"publisher","first-page":"122495","DOI":"10.1109\/ACCESS.2021.3109490","volume":"9","author":"AO Sangodoyin","year":"2021","unstructured":"Sangodoyin, A.O., Akinsolu, M.O., Pillai, P., Grout, V.: Detection and classification of DDoS flooding attacks on software-defined networks: A case study for the application of machine learning. IEEE Access 9, 122495\u2013122508 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3109490","journal-title":"IEEE Access"},{"key":"9769_CR16","doi-asserted-by":"crossref","unstructured":"Li, G., Zhang, M., Liu, C., Kong, X., Chen, A., Gu, G., Duan, H.: Nethcf: Enabling line-rate and adaptive spoofed IP traffic filtering. In: 2019 IEEE 27th International Conference on Network Protocols (ICNP), pp. 1\u201312 (2019)","DOI":"10.1109\/ICNP.2019.8888057"},{"key":"9769_CR17","doi-asserted-by":"publisher","unstructured":"Alsadi, A., Berardi, D., Callegati, F., Melis, A., Prandini, M.: A security monitoring architecture based on data plane programmability. In: 2021 joint European conference on networks and communications 6G summit (EuCNC\/6G summit), pp. 389\u2013394 (2021). https:\/\/doi.org\/10.1109\/EuCNC\/6GSummit51104.2021.9482549","DOI":"10.1109\/EuCNC\/6GSummit51104.2021.9482549"},{"key":"9769_CR18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3104115","author":"M Dimolianis","year":"2021","unstructured":"Dimolianis, M., Pavlidis, A., Maglaris, V.: Signature-based traffic classification and mitigation for DDoS attacks using programmable network data planes. IEEE Access (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3104115","journal-title":"IEEE Access"},{"key":"9769_CR19","doi-asserted-by":"crossref","unstructured":"Febro, A., Xiao, H., Spring, J.: Distributed sip DDoS defense with p4. In: 2019 IEEE Wireless Communications and Networking Conference (WCNC), pp. 1\u20138 (2019)","DOI":"10.1109\/WCNC.2019.8885926"},{"key":"9769_CR20","doi-asserted-by":"publisher","unstructured":"Kaljic, E., Maric, A., Njemcevic, P.: Dos attack mitigation in SDN networks using a deeply programmable packet-switching node based on a hybrid FPGA\/CPU data plane architecture. In: 2019 XXVII International Conference on Information, Communication and Automation Technologies (ICAT), pp. 1\u20136 (2019). https:\/\/doi.org\/10.1109\/ICAT47117.2019.8938862","DOI":"10.1109\/ICAT47117.2019.8938862"},{"key":"9769_CR21","doi-asserted-by":"publisher","unstructured":"Narayanan, N., Sankaran, G.C., Sivalingam, K.M.: Mitigation of security attacks in the SDN data plane using p4-enabled switches. In: 2019 IEEE international conference on Advanced Networks and Telecommunications Systems (ANTS), pp. 1\u20136 (2019). https:\/\/doi.org\/10.1109\/ANTS47819.2019.9118071","DOI":"10.1109\/ANTS47819.2019.9118071"},{"issue":"3","key":"9769_CR22","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1145\/2656877.2656890","volume":"44","author":"P Bosshart","year":"2014","unstructured":"Bosshart, P., Daly, D., Gibb, G., Izzard, M., McKeown, N., Rexford, J., Schlesinger, C., Talayco, D., Vahdat, A., Varghese, G., Walker, D.: P4: Programming protocol-independent packet processors. SIGCOMM Comput. Commun. Rev. 44(3), 87\u201395 (2014). https:\/\/doi.org\/10.1145\/2656877.2656890","journal-title":"SIGCOMM Comput. Commun. Rev."},{"key":"9769_CR23","unstructured":"Gonz\u00e1lez, L.A.Q., Castanheira, L., Marques, J.A., Schaeffer-Filho, A., Gaspary, L.P.: Bungee: An adaptive pushback mechanism for DDoS detection and mitigation in p4 data planes. In: 2021 IFIP\/IEEE international symposium on integrated network management (IM), pp. 393\u2013401 (2021)"},{"issue":"1","key":"9769_CR24","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1364\/JOCN.11.000A84","volume":"11","author":"F Paolucci","year":"2019","unstructured":"Paolucci, F., Civerchia, F., Sgambelluri, A., Giorgetti, A., Cugini, F., Castoldi, P.: P4 edge node enabling stateful traffic engineering and cyber security. IEEE\/OSA J. Opt. Commun. Networking 11(1), 84\u201395 (2019)","journal-title":"IEEE\/OSA J. Opt. Commun. Networking"},{"key":"9769_CR25","doi-asserted-by":"publisher","first-page":"87094","DOI":"10.1109\/ACCESS.2021.3086704","volume":"9","author":"EF Kfoury","year":"2021","unstructured":"Kfoury, E.F., Crichigno, J., Bou-Harb, E.: An exhaustive survey on p4 programmable data plane switches: Taxonomy, applications, challenges, and future trends. IEEE Access 9, 87094\u201387155 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3086704","journal-title":"IEEE Access"},{"key":"9769_CR26","unstructured":"Hauser, F., H\u00e4berle, M., Merling, D., Lindner, S., Gurevich, V., Zeiger, F., Frank, R., Menth, M.: A survey on data plane programming with p4: Fundamentals, advances, and applied research. ArXiv abs\/2101.10632 (2021)"},{"key":"9769_CR27","doi-asserted-by":"publisher","unstructured":"Musumeci, F., Ionata, V., Paolucci, F., Cugini, F., Tornatore, M.: Machine-learning-assisted ddos attack detection with p4 language. In: ICC 2020 - 2020 IEEE International Conference on Communications (ICC), pp. 1\u20136 (2020). https:\/\/doi.org\/10.1109\/ICC40277.2020.9149043","DOI":"10.1109\/ICC40277.2020.9149043"},{"key":"9769_CR28","doi-asserted-by":"publisher","first-page":"01052","DOI":"10.1051\/e3sconf\/202018401052","volume":"184","author":"M Arshi","year":"2020","unstructured":"Arshi, M., Nasreen, M., Madhavi, K.: A survey of DDoS attacks using machine learning techniques. E3S Web Conf 184, 01052 (2020). https:\/\/doi.org\/10.1051\/e3sconf\/202018401052","journal-title":"E3S Web Conf"},{"key":"9769_CR29","doi-asserted-by":"publisher","unstructured":"Wehbi, K., Hong, L., Al-salah, T., Bhutta, A.A.: A survey on machine learning based detection on ddos attacks for IoT systems. In: 2019 SoutheastCon, pp. 1\u20136 (2019). https:\/\/doi.org\/10.1109\/SoutheastCon42311.2019.9020468","DOI":"10.1109\/SoutheastCon42311.2019.9020468"},{"key":"9769_CR30","doi-asserted-by":"publisher","unstructured":"Raghunath, K., Krishnan, P.: Towards a secure SDN architecture. In: 2018 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT), pp. 1\u20137 (2018). https:\/\/doi.org\/10.1109\/ICCCNT.2018.8494043","DOI":"10.1109\/ICCCNT.2018.8494043"},{"issue":"2","key":"9769_CR31","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1007\/s13369-017-2414-5","volume":"42","author":"NZ Bawany","year":"2017","unstructured":"Bawany, N.Z., Shamsi, J.A., Salah, K.: DDoS attack detection and mitigation using SDN: Methods, practices, and solutions. Arab. J. Sci. Eng. 42(2), 425\u2013441 (2017). https:\/\/doi.org\/10.1007\/s13369-017-2414-5","journal-title":"Arab. J. Sci. Eng."},{"key":"9769_CR32","doi-asserted-by":"crossref","unstructured":"Zhang, M., Li, G., Wang, S., Liu, C., Chen, A., Hu, H., Gu, G., Li, Q., Xu, M., Wu, J.: Poseidon: Mitigating volumetric DDoS attacks with programmable switches. In: NDSS (2020)","DOI":"10.14722\/ndss.2020.24007"},{"key":"9769_CR33","doi-asserted-by":"publisher","unstructured":"Friday, K., Kfoury, E., Bou-Harb, E., Crichigno, J.: Towards a unified in-network DDoS detection and mitigation strategy. In: 2020 6th IEEE Conference on Network Softwarization (NetSoft), pp. 218\u2013226 (2020). https:\/\/doi.org\/10.1109\/NetSoft48620.2020.9165336","DOI":"10.1109\/NetSoft48620.2020.9165336"},{"key":"9769_CR34","doi-asserted-by":"publisher","unstructured":"Uddin\u00a0Nadim, T., Foysal : Towards autonomic entropy based approach for DDoS attack detection and mitigation using software defined networking. In: 2021 international conference on automation, control and mechatronics for industry 4.0 (ACMI), pp. 1\u20135 (2021). https:\/\/doi.org\/10.1109\/ACMI53878.2021.9528288","DOI":"10.1109\/ACMI53878.2021.9528288"},{"key":"9769_CR35","doi-asserted-by":"publisher","unstructured":"Yaegashi, R., Hisano, D., Nakayama, Y.: Light-weight DDoS mitigation at network edge with limited resources. In: 2021 IEEE 18th annual consumer communications networking conference (CCNC), pp. 1\u20136 (2021). https:\/\/doi.org\/10.1109\/CCNC49032.2021.9369635","DOI":"10.1109\/CCNC49032.2021.9369635"},{"key":"9769_CR36","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.3048265","author":"ADS Ilha","year":"2020","unstructured":"Ilha, A.D.S., Lapolli, A.C., Marques, J.A., Gaspary, L.P.: Euclid: A fully in-network, p4-based approach for real-time DDoS attack detection and mitigation. IEEE Trans. Netw. Serv. Manag. (2020). https:\/\/doi.org\/10.1109\/TNSM.2020.3048265","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"9769_CR37","doi-asserted-by":"publisher","unstructured":"B\u00fclb\u00fcl, N.S., Fischer, M.: SDN\/NFV-based DDoS mitigation via pushback. In: ICC 2020\u20132020 IEEE International Conference on Communications (ICC), pp. 1\u20136 (2020). https:\/\/doi.org\/10.1109\/ICC40277.2020.9148717","DOI":"10.1109\/ICC40277.2020.9148717"},{"key":"9769_CR38","unstructured":"Zhang, M., Shi, L., Sisodia, D., Li, J., Reiher, P.: On multi-point, in-network filtering of distributed denial-of-service traffic. In: 2019 IFIP\/IEEE symposium on integrated network and service management (IM), pp. 180\u2013188 (2019)"},{"key":"9769_CR39","doi-asserted-by":"publisher","unstructured":"Mi, Y., Wang, A.: Ml-pushback: Machine learning based pushback defense against DDoS. In: Proceedings of the 15th international conference on emerging networking experiments and technologies. CoNEXT \u201919 Companion, pp. 80\u201381. Association for Computing Machinery, New York, NY, USA (2019). https:\/\/doi.org\/10.1145\/3360468.3368188","DOI":"10.1145\/3360468.3368188"},{"key":"9769_CR40","doi-asserted-by":"publisher","DOI":"10.3390\/fi10030023","author":"S Hameed","year":"2018","unstructured":"Hameed, S., Ahmed Khan, H.: SDN based collaborative scheme for mitigation of DDoS attacks. Future Internet (2018). https:\/\/doi.org\/10.3390\/fi10030023","journal-title":"Future Internet"},{"key":"9769_CR41","first-page":"345","volume":"2","author":"A Marnerides","year":"2011","unstructured":"Marnerides, A., James, C., Schaeffer-Filho, A., Sait, S., Mauthe, A., Murthy, H.: Multi-level network resilience: Traffic analysis, anomaly detection and simulation. ICTACT J. Commun. Technol., Spl. Iss. Next Gen Wireless Netw. App. 2, 345\u2013356 (2011).","journal-title":"ICTACT J. Commun. Technol., Spl. Iss. Next Gen Wireless Netw. App."},{"key":"9769_CR42","unstructured":"Lapolli, A.C., Adilson Marques, J., Gaspary, L.P.: Offloading real-time DDoS attack detection to programmable data planes. In: 2019 IFIP\/IEEE symposium on integrated network and service management (IM), pp. 19\u201327 (2019)"},{"key":"9769_CR43","doi-asserted-by":"publisher","unstructured":"Sivaraman, V., Narayana, S., Rottenstreich, O., Muthukrishnan, S., Rexford, J.: Heavy-hitter detection entirely in the data plane. In: Proceedings of the symposium on SDN research. SOSR\u201917, pp. 164\u2013176. Association for Computing Machinery, New York, NY, USA (2017). https:\/\/doi.org\/10.1145\/3050220.3063772","DOI":"10.1145\/3050220.3063772"},{"key":"9769_CR44","doi-asserted-by":"publisher","unstructured":"Hong, G.-C., Lee, C.-N., Lee, M.-F.: Dynamic threshold for ddos mitigation in SDN environment. In: 2019 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC), pp. 1\u20137 (2019). https:\/\/doi.org\/10.1109\/APSIPAASC47483.2019.9023229","DOI":"10.1109\/APSIPAASC47483.2019.9023229"},{"issue":"4","key":"9769_CR45","doi-asserted-by":"publisher","first-page":"2761","DOI":"10.1109\/JSYST.2016.2602848","volume":"11","author":"K Kalkan","year":"2017","unstructured":"Kalkan, K., G\u00fcr, G., Alag\u00f6z, F.: Filtering-based defense mechanisms against DDoS attacks: A survey. IEEE Syst. J. 11(4), 2761\u20132773 (2017). https:\/\/doi.org\/10.1109\/JSYST.2016.2602848","journal-title":"IEEE Syst. J."},{"key":"9769_CR46","unstructured":"The P4 language consortium: P4_16 language specification. https:\/\/p4.org\/p4-spec\/docs\/P4-16-v1.2.1.pdf. Accessed 2020"},{"key":"9769_CR47","doi-asserted-by":"publisher","unstructured":"Sharafaldin, I., Lashkari, A.H., Hakak, S., Ghorbani, A.A.: Developing realistic distributed denial of service (DDoS) attack dataset and taxonomy. In: 2019 International Carnahan Conference on Security Technology (ICCST), pp. 1\u20138 (2019). https:\/\/doi.org\/10.1109\/CCST.2019.8888419","DOI":"10.1109\/CCST.2019.8888419"}],"container-title":["Journal of Network and Systems Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-023-09769-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10922-023-09769-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-023-09769-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,26]],"date-time":"2023-10-26T06:13:05Z","timestamp":1698300785000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10922-023-09769-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,22]]},"references-count":47,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2023,10]]}},"alternative-id":["9769"],"URL":"https:\/\/doi.org\/10.1007\/s10922-023-09769-6","relation":{},"ISSN":["1064-7570","1573-7705"],"issn-type":[{"value":"1064-7570","type":"print"},{"value":"1573-7705","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,8,22]]},"assertion":[{"value":"3 May 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 August 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 August 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 August 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"No competing interests present.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable to this article.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}}],"article-number":"77"}}