{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T19:04:54Z","timestamp":1772823894549,"version":"3.50.1"},"reference-count":47,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2024,8,25]],"date-time":"2024-08-25T00:00:00Z","timestamp":1724544000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,8,25]],"date-time":"2024-08-25T00:00:00Z","timestamp":1724544000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100002322","name":"Coordena\u00e7\u00e3o de Aperfei\u00e7oamento de Pessoal de N\u00edvel Superior","doi-asserted-by":"publisher","award":["001"],"award-info":[{"award-number":["001"]}],"id":[{"id":"10.13039\/501100002322","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002322","name":"Coordena\u00e7\u00e3o de Aperfei\u00e7oamento de Pessoal de N\u00edvel Superior","doi-asserted-by":"publisher","award":["001"],"award-info":[{"award-number":["001"]}],"id":[{"id":"10.13039\/501100002322","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Netw Syst Manage"],"published-print":{"date-parts":[[2024,10]]},"DOI":"10.1007\/s10922-024-09862-4","type":"journal-article","created":{"date-parts":[[2024,8,25]],"date-time":"2024-08-25T13:01:46Z","timestamp":1724590906000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Enhancing the Security of Software-Defined Networking through Forensic Memory Analysis"],"prefix":"10.1007","volume":"32","author":[{"given":"Filipe Augusto","family":"da Luz Lemos","sequence":"first","affiliation":[]},{"given":"Thiago","family":"dos Santos Cavali","sequence":"additional","affiliation":[]},{"given":"Keiko Ver\u00f4nica Ono","family":"Fonseca","sequence":"additional","affiliation":[]},{"given":"Mauro Sergio Pereira","family":"Fonseca","sequence":"additional","affiliation":[]},{"given":"Rubens Alexandre","family":"de Faria","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,8,25]]},"reference":[{"key":"9862_CR1","unstructured":"Br\u00fcgge, F., Hasan, M., Kulezak, M., Lueth, K.L., Pasqua, E., Sinha, S., Wegner, P., Baviskar, K., Taparia, A.: State of IoT\u2014Spring 2023 (2023)"},{"issue":"5","key":"9862_CR2","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/735142","volume":"10","author":"Leonardo Valdivieso Caraguay","year":"2014","unstructured":"Caraguay, Leonardo Valdivieso, Peral, A.B., L\u00f3pez, L.I.B., Villalba, L.J.G.: SDN: evolution and opportunities in the development IoT applications. Int. J. Distrib. Sens. Netw. 10(5), 735142 (2014). https:\/\/doi.org\/10.1155\/2014\/735142","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"9862_CR3","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1016\/j.jnca.2019.04.020","volume":"141","author":"S Saraswat","year":"2019","unstructured":"Saraswat, S., Agarwal, V., Gupta, H.P., Mishra, R., Gupta, A., Dutta, T.: Challenges and solutions in software defined networking: a survey. J. Netw. Comput. Appl. 141, 23\u201358 (2019)","journal-title":"J. Netw. Comput. Appl."},{"key":"9862_CR4","unstructured":"Duan, Q., Toy, M.: Virtualized Software-defined Networks and Services. Artech House Communications and Network Engineering Series. Artech House, Boston (2017). http:\/\/search.ebscohost.com\/login.aspx?direct=true&db=nlebk &AN=1511855 &lang=pt-br &site=ehost-live"},{"key":"9862_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10922-020-09575-4","volume":"29","author":"S Ahmad","year":"2021","unstructured":"Ahmad, S., Mir, A.H.: Scalability, consistency, reliability and security in SDN controllers: a survey of diverse SDN controllers. J. Netw. Syst. Manag. 29, 1\u201359 (2021)","journal-title":"J. Netw. Syst. Manag."},{"key":"9862_CR6","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1007\/s13369-017-2414-5","volume":"42","author":"NZ Bawany","year":"2017","unstructured":"Bawany, N.Z., Shamsi, J.A., Salah, K.: DDoS attack detection and mitigation using SDN: methods, practices, and solutions. Arab. J. Sci. Eng. 42, 425\u2013441 (2017)","journal-title":"Arab. J. Sci. Eng."},{"key":"9862_CR7","doi-asserted-by":"publisher","first-page":"5803","DOI":"10.1002\/sec.1737","volume":"9","author":"K Benzekki","year":"2016","unstructured":"Benzekki, K., Fergougui, A.E., Elalaoui, A.E.: Software-defined networking (SDN): a survey. Secur. Commun. Netw. 9, 5803\u20135833 (2016). https:\/\/doi.org\/10.1002\/sec.1737","journal-title":"Secur. Commun. Netw."},{"key":"9862_CR8","doi-asserted-by":"publisher","first-page":"2719","DOI":"10.1007\/s12083-021-01082-w","volume":"14","author":"A Celdr\u00c3n","year":"2021","unstructured":"Celdr\u00c3n, A., Karmakar, K., M\u00c3rmol, F., Varadharajan, V.: Detecting and mitigating cyberattacks using software defined networks for integrated clinical environments. Peer-to-Peer Netw. Appl. 14, 2719\u20132734 (2021). https:\/\/doi.org\/10.1007\/s12083-021-01082-w","journal-title":"Peer-to-Peer Netw. Appl."},{"issue":"3","key":"9862_CR9","doi-asserted-by":"publisher","first-page":"1617","DOI":"10.1109\/SURV.2014.012214.00180","volume":"16","author":"BAA Nunes","year":"2014","unstructured":"Nunes, B.A.A., Mendonca, M., Nguyen, X.-N., Obraczka, K., Turletti, T.: A survey of software-defined networking: past, present, and future of programmable networks. IEEE Commun. Surv. Tutor. 16(3), 1617\u20131634 (2014). https:\/\/doi.org\/10.1109\/SURV.2014.012214.00180. arxiv:1406.0440","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"9862_CR10","doi-asserted-by":"crossref","unstructured":"Chouikik, M., Ouaissa, M., Ouaissa, M., Boulouard, Z., Kissi, M.: Software-defined networking security: a comprehensive review. In: Big Data Analytics and Computational Intelligence for Cybersecurity, pp. 91\u2013108 (2022)","DOI":"10.1007\/978-3-031-05752-6_6"},{"issue":"4","key":"9862_CR11","doi-asserted-by":"publisher","first-page":"2317","DOI":"10.1109\/COMST.2015.2474118","volume":"17","author":"I Ahmad","year":"2015","unstructured":"Ahmad, I., Namal, S., Ylianttila, M., Gurtov, A.: Security in software defined networks: a survey. IEEE Commun. Surv. Tutor. 17(4), 2317\u20132346 (2015). https:\/\/doi.org\/10.1109\/COMST.2015.2474118","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"3","key":"9862_CR12","doi-asserted-by":"publisher","first-page":"3636","DOI":"10.1109\/TNSM.2024.3386404","volume":"21","author":"B Yuan","year":"2024","unstructured":"Yuan, B., Zhang, C., Ren, J., Chen, Q., Xu, B., Zhang, Q., Li, Z., Zou, D., Zhang, F., Jin, H.: Toward automated attack discovery in SDN controllers through formal verification. IEEE Trans. Netw. Serv. Manag. 21(3), 3636\u20133655 (2024). https:\/\/doi.org\/10.1109\/TNSM.2024.3386404","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"issue":"7","key":"9862_CR13","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1109\/MCOM.001.2100128","volume":"59","author":"ZJ Haas","year":"2021","unstructured":"Haas, Z.J., Culver, T.L., Sarac, K.: Vulnerability challenges of software defined networking. IEEE Commun. Mag. 59(7), 88\u201393 (2021)","journal-title":"IEEE Commun. Mag."},{"key":"9862_CR14","doi-asserted-by":"publisher","unstructured":"Dhandapani, K.P., Thanganadar\u00a0Thangathai, M., Hamead Haja\u00a0Moinudeen, S.: A novel eviction policy based on shortest remaining time for software defined networking flow tables. Int. J. Netw. Manag. 34(3), 2257 (2024). https:\/\/doi.org\/10.1002\/nem.2257","DOI":"10.1002\/nem.2257"},{"issue":"16","key":"9862_CR15","doi-asserted-by":"publisher","first-page":"5402","DOI":"10.1002\/cpe.5402","volume":"32","author":"R Santos","year":"2020","unstructured":"Santos, R., Souza, D., Santo, W., Ribeiro, A., Moreno, E.: Machine learning algorithms to detect DDoS attacks in SDN. Concurr. Comput. Pract. and Exp. 32(16), 5402 (2020)","journal-title":"Concurr. Comput. Pract. and Exp."},{"issue":"3","key":"9862_CR16","doi-asserted-by":"publisher","first-page":"3522","DOI":"10.1109\/TNSM.2024.3363490","volume":"21","author":"M Yue","year":"2024","unstructured":"Yue, M., Yan, Q., Lu, Z., Wu, Z.: CCS: A cross-plane collaboration strategy to defend against LDoS attacks in SDN. IEEE Trans. Netw. Serv. Manag. 21(3), 3522\u20133536 (2024). https:\/\/doi.org\/10.1109\/TNSM.2024.3363490","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"9862_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102595","volume":"159","author":"JCC Chica","year":"2020","unstructured":"Chica, J.C.C., Imbachi, J.C., Vega, J.F.B.: Security in SDN: a comprehensive survey. J. Netw. Comput. Appl. 159, 102595 (2020)","journal-title":"J. Netw. Comput. Appl."},{"key":"9862_CR18","doi-asserted-by":"crossref","unstructured":"Hakiri, A., Dezfouli, B.: Towards a blockchain-SDN architecture for secure and trustworthy 5G massive IoT networks. In: Proceedings of the 2021 ACM International Workshop on Software Defined Networks & Network Function Virtualization Security, pp. 11\u201318 (2021)","DOI":"10.1145\/3445968.3452090"},{"key":"9862_CR19","doi-asserted-by":"crossref","unstructured":"Monshizadeh, M., Khatri, V., Kantola, R.: An adaptive detection and prevention architecture for unsafe traffic in SDN enabled mobile networks. In: 2017 IFIP\/IEEE Symposium on Integrated Network and Service Management (IM), pp. 883\u2013884. IEEE (2017)","DOI":"10.23919\/INM.2017.7987395"},{"key":"9862_CR20","doi-asserted-by":"crossref","unstructured":"Monshizadeh, M., Khatri, V., Kantola, R.: Detection as a service: an SDN application. In: 2017 19th International Conference on Advanced Communication Technology (ICACT), pp. 285\u2013290. IEEE (2017)","DOI":"10.23919\/ICACT.2017.7890099"},{"key":"9862_CR21","doi-asserted-by":"crossref","unstructured":"Shao, Z., Zhu, X., Chikuvanyanga, A.M., Zhu, H.: Blockchain-based SDN security guaranteeing algorithm and analysis model. In: Wireless and Satellite Systems: 10th EAI International Conference, WiSATS 2019, Harbin, China, January 12\u201313, 2019, Proceedings, Part II 10, pp. 348\u2013362. Springer, Berlin (2019)","DOI":"10.1007\/978-3-030-19156-6_32"},{"key":"9862_CR22","first-page":"621","volume":"16","author":"J Ibrahim","year":"2017","unstructured":"Ibrahim, J., Gajin, S.: SDN-based intrusion detection system. Infoteh Jahorina 16, 621\u2013624 (2017)","journal-title":"Infoteh Jahorina"},{"key":"9862_CR23","doi-asserted-by":"crossref","unstructured":"Adeniji, O.D., Adekeye, D.B., Ajagbe, S.A., Adesina, A.O., Oguns, Y.J., Oladipupo, M.A.: Development of DDoS attack detection approach in software defined network using support vector machine classifier. In: Pervasive Computing and Social Networking: Proceedings of ICPCSN 2022, pp. 319\u2013331. Springer, Salem (2022)","DOI":"10.1007\/978-981-19-2840-6_25"},{"key":"9862_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2022.107706","volume":"99","author":"B Alhijawi","year":"2022","unstructured":"Alhijawi, B., Almajali, S., Elgala, H., Salameh, H.B., Ayyash, M.: A survey on DoS\/DDoS mitigation techniques in SDNs: classification, comparison, solutions, testing tools and datasets. Comput. Electr. Eng. 99, 107706 (2022)","journal-title":"Comput. Electr. Eng."},{"issue":"9","key":"9862_CR25","doi-asserted-by":"publisher","first-page":"4534","DOI":"10.1002\/ett.4534","volume":"33","author":"N Aslam","year":"2022","unstructured":"Aslam, N., Srivastava, S., Gore, M.: ONOS flood defender: an intelligent approach to mitigate DDoS attack in SDN. Trans. Emerg. Telecommun. Technol. 33(9), 4534 (2022)","journal-title":"Trans. Emerg. Telecommun. Technol."},{"key":"9862_CR26","doi-asserted-by":"crossref","unstructured":"Elsayed, M.S., Jahromi, H.Z., Nazir, M.M., Jurcut, A.D.: The role of CNN for intrusion detection systems: an improved CNN learning approach for SDNs. In: International Conference on Future Access Enablers of Ubiquitous and Intelligent Infrastructures, pp. 91\u2013104. Springer, Berlin (2021)","DOI":"10.1007\/978-3-030-78459-1_7"},{"key":"9862_CR27","doi-asserted-by":"publisher","unstructured":"Golchin, P., Zhou, C., Agnihotri, P., Agnihotri, P., Hajizadeh, M., Kundel, R., Steinmetz, R.: Cml-ids: enhancing intrusion detection in SDN through collaborative machine learning. In: 2023 19th International Conference on Network and Service Management (CNSM), pp. 1\u20139 (2023). https:\/\/doi.org\/10.23919\/CNSM59352.2023.10327863","DOI":"10.23919\/CNSM59352.2023.10327863"},{"key":"9862_CR28","doi-asserted-by":"publisher","first-page":"181782","DOI":"10.1109\/ACCESS.2020.3028603","volume":"8","author":"X Yang","year":"2020","unstructured":"Yang, X., Wang, D., Tang, W., Feng, W., Zhu, C.: IPsec cryptographic algorithm invocation considering performance and security for SDN southbound interface communication. IEEE Access 8, 181782\u2013181795 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.3028603","journal-title":"IEEE Access"},{"key":"9862_CR29","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.116225","volume":"191","author":"GF Scaranti","year":"2022","unstructured":"Scaranti, G.F., Carvalho, L.F., Barbon, S., Lloret, J., Proen\u00e7a, M.L.: Unsupervised online anomaly detection in software defined network environments. Expert Syst. Appl. 191, 116225 (2022). https:\/\/doi.org\/10.1016\/j.eswa.2021.116225","journal-title":"Expert Syst. Appl."},{"key":"9862_CR30","doi-asserted-by":"publisher","unstructured":"Ali, J., Roh, B.: Management of software-defined networking powered by artificial intelligence (2022). https:\/\/doi.org\/10.5772\/intechopen.97197","DOI":"10.5772\/intechopen.97197"},{"key":"9862_CR31","doi-asserted-by":"publisher","unstructured":"Latah, M.: Artificial intelligence enabled software defined networking: a comprehensive overview (2018) https:\/\/doi.org\/10.48550\/arxiv.1803.06818","DOI":"10.48550\/arxiv.1803.06818"},{"key":"9862_CR32","doi-asserted-by":"publisher","first-page":"6564","DOI":"10.3390\/app10186564","volume":"10","author":"Y Wu","year":"2020","unstructured":"Wu, Y., Hwang, P., Hwang, W., Cheng, M.: Artificial intelligence enabled routing in software defined networking. Appl. Sci. 10, 6564 (2020). https:\/\/doi.org\/10.3390\/app10186564","journal-title":"Appl. Sci."},{"key":"9862_CR33","doi-asserted-by":"publisher","unstructured":"Jasinski, A., Qiao, Y., Fallon, E., Flynn, R.: Natural language processing applied to dynamic workflow generation for network management. In: NOMS 2022-2022 IEEE\/IFIP Network Operations and Management Symposium, pp. 1\u20136 (2022). https:\/\/doi.org\/10.1109\/NOMS54207.2022.9789709","DOI":"10.1109\/NOMS54207.2022.9789709"},{"key":"9862_CR34","unstructured":"Silva\u00a0Eleut\u00e9rio, P.M., Machado, M.P.: Desvendando a Computa\u00e7\u00e3o forense. Novatec Editora, S\u00e3o Paulo (2019)"},{"issue":"3","key":"9862_CR35","first-page":"899","volume":"21","author":"S Yang","year":"2020","unstructured":"Yang, S., Wang, L., Zhang, S., Zhao, D., Xu, L.: A method for acquiring network information from Linux memory image in software-defined networking. J. Internet Technol. 21(3), 899\u2013908 (2020)","journal-title":"J. Internet Technol."},{"issue":"1","key":"9862_CR36","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/s11831-021-09575-w","volume":"29","author":"P Purnaye","year":"2022","unstructured":"Purnaye, P., Kulkarni, V.: A comprehensive study of cloud forensics. Arch. Comput. Methods Eng. 29(1), 33\u201346 (2022)","journal-title":"Arch. Comput. Methods Eng."},{"key":"9862_CR37","doi-asserted-by":"publisher","unstructured":"Waseem, Q., Alshamrani, S.S., Nisar, K., Wan\u00a0Din, W.I.S., Alghamdi, A.S.: Future technology: software-defined network (SDN) forensic. Symmetry 13(5) (2021). https:\/\/doi.org\/10.3390\/sym13050767","DOI":"10.3390\/sym13050767"},{"key":"9862_CR38","doi-asserted-by":"publisher","unstructured":"Nam, S., Jeong, E., Hong, J., Yoo, J.-H., Hong, J.W.-K.: Log analysis and prediction for anomaly detection in network switches. In: 2023 19th International Conference on Network and Service Management (CNSM), pp. 1\u20137 (2023). https:\/\/doi.org\/10.23919\/CNSM59352.2023.10327879","DOI":"10.23919\/CNSM59352.2023.10327879"},{"key":"9862_CR39","doi-asserted-by":"publisher","unstructured":"Achleitner, S., La\u00a0Porta, T., Jaeger, T., McDaniel, P.: Adversarial network forensics in software defined networking. In: Proceedings of the Symposium on SDN Research. SOSR\u201917, pp. 8\u201320. Association for Computing Machinery, New York (2017). https:\/\/doi.org\/10.1145\/3050220.3050223","DOI":"10.1145\/3050220.3050223"},{"key":"9862_CR40","unstructured":"Leichtnam, L., Totel, E., Prigent, N., M\u00e9, L.: Novelty detection on graph structured data to detect network intrusions. In: CAID 2020-Conference on Artificial Intelligence for Defense (2020)"},{"key":"9862_CR41","doi-asserted-by":"publisher","unstructured":"Cui, J., Zhang, J., He, J., Zhong, H., Lu, Y.: DDoS detection and defense mechanism for SDN controllers with k-means. In: 2020 IEEE\/ACM 13th International Conference on Utility and Cloud Computing (UCC), pp. 394\u2013401 (2020). https:\/\/doi.org\/10.1109\/UCC48980.2020.00062","DOI":"10.1109\/UCC48980.2020.00062"},{"key":"9862_CR42","doi-asserted-by":"publisher","unstructured":"Salaria, S., Arora, S., Goyal, N., Goyal, P., Sharma, S.: Implementation and analysis of an improved PCA technique for DDoS detection. In: 2020 IEEE 5th International Conference on Computing Communication and Automation (ICCCA), pp. 280\u2013285 (2020). https:\/\/doi.org\/10.1109\/ICCCA49541.2020.9250912","DOI":"10.1109\/ICCCA49541.2020.9250912"},{"key":"9862_CR43","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s42979-021-00467-1","volume":"2","author":"A Makuvaza","year":"2021","unstructured":"Makuvaza, A., Jat, D.S., Gamundani, A.M.: Deep neural network (DNN) solution for real-time detection of distributed denial of service (DDoS) attacks in software defined networks (SDNs). SN Comput. Sci. 2, 1\u201310 (2021)","journal-title":"SN Comput. Sci."},{"key":"9862_CR44","doi-asserted-by":"publisher","unstructured":"Priyadarshini, I., Mohanty, P., Alkhayyat, A., Sharma, R., Kumar, S.: SDN and application layer DDoS attacks detection in IoT devices by attention-based BI-LSTM-CNN. Trans. Emerg. Telecommun. Technol. n\/a(n\/a), 4758 (2023). https:\/\/doi.org\/10.1002\/ett.4758. https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/ett.4758","DOI":"10.1002\/ett.4758"},{"key":"9862_CR45","doi-asserted-by":"publisher","unstructured":"Wang, H., Li, W.: DDosTC: A transformer-based network attack detection hybrid mechanism in SDN. Sensors 21(15) (2021). https:\/\/doi.org\/10.3390\/s21155047","DOI":"10.3390\/s21155047"},{"issue":"3","key":"9862_CR46","doi-asserted-by":"publisher","first-page":"239","DOI":"10.18280\/ijsse.110304","volume":"11","author":"R Umar","year":"2021","unstructured":"Umar, R., Riadi, I., Kusuma, R.S.: Mitigating sodinokibi ransomware attack on cloud network using software-defined networking (SDN). Int. J. Saf. Secur. Eng. 11(3), 239\u2013246 (2021)","journal-title":"Int. J. Saf. Secur. Eng."},{"issue":"2","key":"9862_CR47","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1145\/1355734.1355746","volume":"38","author":"N McKeown","year":"2008","unstructured":"McKeown, N., Anderson, T., Balakrishnan, H., Parulkar, G., Peterson, L., Rexford, J., Shenker, S., Turner, J.: Openflow: Enabling innovation in campus networks. SIGCOMM Comput. Commun. Rev. 38(2), 69\u201374 (2008). https:\/\/doi.org\/10.1145\/1355734.1355746","journal-title":"SIGCOMM Comput. Commun. Rev."}],"container-title":["Journal of Network and Systems Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-024-09862-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10922-024-09862-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-024-09862-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T15:15:20Z","timestamp":1730301320000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10922-024-09862-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,25]]},"references-count":47,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,10]]}},"alternative-id":["9862"],"URL":"https:\/\/doi.org\/10.1007\/s10922-024-09862-4","relation":{},"ISSN":["1064-7570","1573-7705"],"issn-type":[{"value":"1064-7570","type":"print"},{"value":"1573-7705","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,8,25]]},"assertion":[{"value":"14 March 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 August 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 August 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 August 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"82"}}