{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T12:36:06Z","timestamp":1776947766564,"version":"3.51.4"},"reference-count":57,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,12,26]],"date-time":"2024-12-26T00:00:00Z","timestamp":1735171200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,26]],"date-time":"2024-12-26T00:00:00Z","timestamp":1735171200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Netw Syst Manage"],"published-print":{"date-parts":[[2025,1]]},"DOI":"10.1007\/s10922-024-09889-7","type":"journal-article","created":{"date-parts":[[2024,12,26]],"date-time":"2024-12-26T11:56:04Z","timestamp":1735214164000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["MLP-Based Intrusion Detection for Securing IoT Networks"],"prefix":"10.1007","volume":"33","author":[{"given":"Sarra","family":"Cherfi","sequence":"first","affiliation":[]},{"given":"Ali","family":"Lemouari","sequence":"additional","affiliation":[]},{"given":"Ammar","family":"Boulaiche","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,26]]},"reference":[{"key":"9889_CR1","unstructured":"Deibert, R.J., Villeneuve, N.: Firewalls and power: An overview of global state censorship of the internet. Human rights in the digital age 125\u2013138 (2016)"},{"key":"9889_CR2","doi-asserted-by":"crossref","unstructured":"Al-Asli, M., Ghaleb, T.A.: Review of signature-based techniques in antivirus products. booktitle, 1\u20136 (IEEE, 2019)","DOI":"10.1109\/ICCISci.2019.8716381"},{"key":"9889_CR3","doi-asserted-by":"publisher","first-page":"103261","DOI":"10.1016\/j.micpro.2020.103261","volume":"79","author":"S Manimurugan","year":"2020","unstructured":"Manimurugan, S., Majdi, A.-Q., Mohmmed, M., Narmatha, C., Varatharajan, R.: Intrusion detection in networks using crow search optimization algorithm with adaptive neuro-fuzzy inference system. Microprocess. Microsys. 79, 103261 (2020)","journal-title":"Microprocess. Microsys."},{"issue":"1","key":"9889_CR4","doi-asserted-by":"publisher","first-page":"368589368589","DOI":"10.1155\/2009\/368589","volume":"2009","author":"M Hamdi","year":"2008","unstructured":"Hamdi, M., Meddeb-Makhlouf, A., Boudriga, N.: Multilayer statistical intrusion detection in wireless networks. EURASIP J. Adv. Signal Process. 2009(1), 368589368589 (2008)","journal-title":"EURASIP J. Adv. Signal Process."},{"issue":"1","key":"9889_CR5","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1016\/j.jnca.2012.05.003","volume":"36","author":"C Modi","year":"2013","unstructured":"Modi, C., et al.: A survey of intrusion detection techniques in cloud. J. Netw. Comput. Appl. 36(1), 42\u201357 (2013)","journal-title":"J. Netw. Comput. Appl."},{"key":"9889_CR6","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1007\/s11235-017-0395-z","volume":"68","author":"A Boulaiche","year":"2018","unstructured":"Boulaiche, A., Adi, K.: An auto-learning approach for network intrusion detection. Telecommun. Sys. 68, 277\u2013294 (2018)","journal-title":"Telecommun. Sys."},{"key":"9889_CR7","doi-asserted-by":"publisher","first-page":"450","DOI":"10.1016\/j.procs.2012.06.058","volume":"10","author":"A Boulaiche","year":"2012","unstructured":"Boulaiche, A., Bouzayani, H., Adi, K.: A quantitative approach for intrusions detection and prevention based on statistical n-gram models. Procedia Comput. Sci. 10, 450\u2013457 (2012)","journal-title":"Procedia Comput. Sci."},{"issue":"16","key":"9889_CR8","doi-asserted-by":"publisher","first-page":"1569","DOI":"10.1016\/j.comcom.2004.07.002","volume":"27","author":"JM Estevez-Tapiador","year":"2004","unstructured":"Estevez-Tapiador, J.M., Garcia-Teodoro, P., Diaz-Verdejo, J.E.: Anomaly detection methods in wired networks: a survey and taxonomy. Comput. Commun. 27(16), 1569\u20131584 (2004)","journal-title":"Comput. Commun."},{"issue":"2","key":"9889_CR9","doi-asserted-by":"publisher","first-page":"1153","DOI":"10.1109\/COMST.2015.2494502","volume":"18","author":"AL Buczak","year":"2015","unstructured":"Buczak, A.L., Guven, E.: A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Commun. Surv. Tutor. 18(2), 1153\u20131176 (2015)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"9889_CR10","unstructured":"Schrijver, A., et al.: Combinatorial optimization: polyhedra and efficiency, vol. 24. Springer (2003)"},{"key":"9889_CR11","doi-asserted-by":"crossref","unstructured":"Benaicha, S.\u00a0E., Saoudi, L., Guermeche, S. E.\u00a0B., Lounis, O.: Intrusion detection system using genetic algorithm. booktitle, 564\u2013568 (IEEE, 2014)","DOI":"10.1109\/SAI.2014.6918242"},{"key":"9889_CR12","doi-asserted-by":"crossref","unstructured":"Mounji, A., Le\u00a0Charlier, B., Zampunieris, D., Habra, N.: Distributed audit trail analysis. booktitle, 102\u2013112 (IEEE, 1995)","DOI":"10.1109\/NDSS.1995.390641"},{"key":"9889_CR13","doi-asserted-by":"crossref","unstructured":"Lindqvist, U., Porras, P.\u00a0A.: Detecting computer and network misuse through the production-based expert system toolset (p-best). booktitle, 146\u2013161 (IEEE, 1999)","DOI":"10.1109\/SECPRI.1999.766911"},{"key":"9889_CR14","unstructured":"Ghafir, I., Husak, M., Prenosil, V.: A survey on intrusion detection and prevention systems. booktitle, Vol. 1014 (2014)"},{"issue":"7","key":"9889_CR15","doi-asserted-by":"publisher","first-page":"810","DOI":"10.1109\/TC.2002.1017701","volume":"51","author":"N Ye","year":"2002","unstructured":"Ye, N., Emran, S.M., Chen, Q., Vilbert, S.: Multivariate statistical analysis of audit trails for host-based intrusion detection. IEEE Transac. Comput. 51(7), 810\u2013820 (2002)","journal-title":"IEEE Transac. Comput."},{"key":"9889_CR16","doi-asserted-by":"crossref","unstructured":"Burgetov\u00e1, I., Matou\u0161ek, P., Ry\u0161av\u1ef3, O.: Anomaly detection of ics communication using statistical models. booktitle, 166\u2013172 (IEEE, 2021)","DOI":"10.23919\/CNSM52442.2021.9615510"},{"key":"9889_CR17","doi-asserted-by":"crossref","unstructured":"Estevez-Tapiador, J.\u00a0M., Garcia-Teodoro, P., Diaz-Verdejo, J.\u00a0E.: Stochastic protocol modeling for anomaly based network intrusion detection. booktitle, 3\u201312 (IEEE, 2003)","DOI":"10.1109\/IWIAS.2003.1192454"},{"key":"9889_CR18","doi-asserted-by":"crossref","unstructured":"Sekar, R. et\u00a0al.: Specification-based anomaly detection: a new approach for detecting network intrusions. booktitle, 265\u2013274 (2002)","DOI":"10.1145\/586110.586146"},{"issue":"3","key":"9889_CR19","doi-asserted-by":"publisher","first-page":"503","DOI":"10.1007\/s00607-021-01001-0","volume":"104","author":"H Bangui","year":"2022","unstructured":"Bangui, H., Ge, M., Buhnova, B.: A hybrid machine learning model for intrusion detection in vanet. Computing 104(3), 503\u2013531 (2022)","journal-title":"Computing"},{"key":"9889_CR20","doi-asserted-by":"crossref","unstructured":"Abu Al-Haija, Q., Al\u00a0Badawi, A.: High-performance intrusion detection system for networked uavs via deep learning. Neural Computing and Applications 34\u00a0(13), 10885\u201310900 (2022)","DOI":"10.1007\/s00521-022-07015-9"},{"issue":"1","key":"9889_CR21","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/s12530-020-09364-z","volume":"13","author":"H Azzaoui","year":"2022","unstructured":"Azzaoui, H., Boukhamla, A.Z.E., Arroyo, D., Bensayah, A.: Developing new deep-learning model to enhance network intrusion classification. Evol. Sys. 13(1), 17\u201325 (2022)","journal-title":"Evol. Sys."},{"issue":"5\u20136","key":"9889_CR22","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1007\/s12243-021-00852-0","volume":"77","author":"A Rosay","year":"2022","unstructured":"Rosay, A., Riou, K., Carlier, F., Leroux, P.: Multi-layer perceptron for network intrusion detection: From a study on two recent data sets to deployment on automotive processor. Annal Telecommun. 77(5\u20136), 371\u2013394 (2022)","journal-title":"Annal Telecommun."},{"key":"9889_CR23","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/s12065-019-00291-w","volume":"14","author":"V Kumar","year":"2021","unstructured":"Kumar, V., Das, A.K., Sinha, D.: Uids: a unified intrusion detection system for iot environment. Evolut. Intell. 14, 47\u201359 (2021)","journal-title":"Evolut. Intell."},{"issue":"5","key":"9889_CR24","doi-asserted-by":"publisher","first-page":"3719","DOI":"10.1007\/s40747-021-00498-4","volume":"8","author":"A Singh","year":"2022","unstructured":"Singh, A., Chatterjee, K., Satapathy, S.C.: An edge based hybrid intrusion detection framework for mobile edge computing. Complex Intell. Sys. 8(5), 3719\u20133746 (2022)","journal-title":"Complex Intell. Sys."},{"issue":"6","key":"9889_CR25","doi-asserted-by":"publisher","first-page":"4149","DOI":"10.1007\/s11276-020-02321-3","volume":"26","author":"S Hosseini","year":"2020","unstructured":"Hosseini, S.: A new machine learning method consisting of ga-lr and ann for attack detection. Wirel. Netw. 26(6), 4149\u20134162 (2020)","journal-title":"Wirel. Netw."},{"issue":"1\u20132","key":"9889_CR26","first-page":"49","volume":"2","author":"X Xu","year":"2006","unstructured":"Xu, X.: Adaptive intrusion detection based on machine learning: feature extraction, classifier construction and sequential pattern prediction. Int. J. Web Serv. Prac. 2(1\u20132), 49\u201358 (2006)","journal-title":"Int. J. Web Serv. Prac."},{"issue":"5","key":"9889_CR27","doi-asserted-by":"publisher","first-page":"841","DOI":"10.1080\/18756891.2015.1084705","volume":"8","author":"M Albayati","year":"2015","unstructured":"Albayati, M., Issac, B.: Analysis of intelligent classifiers and enhancing the detection accuracy for intrusion detection system. Int. J. Comput. Intell. Sys. 8(5), 841\u2013853 (2015)","journal-title":"Int. J. Comput. Intell. Sys."},{"key":"9889_CR28","unstructured":"Wahba, Y., ElSalamouny, E., ElTaweel, G.: Improving the performance of multi-class intrusion detection systems using feature reduction. arXiv preprint arXiv:1507.06692 (2015)"},{"issue":"6","key":"9889_CR29","first-page":"446","volume":"4","author":"L Dhanabal","year":"2015","unstructured":"Dhanabal, L., Shantharajah, S.: A study on nsl-kdd dataset for intrusion detection system based on classification algorithms. Int. J. Adv. Res. Comput. Commun. Engineer. 4(6), 446\u2013452 (2015)","journal-title":"Int. J. Adv. Res. Comput. Commun. Engineer."},{"issue":"3","key":"9889_CR30","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1007\/s10922-024-09829-5","volume":"32","author":"R Aljohani","year":"2024","unstructured":"Aljohani, R., Bushnag, A., Alessa, A.: Ai-based intrusion detection for a secure internet of things (iot). J. Netw. Sys. Manag. 32(3), 56 (2024)","journal-title":"J. Netw. Sys. Manag."},{"key":"9889_CR31","doi-asserted-by":"crossref","unstructured":"Stevanovic, M., Pedersen, J.\u00a0M.: An efficient flow-based botnet detection using supervised machine learning. booktitle, 797\u2013801 (IEEE, 2014)","DOI":"10.1109\/ICCNC.2014.6785439"},{"issue":"3","key":"9889_CR32","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1007\/s10922-023-09748-x","volume":"31","author":"DD Kulkarni","year":"2023","unstructured":"Kulkarni, D.D., Jaiswal, R.K.: An intrusion detection system using extended kalman filter and neural networks for iot networks. J. Netw. Sys. Manag. 31(3), 56 (2023)","journal-title":"J. Netw. Sys. Manag."},{"issue":"2","key":"9889_CR33","doi-asserted-by":"publisher","first-page":"2040","DOI":"10.1109\/TNSM.2022.3207094","volume":"20","author":"RR dos Santos","year":"2022","unstructured":"dos Santos, R.R., Viegas, E.K., Santin, A.O., Cogo, V.V.: Reinforcement learning for intrusion detection: More model longness and fewer updates. IEEE Transac. n Netw. Serv. Manag. 20(2), 2040\u20132055 (2022)","journal-title":"IEEE Transac. n Netw. Serv. Manag."},{"key":"9889_CR34","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.107042","volume":"168","author":"W Elmasry","year":"2020","unstructured":"Elmasry, W., Akbulut, A., Zaim, A.H.: Evolving deep learning architectures for network intrusion detection using a double pso metaheuristic. Comput. Netw. 168, 107042 (2020)","journal-title":"Comput. Netw."},{"key":"9889_CR35","doi-asserted-by":"crossref","unstructured":"Yulianto, A., Sukarno, P., Suwastika, N.A.: Improving adaboost-based intrusion detection system (ids) performance on cic ids 2017 dataset. booktitle, Vol. 1192, 012018 (IOP Publishing, 2019)","DOI":"10.1088\/1742-6596\/1192\/1\/012018"},{"key":"9889_CR36","doi-asserted-by":"publisher","first-page":"1249","DOI":"10.1007\/s12652-020-02167-9","volume":"12","author":"A Thakkar","year":"2021","unstructured":"Thakkar, A., Lohiya, R.: Attack classification using feature selection techniques: a comparative study. J. Ambient Intell. Human. Comput. 12, 1249\u20131266 (2021)","journal-title":"J. Ambient Intell. Human. Comput."},{"key":"9889_CR37","doi-asserted-by":"crossref","unstructured":"Jankowski, D., Amanowicz, M.: On efficiency of selected machine learning algorithms for intrusion detection in software defined networks. International Journal of Electronics and Telecommunications 62\u00a0(3) (2016)","DOI":"10.1515\/eletel-2016-0033"},{"key":"9889_CR38","doi-asserted-by":"crossref","unstructured":"Ustebay, S., Turgut, Z., Aydin, M.\u00a0A.: Intrusion detection system with recursive feature elimination by using random forest and deep learning classifier. booktitle, 2018 international congress on big data, deep learning and fighting cyber terrorism (IBIGDELFT), 71\u201376 (IEEE, 2018)","DOI":"10.1109\/IBIGDELFT.2018.8625318"},{"key":"9889_CR39","doi-asserted-by":"publisher","first-page":"2099","DOI":"10.1007\/s10586-021-03249-9","volume":"24","author":"M Jain","year":"2021","unstructured":"Jain, M., Kaur, G.: Distributed anomaly detection using concept drift detection based hybrid ensemble techniques in streamed network data. Cluster Comput. 24, 2099\u20132114 (2021)","journal-title":"Cluster Comput."},{"key":"9889_CR40","doi-asserted-by":"crossref","unstructured":"Golchin, P., Kundel, R., Steuer, T., Hark, R., Steinmetz, R.: Improving ddos attack detection leveraging a multi-aspect ensemble feature selection. booktitle, 1\u20135 (IEEE, 2022)","DOI":"10.1109\/NOMS54207.2022.9789763"},{"key":"9889_CR41","doi-asserted-by":"crossref","unstructured":"Alotaibi, S.\u00a0D. et\u00a0al. Deep neural network-based intrusion detection system through pca. Mathematical Problems in Engineering 2022 (2022)","DOI":"10.1155\/2022\/6488571"},{"issue":"1","key":"9889_CR42","doi-asserted-by":"publisher","first-page":"437","DOI":"10.1007\/s11277-021-09139-y","volume":"123","author":"P Choobdar","year":"2022","unstructured":"Choobdar, P., Naderan, M., Naderan, M.: Detection and multi-class classification of intrusion in software defined networks using stacked auto-encoders and cicids2017 dataset. Wirel. Person. Commun. 123(1), 437\u2013471 (2022)","journal-title":"Wirel. Person. Commun."},{"key":"9889_CR43","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.119030","volume":"213","author":"MHL Louk","year":"2023","unstructured":"Louk, M.H.L., Tama, B.A.: Dual-ids: A bagging-based gradient boosting decision tree model for network anomaly intrusion detection system. Exp. Sys. Appl. 213, 119030 (2023)","journal-title":"Exp. Sys. Appl."},{"issue":"4","key":"9889_CR44","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1007\/s10922-023-09767-8","volume":"31","author":"AT Azar","year":"2023","unstructured":"Azar, A.T., Shehab, E., Mattar, A.M., Hameed, I.A., Elsaid, S.A.: Deep learning based hybrid intrusion detection systems to protect satellite networks. J. Netw. Sys. Manag. 31(4), 82 (2023)","journal-title":"J. Netw. Sys. Manag."},{"key":"9889_CR45","doi-asserted-by":"crossref","unstructured":"Salama, M.\u00a0A., Eid, H.\u00a0F., Ramadan, R.\u00a0A., Darwish, A., Hassanien, A.\u00a0E.: In: Hybrid intelligent intrusion detection scheme booktitle 293\u2013303 (Springer, 2011)","DOI":"10.1007\/978-3-642-20505-7_26"},{"issue":"1\u20133","key":"9889_CR46","first-page":"18","volume":"25","author":"N Moustafa","year":"2016","unstructured":"Moustafa, N., Slay, J.: The evaluation of network anomaly detection systems: Statistical analysis of the unsw-nb15 data set and the comparison with the kdd99 data set. Inf. Secur. J. Global Pers. 25(1\u20133), 18\u201331 (2016)","journal-title":"Inf. Secur. J. Global Pers."},{"issue":"4","key":"9889_CR47","doi-asserted-by":"publisher","first-page":"481","DOI":"10.1109\/TBDATA.2017.2715166","volume":"5","author":"N Moustafa","year":"2017","unstructured":"Moustafa, N., Slay, J., Creech, G.: Novel geometric area analysis technique for anomaly detection using trapezoidal area estimation on large-scale networks. IEEE Transac. Big Data 5(4), 481\u2013494 (2017)","journal-title":"IEEE Transac. Big Data"},{"key":"9889_CR48","first-page":"108","volume":"1","author":"I Sharafaldin","year":"2018","unstructured":"Sharafaldin, I., Lashkari, A.H., Ghorbani, A.A.: Toward generating a new intrusion detection dataset and intrusion traffic characterization. ICISSp 1, 108\u2013116 (2018)","journal-title":"ICISSp"},{"issue":"6","key":"9889_CR49","doi-asserted-by":"publisher","first-page":"1087","DOI":"10.1063\/1.1699114","volume":"21","author":"N Metropolis","year":"1953","unstructured":"Metropolis, N., Rosenbluth, A.W., Rosenbluth, M.N., Teller, A.H., Teller, E.: Equation of state calculations by fast computing machines. J. Chem. Phys. 21(6), 1087\u20131092 (1953)","journal-title":"J. Chem. Phys."},{"key":"9889_CR50","unstructured":"O\u2019Keeffe, M., Cinn\u00e9ide, M.\u00a0O.: A stochastic approach to automated design improvement. booktitle, Vol.\u00a042, 59\u201362 (2003)"},{"issue":"4","key":"9889_CR51","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1287\/trsc.1050.0135","volume":"40","author":"S Ropke","year":"2006","unstructured":"Ropke, S., Pisinger, D.: An adaptive large neighborhood search heuristic for the pickup and delivery problem with time windows. Transport. Sci. 40(4), 455\u2013472 (2006)","journal-title":"Transport. Sci."},{"key":"9889_CR52","doi-asserted-by":"crossref","unstructured":"Rumelhart, D.E., Hinton, G.E., Williams, R.J.: Learning internal representations by error propagation. California Univ San Diego La Jolla Inst for Cognitive Science, Tech. Rep. (1985)","DOI":"10.21236\/ADA164453"},{"key":"9889_CR53","doi-asserted-by":"crossref","unstructured":"Vashishtha, L.\u00a0K., Singh, A.\u00a0P., Chatterjee, K. Hidm: A hybrid intrusion detection model for cloud based systems. Wireless Personal Communications 1\u201330 (2022)","DOI":"10.1007\/s11277-022-10063-y"},{"issue":"1","key":"9889_CR54","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40537-020-00379-6","volume":"7","author":"SM Kasongo","year":"2020","unstructured":"Kasongo, S.M., Sun, Y.: Performance analysis of intrusion detection systems using a feature selection method on the unsw-nb15 dataset. J. Big Data 7(1), 1\u201320 (2020)","journal-title":"J. Big Data"},{"key":"9889_CR55","doi-asserted-by":"crossref","unstructured":"Jing, D., Chen, H.-B.: Svm based network intrusion detection for the unsw-nb15 dataset. booktitle, 1\u20134 (IEEE, 2019)","DOI":"10.1109\/ASICON47005.2019.8983598"},{"key":"9889_CR56","doi-asserted-by":"crossref","unstructured":"Wu, P., Moustafa, N., Yang, S., Guo, H.: Densely connected residual network for attack recognition. booktitle, 233\u2013242 (IEEE, 2020)","DOI":"10.1109\/TrustCom50675.2020.00042"},{"issue":"7","key":"9889_CR57","doi-asserted-by":"publisher","first-page":"1223","DOI":"10.3390\/en12071223","volume":"12","author":"J Gao","year":"2019","unstructured":"Gao, J., Chai, S., Zhang, B., Xia, Y.: Research on network intrusion detection based on incremental extreme learning machine and adaptive principal component analysis. Energies 12(7), 1223 (2019)","journal-title":"Energies"}],"container-title":["Journal of Network and Systems Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-024-09889-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10922-024-09889-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-024-09889-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,28]],"date-time":"2025-01-28T23:20:41Z","timestamp":1738106441000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10922-024-09889-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,26]]},"references-count":57,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1]]}},"alternative-id":["9889"],"URL":"https:\/\/doi.org\/10.1007\/s10922-024-09889-7","relation":{},"ISSN":["1064-7570","1573-7705"],"issn-type":[{"value":"1064-7570","type":"print"},{"value":"1573-7705","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12,26]]},"assertion":[{"value":"10 August 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 November 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 November 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 December 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}}],"article-number":"20"}}