{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T23:05:11Z","timestamp":1768431911240,"version":"3.49.0"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2025,6,20]],"date-time":"2025-06-20T00:00:00Z","timestamp":1750377600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,6,20]],"date-time":"2025-06-20T00:00:00Z","timestamp":1750377600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Netw Syst Manage"],"published-print":{"date-parts":[[2025,7]]},"DOI":"10.1007\/s10922-025-09941-0","type":"journal-article","created":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T23:54:42Z","timestamp":1750377282000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Mathematical Modelling of ANP for Trust Based IoT Device Categorization in Secured Smart Logistics"],"prefix":"10.1007","volume":"33","author":[{"given":"Arbab Waseem","family":"Abbas","sequence":"first","affiliation":[]},{"given":"Safdar Nawaz Khan","family":"Marwat","sequence":"additional","affiliation":[]},{"given":"Ala","family":"Al-Fuqaha","sequence":"additional","affiliation":[]},{"given":"Ghassen Ben","family":"Brahim","sequence":"additional","affiliation":[]},{"given":"Salman","family":"Ahmed","sequence":"additional","affiliation":[]},{"given":"Waseem Ullah","family":"Khan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,20]]},"reference":[{"key":"9941_CR1","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/s10922-023-09754-z","volume":"31","author":"DR Gomes","year":"2023","unstructured":"Gomes, D.R., Lins, F., N\u00f3brega, O., Felix, E.F., Jesus, B.A., Vieira, M.: Security evaluation of authentication requirements in IoT gateways. J. Netw. Syst. Manag. 31, 67 (2023). https:\/\/doi.org\/10.1007\/s10922-023-09754-z","journal-title":"J. Netw. Syst. Manag."},{"key":"9941_CR2","doi-asserted-by":"publisher","first-page":"882","DOI":"10.1007\/s10922-020-09564-7","volume":"28","author":"C Hesselman","year":"2020","unstructured":"Hesselman, C., Grosso, P., Holz, R., Kuipers, F., Xue, H.J., Jonker, M., Ruiter, J., Sperotto, A., Rijswijk-Deij, R., Moura, G., Pras, A., Laat, C.: A responsible internet to increase trust in the digital world. J. Netw. Syst. Manag. 28, 882\u2013922 (2020). https:\/\/doi.org\/10.1007\/s10922-020-09564-7","journal-title":"J. Netw. Syst. Manag."},{"issue":"3","key":"9941_CR3","doi-asserted-by":"publisher","first-page":"3073","DOI":"10.48084\/etasr.2104","volume":"8","author":"S Alshehri","year":"2018","unstructured":"Alshehri, S.: Multi-criteria Decision Making (MCDM) methods for ranking estimation techniques in extreme programming. Eng. Technol. Appl. Sci. Res. 8(3), 3073\u20133078 (2018). https:\/\/doi.org\/10.48084\/etasr.2104","journal-title":"Eng. Technol. Appl. Sci. Res."},{"issue":"1","key":"9941_CR4","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1080\/23335777.2021.1933194","volume":"9","author":"B Rakesh","year":"2021","unstructured":"Rakesh, B., Parveen Sultana, H.: Novel authentication and secure trust based RPL Routing in mobile sink supported Internet of Things. Cyber-Phys. Syst. 9(1), 43\u201376 (2021). https:\/\/doi.org\/10.1080\/23335777.2021.1933194","journal-title":"Cyber-Phys. Syst."},{"key":"9941_CR5","doi-asserted-by":"publisher","unstructured":"Verma, A., Ranga, V.: Addressing flooding attacks in IPv6-based Low Power and Lossy Networks. In: TENCON 2019\u20142019 IEEE Region 10 Conference (TENCON), pp. 552\u2013557 (2019). https:\/\/doi.org\/10.1109\/TENCON.2019.8929409","DOI":"10.1109\/TENCON.2019.8929409"},{"key":"9941_CR6","doi-asserted-by":"publisher","unstructured":"Seeber, S., Sehgal, A., Stelte, B., Rodosek, G.D., Sch\u00f6nw\u00e4lder, J.: Towards a trust computing architecture for RPL in Cyber Physical Systems. In: 9th International Conference on Network and Service Management (CNSM). pp. 134\u2013137 (2013). https:\/\/doi.org\/10.1109\/CNSM.2013.6727823","DOI":"10.1109\/CNSM.2013.6727823"},{"issue":"1","key":"9941_CR7","doi-asserted-by":"publisher","first-page":"50","DOI":"10.18080\/jtde.v5n1.88","volume":"5","author":"D Airehrour","year":"2017","unstructured":"Airehrour, D., Gutierrez, J.A., Ray, S.K.: A Trust-Aware RPL routing protocol to detect blackhole and selective forwarding attacks. J. Telecommun. Digit. Econ. 5(1), 50\u201369 (2017). https:\/\/doi.org\/10.18080\/jtde.v5n1.88","journal-title":"J. Telecommun. Digit. Econ."},{"key":"9941_CR8","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1016\/j.jnca.2017.02.009","volume":"84","author":"BB Zarpel\u00e3o","year":"2017","unstructured":"Zarpel\u00e3o, B.B., Miani, R.S., Kawakani, C.T., Alvarenga, S.C.: A survey of intrusion detection in Internet of Things. J. Netw. Comput. Appl. 84, 25\u201337 (2017). https:\/\/doi.org\/10.1016\/j.jnca.2017.02.009","journal-title":"J. Netw. Comput. Appl."},{"issue":"11","key":"9941_CR9","doi-asserted-by":"publisher","first-page":"5666","DOI":"10.1109\/JSEN.2020.2973677","volume":"20","author":"A Verma","year":"2020","unstructured":"Verma, A., Ranga, V.: Security of RPL based 6LoWPAN Networks in the Internet of Things: a review. IEEE Sens. J. 20(11), 5666\u20135690 (2020). https:\/\/doi.org\/10.1109\/JSEN.2020.2973677","journal-title":"IEEE Sens. J."},{"issue":"7","key":"9941_CR10","doi-asserted-by":"publisher","first-page":"180848","DOI":"10.1371\/journal.pone.0180848","volume":"12","author":"H Farman","year":"2017","unstructured":"Farman, H., Javed, H., Jan, B., Ahmad, J., Ali, S., Khalil, F.N., Khan, M.: Analytical network process based optimum cluster head selection in wireless sensor network. PLoS ONE 12(7), 180848 (2017). https:\/\/doi.org\/10.1371\/journal.pone.0180848","journal-title":"PLoS ONE"},{"key":"9941_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2022\/2158255","volume":"2022","author":"J Afshani","year":"2022","unstructured":"Afshani, J., Karimi, A., Eraghi, N.O., Zarafshan, F.: A fuzzy DEMATEL-ANP-based approach to prioritize activities in enterprise architecture. Complexity 2022, 1\u201312 (2022). https:\/\/doi.org\/10.1155\/2022\/2158255","journal-title":"Complexity"},{"key":"9941_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2022\/4487621","volume":"2022","author":"H Cheng","year":"2022","unstructured":"Cheng, H., Huang, Y.T., Huang, J.: The application of DEMATEL-ANP in livestream E-Commerce based on the research of consumers\u2019 shopping motivation. Sci. Program. 2022, 1\u201315 (2022). https:\/\/doi.org\/10.1155\/2022\/4487621","journal-title":"Sci. Program."},{"key":"9941_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2021\/5564286","volume":"2021","author":"A Farooq","year":"2021","unstructured":"Farooq, A., Stoilova, S., Ahmad, F., Alam, M., Nassar, H., Qaiser, T., Iqbal, K., Qadir, A., Ahmad, M.: An integrated Multicriteria Decision-Making Approach to evaluate traveler modes\u2019 priority: an application to Peshawar, Pakistan. J. Adv. Transp. 2021, 1\u201317 (2021). https:\/\/doi.org\/10.1155\/2021\/5564286","journal-title":"J. Adv. Transp."},{"key":"9941_CR14","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1007\/s42524-021-0156-2","volume":"8","author":"B Feng","year":"2021","unstructured":"Feng, B., Ye, Q.: Operations management of smart logistics: a literature review and future research. Front. Eng. Manag. 8, 344\u2013355 (2021). https:\/\/doi.org\/10.1007\/s42524-021-0156-2","journal-title":"Front. Eng. Manag."},{"issue":"3","key":"9941_CR15","doi-asserted-by":"publisher","first-page":"283","DOI":"10.17762\/msea.v71i3.165","volume":"71","author":"VP Kumar","year":"2022","unstructured":"Kumar, V.P., Janardhana, D.R., Shetty, S., Manu, A.P.: QoS aware service selection in IoT using ANP. Math. Stat. Eng. Appl. 71(3), 283 (2022). https:\/\/doi.org\/10.17762\/msea.v71i3.165","journal-title":"Math. Stat. Eng. Appl."},{"issue":"3","key":"9941_CR16","doi-asserted-by":"publisher","first-page":"e09062","DOI":"10.1016\/j.heliyon.2022.e09062","volume":"8","author":"GM Magableh","year":"2022","unstructured":"Magableh, G.M., Mistarihi, M.Z.: Applications of MCDM approach (ANP-TOPSIS) to evaluate supply chain solutions in the context of COVID-19. Heliyon 8(3), e09062 (2022). https:\/\/doi.org\/10.1016\/j.heliyon.2022.e09062","journal-title":"Heliyon"},{"issue":"4","key":"9941_CR17","doi-asserted-by":"publisher","first-page":"1852","DOI":"10.1109\/TCSS.2022.3195525","volume":"10","author":"S Rani","year":"2023","unstructured":"Rani, S., Kumar, M.: Influential node detection and ranking with fusion of heterogeneous social media information. IEEE Trans. Comput. Soc. Syst. 10(4), 1852\u20131874 (2023). https:\/\/doi.org\/10.1109\/TCSS.2022.3195525","journal-title":"IEEE Trans. Comput. Soc. Syst."},{"issue":"2.7","key":"9941_CR18","doi-asserted-by":"publisher","first-page":"691","DOI":"10.14419\/ijet.v7i2.7.10924","volume":"7","author":"P Abhijit","year":"2018","unstructured":"Abhijit, P., Prasad, D.G.: Trust based security model for IoT and Fog based applications. Int. J. Eng. Technol. 7(2.7), 691\u2013695 (2018). https:\/\/doi.org\/10.14419\/ijet.v7i2.7.10924","journal-title":"Int. J. Eng. Technol."},{"key":"9941_CR19","doi-asserted-by":"publisher","unstructured":"Najib, W., Sulistyo, S., Widyawan: Trust based security model in IoT ecosystem. In: 6th International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE), pp. 195\u2013199 (2022). https:\/\/doi.org\/10.1109\/ICITISEE57756.2022.10057930","DOI":"10.1109\/ICITISEE57756.2022.10057930"},{"issue":"2","key":"9941_CR20","doi-asserted-by":"publisher","first-page":"634","DOI":"10.3390\/s22020634","volume":"22","author":"Y Alghofaili","year":"2022","unstructured":"Alghofaili, Y., Rassam, M.A.: A Trust management model for IoT devices and services based on the Multi-Criteria Decision-Making approach and deep long Short-Term Memory technique. Sensors 22(2), 634 (2022). https:\/\/doi.org\/10.3390\/s22020634","journal-title":"Sensors"},{"key":"9941_CR21","doi-asserted-by":"publisher","first-page":"11165","DOI":"10.1109\/ACCESS.2023.3240990","volume":"11","author":"SA Alhandi","year":"2023","unstructured":"Alhandi, S.A., Kamaludin, H., Alduais, N.: Trust evaluation model in IoT environment: a comprehensive survey. IEEE Access 11, 11165\u201311182 (2023). https:\/\/doi.org\/10.1109\/ACCESS.2023.3240990","journal-title":"IEEE Access"},{"issue":"15","key":"9941_CR22","doi-asserted-by":"publisher","first-page":"3264","DOI":"10.3390\/s19153264","volume":"19","author":"L Kanaris","year":"2019","unstructured":"Kanaris, L., Sergiou, C., Kokkinis, A., Pafitis, A., Antoniou, N., Stavrou, S.: On the realistic radio and network planning of IoT sensor networks. Sensors 19(15), 3264 (2019). https:\/\/doi.org\/10.3390\/s19153264","journal-title":"Sensors"},{"key":"9941_CR23","doi-asserted-by":"publisher","unstructured":"Abbas, A.W., Marwat, S.N.K., Ahmed, S., Hafeez, A., Ullah, K., Khan, I.U.: Proposing model for security of IoT devices in smart logistics: a review. In: 3rd International Conference on Computing, Mathematics and Engineering Technologies (iCoMET), pp. 1\u20134 (2020). https:\/\/doi.org\/10.1109\/iCoMET48670.2020.9073916","DOI":"10.1109\/iCoMET48670.2020.9073916"},{"key":"9941_CR24","doi-asserted-by":"publisher","first-page":"1597","DOI":"10.3390\/e23121597","volume":"23","author":"CH Chen","year":"2021","unstructured":"Chen, C.H.: A hybrid multi-criteria decision-making approach based on anp-entropy topsis for building materials supplier selection. Entropy 23, 1597 (2021). https:\/\/doi.org\/10.3390\/e23121597","journal-title":"Entropy"},{"key":"9941_CR25","doi-asserted-by":"publisher","unstructured":"Copstein, R., Niblett, B., Johnston, A., Schwartzentruber, J., Heywood, M., Zincir-Heywood, N.: MIMC: anomaly detection in network data via multiple instances of micro-cluster detection. In: 19th International Conference on Network and Service Management (CNSM), pp. 1\u20137 (2023). https:\/\/doi.org\/10.23919\/CNSM59352.2023.10327864","DOI":"10.23919\/CNSM59352.2023.10327864"},{"key":"9941_CR26","doi-asserted-by":"publisher","unstructured":"Brunner, J., Rodrigues, B., M\u00fcller, K.O.E., Kanhere, S.S., Stiller, B.: Deciphering DDoS attacks through a global lens. In: 19th International Conference on Network and Service Management (CNSM), pp.1\u20137 (2023). https:\/\/doi.org\/10.23919\/CNSM59352.2023.10327886","DOI":"10.23919\/CNSM59352.2023.10327886"},{"key":"9941_CR27","doi-asserted-by":"publisher","unstructured":"Zheng, X., Yang, S., Wang, X.: A reliable and decentralized trust management model for fog computing in industrial IoT. In: NOMS 2023-2023 IEEE\/IFIP Network Operations and Management Symposium, pp. 1\u20136 (2023). https:\/\/doi.org\/10.1109\/NOMS56928.2023.10154305","DOI":"10.1109\/NOMS56928.2023.10154305"},{"key":"9941_CR28","doi-asserted-by":"publisher","unstructured":"Doumal, Z., Fadili, H.E., Dosse, S.B.: A review of recent ids proposals based on ensemble learning in IoT networks. In: 7th IEEE Congress on Information Science and Technology (CiSt), pp. 187\u2013192 (2023). https:\/\/doi.org\/10.1109\/CiSt56084.2023.10409870","DOI":"10.1109\/CiSt56084.2023.10409870"},{"issue":"4","key":"9941_CR29","doi-asserted-by":"publisher","first-page":"929","DOI":"10.26599\/TST.2023.9010033","volume":"29","author":"C Hazman","year":"2024","unstructured":"Hazman, C., Guezzaz, A., Benkirane, S., Azrour, M.: Enhanced IDS with deep learning for IoT-based smart cities security. Tsinghua Sci. Technol. 29(4), 929\u2013947 (2024). https:\/\/doi.org\/10.26599\/TST.2023.9010033","journal-title":"Tsinghua Sci. Technol."},{"issue":"5","key":"9941_CR30","doi-asserted-by":"publisher","first-page":"e2248","DOI":"10.1002\/nem.2248","volume":"33","author":"ES Babu","year":"2023","unstructured":"Babu, E.S., Rao, M.S., Swain, G., Nikhath, A.K., Kaluri, R.: Fog-Sec: secure end-to-end communication in fog-enabled IoT network using permissioned blockchain system. Int. J. Netw. Manag. 33(5), e2248 (2023). https:\/\/doi.org\/10.1002\/nem.2248","journal-title":"Int. J. Netw. Manag."},{"issue":"1","key":"9941_CR31","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1002\/nem.2299","volume":"35","author":"G Rathee","year":"2024","unstructured":"Rathee, G., Saini, H., Chakkravarthy, S.P., Maheswar, R.: An intelligent and trust-enabled farming systems with blockchain and digital twins on mobile edge computing. Int. J. Netw. Manag. 35(1), 1\u201316 (2024). https:\/\/doi.org\/10.1002\/nem.2299","journal-title":"Int. J. Netw. Manag."},{"issue":"2","key":"9941_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1002\/ett.3973","volume":"33","author":"Abizar","year":"2022","unstructured":"Abizar, Farman, H., Jan, B., Khan, Z., Koubaa, A.: A smart energy-based source location privacy preservation model for Internet of Things-based vehicular ad hoc networks. Trans. Emerg. Telecommun. Technol. 33(2), 1\u201314 (2022). https:\/\/doi.org\/10.1002\/ett.3973","journal-title":"Trans. Emerg. Telecommun. Technol."},{"issue":"4","key":"9941_CR33","doi-asserted-by":"publisher","first-page":"107","DOI":"10.14257\/ijsia.2015.9.4.11","volume":"9","author":"J Ma","year":"2015","unstructured":"Ma, J., Yang, C.: A trust-based stable routing protocol in vehicular ad-hoc networks. Int. J. Secur. Appl. 9(4), 107\u2013117 (2015). https:\/\/doi.org\/10.14257\/ijsia.2015.9.4.11","journal-title":"Int. J. Secur. Appl."},{"key":"9941_CR34","doi-asserted-by":"publisher","first-page":"100833","DOI":"10.1016\/j.iot.2023.100833","volume":"23","author":"H Bangui","year":"2023","unstructured":"Bangui, H., Buhnova, B., Kusnirakova, D., Halasz, D.: Trust management in social Internet of Things across domains. Internet Things 23, 100833 (2023). https:\/\/doi.org\/10.1016\/j.iot.2023.100833","journal-title":"Internet Things"},{"key":"9941_CR35","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1186\/s13638-015-0353-y","volume":"2015","author":"SA Soleymani","year":"2015","unstructured":"Soleymani, S.A., Abdullah, A.H., Hassan, W.H., Anisi, M.H., Goudarzi, S., Baee, M., Mandala, S.: Trust management in vehicular ad hoc network: a systematic review. EURASIP J. Wirel. Commun. Netw. 2015, 146 (2015). https:\/\/doi.org\/10.1186\/s13638-015-0353-y","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"issue":"10","key":"9941_CR36","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3656166","volume":"56","author":"M Almarshoud","year":"2024","unstructured":"Almarshoud, M., Kiraz, S.M., Bayatti, H.A.: Security, privacy, and decentralized trust management in VANETs: a review of current research and future directions. ACM Comput. Surv. 56(10), 1\u201339 (2024). https:\/\/doi.org\/10.1145\/3656166","journal-title":"ACM Comput. Surv."},{"key":"9941_CR37","doi-asserted-by":"publisher","unstructured":"Chatzidakis, M., Hadjiefthymiades, S.: Trust management in mobile ad hoc networks. In: 16th International Telecommunications Network Strategy and Planning Symposium (Networks), vol. 56, no. 10, pp. 1\u20136 (2014). https:\/\/doi.org\/10.1109\/NETWKS.2014.6958525","DOI":"10.1109\/NETWKS.2014.6958525"},{"issue":"1","key":"9941_CR38","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11518-006-0151-5","volume":"13","author":"TL Saaty","year":"2004","unstructured":"Saaty, T.L.: Decision making\u2014the Analytic Hierarchy and Network Processes (AHP\/ANP). J. Syst. Sci. Syst. Eng. 13(1), 1\u201335 (2004). https:\/\/doi.org\/10.1007\/s11518-006-0151-5","journal-title":"J. Syst. Sci. Syst. Eng."},{"key":"9941_CR39","unstructured":"Saaty, T.L.: Theory and Applications of the Analytic Network Process: Decision Making With Benefits, Opportunities, Costs, and Risks. RWS Publications. ISBN: 9781888603064 (2013). https:\/\/books.google.com.pk\/books?id=65N6FiNBMjEC"},{"issue":"13","key":"9941_CR40","doi-asserted-by":"publisher","first-page":"2528","DOI":"10.1016\/j.ins.2010.03.008","volume":"180","author":"YC Hu","year":"2010","unstructured":"Hu, Y.C.: Analytic network process for pattern classification problems using genetic algorithms. Inf. Sci. 180(13), 2528\u20132539 (2010). https:\/\/doi.org\/10.1016\/j.ins.2010.03.008","journal-title":"Inf. Sci."},{"key":"9941_CR41","doi-asserted-by":"publisher","unstructured":"Saaty, T.L., Vargas, L.G.: Decision Making with the Analytic Network Process: Economic, Political, Social and Technological Applications with Benefits, Opportunities, Costs and Risks. Springer New York, NY. ISBN: 9780387338590 (2013). https:\/\/doi.org\/10.1007\/978-1-4614-7279-7","DOI":"10.1007\/978-1-4614-7279-7"},{"key":"9941_CR42","doi-asserted-by":"publisher","first-page":"138350","DOI":"10.1109\/ACCESS.2020.3012458","volume":"8","author":"AW Abbas","year":"2020","unstructured":"Abbas, A.W., Marwat, S.: Scalable emulated framework for IoT devices in smart logistics based Cyber-Physical Systems: bonded coverage and connectivity Analysis. IEEE Access 8, 138350\u2013138372 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.3012458","journal-title":"IEEE Access"},{"issue":"5\u20136","key":"9941_CR43","doi-asserted-by":"publisher","first-page":"1274","DOI":"10.1016\/j.mcm.2008.08.010","volume":"49","author":"H Lee","year":"2009","unstructured":"Lee, H., Lee, S., Park, Y.: Selection of technology acquisition mode using the analytic network process. Math. Comput. Model. 49(5\u20136), 1274\u20131282 (2009). https:\/\/doi.org\/10.1016\/j.mcm.2008.08.010","journal-title":"Math. Comput. Model."},{"key":"9941_CR44","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2017\/4671892","volume":"2017","author":"S Latif","year":"2017","unstructured":"Latif, S., Mahfooz, S., Jan, B., Ahmad, N., Farman, H., Khan, M., Javed, H.: Multicriteria based next forwarder selection for data dissemination in Vehicular Ad Hoc Networks using analytical network process. Math. Probl. Eng. 2017, 1\u201318 (2017). https:\/\/doi.org\/10.1155\/2017\/4671892","journal-title":"Math. Probl. Eng."},{"issue":"8","key":"9941_CR45","doi-asserted-by":"publisher","first-page":"1795","DOI":"10.1016\/j.ijproman.2015.08.007","volume":"33","author":"P Boateng","year":"2015","unstructured":"Boateng, P., Chen, Z., Ogunlana, S.O.: An Analytical Network Process model for risks prioritisation in megaprojects. Int. J. Project Manag. 33(8), 1795\u20131811 (2015). https:\/\/doi.org\/10.1016\/j.ijproman.2015.08.007","journal-title":"Int. J. Project Manag."},{"key":"9941_CR46","unstructured":"Saaty, T.L.: Super decisions. Creative Decisions Foundation, 1926\u20132017. http:\/\/www.superdecisions.com. Accessed 12 May 2024"},{"key":"9941_CR47","unstructured":"Origin (Data Analysis and Graphing Software), OriginLab Corporation, Version (2024). https:\/\/www.originlab.com. Accessed 14 May 2024"},{"issue":"12","key":"9941_CR48","doi-asserted-by":"publisher","first-page":"2009","DOI":"10.3390\/math10122009","volume":"10","author":"AJ S\u00e1nchez-Garrido","year":"2022","unstructured":"S\u00e1nchez-Garrido, A.J., Navarro, I.J., Garc\u00eda, J., Yepes, V.: An adaptive ANP & ELECTRE IS-based MCDM model using quantitative variables. Mathematics 10(12), 2009 (2022). https:\/\/doi.org\/10.3390\/math10122009","journal-title":"Mathematics"}],"container-title":["Journal of Network and Systems Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-025-09941-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10922-025-09941-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-025-09941-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,18]],"date-time":"2025-07-18T06:51:00Z","timestamp":1752821460000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10922-025-09941-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,20]]},"references-count":48,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,7]]}},"alternative-id":["9941"],"URL":"https:\/\/doi.org\/10.1007\/s10922-025-09941-0","relation":{},"ISSN":["1064-7570","1573-7705"],"issn-type":[{"value":"1064-7570","type":"print"},{"value":"1573-7705","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6,20]]},"assertion":[{"value":"24 June 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 December 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 June 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 June 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"The authors confirm that this manuscript has not been published elsewhere and is not under consideration by another journal or conference. All authors have read and approved the manuscript and agree with its submission to the \u201cJournal of Network and Systems Management.\u201d","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}}],"article-number":"69"}}