{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T05:53:23Z","timestamp":1776232403740,"version":"3.50.1"},"reference-count":49,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2026,2,18]],"date-time":"2026-02-18T00:00:00Z","timestamp":1771372800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,2,18]],"date-time":"2026-02-18T00:00:00Z","timestamp":1771372800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Netw Syst Manage"],"published-print":{"date-parts":[[2026,4]]},"DOI":"10.1007\/s10922-025-10014-5","type":"journal-article","created":{"date-parts":[[2026,2,18]],"date-time":"2026-02-18T10:03:37Z","timestamp":1771409017000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An Deep Ensemble Learning Model with Metaheuristic Hyperparameter Optimization for Smart Grid Intrusion Detection"],"prefix":"10.1007","volume":"34","author":[{"given":"Tao","family":"Luo","sequence":"first","affiliation":[]},{"given":"Jingyi","family":"Wei","sequence":"additional","affiliation":[]},{"given":"Xiang","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Wenxu","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Minghao","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Dingyi","family":"Jia","sequence":"additional","affiliation":[]},{"given":"Hongmei","family":"Fei","sequence":"additional","affiliation":[]},{"given":"Xuening","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Keyuan","family":"Qiu","sequence":"additional","affiliation":[]},{"given":"Jie","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,18]]},"reference":[{"issue":"5","key":"10014_CR1","doi-asserted-by":"publisher","first-page":"7679","DOI":"10.3934\/mbe.2023331","volume":"20","author":"Z Tong","year":"2023","unstructured":"Tong, Z., Zhou, Y., Xu, K.: An intelligent scheduling control method for smart grid based on deep learning. Math. Biosci. Eng. 20(5), 7679\u20137695 (2023)","journal-title":"Math. Biosci. Eng."},{"issue":"3","key":"10014_CR2","doi-asserted-by":"publisher","first-page":"1384","DOI":"10.1109\/TII.2013.2256792","volume":"9","author":"A Espinoza","year":"2013","unstructured":"Espinoza, A., Penya, Y., Nieves, J.C., Ortega, M., Pena, A., Rodr\u00edguez, D.: Supporting business workflows in smart grids: an intelligent nodes-based approach. IEEE Trans. Ind. Inf. 9(3), 1384\u20131397 (2013)","journal-title":"IEEE Trans. Ind. Inf."},{"key":"10014_CR3","doi-asserted-by":"crossref","unstructured":"Li, K.-C., Shi, R.-H., Guo, W.-P., Wang, P.-B., Shao, B.-S.: Dynamic range query privacy-preserving scheme for blockchain-enhanced smart grid based on lattice. IEEE Trans. Dependable Secure Comput. (2023)","DOI":"10.1109\/TDSC.2023.3288228"},{"issue":"8","key":"10014_CR4","doi-asserted-by":"publisher","first-page":"4124","DOI":"10.3390\/su13084124","volume":"13","author":"H Kim","year":"2021","unstructured":"Kim, H., Choi, J.: Intelligent access control design for security context awareness in smart grid. Sustainability 13(8), 4124 (2021)","journal-title":"Sustainability"},{"issue":"1","key":"10014_CR5","doi-asserted-by":"publisher","first-page":"704","DOI":"10.1109\/TSG.2020.3017562","volume":"12","author":"R Kaviani","year":"2020","unstructured":"Kaviani, R., Hedman, K.W.: A detection mechanism against load-redistribution attacks in smart grids. IEEE Trans. Smart Grid 12(1), 704\u2013714 (2020)","journal-title":"IEEE Trans. Smart Grid"},{"issue":"2","key":"10014_CR6","doi-asserted-by":"publisher","first-page":"1719","DOI":"10.1109\/TDSC.2022.3163138","volume":"20","author":"K Park","year":"2022","unstructured":"Park, K., Lee, J., Das, A.K., Park, Y.: BPPS: blockchain-enabled privacy-preserving scheme for demand-response management in smart grid environments. IEEE Trans. Dependable Secure Comput. 20(2), 1719\u20131729 (2022)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"5","key":"10014_CR7","doi-asserted-by":"publisher","first-page":"4426","DOI":"10.1109\/TSG.2021.3072244","volume":"12","author":"HMS Badar","year":"2021","unstructured":"Badar, H.M.S., Qadri, S., Shamshad, S., Ayub, M.F., Mahmood, K., Kumar, N.: An identity based authentication protocol for smart grid environment using physical uncloneable function. IEEE Trans. Smart Grid 12(5), 4426\u20134434 (2021)","journal-title":"IEEE Trans. Smart Grid"},{"issue":"4","key":"10014_CR8","doi-asserted-by":"publisher","first-page":"5415","DOI":"10.1109\/TII.2023.3333842","volume":"20","author":"M Kaveh","year":"2023","unstructured":"Kaveh, M., Yan, Z., J\u00e4ntti, R.: Secrecy performance analysis of RIS-aided smart grid communications. IEEE Trans. Ind. Inf. 20(4), 5415\u20135427 (2023)","journal-title":"IEEE Trans. Ind. Inf."},{"issue":"2","key":"10014_CR9","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1109\/MWC.001.2000336","volume":"28","author":"J Lopez","year":"2021","unstructured":"Lopez, J., Rubio, J.E., Alcaraz, C.: Digital twins for intelligent authorization in the B5G-enabled smart grid. IEEE Wirel. Commun. 28(2), 48\u201355 (2021)","journal-title":"IEEE Wirel. Commun."},{"issue":"2","key":"10014_CR10","doi-asserted-by":"publisher","first-page":"1188","DOI":"10.1109\/TSG.2022.3199187","volume":"14","author":"JD Cunningham","year":"2022","unstructured":"Cunningham, J.D., Aved, A., Ferris, D., Morrone, P., Tucker, C.S.: A deep learning game theoretic model for defending against large scale smart grid attacks. IEEE Trans. Smart Grid 14(2), 1188\u20131197 (2022)","journal-title":"IEEE Trans. Smart Grid"},{"key":"10014_CR11","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1016\/j.aej.2023.07.077","volume":"79","author":"A Alsirhani","year":"2023","unstructured":"Alsirhani, A., Alshahrani, M.M., Hassan, A.M., Taloba, A.I., Abd El-Aziz, R.M., Samak, A.H.: Implementation of African vulture optimization algorithm based on deep learning for cybersecurity intrusion detection. Alex. Eng. J. 79, 105\u2013115 (2023)","journal-title":"Alex. Eng. J."},{"key":"10014_CR12","doi-asserted-by":"publisher","first-page":"1784","DOI":"10.7717\/peerj-cs.1784","volume":"10","author":"SSA Naqvi","year":"2024","unstructured":"Naqvi, S.S.A., Li, Y., Uzair, M.: DDoS attack detection in smart grid network using reconstructive machine learning models. PeerJ Comput. Sci. 10, 1784 (2024)","journal-title":"PeerJ Comput. Sci."},{"issue":"22","key":"10014_CR13","doi-asserted-by":"publisher","first-page":"22133","DOI":"10.1109\/JIOT.2021.3106898","volume":"9","author":"Y Li","year":"2021","unstructured":"Li, Y., Zuo, Y., Song, H., Lv, Z.: Deep learning in security of internet of things. IEEE Internet Things J. 9(22), 22133\u201322146 (2021)","journal-title":"IEEE Internet Things J."},{"key":"10014_CR14","doi-asserted-by":"crossref","unstructured":"Lu, Q., Li, J., Peng, Z., Wu, L., Ni, M., Luo, J.: Detecting the cyber-physical-social cooperated APTs in high-DER-penetrated smart grids: threats, current work and challenges. Comput. Netw. 110776 (2024)","DOI":"10.1016\/j.comnet.2024.110776"},{"key":"10014_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107679","volume":"184","author":"SE Quincozes","year":"2021","unstructured":"Quincozes, S.E., Albuquerque, C., Passos, D., Moss\u00e9, D.: A survey on intrusion detection and prevention systems in digital substations. Comput. Netw. 184, 107679 (2021)","journal-title":"Comput. Netw."},{"key":"10014_CR16","volume":"46","author":"N Hamdi","year":"2025","unstructured":"Hamdi, N.: A hybrid learning technique for intrusion detection system for smart grid. Sustain. Comput. Inf. Syst. 46, 101102 (2025)","journal-title":"Sustain. Comput. Inf. Syst."},{"key":"10014_CR17","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1016\/j.neunet.2022.12.011","volume":"159","author":"SY Diaba","year":"2023","unstructured":"Diaba, S.Y., Elmusrati, M.: Proposed algorithm for smart grid DDOS detection based on deep learning. Neural Netw. 159, 175\u2013184 (2023)","journal-title":"Neural Netw."},{"key":"10014_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2022.100567","volume":"39","author":"M Panthi","year":"2022","unstructured":"Panthi, M., Das, T.K.: Intelligent intrusion detection scheme for smart power-grid using optimized ensemble learning on selected features. Int. J. Crit. Infrastruct. Prot. 39, 100567 (2022)","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"issue":"17","key":"10014_CR19","doi-asserted-by":"publisher","first-page":"7464","DOI":"10.3390\/s23177464","volume":"23","author":"U AlHaddad","year":"2023","unstructured":"AlHaddad, U., Basuhail, A., Khemakhem, M., Eassa, F.E., Jambi, K.: Ensemble model based on hybrid deep learning for intrusion detection in smart grid networks. Sensors 23(17), 7464 (2023)","journal-title":"Sensors"},{"issue":"1","key":"10014_CR20","doi-asserted-by":"publisher","first-page":"13556","DOI":"10.1111\/exsy.13556","volume":"42","author":"H Naeem","year":"2025","unstructured":"Naeem, H., Ullah, F., Srivastava, G.: Classification of intrusion cyber-attacks in smart power grids using deep ensemble learning with metaheuristic-based optimization. Expert Syst. 42(1), 13556 (2025)","journal-title":"Expert Syst."},{"issue":"1","key":"10014_CR21","doi-asserted-by":"publisher","first-page":"23069","DOI":"10.1038\/s41598-024-74733-6","volume":"14","author":"SA Sharaf","year":"2024","unstructured":"Sharaf, S.A., Ragab, M., Albogami, N., Al-Malaise Al-Ghamdi, A., Sabir, M.F., Maghrabi, L.A., Ashary, E.B., Alaidaros, H.: Advanced mathematical modeling of mitigating security threats in smart grids through deep ensemble model. Sci. Rep. 14(1), 23069 (2024)","journal-title":"Sci. Rep."},{"key":"10014_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102158","volume":"103","author":"J Gu","year":"2021","unstructured":"Gu, J., Lu, S.: An effective intrusion detection approach using SVM with Na\u00efve Bayes feature embedding. Comput. Secur. 103, 102158 (2021)","journal-title":"Comput. Secur."},{"issue":"19","key":"10014_CR23","doi-asserted-by":"publisher","first-page":"3079","DOI":"10.3390\/electronics11193079","volume":"11","author":"S Patil","year":"2022","unstructured":"Patil, S., Varadarajan, V., Mazhar, S.M., Sahibzada, A., Ahmed, N., Sinha, O., Kumar, S., Shaw, K., Kotecha, K.: Explainable artificial intelligence for intrusion detection system. Electronics 11(19), 3079 (2022)","journal-title":"Electronics"},{"issue":"4","key":"10014_CR24","doi-asserted-by":"publisher","first-page":"1407","DOI":"10.3390\/s22041407","volume":"22","author":"G Liu","year":"2022","unstructured":"Liu, G., Zhao, H., Fan, F., Liu, G., Xu, Q., Nazir, S.: An enhanced intrusion detection model based on improved KNN in WSNS. Sensors 22(4), 1407 (2022)","journal-title":"Sensors"},{"key":"10014_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.116089","volume":"189","author":"S Gavel","year":"2022","unstructured":"Gavel, S., Raghuvanshi, A.S., Tiwari, S.: Maximum correlation based mutual information scheme for intrusion detection in the data networks. Expert Syst. Appl. 189, 116089 (2022)","journal-title":"Expert Syst. Appl."},{"key":"10014_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.123014","volume":"244","author":"Q Wang","year":"2024","unstructured":"Wang, Q., Jiang, H., Ren, J., Liu, H., Wang, X., Zhang, B.: An intrusion detection algorithm based on joint symmetric uncertainty and hyperparameter optimized fusion neural network. Expert Syst. Appl. 244, 123014 (2024)","journal-title":"Expert Syst. Appl."},{"key":"10014_CR27","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1016\/j.future.2021.10.018","volume":"129","author":"J Yu","year":"2022","unstructured":"Yu, J., Ye, X., Li, H.: A high precision intrusion detection system for network security communication based on multi-scale convolutional neural network. Future Gener. Comput. Syst. 129, 399\u2013406 (2022)","journal-title":"Future Gener. Comput. Syst."},{"key":"10014_CR28","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108328","volume":"197","author":"S-L Yin","year":"2021","unstructured":"Yin, S.-L., Zhang, X.-L., Liu, S.: Intrusion detection for capsule networks based on dual routing mechanism. Comput. Netw. 197, 108328 (2021)","journal-title":"Comput. Netw."},{"issue":"4","key":"10014_CR29","doi-asserted-by":"publisher","first-page":"949","DOI":"10.3390\/electronics12040949","volume":"12","author":"J Luo","year":"2023","unstructured":"Luo, J., Zhang, Y., Wu, Y., Xu, Y., Guo, X., Shang, B.: A multi-channel contrastive learning network based intrusion detection method. Electronics 12(4), 949 (2023)","journal-title":"Electronics"},{"key":"10014_CR30","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.104132","volume":"148","author":"P Deng","year":"2025","unstructured":"Deng, P., Huang, Y.: Edge-featured multi-hop attention graph neural network for intrusion detection system. Comput. Secur. 148, 104132 (2025)","journal-title":"Comput. Secur."},{"issue":"1","key":"10014_CR31","doi-asserted-by":"publisher","first-page":"1104","DOI":"10.1109\/TNSM.2020.3032618","volume":"18","author":"D Upadhyay","year":"2020","unstructured":"Upadhyay, D., Manero, J., Zaman, M., Sampalli, S.: Gradient boosting feature selection with machine learning classifiers for intrusion detection on power grids. IEEE Trans. Netw. Serv. Manag. 18(1), 1104\u20131116 (2020)","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"issue":"2","key":"10014_CR32","doi-asserted-by":"publisher","first-page":"1137","DOI":"10.1109\/TNSM.2021.3078381","volume":"18","author":"I Siniosoglou","year":"2021","unstructured":"Siniosoglou, I., Radoglou-Grammatikis, P., Efstathopoulos, G., Fouliras, P., Sarigiannidis, P.: A unified deep learning anomaly detection and classification approach for smart grid environments. IEEE Trans. Netw. Serv. Manag. 18(2), 1137\u20131151 (2021)","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"issue":"16","key":"10014_CR33","doi-asserted-by":"publisher","first-page":"2627","DOI":"10.3390\/electronics11162627","volume":"11","author":"X Sun","year":"2022","unstructured":"Sun, X., Tang, Z., Du, M., Deng, C., Lin, W., Chen, J., Qi, Q., Zheng, H.: A hierarchical federated learning-based intrusion detection system for 5G smart grids. Electronics 11(16), 2627 (2022)","journal-title":"Electronics"},{"issue":"17","key":"10014_CR34","doi-asserted-by":"publisher","first-page":"7464","DOI":"10.3390\/s23177464","volume":"23","author":"U AlHaddad","year":"2023","unstructured":"AlHaddad, U., Basuhail, A., Khemakhem, M., Eassa, F.E., Jambi, K.: Ensemble model based on hybrid deep learning for intrusion detection in smart grid networks. Sensors 23(17), 7464 (2023)","journal-title":"Sensors"},{"issue":"2","key":"10014_CR35","doi-asserted-by":"publisher","first-page":"626","DOI":"10.3390\/s21020626","volume":"21","author":"R Yao","year":"2021","unstructured":"Yao, R., Wang, N., Liu, Z., Chen, P., Sheng, X.: Intrusion detection system in the advanced metering infrastructure: a cross-layer feature-fusion CNN-LSTM-based approach. Sensors 21(2), 626 (2021)","journal-title":"Sensors"},{"issue":"5","key":"10014_CR36","doi-asserted-by":"publisher","first-page":"1164","DOI":"10.3390\/electronics12051164","volume":"12","author":"F Zhai","year":"2023","unstructured":"Zhai, F., Yang, T., Chen, H., He, B., Li, S.: Intrusion detection method based on CNN-GRU-FL in a smart grid environment. Electronics 12(5), 1164 (2023)","journal-title":"Electronics"},{"key":"10014_CR37","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2022.100567","volume":"39","author":"M Panthi","year":"2022","unstructured":"Panthi, M., Das, T.K.: Intelligent intrusion detection scheme for smart power-grid using optimized ensemble learning on selected features. Int. J. Crit. Infrastruct. Prot. 39, 100567 (2022)","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"key":"10014_CR38","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2021.107212","volume":"93","author":"C Song","year":"2021","unstructured":"Song, C., Sun, Y., Han, G., Rodrigues, J.J.: Intrusion detection based on hybrid classifiers for smart grid. Comput. Electr. Eng. 93, 107212 (2021)","journal-title":"Comput. Electr. Eng."},{"issue":"3","key":"10014_CR39","doi-asserted-by":"publisher","first-page":"530","DOI":"10.3390\/math10030530","volume":"10","author":"I Ahmad","year":"2022","unstructured":"Ahmad, I., Ul Haq, Q.E., Imran, M., Alassafi, M.O., AlGhamdi, R.A.: An efficient network intrusion detection and classification system. Mathematics 10(3), 530 (2022)","journal-title":"Mathematics"},{"key":"10014_CR40","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.115524","volume":"185","author":"Y Imrana","year":"2021","unstructured":"Imrana, Y., Xiang, Y., Ali, L., Abdul-Rauf, Z.: A bidirectional LSTM deep learning approach for intrusion detection. Expert Syst. Appl. 185, 115524 (2021)","journal-title":"Expert Syst. Appl."},{"key":"10014_CR41","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2023.110941","volume":"279","author":"R Lazzarini","year":"2023","unstructured":"Lazzarini, R., Tianfield, H., Charissis, V.: A stacking ensemble of deep learning models for IoT intrusion detection. Knowl. Based Syst. 279, 110941 (2023)","journal-title":"Knowl. Based Syst."},{"issue":"10","key":"10014_CR42","doi-asserted-by":"publisher","first-page":"10246","DOI":"10.1016\/j.jksuci.2022.10.019","volume":"34","author":"PB Udas","year":"2022","unstructured":"Udas, P.B., Karim, M.E., Roy, K.S.: Spider: a shallow PCA based network intrusion detection system with enhanced recurrent neural networks. J. King Saud Univ. Comput. Inf. Sci. 34(10), 10246\u201310272 (2022)","journal-title":"J. King Saud Univ. Comput. Inf. Sci."},{"key":"10014_CR43","doi-asserted-by":"publisher","first-page":"99837","DOI":"10.1109\/ACCESS.2022.3206425","volume":"10","author":"A Halbouni","year":"2022","unstructured":"Halbouni, A., Gunawan, T.S., Habaebi, M.H., Halbouni, M., Kartiwi, M., Ahmad, R.: CNN-LSTM: hybrid deep neural network for network intrusion detection system. IEEE Access 10, 99837\u201399849 (2022)","journal-title":"IEEE Access"},{"issue":"1","key":"10014_CR44","doi-asserted-by":"publisher","first-page":"13556","DOI":"10.1111\/exsy.13556","volume":"42","author":"H Naeem","year":"2025","unstructured":"Naeem, H., Ullah, F., Srivastava, G.: Classification of intrusion cyber-attacks in smart power grids using deep ensemble learning with metaheuristic-based optimization. Expert Syst. 42(1), 13556 (2025)","journal-title":"Expert Syst."},{"key":"10014_CR45","doi-asserted-by":"publisher","first-page":"2290","DOI":"10.7717\/peerj-cs.2290","volume":"10","author":"K Bella","year":"2024","unstructured":"Bella, K., Guezzaz, A., Benkirane, S., Azrour, M., Fouad, Y., Benyeogor, M.S., Innab, N.: An efficient intrusion detection system for IoT security using CNN decision forest. PeerJ Comput. Sci. 10, 2290 (2024)","journal-title":"PeerJ Comput. Sci."},{"key":"10014_CR46","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2025.113351","volume":"316","author":"IA Fares","year":"2025","unstructured":"Fares, I.A., Abd Elaziz, M.: Explainable TabNet transformer-based on google vizier optimizer for anomaly intrusion detection system. Knowl. Based Syst. 316, 113351 (2025). https:\/\/doi.org\/10.1016\/j.knosys.2025.113351","journal-title":"Knowl. Based Syst."},{"issue":"1","key":"10014_CR47","doi-asserted-by":"publisher","first-page":"5245622","DOI":"10.1155\/2022\/5245622","volume":"2022","author":"Y Song","year":"2022","unstructured":"Song, Y., Li, H., Xu, P., Liu, D.: A method of intrusion detection based on WOA-XGBoost algorithm. Discrete Dyn. Nat. Soc. 2022(1), 5245622 (2022)","journal-title":"Discrete Dyn. Nat. Soc."},{"key":"10014_CR48","doi-asserted-by":"crossref","unstructured":"Xia, Z., He, S., Liu, C., Liu, Y., Yang, X., Bu, H.: PSO-GA hyperparameter optimized ResNet-BiGRU based intrusion detection method. IEEE Access (2024)","DOI":"10.1109\/ACCESS.2024.3464529"},{"issue":"11","key":"10014_CR49","doi-asserted-by":"publisher","first-page":"3339","DOI":"10.3390\/s24113339","volume":"24","author":"TM Nguyen","year":"2024","unstructured":"Nguyen, T.M., Vo, H.H.-P., Yoo, M.: Enhancing intrusion detection in wireless sensor networks using a GSWO-CatBoost approach. Sensors 24(11), 3339 (2024)","journal-title":"Sensors"}],"container-title":["Journal of Network and Systems Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-025-10014-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10922-025-10014-5","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-025-10014-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T05:02:42Z","timestamp":1776229362000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10922-025-10014-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,18]]},"references-count":49,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2026,4]]}},"alternative-id":["10014"],"URL":"https:\/\/doi.org\/10.1007\/s10922-025-10014-5","relation":{},"ISSN":["1064-7570","1573-7705"],"issn-type":[{"value":"1064-7570","type":"print"},{"value":"1573-7705","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,18]]},"assertion":[{"value":"16 May 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 September 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 December 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 February 2026","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"51"}}