{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T11:12:49Z","timestamp":1775041969733,"version":"3.50.1"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Netw Syst Manage"],"published-print":{"date-parts":[[2026,7]]},"DOI":"10.1007\/s10922-026-10048-3","type":"journal-article","created":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T09:29:20Z","timestamp":1775035760000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Deep Learning-Based Detection Mechanism for DDoS Attacks Targeting SDN Controller"],"prefix":"10.1007","volume":"34","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2307-6302","authenticated-orcid":false,"given":"Abdullah Ahmed","family":"Bahashwan","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7026-6408","authenticated-orcid":false,"given":"Mohammed","family":"Anbar","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4378-1954","authenticated-orcid":false,"given":"Selvakumar","family":"Manickam","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8042-5938","authenticated-orcid":false,"given":"Ali Abdulqader","family":"Bin-Salem","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,4,1]]},"reference":[{"key":"10048_CR1","doi-asserted-by":"publisher","DOI":"10.3390\/s23094441","author":"AA Bahashwan","year":"2023","unstructured":"Bahashwan, A.A., Anbar, M., Manickam, S., Al-Amiedy, T.A., Aladaileh, M.A., Hasbullah, I.H.: A systematic literature review on machine learning and deep learning approaches for detecting DDoS attacks in software-defined networking. Sensors (2023). https:\/\/doi.org\/10.3390\/s23094441","journal-title":"Sensors"},{"issue":"1","key":"10048_CR2","doi-asserted-by":"publisher","first-page":"602","DOI":"10.1109\/COMST.2015.2487361","volume":"18","author":"Q Yan","year":"2015","unstructured":"Yan, Q., Yu, F.R., Gong, Q., Li, J.: Software-defined networking (SDN) and distributed denial of service (DDoS) attacks in cloud computing environments: a survey, some research issues, and challenges. IEEE Commun. Surv. Tutor. 18(1), 602\u2013622 (2015). https:\/\/doi.org\/10.1109\/COMST.2015.2487361","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"12","key":"10048_CR3","doi-asserted-by":"publisher","first-page":"6127","DOI":"10.3390\/app12126127","volume":"12","author":"MA Aladaileh","year":"2022","unstructured":"Aladaileh, M.A., Anbar, M., Hintaw, A.J., Hasbullah, I.H., Bahashwan, A.A., Al-Sarawi, S.: Renyi joint entropy-based dynamic threshold approach to detect DDoS attacks against SDN controller with various traffic rates. Appl. Sci. 12(12), 6127 (2022). https:\/\/doi.org\/10.3390\/app12126127","journal-title":"Appl. Sci."},{"key":"10048_CR4","doi-asserted-by":"publisher","first-page":"685","DOI":"10.1016\/j.future.2018.07.017","volume":"89","author":"KS Sahoo","year":"2018","unstructured":"Sahoo, K.S., Puthal, D., Tiwary, M., Rodrigues, J.J., Sahoo, B., Dash, R.: An early detection of low rate DDoS attack to SDN based data center networks using information distance metrics. Futur. Gener. Comput. Syst. 89, 685\u2013697 (2018). https:\/\/doi.org\/10.1016\/j.future.2018.07.017","journal-title":"Futur. Gener. Comput. Syst."},{"key":"10048_CR5","doi-asserted-by":"publisher","DOI":"10.3390\/app13020775","author":"MA Aladaileh","year":"2023","unstructured":"Aladaileh, M.A., Anbar, M., Hintaw, A.J., Hasbullah, I.H., Bahashwan, A.A., Al-Amiedy, T.A., Ibrahim, D.R.: Effectiveness of an entropy-based approach for detecting low- and high-rate DDoS attacks against the SDN controller: experimental analysis. Appl. Sci. (2023). https:\/\/doi.org\/10.3390\/app13020775","journal-title":"Appl. Sci."},{"issue":"04","key":"10048_CR6","doi-asserted-by":"publisher","first-page":"1917","DOI":"10.1109\/TPDS.2013.146","volume":"3","author":"A Devare","year":"2016","unstructured":"Devare, A., Shelake, M., Vahadne, V., Kamble, P., Tamboli, B.: A system for denial-of-service attack detection based on multivariate correlation analysis. Int. Res. J. Eng. Technol. (IRJET) 3(04), 1917\u20131923 (2016). https:\/\/doi.org\/10.1109\/TPDS.2013.146","journal-title":"Int. Res. J. Eng. Technol. (IRJET)"},{"issue":"1","key":"10048_CR7","doi-asserted-by":"publisher","first-page":"623","DOI":"10.1109\/COMST.2015.2453114","volume":"18","author":"S Scott-Hayward","year":"2015","unstructured":"Scott-Hayward, S., Natarajan, S., Sezer, S.: A survey of security in software defined networks. IEEE Commun. Surv. Tutor. 18(1), 623\u2013654 (2015). https:\/\/doi.org\/10.1109\/COMST.2015.2453114","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"1","key":"10048_CR8","doi-asserted-by":"publisher","first-page":"1403","DOI":"10.32604\/cmc.2022.029369","volume":"73","author":"MA Aladaileh","year":"2022","unstructured":"Aladaileh, M.A., Anbar, M., Iznan H.\u00a0Hasbullah, A.A.B., Al-Sarawn, S.: Dynamic threshold-based approach to detect low-rate DDoS attacks on software-defined networking controller. Comput. Mater. Continua 73(1), 1403\u20131416 (2022). https:\/\/doi.org\/10.32604\/cmc.2022.029369","journal-title":"Comput. Mater. Continua"},{"key":"10048_CR9","doi-asserted-by":"publisher","unstructured":"Singh, S., Prakash, S.: A survey on software defined network based on architecture, issues and challenges. In: 2019 3rd International Conference on Computing Methodologies and Communication (ICCMC), Erode, India, 27\u201329 March 2019, pp. 568\u2013573. IEEE (2019). https:\/\/doi.org\/10.1109\/ICCMC.2019.8819785","DOI":"10.1109\/ICCMC.2019.8819785"},{"issue":"1","key":"10048_CR10","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1007\/s11036-025-02458-5","volume":"30","author":"AA Bahashwan","year":"2025","unstructured":"Bahashwan, A.A., Anbar, M., Manickam, S., Al-Amiedy, T.A., Aladaileh, M.A., Bin-Salem, A.A.: A deep learning-based mechanism for detecting variable-rate DDoS attacks in software-defined networks. Mobile Netw. Appl. 30(1), 12\u201341 (2025). https:\/\/doi.org\/10.1007\/s11036-025-02458-5","journal-title":"Mobile Netw. Appl."},{"key":"10048_CR11","doi-asserted-by":"publisher","unstructured":"Sagatov, E.S., Mayhoub, S., Sukhov, A.M., Esposito, F., Calyam, P.: Proactive detection for countermeasures on port scanning based attacks. In: 2021 17th International Conference on Network and Service Management (CNSM), pp. 402\u2013406. IEEE (2021). https:\/\/doi.org\/10.23919\/CNSM52442.2021.9615577","DOI":"10.23919\/CNSM52442.2021.9615577"},{"issue":"3","key":"10048_CR12","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/s10922-023-09741-4","volume":"31","author":"T Linhares","year":"2023","unstructured":"Linhares, T., Patel, A., Barros, A.L., Fernandez, M.: SDNTruth: innovative ddos detection scheme for software-defined networks (SDN). J. Netw. Syst. Manage. 31(3), 55 (2023). https:\/\/doi.org\/10.1007\/s10922-023-09741-4","journal-title":"J. Netw. Syst. Manage."},{"issue":"2","key":"10048_CR13","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/s10922-025-09919-y","volume":"33","author":"N Bharathi","year":"2025","unstructured":"Bharathi, N., Parthasarathi, R., Vetriselvi, V.: Defending against multifaceted network attacks: a multi-label meta-learning and Lorenz chaos MTD based security paradigm. J. Netw. Syst. Manage. 33(2), 47 (2025). https:\/\/doi.org\/10.1007\/s10922-025-09919-y","journal-title":"J. Netw. Syst. Manage."},{"issue":"4","key":"10048_CR14","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/s10922-024-09867-z","volume":"32","author":"AM Zacaron","year":"2024","unstructured":"Zacaron, A.M., Lent, D.M.B., Silva Ruffo, V.G., Carvalho, L.F., Proen\u00e7a, M.L., Jr.: Generative adversarial network models for anomaly detection in software-defined networks. J. Netw. Syst. Manage. 32(4), 93 (2024). https:\/\/doi.org\/10.1007\/s10922-024-09867-z","journal-title":"J. Netw. Syst. Manage."},{"issue":"2","key":"10048_CR15","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1007\/s10922-025-09904-5","volume":"33","author":"B Khanal","year":"2025","unstructured":"Khanal, B., Kumar, C., Ansari, M.S.A.: Real-time anomaly detection framework to mitigate emerging threats in software defined networks. J. Netw. Syst. Manage. 33(2), 26 (2025). https:\/\/doi.org\/10.1007\/s10922-025-09904-5","journal-title":"J. Netw. Syst. Manage."},{"issue":"4","key":"10048_CR16","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1007\/s10922-024-09841-9","volume":"32","author":"M Bencheikh Lehocine","year":"2024","unstructured":"Bencheikh Lehocine, M., Belhadef, H.: Preprocessing-based approach for prompt intrusion detection in SDN networks. J. Netw. Syst. Manage. 32(4), 79 (2024). https:\/\/doi.org\/10.1007\/s10922-024-09841-9","journal-title":"J. Netw. Syst. Manage."},{"issue":"2","key":"10048_CR17","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/s10922-023-09732-5","volume":"31","author":"NH Thanh","year":"2023","unstructured":"Thanh, N.H., Tuan, N.N., Khoa, D.A., Tuan, L.C., Kien, N.T., Dung, N.X., Thu, N.Q., Wamser, F.: On profiling, benchmarking and behavioral analysis of SDN architecture under DDoS attacks. J. Netw. Syst. Manage. 31(2), 43 (2023). https:\/\/doi.org\/10.1007\/s10922-023-09732-5","journal-title":"J. Netw. Syst. Manage."},{"issue":"1","key":"10048_CR18","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1007\/s10922-023-09741-4","volume":"33","author":"S Cherfi","year":"2025","unstructured":"Cherfi, S., Lemouari, A., Boulaiche, A.: MLP-based intrusion detection for securing IoT networks. J. Netw. Syst. Manage. 33(1), 20 (2025). https:\/\/doi.org\/10.1007\/s10922-023-09741-4","journal-title":"J. Netw. Syst. Manage."},{"issue":"4","key":"10048_CR19","doi-asserted-by":"publisher","first-page":"1366","DOI":"10.1007\/s10922-020-09540-1","volume":"28","author":"B Al-Duwairi","year":"2020","unstructured":"Al-Duwairi, B., Al-Quraan, E., AbdelQader, Y.: ISDSDN: mitigating SYN flood attacks in software defined networks. J. Netw. Syst. Manage. 28(4), 1366\u20131390 (2020). https:\/\/doi.org\/10.1007\/s10922-020-09540-1","journal-title":"J. Netw. Syst. Manage."},{"key":"10048_CR20","doi-asserted-by":"publisher","first-page":"573","DOI":"10.1007\/s10922-017-9432-1","volume":"26","author":"SM Mousavi","year":"2018","unstructured":"Mousavi, S.M., St-Hilaire, M.: Early detection of DDoS attacks against software defined network controllers. J. Netw. Syst. Manage. 26, 573\u2013591 (2018). https:\/\/doi.org\/10.1007\/s10922-017-9432-1","journal-title":"J. Netw. Syst. Manage."},{"issue":"6","key":"10048_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/systems11060296","volume":"11","author":"A Mansoor","year":"2023","unstructured":"Mansoor, A., Anbar, M., Bahashwan, A.A., Alabsi, B.A., Rihan, S.D.A.: Deep learning-based approach for detecting DDoS attack on software-defined networking controller. Systems 11(6), 1\u201321 (2023). https:\/\/doi.org\/10.3390\/systems11060296","journal-title":"Systems"},{"issue":"5","key":"10048_CR22","doi-asserted-by":"publisher","first-page":"3033","DOI":"10.3390\/app13053033","volume":"13","author":"TE Ali","year":"2023","unstructured":"Ali, T.E., Chong, Y.-W., Manickam, S.: Comparison of ML\/DL approaches for detecting DDoS attacks in SDN. Appl. Sci. 13(5), 3033 (2023). https:\/\/doi.org\/10.3390\/app13053033","journal-title":"Appl. Sci."},{"issue":"2","key":"10048_CR23","doi-asserted-by":"publisher","first-page":"923","DOI":"10.32604\/iasc.2022.024668","volume":"33","author":"A Fatmah","year":"2022","unstructured":"Fatmah, A., Kamal, J., Fathy, E., Maher, K., Abdullah, B., Khalid, A.: Ensemble deep learning models for mitigating DDoS attack in software-defined network. Intell. Autom. Soft Comput. 33(2), 923\u2013938 (2022). https:\/\/doi.org\/10.32604\/iasc.2022.024668","journal-title":"Intell. Autom. Soft Comput."},{"key":"10048_CR24","doi-asserted-by":"publisher","unstructured":"Mbasuva, U., Zodi, G.-A.L.: Designing ensemble deep learning intrusion detection system for DDoS attacks in software defined networks. In: 2022 16th International Conference on Ubiquitous Information Management and Communication (IMCOM), Seoul, Korea, 03\u201305 January 2022, pp. 1\u20138. IEEE (2022). https:\/\/doi.org\/10.1109\/IMCOM53663.2022.9721785","DOI":"10.1109\/IMCOM53663.2022.9721785"},{"key":"10048_CR25","doi-asserted-by":"publisher","first-page":"14301","DOI":"10.1109\/ACCESS.2022.3148134","volume":"10","author":"AH Janabi","year":"2022","unstructured":"Janabi, A.H., Kanakis, T., Johnson, M.: Convolutional neural network based algorithm for early warning proactive system security in software defined networks. IEEE Access 10, 14301\u201314310 (2022). https:\/\/doi.org\/10.1109\/ACCESS.2022.3148134","journal-title":"IEEE Access"},{"key":"10048_CR26","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1016\/j.future.2021.11.009","volume":"129","author":"Y Liu","year":"2022","unstructured":"Liu, Y., Zhi, T., Shen, M., Wang, L., Li, Y., Wan, M.: Software-defined DDoS detection with information entropy analysis and optimized deep learning. Futur. Gener. Comput. Syst. 129, 99\u2013114 (2022). https:\/\/doi.org\/10.1016\/j.future.2021.11.009","journal-title":"Futur. Gener. Comput. Syst."},{"key":"10048_CR27","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1016\/j.procs.2021.07.032","volume":"191","author":"AS Alshra\u2019a","year":"2021","unstructured":"Alshra\u2019a, A.S., Farhat, A., Seitz, J.: Deep learning algorithms for detecting denial of service attacks in software-defined networks. Procedia Comput. Sci. 191, 254\u2013263 (2021). https:\/\/doi.org\/10.1016\/j.procs.2021.07.032","journal-title":"Procedia Comput. Sci."},{"issue":"1","key":"10048_CR28","doi-asserted-by":"publisher","first-page":"14","DOI":"10.3390\/technologies9010014","volume":"9","author":"JD Gadze","year":"2021","unstructured":"Gadze, J.D., Bamfo-Asante, A.A., Agyemang, J.O., Nunoo-Mensah, H., Opare, K.A.-B.: An investigation into the application of deep learning in the detection and mitigation of DDOS attack on SDN controllers. Technologies 9(1), 14 (2021). https:\/\/doi.org\/10.3390\/technologies9010014","journal-title":"Technologies"},{"key":"10048_CR29","doi-asserted-by":"publisher","unstructured":"Elsayed, M.S., Le-Khac, N.-A., Dev, S., Jurcut, A.D.: DDOSNET: a deep-learning model for detecting network attacks. In: 2020 IEEE 21st International Symposium on \u201cA World of Wireless, Mobile and Multimedia Networks\u201d (WoWMoM), Cork, Ireland, 31 August 2020\u201303 September 2020, pp. 391\u2013396. IEEE (2020). https:\/\/doi.org\/10.1109\/WoWMoM49955.2020.00072","DOI":"10.1109\/WoWMoM49955.2020.00072"},{"issue":"9","key":"10048_CR30","doi-asserted-by":"publisher","first-page":"1533","DOI":"10.3390\/electronics9091533","volume":"9","author":"TA Tang","year":"2020","unstructured":"Tang, T.A., Mhamdi, L., McLernon, D., Zaidi, S.A.R., Ghogho, M., El Moussa, F.: DeepIDS: deep learning approach for intrusion detection in software defined networking. Electronics 9(9), 1533 (2020). https:\/\/doi.org\/10.3390\/electronics9091533","journal-title":"Electronics"},{"key":"10048_CR31","doi-asserted-by":"publisher","first-page":"53972","DOI":"10.1109\/ACCESS.2020.2976908","volume":"8","author":"S Haider","year":"2020","unstructured":"Haider, S., Akhunzada, A., Mustafa, I., Patel, T.B., Fernandez, A., Choo, K.-K.R., Iqbal, J.: A deep CNN ensemble framework for efficient DDoS attack detection in software defined networks. IEEE Access 8, 53972\u201353983 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.2976908","journal-title":"IEEE Access"},{"key":"10048_CR32","doi-asserted-by":"publisher","unstructured":"Tang, T., Mhamdi, L., Zaidi, S., El-moussa, F., McLernon, D., Ghogho, M.: A deep learning approach combining autoencoder with one-class SVM for DDoS attack detection in SDNs. In: 2020 IEEE Eighth International Conference on Communications and Networking (ComNet), Hammamet, Tunisia, 27\u201330 October 2020 (2020). https:\/\/doi.org\/10.1109\/ComNet47917.2020.9306073","DOI":"10.1109\/ComNet47917.2020.9306073"},{"key":"10048_CR33","doi-asserted-by":"publisher","unstructured":"Tang, T.A., McLernon, D., Mhamdi, L., Zaidi, S.A.R., Ghogho, M.: Intrusion detection in SDN-based networks: deep recurrent neural network approach. In: Deep Learning Applications for Cyber Security, pp. 175\u2013195. Springer (2019). https:\/\/doi.org\/10.1007\/978-3-030-13057-2_8","DOI":"10.1007\/978-3-030-13057-2_8"},{"key":"10048_CR34","doi-asserted-by":"publisher","unstructured":"Liu, Y., Dong, M., Ota, K., Li, J., Wu, J.: Deep reinforcement learning based smart mitigation of DDoS flooding in software-defined networks. In: 2018 IEEE 23rd International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), Barcelona, Spain, 17\u201319 September 2018, pp. 1\u20136. IEEE (2018). https:\/\/doi.org\/10.1109\/CAMAD.2018.8514971","DOI":"10.1109\/CAMAD.2018.8514971"},{"issue":"5","key":"10048_CR35","doi-asserted-by":"publisher","first-page":"3497","DOI":"10.1002\/dac.3497","volume":"31","author":"C Li","year":"2018","unstructured":"Li, C., Wu, Y., Yuan, X., Sun, Z., Wang, W., Li, X., Gong, L.: Detection and defense of DDoS attack-based on deep learning in OpenFlow-based SDN. Int. J. Commun Syst 31(5), 3497 (2018). https:\/\/doi.org\/10.1002\/dac.3497","journal-title":"Int. J. Commun Syst"},{"key":"10048_CR36","doi-asserted-by":"publisher","DOI":"10.4108\/eai.28-12-2017.153515","author":"Q Niyaz","year":"2017","unstructured":"Niyaz, Q., Sun, W., Javaid, A.Y.: A deep learning based DDoS detection system in software-defined networking (SDN). EAI Endors. Trans. Secur. Saf. (2017). https:\/\/doi.org\/10.4108\/eai.28-12-2017.153515","journal-title":"EAI Endors. Trans. Secur. Saf."},{"key":"10048_CR37","doi-asserted-by":"publisher","unstructured":"Tang, T.A., Mhamdi, L., McLernon, D., Zaidi, S.A.R., Ghogho, M.: Deep learning approach for network intrusion detection in software defined networking. In: 2016 International Conference on Wireless Networks and Mobile Communications (WINCOM), Fez, Morocco, 26\u201329 October 2016, pp. 258\u2013263. IEEE (2016). https:\/\/doi.org\/10.1109\/WINCOM.2016.7777224","DOI":"10.1109\/WINCOM.2016.7777224"},{"issue":"2","key":"10048_CR38","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1371\/journal.pone.0297548","volume":"19","author":"AA Bahashwan","year":"2024","unstructured":"Bahashwan, A.A., Anbar, M., Manickam, S., Issa, G., Aladaileh, M.A., Alabsi, B.A., Rihan, S.D.A.: HLD-DDoSDN: high and low-rates dataset-based DDoS attacks against SDN. PLoS ONE 19(2), 1\u201329 (2024). https:\/\/doi.org\/10.1371\/journal.pone.0297548","journal-title":"PLoS ONE"},{"key":"10048_CR39","doi-asserted-by":"publisher","DOI":"10.3390\/app12126150","author":"OE Elejla","year":"2022","unstructured":"Elejla, O.E., Anbar, M., Hamouda, S., Faisal, S., Bahashwan, A.A., Hasbullah, I.H.: Deep-learning-based approach to detect ICMPv6 flooding DDoS attacks on IPv6 networks. Appl. Sci. (2022). https:\/\/doi.org\/10.3390\/app12126150","journal-title":"Appl. Sci."},{"key":"10048_CR40","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2021.103160","volume":"191","author":"MS ElSayed","year":"2021","unstructured":"ElSayed, M.S., Le-Khac, N.-A., Albahar, M.A., Jurcut, A.: A novel hybrid model for intrusion detection systems in SDNs based on CNN and a new regularization technique. J. Netw. Comput. Appl. 191, 103160 (2021). https:\/\/doi.org\/10.1016\/j.jnca.2021.103160","journal-title":"J. Netw. Comput. Appl."}],"container-title":["Journal of Network and Systems Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-026-10048-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10922-026-10048-3","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-026-10048-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T09:29:21Z","timestamp":1775035761000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10922-026-10048-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,4,1]]},"references-count":40,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2026,7]]}},"alternative-id":["10048"],"URL":"https:\/\/doi.org\/10.1007\/s10922-026-10048-3","relation":{},"ISSN":["1064-7570","1573-7705"],"issn-type":[{"value":"1064-7570","type":"print"},{"value":"1573-7705","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,4,1]]},"assertion":[{"value":"12 February 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 January 2026","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 February 2026","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 April 2026","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"76"}}