{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T00:23:15Z","timestamp":1772065395374,"version":"3.50.1"},"reference-count":57,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2018,5,21]],"date-time":"2018-05-21T00:00:00Z","timestamp":1526860800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2018,5,21]],"date-time":"2018-05-21T00:00:00Z","timestamp":1526860800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2019,6,15]]},"DOI":"10.1007\/s11036-018-1060-9","type":"journal-article","created":{"date-parts":[[2018,5,21]],"date-time":"2018-05-21T09:36:20Z","timestamp":1526895380000},"page":"1034-1045","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":45,"title":["RETRACTED ARTICLE: E-Health Cloud Security Using Timing Enabled Proxy Re-Encryption"],"prefix":"10.1007","volume":"24","author":[{"given":"V.","family":"Vijayakumar","sequence":"first","affiliation":[]},{"given":"M. K.","family":"Priyan","sequence":"additional","affiliation":[]},{"given":"G","family":"Ushadevi","sequence":"additional","affiliation":[]},{"given":"R.","family":"Varatharajan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4083-6163","authenticated-orcid":false,"given":"Gunasekaran","family":"Manogaran","sequence":"additional","affiliation":[]},{"given":"Prathamesh Vijay","family":"Tarare","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,5,21]]},"reference":[{"key":"1060_CR1","unstructured":"K. Olszewska (2014) The future of IT in the healthcare industry from an IT decision maker perspective,\u201chttp:\/\/www.frost.com\/sublib\/displayreport.do?id=M9D3-01-00-00-00, last accessed: March 29, 2016"},{"key":"1060_CR2","doi-asserted-by":"crossref","unstructured":"Varatharajan R, Manogaran G, Priyan MK (2017). A big data classification approach using LDA with an enhanced SVM method for ECG signals in cloud computing. Multimedia Tools and Applications, 1\u201321","DOI":"10.1007\/s11042-017-5318-1"},{"key":"1060_CR3","doi-asserted-by":"crossref","unstructured":"Manogaran G, Varatharajan R, Lopez D, Kumar PM, Sundarasekar R, Thota C (2017). A new architecture of Internet of Things and big data ecosystem for secured smart healthcare monitoring and alerting. Future Generation Computer Systems","DOI":"10.1016\/j.future.2017.10.045"},{"key":"1060_CR4","doi-asserted-by":"crossref","unstructured":"Thota C, Sundarasekar R, Manogaran G, Varatharajan R., Priyan MK (2018). Centralized Fog Computing Security Platform for IoT and Cloud in Healthcare System. In Exploring the Convergence of Big Data and the Internet of Things (pp. 141\u2013154). IGI Global","DOI":"10.4018\/978-1-5225-2947-7.ch011"},{"key":"1060_CR5","unstructured":"Manogaran G, Vijayakumar V, Varatharajan R, Kumar PM, Sundarasekar R, Hsu CH Machine Learning Based Big Data Processing Framework for Cancer Diagnosis Using Hidden Markov Model and GM Clustering. Wireless Personal Communications, 1\u201318"},{"key":"1060_CR6","doi-asserted-by":"crossref","unstructured":"Suresh A, Varatharajan R (2017) Competent resource provisioning and distribution techniques for cloud computing environment. Cluster Computing, 1\u20138","DOI":"10.1007\/s10586-017-1293-6"},{"key":"1060_CR7","doi-asserted-by":"crossref","unstructured":"Manogaran, G., Lopez, D., Thota, C., Abbas, K. M., Pyne, S., & Sundarasekar, R. (2017). Big data analytics in healthcare internet of things. In Innovative Healthcare Systems for the 21st Century (pp. 263-284). Springer international publishing","DOI":"10.1007\/978-3-319-55774-8_10"},{"issue":"2\u20134","key":"1060_CR8","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1504\/IJBET.2017.087722","volume":"25","author":"G Manogaran","year":"2017","unstructured":"Manogaran G, Lopez D (2017) A survey of big data architectures and machine learning algorithms in healthcare. Int J Biomed Eng Technol 25(2\u20134):182\u2013211","journal-title":"Int J Biomed Eng Technol"},{"key":"1060_CR9","doi-asserted-by":"crossref","unstructured":"Manogaran G, Thota C, Lopez D (2018) Human-computer interaction with big data analytics. In HCI Challenges and Privacy Preservation in Big Data Security (pp. 1\u201322). IGI Global","DOI":"10.4018\/978-1-5225-2863-0.ch001"},{"key":"1060_CR10","doi-asserted-by":"crossref","unstructured":"Kumar PM, Gandhi U, Varatharajan R, Manogaran G, Jidhesh R, Vadivel T (2017). Intelligent face recognition and navigation system using neural learning for smart security in Internet of Things. Cluster Computing, 1\u201312","DOI":"10.1007\/s10586-017-1323-4"},{"key":"1060_CR11","doi-asserted-by":"crossref","unstructured":"Lopez D, Manogaran G (2017) Parametric Model to Predict H1N1 Influenza in Vellore District, Tamil Nadu, India. In Handbook of Statistics (Vol. 37, pp. 301\u2013316). Elsevier","DOI":"10.1016\/bs.host.2017.09.005"},{"key":"1060_CR12","doi-asserted-by":"crossref","unstructured":"Manogaran G, Varatharajan R, Priyan MK (2017) Hybrid Recommendation System for Heart Disease Diagnosis based on Multiple Kernel Learning with Adaptive Neuro-Fuzzy Inference System. Multimedia Tools and Applications, 1\u201321","DOI":"10.1007\/s11042-017-5515-y"},{"key":"1060_CR13","doi-asserted-by":"crossref","unstructured":"Varatharajan R, Manogaran G, Priyan MK, Bala\u015f VE, Barna C (2017) Visual analysis of geospatial habitat suitability model based on inverse distance weighting with paired comparison analysis. Multimedia Tools and Applications, 1\u201321","DOI":"10.1007\/s11042-017-4768-9"},{"key":"1060_CR14","doi-asserted-by":"crossref","unstructured":"Varatharajan R, Vasanth K, Gunasekaran M, Priyan M, Gao XZ (2017). An adaptive decision based kriging interpolation algorithm for the removal of high density salt and pepper noise in images. Computers & Electrical Engineering","DOI":"10.1016\/j.compeleceng.2017.05.035"},{"key":"1060_CR15","doi-asserted-by":"crossref","unstructured":"Varatharajan R, Manogaran G, Priyan MK, Sundarasekar R (2017) Wearable sensor devices for early detection of Alzheimer disease using dynamic time warping algorithm. Cluster Computing, 1\u201310","DOI":"10.1007\/s10586-017-0977-2"},{"key":"1060_CR16","unstructured":"Lopez D, Manogaran G (2016) Big Data Architecture for Climate Change and Disease Dynamics, Eds. Geetam S. Tomar et al. The Human Element of Big Data: Issues, Analytics, and Performance, CRC Press"},{"issue":"2","key":"1060_CR17","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4018\/IJACI.2017040101","volume":"8","author":"G Manogaran","year":"2017","unstructured":"Manogaran G, Lopez D (2017) Disease surveillance system for big climate data processing and dengue transmission. Int J Ambient Comput Int 8(2):1\u201325","journal-title":"Int J Ambient Comput Int"},{"key":"1060_CR18","doi-asserted-by":"crossref","unstructured":"Manogaran G, Lopez D (2017) Spatial cumulative sum algorithm with big data analytics for climate change detection. Computers & Electrical Engineering","DOI":"10.1016\/j.compeleceng.2017.04.006"},{"key":"1060_CR19","doi-asserted-by":"crossref","unstructured":"Manogaran G, Lopez D (2017) A Gaussian process based big data processing framework in cluster computing environment. Cluster Computing, 1\u201316","DOI":"10.1007\/s10586-017-0982-5"},{"issue":"8","key":"1060_CR20","first-page":"1","volume":"28","author":"D Lopez","year":"2017","unstructured":"Lopez D, Manogaran G, Jagan J (2017) Modelling the H1N1 influenza using mathematical and neural network approaches. Biomed Res 28(8):1\u20135","journal-title":"Biomed Res"},{"key":"1060_CR21","doi-asserted-by":"crossref","unstructured":"Lopez D, Gunasekaran M, Murugan BS, Kaur H, Abbas KM (2014) \u201cSpatial BigData analytics of influenza epidemic in Vellore, India,\u201d in Proc. 2014 IEEE International Conference onBig Data (pp. 19\u201324). IEEE","DOI":"10.1109\/BigData.2014.7004422"},{"key":"1060_CR22","doi-asserted-by":"crossref","unstructured":"Lopez D, Gunasekaran M (2015) \u201cAssessment of Vaccination Strategies Using Fuzzy MulticriteriaDecision Making,\u201d in Proc. Proceedings of the Fifth International Conference on Fuzzy and NeuroComputing (FANCCO-2015) (pp. 195\u2013208). Springer International","DOI":"10.1007\/978-3-319-27212-2_16"},{"key":"1060_CR23","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1016\/j.ijid.2016.02.084","volume":"45","author":"D Lopez","year":"2016","unstructured":"Lopez D, Sekaran G (2016) Climate change and disease dynamics - a big data perspective. Int J Infect Dis 45:23\u201324","journal-title":"Int J Infect Dis"},{"key":"1060_CR24","unstructured":"Rawal BS, Vijayakumar V, Manogaran G, Varatharajan R, Chilamkurti N Secure Disintegration Protocol for Privacy Preserving Cloud Storage. Wireless Personal Communications, 1\u201317"},{"key":"1060_CR25","doi-asserted-by":"crossref","unstructured":"Thota C, Manogaran G, Lopez D, Sundarasekar R (2018) Architecture for big data storage in different cloud deployment models. In Handbook of Research on Big Data Storage and Visualization Techniques (pp. 196\u2013226). IGI Global","DOI":"10.4018\/978-1-5225-3142-5.ch008"},{"issue":"3","key":"1060_CR26","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1016\/j.jss.2011.09.035","volume":"85","author":"XA Wang","year":"2012","unstructured":"Wang XA, Huang X, Yang X, Liu L, Wu X (2012) Further observation on proxy re-encryption with keyword search. J Syst Softw 85(3):643\u2013654","journal-title":"J Syst Softw"},{"key":"1060_CR27","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1016\/j.ins.2012.09.034","volume":"258","author":"Q Liu","year":"2014","unstructured":"Liu Q, Wang G, Wu J (2014) Time-based proxy re-encryption scheme for secure data sharing in a cloud environment. Inf Sci 258:355\u2013370","journal-title":"Inf Sci"},{"key":"1060_CR28","first-page":"1","volume":"9","author":"G Manogaran","year":"2016","unstructured":"Manogaran G, Lopez D (2016) Health data analytics using scalable logistic regression with stochastic gradient descent. Int J Adv Intel Paradigms 9:1\u201315","journal-title":"Int J Adv Intel Paradigms"},{"key":"1060_CR29","doi-asserted-by":"crossref","unstructured":"Manogaran G, Thota C, Lopez D, Vijayakumar V, Abbas KM, Sundarsekar R (2017). Big Data Knowledge System in Healthcare. In Internet of Things and Big Data Technologies for Next Generation Healthcare (pp. 133\u2013157). Springer International Publishing","DOI":"10.1007\/978-3-319-49736-5_7"},{"issue":"2","key":"1060_CR30","doi-asserted-by":"publisher","first-page":"88","DOI":"10.4018\/IJACI.2017040106","volume":"8","author":"G Manogaran","year":"2017","unstructured":"Manogaran G, Lopez D (2017) Disease surveillance system for big climate data processing and dengue transmission. Int J Ambient Comput Int (IJACI) 8(2):88\u2013105","journal-title":"Int J Ambient Comput Int (IJACI)"},{"key":"1060_CR31","doi-asserted-by":"crossref","unstructured":"Manickam A, Devarasan E, Manogaran G, Priyan MK, Varatharajan R, Hsu CH, Krishnamoorthi R (2018). Score level based latent fingerprint enhancement and matching using SIFT feature. Multimedia Tools and Applications, 1\u201321","DOI":"10.1007\/s11042-018-5633-1"},{"key":"1060_CR32","doi-asserted-by":"crossref","unstructured":"Gandhi UD, Kumar PM, Varatharajan R, Manogaran G, Sundarasekar R, Kadu S (2018) HIoTPOT: Surveillance on IoT Devices against Recent Threats. Wireless Personal Communications, 1\u201316","DOI":"10.1007\/s11277-018-5307-3"},{"issue":"5","key":"1060_CR33","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1002\/sec.326","volume":"5","author":"J Shao","year":"2012","unstructured":"Shao J, Liu P, Wei G, Ling Y (2012) Anonymous proxy re-encryption. Sec Commun Netw 5(5):439\u2013449","journal-title":"Sec Commun Netw"},{"key":"1060_CR34","unstructured":"T. Mather, S. Kumaraswamy, and S. Latif (2009) \u201cCloud security and privacy: an enterprise perspective on risks and compliance.\u201d OReilly Media"},{"key":"1060_CR35","doi-asserted-by":"crossref","unstructured":"H Rhee, I Jeong, J Byun, D Lee (2006) \u201cDifference set attacks on conjunctive keyword search schemes,\u201d in Proc. SDM: VLDB Workshop","DOI":"10.1007\/11844662_5"},{"key":"1060_CR36","doi-asserted-by":"crossref","unstructured":"P Wang, H Wang, J Pieprzyk (2009) An efficient scheme of common secure indices for conjunctive keyword-based retrieval on encrypted data,\u201d in Proc. WISA","DOI":"10.1007\/978-3-642-00306-6_11"},{"key":"1060_CR37","doi-asserted-by":"crossref","unstructured":"P Golle, J Staddon, and B Waters (2004) Secure conjunctive keyword search over encrypted data,\u201d in Proc. ACNS","DOI":"10.1007\/978-3-540-24852-1_3"},{"issue":"1","key":"1060_CR38","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1109\/MIC.2012.14","volume":"16","author":"K Ren","year":"2012","unstructured":"Ren K, Wang C, Wang Q (2012) Security challenges for the public cloud. IEEE Internet Comput 16(1):69\u201373","journal-title":"IEEE Internet Comput"},{"key":"1060_CR39","doi-asserted-by":"crossref","unstructured":"M Li, S Yu, N Cao, W Lou (2011) Authorized private keyword search over encrypted data in cloud computing, in IEEE ICDCS, 383\u2013392","DOI":"10.1109\/ICDCS.2011.55"},{"key":"1060_CR40","doi-asserted-by":"crossref","unstructured":"W Sun, B Wang, N Cao, M Li, W Lou, YT Hou, and H. Li (2013) Privacy preserving multi-keyword text search in the cloud supporting similarity based ranking,\u201d in ACM ASIACCS","DOI":"10.1145\/2484313.2484322"},{"key":"1060_CR41","doi-asserted-by":"crossref","unstructured":"Q Wang, C Wang, . Li, K Ren, and W. Lou (2009) Enabling public verifiability and data dynamics for storage security in cloud computing, in Proceedings of the 14th European Conference on Research in Computer Security 355\u2013370","DOI":"10.1007\/978-3-642-04444-1_22"},{"issue":"1","key":"1060_CR42","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1504\/IJGUC.2016.073773","volume":"7","author":"Y Wang","year":"2016","unstructured":"Wang Y, Du J, Cheng X, Liu Z, Lin K (2016) Degradation and encryption for outsourced png images in cloud storage. Int J Grid Utility Comput 7(1):22\u201328","journal-title":"Int J Grid Utility Comput"},{"issue":"2","key":"1060_CR43","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1504\/IJSSC.2014.062469","volume":"4","author":"M Thabet","year":"2014","unstructured":"Thabet M, Boufaida M, Kordon F (2014) An approach for developing an interoperability mechanism between cloud providers. Int J Space-Based Situat Comput 4(2):88\u201399","journal-title":"Int J Space-Based Situat Comput"},{"key":"1060_CR44","doi-asserted-by":"crossref","unstructured":"E Damiani, S Vimercati, S Jajodia, S Paraboschi, P Samarati (2003) Balancing confidentiality and efficiency in untrusted relational dbmss,\u201d in Proc. ACM CCS","DOI":"10.1145\/948109.948124"},{"key":"1060_CR45","volume-title":"Proc. SDM:VLDB workshop","author":"B Hore","year":"2012","unstructured":"Hore B, Chang E, Diallo M, Mehrotra S (2012) Indexing encrypted documents for supporting efficient keyword search. In: Proc. SDM:VLDB workshop"},{"issue":"4","key":"1060_CR46","first-page":"35","volume":"24","author":"A Singhal","year":"2001","unstructured":"Singhal A (2001) Modern information retrieval: a brief overview. IEEE Data Eng Bull 24(4):35\u201343","journal-title":"IEEE Data Eng Bull"},{"key":"1060_CR47","doi-asserted-by":"crossref","unstructured":"D Boneh, GD Crescenzo, R Ostrovsky, G Persiano (2004) \u201cPublic-key encryption with keyword search,\u201d in EUROCRYPR 506\u2013522","DOI":"10.1007\/978-3-540-24676-3_30"},{"key":"1060_CR48","doi-asserted-by":"crossref","unstructured":"V. Iovino and G. Persiano, \u201cHidden-vector encryption with groups of prime order,\u201d in Proceedings of the 2nd international conference on Pairing-Based Cryptography, ser. Pairing\u2019 08. Berlin, Heidelberg: Springer-Verlag, 2008, pp. 75\u201388","DOI":"10.1007\/978-3-540-85538-5_5"},{"key":"1060_CR49","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1016\/j.comnet.2017.03.013","volume":"129","author":"X Li","year":"2017","unstructured":"Li X, Ibrahim MH, Kumari S, Sangaiah AK, Gupta V, Choo KKR (2017) Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks. Comput Netw 129:429\u2013443","journal-title":"Comput Netw"},{"key":"1060_CR50","doi-asserted-by":"crossref","unstructured":"Li, X., Niu, J., Kumari, S., Wu, F., & Choo, K. K. R. (2017). A robust biometrics based three-factor authentication scheme for global mobility networks in smart city. Future Generation Computer Systems","DOI":"10.1016\/j.future.2017.04.012"},{"key":"1060_CR51","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1016\/j.jnca.2017.07.001","volume":"103","author":"X Li","year":"2018","unstructured":"Li X, Niu J, Kumari S, Wu F, Sangaiah AK, Choo KKR (2018) A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments. J Netw Comput Appl 103:194\u2013204","journal-title":"J Netw Comput Appl"},{"key":"1060_CR52","doi-asserted-by":"publisher","unstructured":"Xiong Li, Jianwei Niu, Md Zakirul Alam Bhuiyan, Fan Wu, Marimuthu Karuppiah, Saru Kumari (2017) A Robust ECC based Provable Secure Authentication Protocol with Privacy Preserving for Industrial Internet of Things. IEEE Transactions on Industrial Informatics. https:\/\/doi.org\/10.1109\/TII.2017.2773666","DOI":"10.1109\/TII.2017.2773666"},{"issue":"11","key":"1060_CR53","doi-asserted-by":"publisher","first-page":"3025","DOI":"10.1109\/TPDS.2013.282","volume":"25","author":"W Sun","year":"2014","unstructured":"W Sun, B Wang, N Cao, M Li, W Lou, YT Hou, and . Li (2014) Verifiable privacy preserving multi-keyword text search in the cloud supporting similarity-based ranking,\u201d IEEE Trans Parallel Distrib Syst, vol. 25, no. 11, pp. 3025\u20133035,","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"1060_CR54","doi-asserted-by":"crossref","unstructured":"P Liu, J Wang, H Ma, and H Nie (2014) \u201cEfficient verifiable public key encryption with keyword search based on KP-ABE,\u201d in Proc. IEEE 9th Int. Conf. Broadband Wireless Compute., Commun. Appl. (BWCCA), 584\u2013589","DOI":"10.1109\/BWCCA.2014.119"},{"issue":"1","key":"1060_CR55","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1016\/j.jnca.2010.07.007","volume":"34","author":"B Zhang","year":"2011","unstructured":"Zhang B, Zhang F (2011) An efficient public key encryption with conjunctive-subset keywords search. J Netw Comput Appl 34(1):262\u2013267","journal-title":"J Netw Comput Appl"},{"key":"1060_CR56","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1007\/978-3-642-38033-4_10","volume-title":"Information security practice and experience","author":"K Liang","year":"2013","unstructured":"Liang K, Huang Q, Schlegel R, Wong DS, Tang C (2013) A conditional proxy broadcast re-encryption scheme supporting timed-release. In: Information security practice and experience. Springer, Berlin, pp 132\u2013146"},{"key":"1060_CR57","doi-asserted-by":"publisher","unstructured":"Li J, Shi Y, Zhang Y (2015) Searchable ciphertext-policy attribute-based encryption with revocation in cloud storage. Int J Commun Syst. https:\/\/doi.org\/10.1002\/dac.2942","DOI":"10.1002\/dac.2942"}],"updated-by":[{"DOI":"10.1007\/s11036-022-02062-x","type":"retraction","label":"Retraction","source":"retraction-watch","updated":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T00:00:00Z","timestamp":1667779200000},"record-id":"42551"},{"DOI":"10.1007\/s11036-022-02062-x","type":"retraction","label":"Retraction","source":"publisher","updated":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T00:00:00Z","timestamp":1667779200000}}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-018-1060-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11036-018-1060-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-018-1060-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,8]],"date-time":"2022-11-08T00:18:43Z","timestamp":1667866723000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11036-018-1060-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5,21]]},"references-count":57,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2019,6,15]]}},"alternative-id":["1060"],"URL":"https:\/\/doi.org\/10.1007\/s11036-018-1060-9","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"value":"1383-469X","type":"print"},{"value":"1572-8153","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,5,21]]},"assertion":[{"value":"21 May 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 November 2022","order":2,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Correction","order":3,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"This article has been retracted. Please see the Retraction Notice for more detail:","order":4,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"https:\/\/doi.org\/10.1007\/s11036-022-02062-x","URL":"https:\/\/doi.org\/10.1007\/s11036-022-02062-x","order":5,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}}]}}