{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T16:07:53Z","timestamp":1774541273809,"version":"3.50.1"},"reference-count":56,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2018,12,15]],"date-time":"2018-12-15T00:00:00Z","timestamp":1544832000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2020,2]]},"DOI":"10.1007\/s11036-018-1189-6","type":"journal-article","created":{"date-parts":[[2018,12,15]],"date-time":"2018-12-15T21:28:43Z","timestamp":1544909323000},"page":"42-54","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":24,"title":["Protecting Source Location Privacy in a Clustered Wireless Sensor Networks against Local Eavesdroppers"],"prefix":"10.1007","volume":"25","author":[{"given":"Mamoun F.","family":"Al-Mistarihi","sequence":"first","affiliation":[]},{"given":"Islam M.","family":"Tanash","sequence":"additional","affiliation":[]},{"given":"Fedaa S.","family":"Yaseen","sequence":"additional","affiliation":[]},{"given":"Khalid A.","family":"Darabkh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,15]]},"reference":[{"issue":"12","key":"1189_CR1","doi-asserted-by":"publisher","first-page":"5332","DOI":"10.1007\/s11227-017-2089-4","volume":"73","author":"KA Darabkh","year":"2017","unstructured":"Darabkh KA, Al-Rawashdeh WS, Al-Zubi RT, Alnabelsi SH (2017) C-DTB-CHR: Centralized Density- and Threshold-based Cluster Head Replacement Protocols for Wireless Sensor Networks. J Supercomput 73(12):5332\u20135353","journal-title":"J Supercomput"},{"issue":"4","key":"1189_CR2","first-page":"1020","volume":"5","author":"MM Shurman","year":"2016","unstructured":"Shurman MM, Al-Mistarihi MF, Darabkh KA (2016) Dynamic Distribution of Security Keys and IP Addresses Coalition Protocol for Mobile Ad Hoc Networks. AUTOMATIKA \u2013 Journal for Control, Measurement, Electronics, Computing and Communications 5(4):1020\u20131034","journal-title":"AUTOMATIKA \u2013 Journal for Control, Measurement, Electronics, Computing and Communications"},{"issue":"10","key":"1189_CR3","doi-asserted-by":"publisher","first-page":"1377","DOI":"10.1049\/iet-com.2010.0698","volume":"5","author":"KA Darabkh","year":"2011","unstructured":"Darabkh KA, Abu-Jaradeh B, Jafar I (2011) Incorporating Automatic Repeat Request and Thresholds with Variable Complexity Decoding Algorithms over Wireless Networks: Queuing Analysis. IET Commun 5(10):1377\u20131393","journal-title":"IET Commun"},{"issue":"1","key":"1189_CR4","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1002\/dac.2640","volume":"28","author":"MF Al-Mistarihi","year":"2015","unstructured":"Al-Mistarihi MF, Mohaisen R, Sharaqa A, Shurman MM, Darabkh KA (2015) Performance Evaluation of Multiuser Diversity in Multiuser Two-Hop Cooperative Multi-Relay Wireless Networks using MRC over Rayleigh Fading Channels. Int J Commun Syst 28(1):71\u201390","journal-title":"Int J Commun Syst"},{"issue":"1","key":"1189_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1002\/ett.2929","volume":"28","author":"KA Darabkh","year":"2017","unstructured":"Darabkh KA (2017) Fast and Upper Bounded Fano Decoding Algorithm: Queuing Analysis. Transactions on Emerging Telecommunications Technologies 28(1):1\u201312","journal-title":"Transactions on Emerging Telecommunications Technologies"},{"issue":"12","key":"1189_CR6","doi-asserted-by":"publisher","first-page":"1765","DOI":"10.1093\/comjnl\/bxt092","volume":"57","author":"R Al-Zubi","year":"2014","unstructured":"Al-Zubi R, Hawa M, Al-Sukkar G, Darabkh KA (2014) Markov-Based Distributed Approach For Mitigating Self-Coexistence Problem in IEEE 802.22 WRANs. Comput J 57(12):1765\u20131775","journal-title":"Comput J"},{"issue":"18","key":"1189_CR7","doi-asserted-by":"publisher","first-page":"3315","DOI":"10.1049\/iet-com.2012.0410","volume":"6","author":"KA Darabkh","year":"2012","unstructured":"Darabkh KA, Jafar I, Al Sukkar G, Abandah G, Al-Zubi R (2012) An Improved Queuing Model for Packet Retransmission Policy and Variable Latency Decoders. IET Commun 6(18):3315\u20133328","journal-title":"IET Commun"},{"key":"1189_CR8","doi-asserted-by":"crossref","unstructured":"Khalifeh AF, Al-Tamimi A-K, Darabkh KA (2017) Perceptual Evaluation of Audio Quality Under Lossy Networks. Proc. International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET 2017). Chennai, India","DOI":"10.1109\/WiSPNET.2017.8299900"},{"key":"1189_CR9","doi-asserted-by":"crossref","unstructured":"Hlayel MM, Hayajneh AM, Al-Mistarihi MF, Shurman M, Darabkh KA (2014) Closed-form Expression of Bit Error Rate in Dual-Hop Dual-Branch Mixed Relaying Cooperative Networks with Best-Path Selection over Rayleigh Fading Channels. Proc. IEEE International Multi-Conference on Systems, Signals & Devices, Conference on Communication & Signal Processing. Castelldefels-Barcelona, Spain","DOI":"10.1109\/SSD.2014.6808897"},{"key":"1189_CR10","doi-asserted-by":"crossref","unstructured":"Darabkh KA, Abu-Jaradeh B (2010) Bounded Fano Decoders over Intermediate Hops Excluding Packet Retransmission. Proc. IEEE 24th International Conference on Advanced Information Networking and Applications (AINA 2010). Perth, Australia 299\u2013303","DOI":"10.1109\/AINA.2010.141"},{"key":"1189_CR11","doi-asserted-by":"crossref","unstructured":"Darabkh KA, Abu-Jaradeh B (2010) Buffering Study over Intermediate Hops including Packet Retransmission.Proc. IEEE International Conference on Multimedia Computing and Information Technology (MCIT-2010). Sharjah, U.A.E: 45\u201348","DOI":"10.1109\/MCIT.2010.5444857"},{"key":"1189_CR12","unstructured":"Darabkh KA, Aygun RS (2006) Quality of Service Evaluation of Error Control for TCP\/IP-Based Systems in Packet Switching ATM Networks. Proc. International Conference on Internet Computing (ICOMP'06). Las Vegas, Nevada: 243\u2013248"},{"issue":"12","key":"1189_CR13","doi-asserted-by":"publisher","first-page":"1833","DOI":"10.1016\/j.aeue.2015.09.008","volume":"69","author":"M Hawa","year":"2015","unstructured":"Hawa M, Darabkh KA, Khalaf LD, Rahhal JS (2015) Dynamic Resource Allocation Using Load Estimation in Distributed Cognitive Radio Systems. AE\u00dc - Int J Electron Commun 69(12):1833\u20131846","journal-title":"AE\u00dc - Int J Electron Commun"},{"issue":"2","key":"1189_CR14","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1007\/s11235-015-0115-5","volume":"63","author":"KA Darabkh","year":"2016","unstructured":"Darabkh KA, Ibeid H, Jafar IF, Al-Zubi RT (2016) A generic buffer occupancy expression for stop-and-wait hybrid automatic repeat request protocol over unstable channels. Telecommun Syst 63(2):205\u2013221","journal-title":"Telecommun Syst"},{"key":"1189_CR15","doi-asserted-by":"crossref","unstructured":"Shurman M, Awad N, Al-Mistarihi MF, Darabkh KA (2014) LEACH Enhancements for Wireless Sensor Networks Based on Energy Model. Proc. IEEE International Multi-Conference on Systems, Signals & Devices, Conference on Communication & Signal Processing. Castelldefels-Barcelona, Spain","DOI":"10.1109\/SSD.2014.6808823"},{"key":"1189_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2016\/9604526","volume":"2016","author":"Mohammed Hawa","year":"2016","unstructured":"Hawa M, Darabkh KA, Al-Zubi R, Al-Sukkar G (2016) A Self-Learning MAC Protocol for Energy Harvesting and Spectrum Access in Cognitive Radio Sensor Networks. Journal of Sensors: 1\u201318","journal-title":"Journal of Sensors"},{"key":"1189_CR17","doi-asserted-by":"crossref","unstructured":"Khalifeh AF, AlQudah M, Darabkh KA(2017) Optimizing the Beacon and SuperFrame Orders in IEEE 802.15.4 for Real-time Notification in Wireless Sensor Networks. Proc. International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET 2017). Chennai, India","DOI":"10.1109\/WiSPNET.2017.8299827"},{"key":"1189_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2015\/348967","volume":"2015","author":"Khalid A. Darabkh","year":"2015","unstructured":"Darabkh KA, Alsukour O (2015) Novel Protocols for Improving the Performance of ODMRP and EODMRP over Mobile Ad hoc Networks. International Journal of Distributed Sensor Networks: 1\u201318","journal-title":"International Journal of Distributed Sensor Networks"},{"key":"1189_CR19","unstructured":"Shurman M, Al-Mistarihi M, Darabkh KA, Ababnah A (2013) Hierarchical Clustering Using Genetic Algorithm in Wireless Sensor Networks. Proc. of 36th IEEE International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO 2013): 479\u2013483"},{"issue":"5","key":"1189_CR20","doi-asserted-by":"publisher","first-page":"1952","DOI":"10.1007\/s11227-016-1898-1","volume":"73","author":"KA Darabkh","year":"2017","unstructured":"Darabkh KA, Albtoush WY, Jafar IF (2017) Improved Clustering Algorithms for Target Tracking in Wireless Sensor Networks. J Supercomput 73(5):1952\u20131977","journal-title":"J Supercomput"},{"key":"1189_CR21","doi-asserted-by":"crossref","unstructured":"Darabkh KA, Al-Rawashdeh WS, Hawa M, Saifan R, Khalifeh AF(2017) A Novel Clustering Protocol for Wireless Sensor Networks. Proc. International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET 2017). Chennai, India","DOI":"10.1109\/WiSPNET.2017.8299793"},{"key":"1189_CR22","doi-asserted-by":"publisher","first-page":"2292","DOI":"10.1016\/j.comnet.2008.04.002","volume":"52","author":"J Yick","year":"2008","unstructured":"Yick J, Mukherjee B, Ghosal D (2008) Wireless sensor network survey. Comput Netw 52:2292\u20132330","journal-title":"Comput Netw"},{"issue":"2","key":"1189_CR23","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1109\/SURV.2009.090205","volume":"11","author":"X Chen","year":"2009","unstructured":"Chen X, Makki K, Yen K, Pissinou N (2009) Sensor network security: a survey. IEEE Commun Surv Tutorials 11(2):52\u201373","journal-title":"IEEE Commun Surv Tutorials"},{"key":"1189_CR24","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1016\/S1389-1286(01)00302-4","volume":"38","author":"IF Akyildiz","year":"2002","unstructured":"Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E (2002) Wireless sensor networks: a survey. Comput Netw 38:393\u2013422","journal-title":"Comput Netw"},{"key":"1189_CR25","unstructured":"Khemapech I, Duncan I, Miller A (2005) A Survey of Wireless Sensor Networks Technology"},{"issue":"1","key":"1189_CR26","first-page":"5201","volume":"3","author":"SK Gupta","year":"2014","unstructured":"Gupta SK, Sinha P (2014) Overview of Wireless Sensor Network: A Survey. Int J Adv Res Comput Commun Eng 3(1):5201\u20135207","journal-title":"Int J Adv Res Comput Commun Eng"},{"key":"1189_CR27","doi-asserted-by":"publisher","first-page":"6869","DOI":"10.3390\/s90906869","volume":"9","author":"C Buratti","year":"2009","unstructured":"Buratti C, Conti A, Dardari D, Verdone R (2009) An Overview on Wireless Sensor Networks Technology and Evolution. Sensors 9:6869\u20136896","journal-title":"Sensors"},{"key":"1189_CR28","doi-asserted-by":"publisher","first-page":"483","DOI":"10.4236\/wsn.2010.26060","volume":"2","author":"S Tarannum","year":"2010","unstructured":"Tarannum S (2010) Energy conservation Challenges in Wireless Sensor Networks: A Comprehensive Study. Wirel Sens Netw 2:483\u2013491","journal-title":"Wirel Sens Netw"},{"issue":"2","key":"1189_CR29","first-page":"55","volume":"1","author":"J Sen","year":"2009","unstructured":"Sen J (2009) A Survey on Wireless Sensor Network Security. Int J Commun Netw Inf Secur 1(2):55\u201378","journal-title":"Int J Commun Netw Inf Secur"},{"key":"1189_CR30","doi-asserted-by":"crossref","unstructured":"Pathan AK, Lee HW, Hong CS (2006) Security in Wireless Sensor Networks: Issues and Challenges. Proc. ICACT2006:1043\u20131048","DOI":"10.1109\/ICACT.2006.206151"},{"key":"1189_CR31","doi-asserted-by":"crossref","unstructured":"Malik MY (2011) An Outline of Security in Wireless Sensor Networks: Threats, Countermeasures and Implementations. Wireless Sensor Networks and Energy Efficiency: Protocols, Routing and Management","DOI":"10.4018\/978-1-4666-0101-7.ch024"},{"issue":"4","key":"1189_CR32","first-page":"67","volume":"2","author":"MA Abuhelaleh","year":"2010","unstructured":"Abuhelaleh MA, Elleithy KM (2010) Security in Wireless Sensor Networks: Key Management Module in SOOAWSN. Int J Netw SecurAppl 2(4):67\u201378","journal-title":"Int J Netw SecurAppl"},{"key":"1189_CR33","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1016\/j.pmcj.2014.01.006","volume":"16","author":"H Chen","year":"2014","unstructured":"Chen H, Lou W (2014) On protecting end-to-end Location Privacy against Local Eavesdropper in Wireless Sensor Networks. Elsevier, pervasive mob comput 16:36\u201350","journal-title":"Elsevier, pervasive mob comput"},{"issue":"5","key":"1189_CR34","doi-asserted-by":"publisher","first-page":"677","DOI":"10.1109\/JSAC.2010.100606","volume":"28","author":"Y Zeng","year":"2010","unstructured":"Zeng Y, Cao J, Zhang S, Guo S, Xie L (2010) Random-walk based approach to detect clone attacks in wireless sensor networks. IEEE J Sel Areas Commun 28(5):677\u2013691","journal-title":"IEEE J Sel Areas Commun"},{"key":"1189_CR35","unstructured":"KhanWZ, AalsalemMY, SaadNM, XaingY, LuanTH (2014) Detecting replicated nodes in Wireless Sensor Networks using random walks and network division. Proc. IEEE Wireless Communications and Networking Conference, WCNC2014: 2623\u20132628"},{"key":"1189_CR36","doi-asserted-by":"crossref","unstructured":"Zhang L (2006) A self-adjusting directed random walk approach for enhancing source-location privacy in sensor network routing. Proc. International conference on Wireless communications and mobile computing, IWCMC\u201906: 33\u201338","DOI":"10.1145\/1143549.1143558"},{"key":"1189_CR37","doi-asserted-by":"crossref","unstructured":"Chen H, Lou W (2010) From nowhere to somewhere: protecting end-to-end location privacy in wireless sensor networks. Proc. IEEE 29th International Performance Computing and Communications Conference, IPCCC 2010: 1\u20138","DOI":"10.1109\/PCCC.2010.5682341"},{"key":"1189_CR38","doi-asserted-by":"crossref","unstructured":"Li Y, Ren J (2009) Providing source-location privacy in wireless sensor networks. Proc. International Conference on Wireless Algorithms, Systems and Applications, WASA 2009: 338\u2013347","DOI":"10.1007\/978-3-642-03417-6_33"},{"key":"1189_CR39","doi-asserted-by":"crossref","unstructured":"Kamat P, Zhang Y, Trappe W, Ozturk C (2005) Enhancing source location privacy in sensor network routing. Proc. 25th IEEE International Conference on Distributed Computing Systems, ICDCS 2005. Los Alamitos, CA, USA: 599\u2013608","DOI":"10.1109\/ICDCS.2005.31"},{"key":"1189_CR40","doi-asserted-by":"crossref","unstructured":"Ozturk C, Zhang Y, Trappe W (2004) Source-location privacy in energy-constrained sensor network routing. Proc. 2nd ACM workshop on Security of Ad hoc and Sensor Networks, SASN \u201804: 88\u201393","DOI":"10.1145\/1029102.1029117"},{"key":"1189_CR41","unstructured":"Spachos P, Song L, Hatzinakos D (2010) Opportunistic routing for enhanced source-location privacy in wireless sensor networks. Proc. IEEE 25th Biennial Symposium on Communications, QBSC 2010: 315\u2013318"},{"key":"1189_CR42","unstructured":"Wei-ping W, Liang C, Jian-xin W (2008) A source-location privacy protocol in wsn based on locational angle.Proc. IEEE International Conference on Communications, ICC\u201908. Piscataway, NJ, USA: 1630\u20131634"},{"key":"1189_CR43","unstructured":"Luo X, Ji X, Park M (2010) Location privacy against traffic analysis attacks in wireless sensor networks. Proc. IEEE International Conference on Information Science and Applications, ICISA 2010: 1\u20136"},{"key":"1189_CR44","doi-asserted-by":"crossref","unstructured":"Xiong K, Thuente D (2006) Secure Localization Schemes in Sensor Networks. IEEE International Symposium on High Capacity Optical Networks and Enabling Technologies","DOI":"10.1109\/HONET.2006.5338402"},{"issue":"5","key":"1189_CR45","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1109\/JIOT.2014.2346813","volume":"1","author":"W Tan","year":"2014","unstructured":"Tan W, Xu K, Wang D (2014) An anti-tracking source-location privacy protection protocol in WSNs based on path extension. IEEE Internet Things J 1(5):461\u2013471","journal-title":"IEEE Internet Things J"},{"key":"1189_CR46","doi-asserted-by":"publisher","first-page":"633","DOI":"10.1109\/ACCESS.2014.2332817","volume":"2","author":"J Long","year":"2014","unstructured":"Long J, Dong M, Ota K, Liu A (2014) Achieving Source Location Privacy and Network Lifetime Maximization Through Tree-Based Diversionary Routing in Wireless Sensor Networks. IEEE Access 2:633\u2013651","journal-title":"IEEE Access"},{"key":"1189_CR47","doi-asserted-by":"crossref","unstructured":"Li Y and Ren J(2010) Source-Location Privacy through Dynamic Routing in Wireless Sensor Networks. Proc. IEEE INFOCOM","DOI":"10.1109\/INFCOM.2010.5462096"},{"issue":"4","key":"1189_CR48","doi-asserted-by":"publisher","first-page":"458","DOI":"10.1109\/TDSC.2014.2366467","volume":"12","author":"JD Zhang","year":"2015","unstructured":"Zhang JD, Chow CY (2015) REAL: A Reciprocal Protocol for Location Privacy in Wireless Sensor Networks. IEEE TransDependable Secure Comput 12(4):458\u2013471","journal-title":"IEEE TransDependable Secure Comput"},{"key":"1189_CR49","doi-asserted-by":"crossref","unstructured":"Bai L, Yan Y, Qian S (2017) A source-location privacy protection algorithm in WSNs based on node distance. Proc. 13th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD): 2772\u20132776","DOI":"10.1109\/FSKD.2017.8393218"},{"key":"1189_CR50","doi-asserted-by":"crossref","unstructured":"Tang D, Gu J, Yu Y, Yang Y, Han W, Ma X (2018) Source-Location Privacy Based on Dynamic Mix-Ring in Wireless Sensor Networks. Proc.International Conference on Computing, Networking and Communications (ICNC): Communications and Information Security Symposium: 327\u2013331","DOI":"10.1109\/ICCNC.2018.8390237"},{"issue":"3","key":"1189_CR51","doi-asserted-by":"publisher","first-page":"614","DOI":"10.3390\/s17030614","volume":"17","author":"Na Wang","year":"2017","unstructured":"Wang N, Zeng J(2017) All-Direction Random Routing for Source-Location Privacy Protecting against Parasitic Sensor Networks. Sensors 17(3)","journal-title":"Sensors"},{"key":"1189_CR52","doi-asserted-by":"crossref","unstructured":"Lilian CM, Seokjoo S (2018) Strategic Location-Based Random Routing for Source Location Privacy in Wireless Sensor Networks. Sensors 18(7)","DOI":"10.3390\/s18072291"},{"issue":"4","key":"1189_CR53","doi-asserted-by":"publisher","first-page":"724","DOI":"10.3390\/s17040724","volume":"17","author":"Changqin Huang","year":"2017","unstructured":"Huang C, Ma M, Liu Y, Liu A(2017) Preserving Source Location Privacy for Energy Harvesting WSNs. Sensors 17(4)","journal-title":"Sensors"},{"issue":"2","key":"1189_CR54","doi-asserted-by":"publisher","first-page":"2761","DOI":"10.1007\/s11277-017-4323-z","volume":"96","author":"RA Raja","year":"2017","unstructured":"Raja RA, Valli S (2017) An Approach to Defend Global Eavesdropper in Sensor Networks. Wirel Pers Commun 96(2):2761\u20132777","journal-title":"Wirel Pers Commun"},{"key":"1189_CR55","doi-asserted-by":"publisher","first-page":"926","DOI":"10.1016\/j.compeleceng.2018.01.032","volume":"72","author":"Khalid A. Darabkh","year":"2018","unstructured":"Darabkh KA, Al-Rawashdeh WS, Hawa M, Saifan R (2018) MT-CHR: A Modified Threshold-based Cluster Head Replacement Protocol for Wireless Sensor Networks,\u201d Computers and Electrical Engineering, https:\/\/doi.org\/10.1016\/j.compeleceng.2018.01.032 , 2018","journal-title":"Computers & Electrical Engineering"},{"key":"1189_CR56","unstructured":"Anfeng L et al. (2013) Deployment guidelines for achieving maximum lifetime and avoiding energy holes in sensor network. Information Sciences: 197\u2013226"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-018-1189-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11036-018-1189-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-018-1189-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T23:22:02Z","timestamp":1605655322000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11036-018-1189-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12,15]]},"references-count":56,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,2]]}},"alternative-id":["1189"],"URL":"https:\/\/doi.org\/10.1007\/s11036-018-1189-6","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"value":"1383-469X","type":"print"},{"value":"1572-8153","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,12,15]]},"assertion":[{"value":"15 December 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}