{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T19:17:45Z","timestamp":1772911065979,"version":"3.50.1"},"reference-count":98,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100004663","name":"Ministry of Science and Technology, Taiwan","doi-asserted-by":"publisher","award":["MOST 109-2221-E-009-068-MY3"],"award-info":[{"award-number":["MOST 109-2221-E-009-068-MY3"]}],"id":[{"id":"10.13039\/501100004663","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004663","name":"Ministry of Science and Technology, Taiwan","doi-asserted-by":"publisher","award":["MOST 108-2628-E-009-008-MY3"],"award-info":[{"award-number":["MOST 108-2628-E-009-008-MY3"]}],"id":[{"id":"10.13039\/501100004663","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004663","name":"Ministry of Science and Technology, Taiwan","doi-asserted-by":"publisher","award":["MOST 108-2221-E-240 -003"],"award-info":[{"award-number":["MOST 108-2221-E-240 -003"]}],"id":[{"id":"10.13039\/501100004663","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004663","name":"ministry of science and technology, taiwan","doi-asserted-by":"publisher","award":["110-2622-E-A49-004"],"award-info":[{"award-number":["110-2622-E-A49-004"]}],"id":[{"id":"10.13039\/501100004663","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2023,6]]},"DOI":"10.1007\/s11036-023-02143-5","type":"journal-article","created":{"date-parts":[[2023,7,5]],"date-time":"2023-07-05T09:02:32Z","timestamp":1688547752000},"page":"1043-1058","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":24,"title":["Security and Privacy in 5G-IIoT Smart Factories: Novel Approaches, Trends, and Challenges"],"prefix":"10.1007","volume":"28","author":[{"given":"Chun-Cheng","family":"Lin","sequence":"first","affiliation":[]},{"given":"Ching-Tsorng","family":"Tsai","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4609-3682","authenticated-orcid":false,"given":"Yu-Liang","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Tsai-Ting","family":"Chang","sequence":"additional","affiliation":[]},{"given":"Yung-Sheng","family":"Chang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,7,5]]},"reference":[{"issue":"4","key":"2143_CR1","doi-asserted-by":"publisher","first-page":"1020","DOI":"10.1007\/s11036-017-0967-x","volume":"23","author":"SY Lien","year":"2018","unstructured":"Lien SY, Hung SC, Deng DJ, Wang YJ (2018) Optimum ultra-reliable and low latency communications in 5G new radio. Mob Networks Appl 23(4):1020\u20131027","journal-title":"Mob Networks Appl"},{"issue":"11","key":"2143_CR2","doi-asserted-by":"publisher","first-page":"4724","DOI":"10.1109\/TII.2018.2852491","volume":"14","author":"E Sisinni","year":"2018","unstructured":"Sisinni E, Saifullah A, Han S, Jennehag U, Gidlund M (2018) Industrial internet of things: challenges, opportunities, and directions. IEEE Trans Industr Inf 14(11):4724\u20134734","journal-title":"IEEE Trans Industr Inf"},{"key":"2143_CR3","doi-asserted-by":"publisher","first-page":"152351","DOI":"10.1109\/ACCESS.2020.3016937","volume":"8","author":"T Gebremichael","year":"2020","unstructured":"Gebremichael T, Ledwaba LP, Eldefrawy MH, Hancke GP, Pereira N, Gidlund M, Akerberg J (2020) Security and privacy in the industrial internet of things: current standards and future challenges. IEEE Access 8:152351\u2013152366","journal-title":"IEEE Access"},{"issue":"6","key":"2143_CR4","doi-asserted-by":"publisher","first-page":"944","DOI":"10.1109\/JPROC.2019.2913443","volume":"107","author":"S Vitturi","year":"2019","unstructured":"Vitturi S, Zunino C, Sauter T (2019) Industrial communication systems and their future challenges: next-generation ethernet, IIoT, and 5G. Proc IEEE 107(6):944\u2013961","journal-title":"Proc IEEE"},{"issue":"4","key":"2143_CR5","doi-asserted-by":"publisher","first-page":"2489","DOI":"10.1109\/COMST.2020.3011208","volume":"22","author":"K Tange","year":"2020","unstructured":"Tange K, De Donno M, Fafoutis X, Dragoni N (2020) A systematic survey of industrial internet of things security: requirements and fog computing opportunities. IEEE Commun Surv Tutorials 22(4):2489\u20132520","journal-title":"IEEE Commun Surv Tutorials"},{"key":"2143_CR6","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1016\/j.jnca.2017.04.002","volume":"88","author":"FA Alaba","year":"2017","unstructured":"Alaba FA, Othman M, Hashem IAT, Alotaibi F (2017) Internet of things security: a survey. J Netw Comput Appl 88:10\u201328","journal-title":"J Netw Comput Appl"},{"key":"2143_CR7","doi-asserted-by":"publisher","first-page":"100312","DOI":"10.1016\/j.cosrev.2020.100312","volume":"38","author":"MM Ogonji","year":"2020","unstructured":"Ogonji MM, Okeyo G, Wafula JM (2020) A survey on privacy and security of internet of things. Comput Sci Rev 38:100312","journal-title":"Comput Sci Rev"},{"key":"2143_CR8","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1016\/j.comnet.2018.03.012","volume":"141","author":"DE Kouicem","year":"2018","unstructured":"Kouicem DE, Bouabdallah A, Lakhlef H (2018) Internet of things security: a top-down survey. Comput Netw 141:199\u2013221","journal-title":"Comput Netw"},{"key":"2143_CR9","doi-asserted-by":"publisher","first-page":"78238","DOI":"10.1109\/ACCESS.2018.2884906","volume":"6","author":"H Xu","year":"2018","unstructured":"Xu H, Yu W, Griffith D, Golmie N (2018) A survey on industrial internet of things: a cyber-physical systems perspective. IEEE Access 6:78238\u201378259","journal-title":"IEEE Access"},{"key":"2143_CR10","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/j.comcom.2020.09.006","volume":"163","author":"FH Al-Naji","year":"2020","unstructured":"Al-Naji FH, Zagrouba R (2020) A survey on continuous authentication methods in internet of things environment. Comput Commun 163:109\u2013133","journal-title":"Comput Commun"},{"issue":"3","key":"2143_CR11","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/MNET.011.1900276","volume":"34","author":"H Fang","year":"2020","unstructured":"Fang H, Qi A, Wang X (2020) Fast authentication and progressive authorization in large-scale IoT: how to leverage AI for security enhancement. IEEE Network 34(3):24\u201329","journal-title":"IEEE Network"},{"issue":"2","key":"2143_CR12","doi-asserted-by":"publisher","first-page":"1594","DOI":"10.1109\/JIOT.2018.2847705","volume":"6","author":"Y Zhang","year":"2018","unstructured":"Zhang Y, Kasahara S, Shen Y, Jiang X, Wan J (2018) Smart contract-based access control for the internet of things. IEEE Internet Things J 6(2):1594\u20131605","journal-title":"IEEE Internet Things J"},{"key":"2143_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.102481","volume":"149","author":"J Sengupta","year":"2020","unstructured":"Sengupta J, Ruj S, Bit SD (2020) A comprehensive survey on attacks, security issues and blockchain solutions for IoT and IIoT. J Netw Comput Appl 149:102481","journal-title":"J Netw Comput Appl"},{"key":"2143_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101921","volume":"96","author":"M Amiri-Zarandi","year":"2020","unstructured":"Amiri-Zarandi M, Dara RA, Fraser E (2020) A survey of machine learning-based solutions to protect privacy in the internet of things. Comput Secur 96:101921","journal-title":"Comput Secur"},{"issue":"1","key":"2143_CR15","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1109\/MPRV.2018.2877286","volume":"18","author":"P Eugster","year":"2019","unstructured":"Eugster P, Kumar S, Savvides S, Stephen JJ (2019) Ensuring confidentiality in the cloud of things. IEEE Pervasive Comput 18(1):10\u201318","journal-title":"IEEE Pervasive Comput"},{"issue":"1","key":"2143_CR16","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1109\/TNSE.2018.2887236","volume":"7","author":"YJ Chen","year":"2018","unstructured":"Chen YJ, Wang LC, Wang S (2018) Stochastic blockchain for IoT data integrity. IEEE Trans Netw Sci Eng 7(1):373\u2013384","journal-title":"IEEE Trans Netw Sci Eng"},{"issue":"2","key":"2143_CR17","doi-asserted-by":"publisher","first-page":"1530","DOI":"10.1109\/JIOT.2018.2842773","volume":"6","author":"J Xiong","year":"2018","unstructured":"Xiong J, Ren J, Chen L, Yao Z, Lin M, Wu D, Niu B (2018) Enhancing privacy and availability for data clustering in intelligent electrical service of IoT. IEEE Internet Things J 6(2):1530\u20131540","journal-title":"IEEE Internet Things J"},{"key":"2143_CR18","first-page":"1","volume":"10","author":"S Li","year":"2018","unstructured":"Li S, Da Xu L, Zhao S (2018) 5G internet of things: a survey. J Industr Inform Integr 10:1\u20139","journal-title":"J Industr Inform Integr"},{"issue":"1","key":"2143_CR19","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1109\/MIE.2017.2649104","volume":"11","author":"M Wollschlaeger","year":"2017","unstructured":"Wollschlaeger M, Sauter T, Jasperneite J (2017) The future of industrial communication: automation networks in the era of the internet of things and industry 4.0. IEEE Ind Electron Mag 11(1):17\u201327","journal-title":"IEEE Ind Electron Mag"},{"issue":"1","key":"2143_CR20","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/JIOT.2019.2948888","volume":"7","author":"L Chettri","year":"2019","unstructured":"Chettri L, Bera R (2019) A comprehensive survey on internet of things (IoT) toward 5G wireless systems. IEEE Internet Things J 7(1):16\u201332","journal-title":"IEEE Internet Things J"},{"key":"2143_CR21","doi-asserted-by":"publisher","first-page":"31457","DOI":"10.1109\/ACCESS.2018.2839669","volume":"6","author":"NS Vo","year":"2018","unstructured":"Vo NS, Duong TQ, Guizani M, Kortun A (2018) 5G optimized caching and downlink resource sharing for smart cities. IEEE Access 6:31457\u201331468","journal-title":"IEEE Access"},{"key":"2143_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.compag.2020.105895","volume":"180","author":"Y Tang","year":"2021","unstructured":"Tang Y, Dananjayan S, Hou C, Guo Q, Luo S, He Y (2021) A survey on the 5G network and its impact on agriculture: challenges and opportunities. Comput Electron Agric 180:105895","journal-title":"Comput Electron Agric"},{"key":"2143_CR23","doi-asserted-by":"crossref","unstructured":"Selem E, Fatehy M, Abd El-Kader SM (2019) E-Health applications over 5G networks: challenges and state of the art. In: Proc. of 2019 6th International Conference on Advanced Control Circuits and Systems (ACCS) & 2019 5th International Conference on New Paradigms in Electronics & information Technology (PEIT):111\u2013118","DOI":"10.1109\/ACCS-PEIT48329.2019.9062841"},{"issue":"1","key":"2143_CR24","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/s11277-018-5615-7","volume":"100","author":"SK Rao","year":"2018","unstructured":"Rao SK, Prasad R (2018) Impact of 5G technologies on industry 4.0. Wireless Pers Commun 100(1):145\u2013159","journal-title":"Wireless Pers Commun"},{"issue":"8","key":"2143_CR25","doi-asserted-by":"publisher","first-page":"9097","DOI":"10.1109\/TVT.2020.3000576","volume":"69","author":"B Bera","year":"2020","unstructured":"Bera B, Saha S, Das AK, Kumar N, Lorenz P, Alazab M (2020) Blockchain-envisioned secure data delivery and collection scheme for 5G-based IoT-enabled internet of drones environment. IEEE Trans Veh Technol 69(8):9097\u20139111","journal-title":"IEEE Trans Veh Technol"},{"key":"2143_CR26","doi-asserted-by":"publisher","first-page":"202312","DOI":"10.1109\/ACCESS.2020.3035729","volume":"8","author":"EA Oyekanlu","year":"2020","unstructured":"Oyekanlu EA, Smith AC, Thomas WP, Mulroy G, Hitesh D, Ramsey M, Sun D (2020) A review of recent advances in automated guided vehicle technologies: integration challenges and research areas for 5G-based smart manufacturing applications. IEEE Access 8:202312\u2013202353","journal-title":"IEEE Access"},{"key":"2143_CR27","doi-asserted-by":"crossref","unstructured":"Ordonez-Lucena J, Chavarria JF, Contreras LM, Pastor A (2019) The use of 5G non-public networks to support Industry 4.0 scenarios. In: Proc. of 2019 IEEE Conference on Standards for Communications and Networking (CSCN):1\u20137","DOI":"10.1109\/CSCN.2019.8931325"},{"issue":"1","key":"2143_CR28","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1109\/COMST.2019.2933899","volume":"22","author":"R Khan","year":"2019","unstructured":"Khan R, Kumar P, Jayakody DNK, Liyanage M (2019) A survey on security and privacy of 5G technologies: potential solutions, recent advancements, and future directions. IEEE Commun Surv Tutorials 22(1):196\u2013248","journal-title":"IEEE Commun Surv Tutorials"},{"issue":"1","key":"2143_CR29","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/MCOMSTD.2018.1700063","volume":"2","author":"I Ahmad","year":"2018","unstructured":"Ahmad I, Kumar T, Liyanage M, Okwuibe J, Ylianttila M, Gurtov A (2018) Overview of 5G security challenges and solutions. IEEE Commun Stand Mag 2(1):36\u201343","journal-title":"IEEE Commun Stand Mag"},{"key":"2143_CR30","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107345","volume":"179","author":"S Sicari","year":"2020","unstructured":"Sicari S, Rizzardi A, Coen-Porisini A (2020) 5G in the internet of things era: an overview on security and privacy challenges. Comput Netw 179:107345","journal-title":"Comput Netw"},{"key":"2143_CR31","doi-asserted-by":"crossref","unstructured":"Deng DJ, Chen KC, Cheng RS (2014) IEEE 802.11 ax: next generation wireless local area networks. In: Proc. of IEEE 10th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness:77\u201382","DOI":"10.1109\/QSHINE.2014.6928663"},{"issue":"7","key":"2143_CR32","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1109\/MCOM.2019.1800389","volume":"57","author":"DJ Deng","year":"2019","unstructured":"Deng DJ, Gan M, Guo YC, Yu J, Lin YP, Lien SY, Chen KC (2019) IEEE 802.11ba: low-power wake-up radio for green IoT. IEEE Commun Mag 57(7):106\u2013112","journal-title":"IEEE Commun Mag"},{"issue":"1","key":"2143_CR33","first-page":"96","volume":"82","author":"J Deng","year":"1999","unstructured":"Deng J, Chang RS (1999) A priority scheme for IEEE 802. 11 DCF access method. IEICE Trans Commun 82(1):96\u2013102","journal-title":"IEICE Trans Commun"},{"key":"2143_CR34","doi-asserted-by":"publisher","first-page":"1581","DOI":"10.1109\/ACCESS.2015.2477299","volume":"3","author":"TN Pham","year":"2015","unstructured":"Pham TN, Tsai MF, Nguyen DB, Dow CR, Deng DJ (2015) A cloud-based smart-parking system based on internet-of-things technologies. IEEE Access 3:1581\u20131591","journal-title":"IEEE Access"},{"key":"2143_CR35","doi-asserted-by":"publisher","first-page":"35368","DOI":"10.1109\/ACCESS.2020.2973706","volume":"8","author":"SY Lien","year":"2020","unstructured":"Lien SY, Deng DJ, Lin CC, Tsai HL, Chen T, Guo C, Cheng SM (2020) 3GPP NR sidelink transmissions toward 5G V2X. IEEE Access 8:35368\u201335382","journal-title":"IEEE Access"},{"issue":"12","key":"2143_CR36","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1109\/MCOM.2017.1700285","volume":"55","author":"DJ Deng","year":"2017","unstructured":"Deng DJ, Lin YP, Yang X, Zhu J, Li YB, Luo J, Chen KC (2017) IEEE 802.11ax: highly efficient WLANs for intelligent information infrastructure. IEEE Commun Mag 55(12):52\u201359","journal-title":"IEEE Commun Mag"},{"key":"2143_CR37","doi-asserted-by":"publisher","first-page":"6086","DOI":"10.1109\/ACCESS.2016.2602281","volume":"4","author":"DJ Deng","year":"2016","unstructured":"Deng DJ, Lien SY, Lee J, Chen KC (2016) On quality-of-service provisioning in IEEE 802.11 ax WLANs. IEEE Access 4:6086\u20136104","journal-title":"IEEE Access"},{"issue":"5","key":"2143_CR38","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/MWC.2016.7721739","volume":"23","author":"K Wang","year":"2016","unstructured":"Wang K, Qi X, Shu L, Deng DJ, Rodrigues JJPC (2016) Toward trustworthy crowdsourcing in the social internet of things. IEEE Wirel Commun 23(5):30\u201336","journal-title":"IEEE Wirel Commun"},{"issue":"1","key":"2143_CR39","doi-asserted-by":"publisher","first-page":"580","DOI":"10.1109\/JIOT.2018.2846299","volume":"6","author":"P Gope","year":"2018","unstructured":"Gope P, Sikdar B (2018) Lightweight and privacy-preserving two-factor authentication scheme for IoT devices. IEEE Internet Things J 6(1):580\u2013589","journal-title":"IEEE Internet Things J"},{"issue":"9","key":"2143_CR40","doi-asserted-by":"publisher","first-page":"4957","DOI":"10.1109\/TII.2019.2895030","volume":"15","author":"P Gope","year":"2019","unstructured":"Gope P, Das AK, Kumar N, Cheng Y (2019) Lightweight and physically secure anonymous mutual authentication protocol for real-time data access in industrial wireless sensor networks. IEEE Trans Industr Inf 15(9):4957\u20134968","journal-title":"IEEE Trans Industr Inf"},{"key":"2143_CR41","doi-asserted-by":"publisher","first-page":"3722","DOI":"10.1109\/TIFS.2020.2998947","volume":"15","author":"Z Gu","year":"2020","unstructured":"Gu Z, Chen H, Xu P, Li Y, Vucetic B (2020) Physical layer authentication for non-coherent massive SIMO-enabled industrial IoT communications. IEEE Trans Inf Forensics Secur 15:3722\u20133733","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"11","key":"2143_CR42","doi-asserted-by":"publisher","first-page":"7081","DOI":"10.1109\/TII.2019.2942389","volume":"16","author":"S Jangirala","year":"2019","unstructured":"Jangirala S, Das AK, Vasilakos AV (2019) Designing secure lightweight blockchain-enabled RFID-based authentication protocol for supply chains in 5G mobile edge computing environment. IEEE Trans Industr Inf 16(11):7081\u20137093","journal-title":"IEEE Trans Industr Inf"},{"issue":"5","key":"2143_CR43","doi-asserted-by":"publisher","first-page":"942","DOI":"10.1109\/JSAC.2020.2980916","volume":"38","author":"M Shen","year":"2020","unstructured":"Shen M, Liu H, Zhu L, Xu K, Yu H, Du X, Guizani M (2020) Blockchain-assisted secure device authentication for cross-domain industrial IoT. IEEE J Sel Areas Commun 38(5):942\u2013954","journal-title":"IEEE J Sel Areas Commun"},{"issue":"12","key":"2143_CR44","doi-asserted-by":"publisher","first-page":"6481","DOI":"10.1109\/TII.2019.2925418","volume":"15","author":"F Pan","year":"2019","unstructured":"Pan F, Pang Z, Wen H, Luvisotto M, Xiao M, Liao RF, Chen J (2019) Threshold-free physical layer authentication based on machine learning for industrial wireless CPS. IEEE Trans Industr Inf 15(12):6481\u20136491","journal-title":"IEEE Trans Industr Inf"},{"issue":"3","key":"2143_CR45","doi-asserted-by":"publisher","first-page":"2041","DOI":"10.1109\/TII.2020.2963962","volume":"17","author":"S Chen","year":"2020","unstructured":"Chen S, Pang Z, Wen H, Yu K, Zhang T, Lu Y (2020) Automated labeling and learning for physical layer authentication against clone node and sybil attacks in industrial wireless edge networks. IEEE Trans Industr Inf 17(3):2041\u20132051","journal-title":"IEEE Trans Industr Inf"},{"key":"2143_CR46","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1016\/j.ymssp.2018.07.048","volume":"117","author":"T Han","year":"2019","unstructured":"Han T, Liu C, Wu L, Sarkar S, Jiang D (2019) An adaptive spatiotemporal feature learning approach for fault diagnosis in complex systems. Mech Syst Signal Process 117:170\u2013187","journal-title":"Mech Syst Signal Process"},{"key":"2143_CR47","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1016\/j.compind.2018.12.012","volume":"105","author":"S Ma","year":"2019","unstructured":"Ma S, Chu F (2019) Ensemble deep learning-based fault diagnosis of rotor bearing systems. Comput Ind 105:143\u2013152","journal-title":"Comput Ind"},{"key":"2143_CR48","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1016\/j.isatra.2019.07.001","volume":"96","author":"Y Wang","year":"2020","unstructured":"Wang Y, Pan Z, Yuan X, Yang C, Gui W (2020) A novel deep learning based fault diagnosis approach for chemical process with extended deep belief network. ISA Trans 96:457\u2013467","journal-title":"ISA Trans"},{"key":"2143_CR49","doi-asserted-by":"publisher","first-page":"19990","DOI":"10.1109\/ACCESS.2018.2890566","volume":"7","author":"Y Xu","year":"2019","unstructured":"Xu Y, Sun Y, Liu X, Zheng Y (2019) A digital-twin-assisted fault diagnosis using deep transfer learning. IEEE Access 7:19990\u201319999","journal-title":"IEEE Access"},{"issue":"3","key":"2143_CR50","doi-asserted-by":"publisher","first-page":"1947","DOI":"10.1109\/TII.2019.2920831","volume":"16","author":"B Naik","year":"2019","unstructured":"Naik B, Obaidat MS, Nayak J, Pelusi D, Vijayakumar P, Islam SH (2019) Intelligent secure ecosystem based on Metaheuristic and functional link neural network for edge of things. IEEE Trans Industr Inf 16(3):1947\u20131956","journal-title":"IEEE Trans Industr Inf"},{"issue":"3","key":"2143_CR51","doi-asserted-by":"publisher","first-page":"1963","DOI":"10.1109\/TII.2019.2938778","volume":"16","author":"Z Tian","year":"2019","unstructured":"Tian Z, Luo C, Qiu J, Du X, Guizani M (2019) A distributed deep learning system for web attack detection on edge devices. IEEE Trans Industr Inf 16(3):1963\u20131971","journal-title":"IEEE Trans Industr Inf"},{"issue":"7","key":"2143_CR52","doi-asserted-by":"publisher","first-page":"4285","DOI":"10.1109\/TII.2019.2907754","volume":"15","author":"Z Tian","year":"2019","unstructured":"Tian Z, Shi W, Wang Y, Zhu C, Du X, Su S, Guizani N (2019) Real-time lateral movement detection based on evidence reasoning network for edge computing environment. IEEE Trans Industr Inf 15(7):4285\u20134294","journal-title":"IEEE Trans Industr Inf"},{"issue":"9","key":"2143_CR53","doi-asserted-by":"publisher","first-page":"4066","DOI":"10.1109\/TCYB.2019.2912939","volume":"50","author":"C Yang","year":"2019","unstructured":"Yang C, Shi Z, Zhang H, Wu J, Shi X (2019) Multiple attacks detection in cyber-physical systems using random finite set theory. IEEE Trans Cybernetics 50(9):4066\u20134075","journal-title":"IEEE Trans Cybernetics"},{"issue":"4","key":"2143_CR54","doi-asserted-by":"publisher","first-page":"4394","DOI":"10.1109\/TIA.2020.2977872","volume":"56","author":"K Krithivasan","year":"2020","unstructured":"Krithivasan K, Pravinraj S, VS SS (2020) Detection of cyberattacks in industrial control systems using enhanced principal component analysis and hypergraph-based convolution neural network (EPCA-HG-CNN). IEEE Trans Ind Appl 56(4):4394\u20134404","journal-title":"IEEE Trans Ind Appl"},{"key":"2143_CR55","doi-asserted-by":"publisher","first-page":"1230","DOI":"10.1016\/j.future.2018.07.027","volume":"108","author":"Y Hu","year":"2020","unstructured":"Hu Y, Li H, Luan TH, Yang A, Sun L, Wang Z, Wang R (2020) Detecting stealthy attacks on industrial control systems using a permutation entropy-based method. Future Gener Comput Syst 108:1230\u20131240","journal-title":"Future Gener Comput Syst"},{"issue":"5","key":"2143_CR56","doi-asserted-by":"publisher","first-page":"803","DOI":"10.1109\/JSAC.2020.2980908","volume":"38","author":"K Wang","year":"2020","unstructured":"Wang K, Zhou Y, Liu Z, Shao Z, Luo X, Yang Y (2020) Online task scheduling and resource allocation for intelligent NOMA-based industrial internet of things. IEEE J Sel Areas Commun 38(5):803\u2013815","journal-title":"IEEE J Sel Areas Commun"},{"issue":"4","key":"2143_CR57","doi-asserted-by":"publisher","first-page":"3041","DOI":"10.1109\/JIOT.2020.2964590","volume":"7","author":"Y Jie","year":"2020","unstructured":"Jie Y, Guo C, Choo KKR, Liu CZ, Li M (2020) Game-theoretic resource allocation for fog-based industrial internet of things environment. IEEE Internet Things J 7(4):3041\u20133052","journal-title":"IEEE Internet Things J"},{"issue":"1","key":"2143_CR58","doi-asserted-by":"publisher","first-page":"398","DOI":"10.1109\/TII.2020.2985723","volume":"17","author":"H Wu","year":"2020","unstructured":"Wu H, Tian H, Fan S, Ren J (2020) Data age aware scheduling for wireless powered mobile-edge computing in industrial internet of things. IEEE Trans Industr Inf 17(1):398\u2013408","journal-title":"IEEE Trans Industr Inf"},{"issue":"7","key":"2143_CR59","doi-asserted-by":"publisher","first-page":"4225","DOI":"10.1109\/TII.2019.2899679","volume":"5","author":"X Li","year":"2019","unstructured":"Li X, Wan J, Dai HN, Imran M, Xia M, Celesti A (2019) A hybrid computing solution and resource scheduling strategy for edge computing in smart manufacturing. IEEE Trans Industr Inf 5(7):4225\u20134234","journal-title":"IEEE Trans Industr Inf"},{"issue":"9","key":"2143_CR60","doi-asserted-by":"publisher","first-page":"6103","DOI":"10.1109\/TII.2020.2974875","volume":"16","author":"S Deng","year":"2020","unstructured":"Deng S, Xiang Z, Zhao P, Taheri J, Gao H, Yin J, Zomaya AY (2020) Dynamical resource allocation in edge for trustable internet-of-things systems: a reinforcement learning method. IEEE Trans Industr Inf 16(9):6103\u20136113","journal-title":"IEEE Trans Industr Inf"},{"issue":"3","key":"2143_CR61","doi-asserted-by":"publisher","first-page":"4035","DOI":"10.1109\/JIOT.2018.2875909","volume":"6","author":"G Zhang","year":"2018","unstructured":"Zhang G, Chen Y, Shen Z, Wang L (2018) Distributed energy management for multiuser mobile-edge computing systems with energy harvesting devices and QoS constraints. IEEE Internet Things J 6(3):4035\u20134048","journal-title":"IEEE Internet Things J"},{"issue":"4","key":"2143_CR62","doi-asserted-by":"publisher","first-page":"2756","DOI":"10.1109\/TII.2019.2954334","volume":"16","author":"J Wang","year":"2019","unstructured":"Wang J, Jiang C, Zhang K, Hou X, Ren Y, Qian Y (2019) Distributed Q-learning aided heterogeneous network association for energy-efficient IIoT. IEEE Trans Industr Inf 16(4):2756\u20132764","journal-title":"IEEE Trans Industr Inf"},{"issue":"9","key":"2143_CR63","doi-asserted-by":"publisher","first-page":"6059","DOI":"10.1109\/TII.2019.2952669","volume":"16","author":"J Wan","year":"2019","unstructured":"Wan J, Yang J, Wang S, Li D, Li P, Xia M (2019) Cross-network fusion and scheduling for heterogeneous networks in smart factory. IEEE Trans Industr Inf 16(9):6059\u20136068","journal-title":"IEEE Trans Industr Inf"},{"issue":"5","key":"2143_CR64","doi-asserted-by":"publisher","first-page":"3143","DOI":"10.1109\/TII.2020.3010983","volume":"17","author":"X Wang","year":"2021","unstructured":"Wang X, Chai L, Zhou Y, Dan F (2021) Dual-network task scheduling in cyber-physical systems: a co-optimization approach. IEEE Trans Industr Inf 17(5):3143\u20133152","journal-title":"IEEE Trans Industr Inf"},{"issue":"2","key":"2143_CR65","doi-asserted-by":"publisher","first-page":"682","DOI":"10.1109\/TNSM.2020.2973222","volume":"17","author":"V Huang","year":"2020","unstructured":"Huang V, Chen G, Zhang P, Li H, Hu C, Pan T, Fu Q (2020) A scalable approach to SDN control plane management: high utilization comes with low latency. IEEE Trans Netw Serv Manage 17(2):682\u2013695","journal-title":"IEEE Trans Netw Serv Manage"},{"issue":"1","key":"2143_CR66","doi-asserted-by":"publisher","first-page":"304","DOI":"10.1109\/TCCN.2020.2988908","volume":"7","author":"J Li","year":"2021","unstructured":"Li J, Shi W, Zhang N, Shen X (2021) Delay-aware VNF scheduling: a reinforcement learning approach with variable action set. IEEE Trans Cogn Commun Netw 7(1):304\u2013318","journal-title":"IEEE Trans Cogn Commun Netw"},{"issue":"2","key":"2143_CR67","doi-asserted-by":"publisher","first-page":"1427","DOI":"10.1109\/TII.2019.2945012","volume":"16","author":"S Messaoud","year":"2019","unstructured":"Messaoud S, Bradai A, Moulay E (2019) Online GMM clustering and mini-batch gradient descent based optimization for industrial IoT 4.0. IEEE Trans Industr Inf 16(2):1427\u20131435","journal-title":"IEEE Trans Industr Inf"},{"issue":"4","key":"2143_CR68","doi-asserted-by":"publisher","first-page":"2515","DOI":"10.1109\/TWC.2020.2965927","volume":"19","author":"H Xiang","year":"2020","unstructured":"Xiang H, Yan S, Peng M (2020) A realization of fog-RAN slicing via deep reinforcement learning. IEEE Trans Wireless Commun 19(4):2515\u20132527","journal-title":"IEEE Trans Wireless Commun"},{"issue":"4","key":"2143_CR69","doi-asserted-by":"publisher","first-page":"2394","DOI":"10.1109\/TCOMM.2020.2968907","volume":"68","author":"K Qu","year":"2020","unstructured":"Qu K, Zhuang W, Ye Q, Shen X, Li X, Rao J (2020) Dynamic flow migration for embedded services in SDN\/NFV-enabled 5G core networks. IEEE Trans Commun 68(4):2394\u20132408","journal-title":"IEEE Trans Commun"},{"issue":"2","key":"2143_CR70","doi-asserted-by":"publisher","first-page":"1362","DOI":"10.1109\/TII.2019.2947291","volume":"16","author":"F Estrada-Solano","year":"2019","unstructured":"Estrada-Solano F, Caicedo OM, Da Fonseca NL (2019) Nelly: flow detection using incremental learning at the server side of SDN-based data centers. IEEE Trans Industr Inf 16(2):1362\u20131372","journal-title":"IEEE Trans Industr Inf"},{"issue":"4","key":"2143_CR71","doi-asserted-by":"publisher","first-page":"3559","DOI":"10.1109\/JIOT.2020.2973176","volume":"7","author":"N Ravi","year":"2020","unstructured":"Ravi N, Shalinie SM (2020) Learning-driven detection and mitigation of DDoS attack in IoT via SDN-cloud architecture. IEEE Internet Things J 7(4):3559\u20133570","journal-title":"IEEE Internet Things J"},{"issue":"6","key":"2143_CR72","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/MNET.021.1900614","volume":"34","author":"L Fang","year":"2020","unstructured":"Fang L, Zhao B, Li Y, Liu Z, Ge C, Meng W (2020) Countermeasure based on smart contracts and AI against DoS\/DDoS attack in 5G circumstances. IEEE Network 34(6):54\u201361","journal-title":"IEEE Network"},{"issue":"9","key":"2143_CR73","doi-asserted-by":"publisher","first-page":"6154","DOI":"10.1109\/TII.2020.2970074","volume":"16","author":"MM Hassan","year":"2020","unstructured":"Hassan MM, Gumaei A, Huda S, Almogren A (2020) Increasing the trustworthiness in the industrial IoT networks through a reliable cyberattack detection model. IEEE Trans Industr Inf 16(9):6154\u20136162","journal-title":"IEEE Trans Industr Inf"},{"issue":"9","key":"2143_CR74","doi-asserted-by":"publisher","first-page":"8852","DOI":"10.1109\/JIOT.2020.2996425","volume":"7","author":"M Saharkhizan","year":"2020","unstructured":"Saharkhizan M, Azmoodeh A, Dehghantanha A, Choo KKR, Parizi RM (2020) An ensemble of deep recurrent neural networks for detecting IoT cyber attacks using network traffic. IEEE Internet Things J 7(9):8852\u20138859","journal-title":"IEEE Internet Things J"},{"issue":"8","key":"2143_CR75","doi-asserted-by":"publisher","first-page":"3083","DOI":"10.1007\/s12652-018-0813-4","volume":"10","author":"LF Maim\u00f3","year":"2019","unstructured":"Maim\u00f3 LF, Celdr\u00e1n AH, P\u00e9rez MG, Clemente FJG, P\u00e9rez GM (2019) Dynamic management of a deep learning-based anomaly detection system for 5G networks. J Ambient Intell Humaniz Comput 10(8):3083\u20133097","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"2143_CR76","doi-asserted-by":"publisher","first-page":"658","DOI":"10.1109\/TIFS.2020.3017932","volume":"16","author":"N Wang","year":"2020","unstructured":"Wang N, Li W, Alipour-Fanid A, Jiao L, Dabaghchian M, Zeng K (2020) Pilot contamination attack detection for 5G MmWave grant-free IoT networks. IEEE Trans Inf Forensics Secur 16:658\u2013670","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"2","key":"2143_CR77","doi-asserted-by":"publisher","first-page":"1015","DOI":"10.1109\/TCNS.2019.2927594","volume":"7","author":"A Chattopadhyay","year":"2019","unstructured":"Chattopadhyay A, Mitra U (2019) Security against false data-injection attack in cyber-physical systems. IEEE Trans Control Netw Syst 7(2):1015\u20131027","journal-title":"IEEE Trans Control Netw Syst"},{"issue":"2","key":"2143_CR78","doi-asserted-by":"publisher","first-page":"860","DOI":"10.1109\/TII.2020.2974520","volume":"17","author":"B Hussain","year":"2021","unstructured":"Hussain B, Du Q, Sun B, Han Z (2021) Deep learning-based DDoS-attack detection for cyber-physical system over 5G network. IEEE Trans Industr Inf 17(2):860\u2013870","journal-title":"IEEE Trans Industr Inf"},{"key":"2143_CR79","doi-asserted-by":"publisher","first-page":"761","DOI":"10.1016\/j.future.2017.08.043","volume":"82","author":"AA Diro","year":"2017","unstructured":"Diro AA, Chilamkurti N (2017) Distributed attack detection scheme using deep learning approach for internet of things. Future Gener Comput Syst 82:761\u2013768","journal-title":"Future Gener Comput Syst"},{"issue":"3","key":"2143_CR80","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1109\/MNET.2019.1800376","volume":"33","author":"Y Dai","year":"2019","unstructured":"Dai Y, Xu D, Maharjan S, Chen Z, He Q, Zhang Y (2019) Blockchain and deep reinforcement learning empowered intelligent 5G beyond. IEEE Network 33(3):10\u201317","journal-title":"IEEE Network"},{"key":"2143_CR81","doi-asserted-by":"crossref","unstructured":"Rezvy S, Luo Y, Petridis M, Lasebae A, Zebin T (2019) An efficient deep learning model for intrusion classification and prediction in 5G and IoT networks. In: Proc. of 2019 53rd Annual Conference on Information Sciences and Systems (CISS), Baltimore, MD, pp 1\u20136","DOI":"10.1109\/CISS.2019.8693059"},{"issue":"4","key":"2143_CR82","doi-asserted-by":"publisher","first-page":"2886","DOI":"10.1109\/JIOT.2020.3020979","volume":"8","author":"S Qi","year":"2020","unstructured":"Qi S, Lu Y, Wei W, Chen X (2020) Efficient data access control with fine-grained data protection in cloud-assisted IIoT. IEEE Internet Things J 8(4):2886\u20132899","journal-title":"IEEE Internet Things J"},{"issue":"4","key":"2143_CR83","doi-asserted-by":"publisher","first-page":"2914","DOI":"10.1109\/JIOT.2020.2963899","volume":"7","author":"S Xiong","year":"2020","unstructured":"Xiong S, Ni Q, Wang L, Wang Q (2020) SEM-ACSIT: secure and efficient multiauthority access control for IoT cloud storage. IEEE Internet Things J 7(4):2914\u20132927","journal-title":"IEEE Internet Things J"},{"issue":"6","key":"2143_CR84","doi-asserted-by":"publisher","first-page":"3680","DOI":"10.1109\/TII.2019.2903342","volume":"15","author":"J Huang","year":"2019","unstructured":"Huang J, Kong L, Chen G, Wu MY, Liu X, Zeng P (2019) Towards secure industrial IoT: blockchain system with credit-based consensus mechanism. IEEE Trans Industr Inf 15(6):3680\u20133689","journal-title":"IEEE Trans Industr Inf"},{"issue":"7","key":"2143_CR85","doi-asserted-by":"publisher","first-page":"5510","DOI":"10.1109\/JIOT.2020.3030689","volume":"8","author":"D Wu","year":"2020","unstructured":"Wu D, Ansari N (2020) A trust evaluation enhanced blockchain-secured industrial IoT system. IEEE Internet Things J 8(7):5510\u20135517","journal-title":"IEEE Internet Things J"},{"issue":"2","key":"2143_CR86","doi-asserted-by":"publisher","first-page":"766","DOI":"10.1109\/TII.2020.2977774","volume":"17","author":"A Castiglione","year":"2020","unstructured":"Castiglione A, Nappi M, Ricciardi S (2020) Trustworthy method for person identification in IIoT environments by means of facial dynamics. IEEE Trans Industr Inf 17(2):766\u2013774","journal-title":"IEEE Trans Industr Inf"},{"issue":"6","key":"2143_CR87","doi-asserted-by":"publisher","first-page":"4900","DOI":"10.1109\/JIOT.2018.2877690","volume":"5","author":"AK Das","year":"2018","unstructured":"Das AK, Wazid M, Kumar N, Vasilakos AV, Rodrigues JJ (2018) Biometrics-based privacy-preserving user authentication scheme for cloud-based industrial internet of things deployment. IEEE Internet Things J 5(6):4900\u20134913","journal-title":"IEEE Internet Things J"},{"issue":"6","key":"2143_CR88","doi-asserted-by":"publisher","first-page":"3652","DOI":"10.1109\/TII.2019.2894573","volume":"15","author":"J Wan","year":"2019","unstructured":"Wan J, Li J, Imran M, Li D (2019) A blockchain-based solution for enhancing security and privacy in smart factory. IEEE Trans Industr Inf 15(6):3652\u20133660","journal-title":"IEEE Trans Industr Inf"},{"issue":"9","key":"2143_CR89","doi-asserted-by":"publisher","first-page":"6114","DOI":"10.1109\/TII.2019.2952645","volume":"16","author":"M Usman","year":"2019","unstructured":"Usman M, Jan MA, Jolfaei A, Xu M, He X, Chen J (2019) A distributed and anonymous data collection framework based on multilevel edge computing architecture. IEEE Trans Industr Inf 16(9):6114\u20136123","journal-title":"IEEE Trans Industr Inf"},{"issue":"6","key":"2143_CR90","doi-asserted-by":"publisher","first-page":"4177","DOI":"10.1109\/TII.2019.2942190","volume":"16","author":"Y Lu","year":"2019","unstructured":"Lu Y, Huang X, Dai Y, Maharjan S, Zhang Y (2019) Blockchain and federated learning for privacy-preserved data sharing in industrial IoT. IEEE Trans Industr Inf 16(6):4177\u20134186","journal-title":"IEEE Trans Industr Inf"},{"issue":"4","key":"2143_CR91","doi-asserted-by":"publisher","first-page":"804","DOI":"10.1109\/TBDATA.2019.2907133","volume":"6","author":"E Zaghloul","year":"2019","unstructured":"Zaghloul E, Zhou K, Ren J (2019) P-mod: secure privilege-based multilevel organizational data-sharing in cloud computing. IEEE Trans Big Data 6(4):804\u2013815","journal-title":"IEEE Trans Big Data"},{"issue":"4","key":"2143_CR92","doi-asserted-by":"publisher","first-page":"2376","DOI":"10.1109\/TII.2020.2998166","volume":"17","author":"S Qi","year":"2020","unstructured":"Qi S, Lu Y, Zheng Y, Li Y, Chen X (2020) Cpds: enabling compressed and private data sharing for industrial internet of things over blockchain. IEEE Trans Industr Inf 17(4):2376\u20132387","journal-title":"IEEE Trans Industr Inf"},{"issue":"8","key":"2143_CR93","doi-asserted-by":"publisher","first-page":"3648","DOI":"10.1109\/TII.2018.2794442","volume":"14","author":"R Zhou","year":"2018","unstructured":"Zhou R, Zhang X, Du X, Wang X, Yang G, Guizani M (2018) File-centric multi-key aggregate keyword searchable encryption for industrial internet of things. IEEE Trans Industr Inf 14(8):3648\u20133658","journal-title":"IEEE Trans Industr Inf"},{"issue":"4","key":"2143_CR94","doi-asserted-by":"publisher","first-page":"870","DOI":"10.1109\/TIFS.2018.2868162","volume":"14","author":"G Xu","year":"2018","unstructured":"Xu G, Li H, Dai Y, Yang K, Lin X (2018) Enabling efficient and geometric range query with access control over encrypted spatial data. IEEE Trans Inf Forensics Secur 14(4):870\u2013885","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"4","key":"2143_CR95","doi-asserted-by":"publisher","first-page":"2696","DOI":"10.1109\/TII.2020.3006474","volume":"17","author":"Y Lu","year":"2020","unstructured":"Lu Y, Li J, Wang F (2020) Pairing-free certificate-based searchable encryption supporting privacy-preserving keyword search function for IIoTs. IEEE Trans Industr Inf 17(4):2696\u20132706","journal-title":"IEEE Trans Industr Inf"},{"issue":"9","key":"2143_CR96","doi-asserted-by":"publisher","first-page":"7851","DOI":"10.1109\/JIOT.2020.2993231","volume":"7","author":"S Liu","year":"2020","unstructured":"Liu S, Yu J, Xiao Y, Wan Z, Wang S, Yan B (2020) BC-SABE: blockchain-aided searchable attribute-based encryption for cloud-IoT. IEEE Internet Things J 7(9):7851\u20137867","journal-title":"IEEE Internet Things J"},{"issue":"2","key":"2143_CR97","doi-asserted-by":"publisher","first-page":"1140","DOI":"10.1109\/JIOT.2019.2953082","volume":"7","author":"J Hao","year":"2019","unstructured":"Hao J, Liu J, Wu W, Tang F, Xian M (2019) Secure and fine-grained self-controlled outsourced data deletion in cloud-based IoT. IEEE Internet Things J 7(2):1140\u20131153","journal-title":"IEEE Internet Things J"},{"key":"2143_CR98","doi-asserted-by":"publisher","first-page":"640","DOI":"10.1016\/j.ins.2018.02.015","volume":"479","author":"L Xue","year":"2019","unstructured":"Xue L, Yu Y, Li Y, Au MH, Du X, Yang B (2019) Efficient attribute-based encryption with attribute revocation for assured data deletion. Inf Sci 479:640\u2013650","journal-title":"Inf Sci"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-023-02143-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11036-023-02143-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-023-02143-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,3]],"date-time":"2024-05-03T14:50:47Z","timestamp":1714747847000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11036-023-02143-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6]]},"references-count":98,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2023,6]]}},"alternative-id":["2143"],"URL":"https:\/\/doi.org\/10.1007\/s11036-023-02143-5","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"value":"1383-469X","type":"print"},{"value":"1572-8153","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,6]]},"assertion":[{"value":"23 August 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 July 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}