{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:27:41Z","timestamp":1740122861281,"version":"3.37.3"},"reference-count":56,"publisher":"Springer Science and Business Media LLC","issue":"31-32","license":[{"start":{"date-parts":[[2020,6,8]],"date-time":"2020-06-08T00:00:00Z","timestamp":1591574400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,6,8]],"date-time":"2020-06-08T00:00:00Z","timestamp":1591574400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2020,8]]},"DOI":"10.1007\/s11042-020-09042-x","type":"journal-article","created":{"date-parts":[[2020,6,8]],"date-time":"2020-06-08T07:05:43Z","timestamp":1591599943000},"page":"23295-23324","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["New soft biometrics for limited resource in keystroke dynamics authentication"],"prefix":"10.1007","volume":"79","author":[{"given":"Ting-Yi","family":"Chang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0767-1953","authenticated-orcid":false,"given":"Cheng-Jung","family":"Tsai","sequence":"additional","affiliation":[]},{"given":"Jen-Yuan","family":"Yeh","sequence":"additional","affiliation":[]},{"given":"Chun-Cheng","family":"Peng","sequence":"additional","affiliation":[]},{"given":"Pei-Hsuan","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,6,8]]},"reference":[{"issue":"4","key":"9042_CR1","doi-asserted-by":"crossref","first-page":"458","DOI":"10.1109\/TCYB.2013.2257745","volume":"44","author":"AA Ahmed","year":"2014","unstructured":"Ahmed AA, Traore I (2014) Biometric recognition based on free-text keystroke dynamics. IEEE Trans Cybernet 44(4):458\u2013472","journal-title":"IEEE Trans Cybernet"},{"issue":"5","key":"9042_CR2","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1016\/j.patrec.2005.08.018","volume":"27","author":"H Ailisto","year":"2006","unstructured":"Ailisto H, Vildjiounaite E, Lindholm M, M\u00e4kel\u00e4 SM, Peltola J (2006) Soft biometrics \u2013 combining body weight and fat measurements with fingerprint biometrics. Pattern Recogn Lett 27(5):325\u2013334","journal-title":"Pattern Recogn Lett"},{"key":"9042_CR3","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1016\/j.knosys.2016.11.006","volume":"116","author":"O Alpar","year":"2017","unstructured":"Alpar O (2017) Frequency spectrograms for biometric keystroke authentication using neural network based classifier. Knowl-Based Syst 116:163\u2013171","journal-title":"Knowl-Based Syst"},{"issue":"3","key":"9042_CR4","doi-asserted-by":"crossref","first-page":"164","DOI":"10.1049\/iet-bmt.2015.0101","volume":"5","author":"A Alsultan","year":"2016","unstructured":"Alsultan A, Warwick K, Wei H (2016) Free-text keystroke dynamics authentication for Arabic language. IET Biometrics 5(3):164\u2013169","journal-title":"IET Biometrics"},{"key":"9042_CR5","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1016\/j.patrec.2017.02.010","volume":"89","author":"A Alsultan","year":"2017","unstructured":"Alsultan A, Warwick K, Wei H (2017) Non-conventional keystroke dynamics for user authentication. Pattern Recogn Lett 89:53\u201359","journal-title":"Pattern Recogn Lett"},{"key":"9042_CR6","doi-asserted-by":"crossref","first-page":"1024","DOI":"10.1016\/j.asoc.2017.11.018","volume":"70","author":"A Alsultan","year":"2018","unstructured":"Alsultan A, Warwick K, Wei H (2018) Improving the performance of free-text keystroke dynamics authentication by fusion. Appl Soft Comput 70:1024\u20131033","journal-title":"Appl Soft Comput"},{"issue":"9","key":"9042_CR7","doi-asserted-by":"crossref","first-page":"12117","DOI":"10.1007\/s11042-016-4070-2","volume":"76","author":"L An","year":"2017","unstructured":"An L, Chen X, Liu S, Lei Y, Yang S (2017) Integrating appearance features and soft biometrics for person re-identification. Multimed Tools Appl 76(9):12117\u201312131","journal-title":"Multimed Tools Appl"},{"issue":"2","key":"9042_CR8","doi-asserted-by":"crossref","first-page":"851","DOI":"10.1109\/TSP.2004.839903","volume":"53","author":"LCF Ara\u00fajo","year":"2005","unstructured":"Ara\u00fajo LCF, Sucupira LHR, Lizarraga MG, Ling LL, Yabu-Uti JBT (2005) User authentication through typing biometrics features. IEEE Trans Sign Proc 53(2):851\u2013855","journal-title":"IEEE Trans Sign Proc"},{"issue":"5","key":"9042_CR9","doi-asserted-by":"crossref","first-page":"469","DOI":"10.3233\/IDA-2003-7506","volume":"7","author":"F Bergadano","year":"2003","unstructured":"Bergadano F, Gunetti D, Picardi C (2003) Identity verification through dynamic keystroke analysis. Intelligent Data Analysis 7(5):469\u2013496","journal-title":"Intelligent Data Analysis"},{"key":"9042_CR10","unstructured":"A. Bertillon. Signaletic instructions including the theory and practice of anthropometrical identification. The Werner Company, 1896."},{"issue":"02","key":"9042_CR11","doi-asserted-by":"crossref","first-page":"112","DOI":"10.4236\/jmp.2018.92008","volume":"9","author":"A Bhatia","year":"2018","unstructured":"Bhatia A, Hanmandlu M (2018) Keystroke Dynamics Based authentication using possibilistic renyi entropy features and composite fuzzy classifier. Journal of Modern Physics 9(02):112","journal-title":"Journal of Modern Physics"},{"key":"9042_CR12","doi-asserted-by":"crossref","unstructured":"G. C. Boechat, J. C. Ferreira, and E. Carvalho Filho. Authentication personal. Proceedings of International Conference on Intelligent and Advanced Systems, 254\u2013256, 2007.","DOI":"10.1109\/ICIAS.2007.4658385"},{"issue":"2","key":"9042_CR13","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1108\/09685221011048328","volume":"18","author":"TY Chang","year":"2010","unstructured":"Chang TY, Yang YJ, Peng CC (2010) A personalized rhythm click-based authentication system. Inf Manag Comput Secur 18(2):72\u201385","journal-title":"Inf Manag Comput Secur"},{"issue":"5","key":"9042_CR14","doi-asserted-by":"crossref","first-page":"1157","DOI":"10.1016\/j.jss.2011.12.044","volume":"85","author":"TY Chang","year":"2012","unstructured":"Chang TY, Tsai CJ, Lin JH (2012) A graphical-based password keystroke dynamic authentication system for touch screen handheld mobile devices. J Syst Softw 85(5):1157\u20131165","journal-title":"J Syst Softw"},{"issue":"15","key":"9042_CR15","doi-asserted-by":"crossref","first-page":"2674","DOI":"10.1002\/sec.1265","volume":"9","author":"TY Chang","year":"2016","unstructured":"Chang TY, Tsai CJ, Tsai WJ, Peng CC, Wu HS (2016) A changeable pin-based keystroke dynamic authentication system on smart phones. Sec Commun Netw 9(15):2674\u20132685","journal-title":"Sec Commun Netw"},{"key":"9042_CR16","doi-asserted-by":"crossref","unstructured":"Chernick MR (2007) Bootstrap methods: a guide for practitioners and researchers. Wiley-Interscience","DOI":"10.1002\/9780470192573"},{"key":"9042_CR17","doi-asserted-by":"crossref","unstructured":"M. Chora\u015b and P. Mroczkowski. Keystroke dynamics for biometrics identification. Proceedings of International Conference on Adaptive and Natural Computing Algorithms, Springer Berlin, Heidelberg. 424\u2013431, 2007.","DOI":"10.1007\/978-3-540-71629-7_48"},{"issue":"1","key":"9042_CR18","first-page":"66","volume":"227","author":"JC Collins","year":"2019","unstructured":"Collins JC (2019) Improving voice-recognition accuracy. Journal of Accountancy 227(1):66","journal-title":"Journal of Accountancy"},{"key":"9042_CR19","doi-asserted-by":"crossref","unstructured":"H. Davoudi and E. Kabir, \u201cA New Distance Measure for Free Text Keystroke Authentication\u201d, Proceedings of the 14th International CSI Computer Conference. 570\u2013575, 2009.","DOI":"10.1109\/CSICC.2009.5349640"},{"key":"9042_CR20","doi-asserted-by":"crossref","unstructured":"M. El-Abed, R. Giot, B. Hemery, and C. Rosenberger. A study of users' acceptance and satisfaction of biometric systems. Proceedings of 2010 IEEE International Carnahan Conference on Security Technology (ICCST). 170\u2013178, 2010.","DOI":"10.1109\/CCST.2010.5678678"},{"key":"9042_CR21","unstructured":"R. S. Gaines, W. Lisowski, S. J. Press and N. Shapiro. Authentication by keystroke timing: some preliminary results. RAND COPR SANTA MONICA CA, (No. RAND-R-2526-NSF), 1980."},{"issue":"1","key":"9042_CR22","first-page":"35","volume":"11","author":"R Giot","year":"2012","unstructured":"Giot R, Rosenberger C (2012) A new soft biometric approach for keystroke dynamics based on gender recognition. Int J Inf Technol Manag 11(1):35\u201349","journal-title":"Int J Inf Technol Manag"},{"issue":"6","key":"9042_CR23","doi-asserted-by":"crossref","first-page":"427","DOI":"10.1016\/j.cose.2011.03.004","volume":"30","author":"R Giot","year":"2011","unstructured":"Giot R, El-Abed M, Hemery B, Rosenberger C (2011) Unconstrained keystroke dynamics authentication with shared secret. Comput Sec 30(6):427\u2013445","journal-title":"Comput Sec"},{"issue":"8","key":"9042_CR24","first-page":"2018","volume":"13","author":"E Gonzalez-Sosa","year":"2001","unstructured":"Gonzalez-Sosa E, Fierrez J, Vera-Rodriguez R, Alonso-Fernandez F (2001-2014) Facial soft biometrics for recognition in the wild: recent works, annotation, and cots evaluation. IEEE Trans Inform Forens Sec 13(8):2018","journal-title":"IEEE Trans Inform Forens Sec"},{"issue":"3","key":"9042_CR25","doi-asserted-by":"crossref","first-page":"312","DOI":"10.1145\/1085126.1085129","volume":"8","author":"D Gunetti","year":"2005","unstructured":"Gunetti D, Picardi C (2005) Keystroke analysis of free text. ACM Trans Inf Syst Secur 8(3):312\u2013347","journal-title":"ACM Trans Inf Syst Secur"},{"key":"9042_CR26","unstructured":"J. Han and M. Kamber, \u201cData mining: concepts and techniques\u201d, Morgan Kaufmann, 2011."},{"key":"9042_CR27","doi-asserted-by":"crossref","unstructured":"J. Hu, D. Gingrich and A. Sentosa. A k-nearest neighbor approach for user authentication through biometric keystroke dynamics. Proceedings of IEEE International Conference on Communications. 1556\u20131560, 2008.","DOI":"10.1109\/ICC.2008.301"},{"issue":"5","key":"9042_CR28","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1109\/MSP.2015.2439717","volume":"32","author":"G Itkis","year":"2015","unstructured":"Itkis G, Chandar V, Fuller BW, Campbell JP, Cunningham RK (2015) Iris biometric security challenges and possible solutions: for your eyes only? Using the iris as a key. IEEE Signal Process Mag 32(5):42\u201353","journal-title":"IEEE Signal Process Mag"},{"issue":"1","key":"9042_CR29","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1109\/TCSVT.2003.818349","volume":"14","author":"AK Jain","year":"2004","unstructured":"Jain AK, Ross A, Prabhaker S (2004) An introduction to biometric recognition. IEEE Trans Circ Syst Video Technol 14(1):4\u201320","journal-title":"IEEE Trans Circ Syst Video Technol"},{"key":"9042_CR30","doi-asserted-by":"crossref","unstructured":"A. K. Jain, S. C. Dass, and K. Nandakumar. Soft biometric traits for personal recognition systems. Biometric Authentication, Springer, Berlin, Heidelberg, 731-738, 2004.","DOI":"10.1007\/978-3-540-25948-0_99"},{"issue":"6","key":"9042_CR31","doi-asserted-by":"crossref","first-page":"542","DOI":"10.1002\/sec.1061","volume":"9","author":"G Kambourakis","year":"2016","unstructured":"Kambourakis G, Damopoulos D, Papamartzivanos D, Pavlidakis E (2016) Introducing Touchstroke: keystroke-based authentication system for smartphones. Sec Commun Netw 9(6):542\u2013554","journal-title":"Sec Commun Netw"},{"key":"9042_CR32","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jss.2014.12.017","volume":"102","author":"P Kang","year":"2015","unstructured":"Kang P (2015) The effects of different alphabets on free text keystroke authentication: a case study on the Korean\u2013English users. J Syst Softw 102:1\u201311","journal-title":"J Syst Softw"},{"key":"9042_CR33","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1016\/j.ins.2014.08.070","volume":"308","author":"P Kang","year":"2015","unstructured":"Kang P, Cho S (2015) Keystroke dynamics-based user authentication using long and free text strings from various input devices. Inf Sci 308:72\u201393","journal-title":"Inf Sci"},{"key":"9042_CR34","doi-asserted-by":"crossref","first-page":"1077","DOI":"10.1016\/j.asoc.2017.09.045","volume":"62","author":"J Kim","year":"2018","unstructured":"Kim J, Kim H, Kang P (2018) Keystroke dynamics-based user authentication using freely typed text based on user-adaptive feature extraction and novelty detection. Appl Soft Comput 62:1077\u20131087","journal-title":"Appl Soft Comput"},{"key":"9042_CR35","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1007\/978-3-319-62120-3_4","volume":"551","author":"A Ko\u0142akowska","year":"2018","unstructured":"Ko\u0142akowska A (2018) Usefulness of keystroke dynamics features in user authentication and emotion recognition. Human-Comput Syst Int 551:42\u201352","journal-title":"Human-Comput Syst Int"},{"issue":"3","key":"9042_CR36","first-page":"439","volume":"13","author":"CL Liu","year":"2012","unstructured":"Liu CL, Chang TY, Chiang ML, Tsai CJ (2012) A simple keystroke dynamics-based authentication system using means and standard deviations. J Int Technol 13(3):439\u2013444","journal-title":"J Int Technol"},{"key":"9042_CR37","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1016\/j.jnca.2015.03.006","volume":"53","author":"CL Liu","year":"2015","unstructured":"Liu CL, Tsai CJ, Chang TY, Tsai WJ, Zhong PK (2015) Implementing multiple biometric features for a recall-based graphical keystroke dynamics authentication system on a smart phone. J Netw Comput Appl 53:128\u2013139","journal-title":"J Netw Comput Appl"},{"issue":"2","key":"9042_CR38","doi-asserted-by":"crossref","first-page":"428","DOI":"10.1016\/S0167-4048(00)05029-X","volume":"19","author":"SM Matyas","year":"2000","unstructured":"Matyas SM, Stapleton J (2000) A biometric standard for information management and security. Comput Sec 19(2):428\u2013441","journal-title":"Comput Sec"},{"key":"9042_CR39","doi-asserted-by":"crossref","unstructured":"A. Messerman, T. Mustafic, S. A. Camtepe and S. Albayrak. Continuous and non-intrusive identity verification in real-time environments based on free-text keystroke dynamics. Proceedings of IEEE International Joint Conference on Biometrics. 1\u20138, 2011","DOI":"10.1109\/IJCB.2011.6117552"},{"key":"9042_CR40","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.neucom.2016.11.031","volume":"230","author":"S Mondal","year":"2017","unstructured":"Mondal S, Bours P (2017) A study on continuous authentication using a combination of keystroke and mouse biometrics. Neurocomputing 230:1\u201322","journal-title":"Neurocomputing"},{"key":"9042_CR41","doi-asserted-by":"crossref","unstructured":"F. Monrose and A. Rubin. Authentication via keystroke dynamics. Proceedings of the 4th ACM Conference on Computer and Communications Security. 48\u201356, 1997.","DOI":"10.1145\/266420.266434"},{"issue":"4","key":"9042_CR42","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1016\/S0167-739X(99)00059-X","volume":"16","author":"F Monrose","year":"2000","unstructured":"Monrose F, Rubin A (2000) Keystroke dynamics as a biometric for authentication. Futur Gener Comput Syst 16(4):351\u2013359","journal-title":"Futur Gener Comput Syst"},{"issue":"2","key":"9042_CR43","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1007\/s102070100006","volume":"1","author":"F Monrose","year":"2002","unstructured":"Monrose F, Reiter MK, Wetzel S (2002) Password hardening based on keystroke dynamics. Int J Inf Secur 1(2):69\u201383","journal-title":"Int J Inf Secur"},{"key":"9042_CR44","unstructured":"S. Park, J. Park, and S. Cho. User authentication based on keystroke analysis of long free texts with a reduced number of features. Proceedings of IEEE International Conference on Communication Systems, Networks and Applications. 433\u2013435, 2010."},{"key":"9042_CR45","doi-asserted-by":"crossref","first-page":"178","DOI":"10.1016\/j.asoc.2015.05.008","volume":"34","author":"PH Pisani","year":"2015","unstructured":"Pisani PH, Lorena AC (2015) Emphasizing typing signature in keystroke dynamics using immune algorithms. Appl Soft Comput 34:178\u2013193","journal-title":"Appl Soft Comput"},{"key":"9042_CR46","unstructured":"T. Samura and H. Nishimura. Keystroke timing analysis for individual identification in japanese free text typing. Proceedings of ICCAS-SICE International Joint Conference. 3166\u20133170, 2009."},{"key":"9042_CR47","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1016\/j.comnet.2014.11.008","volume":"76","author":"S Sicari","year":"2015","unstructured":"Sicari S, Rizzardi A, Grieco LA, Coen-Porisini A (2015) Security, privacy and trust in internet of things: the road ahead. Comput Netw 76:146\u2013164","journal-title":"Comput Netw"},{"key":"9042_CR48","doi-asserted-by":"crossref","unstructured":"A. Sulong, Wahyudi and M. U. Siddiqi. Intelligent keystroke pressure-based typing biometrics authentication system using radial basis function network. Proceedings of IEEE International Colloquium on Signal Processing and its Applications. 151\u2013155, 2009.","DOI":"10.1109\/CSPA.2009.5069206"},{"issue":"1","key":"9042_CR49","doi-asserted-by":"crossref","first-page":"32","DOI":"10.4018\/jisp.2010010103","volume":"4","author":"CC Tappert","year":"2010","unstructured":"Tappert CC, Cha SH, Villani M, Zack RS (2010) A keystroke biometric system for long-text input. Int J Inf Secur Priv 4(1):32\u201360","journal-title":"Int J Inf Secur Priv"},{"key":"9042_CR50","doi-asserted-by":"crossref","unstructured":"P. S. Teh, S. Yue and A. B. J. Teoh. Improving keystroke dynamics authentication system via multiple feature fusion scheme. Proceedings of IEEE International Conference on Cyber Security, Cyber Warfare and Digital Forensic. 277\u2013282, 2012.","DOI":"10.1109\/CyberSec.2012.6246096"},{"key":"9042_CR51","doi-asserted-by":"publisher","first-page":"107067","DOI":"10.1016\/j.patcog.2019.107067","volume":"98","author":"CJ Tsai","year":"2020","unstructured":"Tsai CJ, Huang PH (2020) Keyword-based approach for recognizing fraudulent messages by keystroke dynamics. Pattern Recogn 98:107067. https:\/\/doi.org\/10.1016\/j.patcog.2019.107067","journal-title":"Pattern Recogn"},{"key":"9042_CR52","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1016\/j.asoc.2019.03.033","volume":"80","author":"CJ Tsai","year":"2019","unstructured":"Tsai CJ, Shih KJ (2019) Mining a new biometrics to improve the accuracy of keystroke dynamics-based authentication system on free-text. Appl Soft Comput 80:125\u2013137","journal-title":"Appl Soft Comput"},{"issue":"10","key":"9042_CR53","first-page":"7875","volume":"8","author":"CJ Tsai","year":"2012","unstructured":"Tsai CJ, Chang TY, Yang YJ, Wu MS, Li YC (2012) An approach for user authentication on non-keyboard devices using mouse click characteristics and statistical-based classification. Int J Innov Comput, Inform Control, Spec Issue Dec Making Inform Sec Strate Technol 8(10):7875\u20137886","journal-title":"Int J Innov Comput, Inform Control, Spec Issue Dec Making Inform Sec Strate Technol"},{"issue":"4","key":"9042_CR54","doi-asserted-by":"crossref","first-page":"750","DOI":"10.1002\/sec.776","volume":"7","author":"CJ Tsai","year":"2014","unstructured":"Tsai CJ, Chang TY, Cheng PC, Lin JH (2014) Two novel biometric features in keystroke dynamics authentication systems for touch screen devices. Sec Commun Netw 7(4):750\u2013758","journal-title":"Sec Commun Netw"},{"key":"9042_CR55","unstructured":"M. Villani, C. Tappert, G. Ngo, J. Simone, H. S. Fort and S. H. Cha. Keystroke biometric recognition studies on long-text input under ideal and application-oriented conditions. Proceedings of IEEE Conference on Computer Vision and Pattern Recognition Workshop. 39\u201339, 2006."},{"key":"9042_CR56","doi-asserted-by":"publisher","unstructured":"X. Yin, Y. Zhu and J. Hu, (2019). 3D fingerprint recognition based on ridge-valley-guided 3D reconstruction and 3D topology polymer feature extraction. IEEE Trans Pattern Anal Mach Intell. https:\/\/doi.org\/10.1109\/TPAMI.2019.2949299, 1.","DOI":"10.1109\/TPAMI.2019.2949299"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09042-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-020-09042-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09042-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,7]],"date-time":"2021-06-07T23:38:18Z","timestamp":1623109098000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-020-09042-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,8]]},"references-count":56,"journal-issue":{"issue":"31-32","published-print":{"date-parts":[[2020,8]]}},"alternative-id":["9042"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-09042-x","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2020,6,8]]},"assertion":[{"value":"29 March 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 December 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 May 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 June 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}