{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T22:10:03Z","timestamp":1777500603627,"version":"3.51.4"},"reference-count":50,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2022,9,27]],"date-time":"2022-09-27T00:00:00Z","timestamp":1664236800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,9,27]],"date-time":"2022-09-27T00:00:00Z","timestamp":1664236800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2023,4]]},"DOI":"10.1007\/s11042-022-13914-9","type":"journal-article","created":{"date-parts":[[2022,9,27]],"date-time":"2022-09-27T08:02:46Z","timestamp":1664265766000},"page":"13973-13995","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":42,"title":["Improved dropping attacks detecting system in 5g networks using machine learning and deep learning approaches"],"prefix":"10.1007","volume":"82","author":[{"given":"Ala","family":"Mughaid","sequence":"first","affiliation":[]},{"given":"Shadi","family":"AlZu\u2019bi","sequence":"additional","affiliation":[]},{"given":"Asma","family":"Alnajjar","sequence":"additional","affiliation":[]},{"given":"Esraa","family":"AbuElsoud","sequence":"additional","affiliation":[]},{"given":"Subhieh El","family":"Salhi","sequence":"additional","affiliation":[]},{"given":"Bashar","family":"Igried","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2203-4549","authenticated-orcid":false,"given":"Laith","family":"Abualigah","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,9,27]]},"reference":[{"key":"13914_CR1","doi-asserted-by":"crossref","unstructured":"Abusukhon A, AlZu\u2019bi S (2020) New direction of cryptography: a review on text-to-image encryption algorithms based on rgb color value. In: 2020 seventh international conference on software defined systems, (SDS), IEEE, pp 235\u2013239","DOI":"10.1109\/SDS49854.2020.9143891"},{"key":"13914_CR2","doi-asserted-by":"publisher","first-page":"100365","DOI":"10.1016\/j.iot.2021.100365","volume":"14","author":"R Ahmad","year":"2021","unstructured":"Ahmad R, Alsmadi I (2021) Machine learning approaches to iot security: A systematic literature review. Inter Things 14:100365","journal-title":"Inter Things"},{"issue":"1","key":"13914_CR3","first-page":"36","volume":"2","author":"I Ahmad","year":"2018","unstructured":"Ahmad I, Kumar T, Liyanage M, Okwuibe J, Ylianttila M, Gurtov A (2018) Overview of 5g security challenges and solutions. IEEE Commun Mag 2(1):36\u201343","journal-title":"IEEE Commun Mag"},{"key":"13914_CR4","doi-asserted-by":"publisher","first-page":"107950","DOI":"10.1016\/j.comnet.2021.107950","volume":"190","author":"A Akbar","year":"2021","unstructured":"Akbar A, Jangsher S, Bhatti FA (2021) Noma and 5g emerging technologies: a survey on issues and solution techniques. Comput Netw 190:107950","journal-title":"Comput Netw"},{"issue":"8","key":"13914_CR5","doi-asserted-by":"publisher","first-page":"5190","DOI":"10.1109\/TITS.2021.3053095","volume":"22","author":"I Al Ridhawi","year":"2021","unstructured":"Al Ridhawi I, Aloqaily M, Boukerche A, Jararweh Y (2021) Enabling intelligent iocv services at the edge for 5g networks and beyond. IEEE Trans Intell Transp Syst 22(8):5190\u20135200","journal-title":"IEEE Trans Intell Transp Syst"},{"issue":"1","key":"13914_CR6","doi-asserted-by":"publisher","first-page":"349","DOI":"10.3390\/s22010349","volume":"22","author":"M Al Shinwan","year":"2022","unstructured":"Al Shinwan M, Abualigah L, Huy T-D, Younes Shdefat A, Altalhi M, Kim C, El-Sappagh S, Abd Elaziz M, Kwak KS (2022) An efficient 5g data plan approach based on partially distributed mobility architecture. Sensors 22 (1):349","journal-title":"Sensors"},{"key":"13914_CR7","unstructured":"Al-Arjan A, Rasmi M, AlZu\u2019bi S, et al. (2021) Intelligent security in the era of ai: the key vulnerability of rc4 algorithm. In: 2021 international conference on information technology, (ICIT), IEEE, pp 691\u2013694"},{"issue":"1","key":"13914_CR8","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1109\/MITP.2017.9","volume":"19","author":"N Al-Falahy","year":"2017","unstructured":"Al-Falahy N, Alani OY (2017) Technologies for 5g networks: challenges and opportunities. IT Professional 19(1):12\u201320","journal-title":"IT Professional"},{"key":"13914_CR9","doi-asserted-by":"publisher","first-page":"102452","DOI":"10.1016\/j.simpat.2021.102452","volume":"116","author":"H Al-Obiedollah","year":"2022","unstructured":"Al-Obiedollah H, Salameh HB, Abdel-Razeq S, Hayajneh A, Cumanan K, Jararweh Y (2022) Energy-efficient opportunistic multi-carrier noma-based resource allocation for beyond 5g (b5g) networks. Simul Model Pract Theory 116:102452","journal-title":"Simul Model Pract Theory"},{"issue":"11","key":"13914_CR10","doi-asserted-by":"publisher","first-page":"16887","DOI":"10.1007\/s11042-020-09160-6","volume":"80","author":"S Al-Zu\u2019bi","year":"2021","unstructured":"Al-Zu\u2019bi S, Hawashin B, Mughaid A, Baker T (2021) Efficient 3d medical image segmentation algorithm over a secured multimedia network. Multimed Tools Appl 80(11):16887\u201316905","journal-title":"Multimed Tools Appl"},{"issue":"17","key":"13914_CR11","doi-asserted-by":"publisher","first-page":"24223","DOI":"10.1007\/s11042-018-7003-4","volume":"78","author":"S AlZu\u2019bi","year":"2019","unstructured":"AlZu\u2019bi S, Jararweh Y, Al-Zoubi H, Elbes M, Kanan T, Gupta B (2019) Multi-orientation geometric medical volumes segmentation using 3d multiresolution analysis. Multimed Tools Appl 78(17):24223\u201324248","journal-title":"Multimed Tools Appl"},{"issue":"4","key":"13914_CR12","first-page":"4101","volume":"10","author":"SA Alasal","year":"2020","unstructured":"Alasal SA, Alsmirat M, Baker QB, Alzu\u2019bi S, et al. (2020) Lumbar disk 3d modeling from limited number of mri axial slices. Inter J Electr Comput Eng 10(4):4101","journal-title":"Inter J Electr Comput Eng"},{"key":"13914_CR13","doi-asserted-by":"crossref","unstructured":"Alkhatib AA, Abu Maria K, Alzu\u2019bi S, Abu Maria E (2022) Novel system for road traffic optimisation in large cities, IET Smart Cities","DOI":"10.1049\/smc2.12032"},{"key":"13914_CR14","doi-asserted-by":"crossref","unstructured":"Alzubi S, Hawashin B, Mughaid A, Jararweh Y (2020) Whats trending? an efficient trending research topics extractor and recommender. In: 2020 11th international conference on information and communication systems, (ICICS), IEEE, pp 191\u2013196","DOI":"10.1109\/ICICS49469.2020.239519"},{"issue":"3","key":"13914_CR15","doi-asserted-by":"publisher","first-page":"621","DOI":"10.1109\/TIFS.2017.2762828","volume":"13","author":"ME Aminanto","year":"2017","unstructured":"Aminanto ME, Choi R, Tanuwidjaja HC, Yoo PD, Kim K (2017) Deep abstraction and weighted feature selection for wi-fi impersonation detection. IEEE Trans Inform Forensics Secur 13(3):621\u2013636","journal-title":"IEEE Trans Inform Forensics Secur"},{"key":"13914_CR16","doi-asserted-by":"crossref","unstructured":"Aminanto ME, Tanuwidjaja HC, Yoo PD, Kim K (2017) Wi-fi intrusion detection using weighted-feature selection for neural networks classifier. In: 2017 international workshop on big data and information security, (IWBIS), IEEE, pp 99\u2013104","DOI":"10.1109\/IWBIS.2017.8275109"},{"key":"13914_CR17","doi-asserted-by":"crossref","unstructured":"Aqel D, Al-Zubi S, Mughaid A, Jararweh Y (2021) Extreme learning machine for plant diseases classification: a sustainable approach for smart agriculture. Cluster Computing, pp 1\u201314","DOI":"10.1007\/s10586-021-03397-y"},{"key":"13914_CR18","doi-asserted-by":"crossref","unstructured":"Arachchillage USSS, Jayakody DNK, Biswash SK, Dinis R (2018) Recent advances and future research challenges in non-orthogonal multiple access for 5g networks. In: 2018 IEEE 87th Vehicular Technology Conference (VTC Spring), IEEE, pp 1\u20136","DOI":"10.1109\/VTCSpring.2018.8417843"},{"key":"13914_CR19","doi-asserted-by":"publisher","first-page":"22466","DOI":"10.1109\/ACCESS.2018.2827419","volume":"6","author":"G Arfaoui","year":"2018","unstructured":"Arfaoui G, Bisson P, Blom R, Borgaonkar R, Englund H, F\u00e9lix E, Klaedtke F, Nakarmi PK, N\u00e4slund M, O\u2019Hanlon P, Papay J, Suomalainen J, Surridge M, Wary J-P, Zahariev A (2018) A security architecture for 5g networks. IEEE Access 6:22466\u201322479","journal-title":"IEEE Access"},{"key":"13914_CR20","doi-asserted-by":"crossref","unstructured":"Bengag A, Moussaoui O, Moussaoui M (2019) A new ids for detecting jamming attacks in wban. In: 2019 third international conference on intelligent computing in data sciences, (ICDS), IEEE, pp 1\u20135","DOI":"10.1109\/ICDS47004.2019.8942268"},{"key":"13914_CR21","doi-asserted-by":"crossref","unstructured":"Bounouni M, Bouallouche-Medjkoune L, Beraza A, Daoud A (2021) Eliminating selective dropping attack in mobile ad hoc network. Wirel Pers Commun, pp 1\u201318","DOI":"10.21203\/rs.3.rs-190407\/v1"},{"key":"13914_CR22","doi-asserted-by":"crossref","unstructured":"Dawoud A, Shahristani S, Raun C (2018) Deep learning for network anomalies detection. In: 2018 International Conference on Machine Learning and Data Engineering (iCMLDE), IEEE, pp 149\u2013153","DOI":"10.1109\/iCMLDE.2018.00035"},{"key":"13914_CR23","doi-asserted-by":"crossref","unstructured":"De Capitani di Vimercati S, Foresti S, Jajodia S, Livraga G, Paraboschi S, Samarati P (2021) An authorization model for query execution in the cloud. The VLDB Journal, pp 1\u201325","DOI":"10.1007\/s00778-021-00709-x"},{"issue":"5","key":"13914_CR24","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1109\/MWC.001.1900054","volume":"26","author":"H Fang","year":"2019","unstructured":"Fang H, Wang X, Tomasin S (2019) Machine learning for intelligent authentication in 5g and beyond wireless networks. IEEE Wirel Commun 26(5):55\u201361","journal-title":"IEEE Wirel Commun"},{"key":"13914_CR25","doi-asserted-by":"crossref","unstructured":"Forland MK, Kralevska K, Garau M, Gligoroski D (2019) Preventing ddos with sdn in 5g. In: 2019 IEEE globecom workshops, (GC Wkshps), IEEE, pp 1\u20137","DOI":"10.1109\/GCWkshps45667.2019.9024497"},{"issue":"1","key":"13914_CR26","first-page":"77","volume":"18","author":"A Hnaif","year":"2021","unstructured":"Hnaif A, Jaber KM, Alia MA, Daghbosheh M (2021) Parallel scalable approximate matching algorithm for network intrusion detection systems. Int Arab J Inf Technol 18(1):77\u201384","journal-title":"Int Arab J Inf Technol"},{"key":"13914_CR27","first-page":"9","volume":"3","author":"NM Intelligence","year":"2021","unstructured":"Intelligence NM (2021) Ai reflections in 2021. Evol Comput 3:9\u201315","journal-title":"Evol Comput"},{"issue":"1","key":"13914_CR28","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1109\/COMST.2019.2933899","volume":"22","author":"R Khan","year":"2019","unstructured":"Khan R, Kumar P, Jayakody DNK, Liyanage M (2019) A survey on security and privacy of 5g technologies: Potential solutions, recent advancements, and future directions. IEEE Commun Surv Tut 22(1):196\u2013248","journal-title":"IEEE Commun Surv Tut"},{"key":"13914_CR29","doi-asserted-by":"crossref","unstructured":"Koh PW, Steinhardt J, Liang P (2021) Stronger data poisoning attacks break data sanitization defenses. Machine Learning, pp 1\u201347","DOI":"10.1007\/s10994-021-06119-y"},{"key":"13914_CR30","doi-asserted-by":"publisher","first-page":"103352","DOI":"10.1016\/j.micpro.2020.103352","volume":"80","author":"A Kumar","year":"2021","unstructured":"Kumar A, Varadarajan V, Kumar A, Dadheech P, Choudhary SS, Kumar VA, Panigrahi BK, Veluvolu KC (2021) Black hole attack detection in vehicular ad-hoc network using secure aodv routing algorithm. Microprocess Microsyst 80:103352","journal-title":"Microprocess Microsyst"},{"issue":"1","key":"13914_CR31","first-page":"99","volume":"127","author":"M Lafi","year":"2021","unstructured":"Lafi M, Hawashin B, AlZu\u2019bi S (2021) Eliciting requirements from stakeholders\u2019 responses using natural language processing. Comput Model Eng Sci 127 (1):99\u2013116","journal-title":"Comput Model Eng Sci"},{"key":"13914_CR32","unstructured":"Lam J, Abbas R (2020) Machine learning based anomaly detection for 5g networks, arXiv:2003.03474"},{"key":"13914_CR33","doi-asserted-by":"publisher","first-page":"7700","DOI":"10.1109\/ACCESS.2018.2803446","volume":"6","author":"LF Maim\u00f3","year":"2018","unstructured":"Maim\u00f3 LF, G\u00f3mez \u00c1 LP, Clemente FJG, P\u00e9rez MG, P\u00e9rez GM (2018) A self-adaptive deep learning-based system for anomaly detection in 5g networks. IEEE Access 6:7700\u20137712","journal-title":"IEEE Access"},{"issue":"1","key":"13914_CR34","first-page":"13","volume":"13","author":"M Malekzadeh","year":"2011","unstructured":"Malekzadeh M, Ghani AAA, Subramaniam S, Desa JM (2011) Validating reliability of omnet++ in wireless networks dos attacks: Simulation vs. testbed. Int J Netw Secur 13(1):13\u201321","journal-title":"Int J Netw Secur"},{"issue":"5","key":"13914_CR35","doi-asserted-by":"publisher","first-page":"1897","DOI":"10.3390\/s22051897","volume":"22","author":"A Malik","year":"2022","unstructured":"Malik A, Khan MZ, Faisal M, Khan F, Seo J-T (2022) An efficient dynamic solution for the detection and prevention of black hole attack in vanets. Sensors 22(5):1897","journal-title":"Sensors"},{"key":"13914_CR36","doi-asserted-by":"crossref","unstructured":"Marashdeh Z, Suwais K, Alia M (2021) A survey on sql injection attack: detection and challenges. In: 2021 international conference on information technology, (ICIT), IEEE, pp 957\u2013962","DOI":"10.1109\/ICIT52682.2021.9491117"},{"key":"13914_CR37","unstructured":"Mitrokotsa A, Mavropodi R, Douligeris C (2006) Intrusion detection of packet dropping attacks in mobile ad hoc networks. In: Proceedings of the international conference on intelligent systems and computing: theory and applications, pp 111\u2013118"},{"issue":"12","key":"13914_CR38","doi-asserted-by":"publisher","first-page":"5577","DOI":"10.1007\/s00500-022-07080-1","volume":"26","author":"A Mughaid","year":"2022","unstructured":"Mughaid A, Al-Zu\u2019bi S, Al Arjan A, Al-Amrat R, Alajmi R, Zitar RA, Abualigah L (2022) An intelligent cybersecurity system for detecting fake news in social media websites. Soft Comput 26(12):5577\u20135591","journal-title":"Soft Comput"},{"key":"13914_CR39","doi-asserted-by":"crossref","unstructured":"Mughaid A, AlZu\u2019bi S, Hnaif A, Taamneh S, Alnajjar A, Elsoud EA (2022) An intelligent cyber security phishing detection system using deep learning techniques. Cluster Computing, pp 1\u201310","DOI":"10.1007\/s10586-022-03604-4"},{"key":"13914_CR40","unstructured":"Muro Barb\u00e9 M (2020) Development of a MATLAB application to generate NOMA-CAP 5G signals (Bachelor\u2019s thesis, Universitat Polit\u00e8cnica de Catalunya)."},{"key":"13914_CR41","doi-asserted-by":"crossref","unstructured":"Obeidat I, Mughaid A, Alzoubi S (2019) A Secure Encrypted Protocol for Clients\u2019 Handshaking in the Same Network.","DOI":"10.3991\/ijim.v13i05.9845"},{"issue":"2","key":"13914_CR42","doi-asserted-by":"publisher","first-page":"721","DOI":"10.1007\/s11276-021-02866-x","volume":"28","author":"M Otair","year":"2022","unstructured":"Otair M, Ibrahim OT, Abualigah L, Altalhi M, Sumari P (2022) An enhanced grey wolf optimizer based particle swarm optimizer for intrusion detection system in wireless sensor networks. Wirel Netw 28(2):721\u2013744","journal-title":"Wirel Netw"},{"issue":"1","key":"13914_CR43","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/s41598-022-09929-9","volume":"12","author":"ON Oyelade","year":"2022","unstructured":"Oyelade ON, Ezugwu AE, Almutairi MS, Saha AK, Abualigah L, Chiroma H (2022) A generative adversarial network for synthetization of regions of interest based on digital mammograms. Sci Rep 12(1):1\u201330","journal-title":"Sci Rep"},{"issue":"6","key":"13914_CR44","first-page":"2973","volume":"6","author":"F Pathan","year":"2019","unstructured":"Pathan F, Shringare K (2019) Analysis of 5g mobile technologies and ddos defense. Inter Res J Eng Technol 6(6):2973\u20132979","journal-title":"Inter Res J Eng Technol"},{"key":"13914_CR45","doi-asserted-by":"crossref","unstructured":"Ran J, Ji Y, Tang B (2019) A semi-supervised learning approach to ieee 802.11 network anomaly detection. In: 2019 IEEE 89th Vehicular technology conference (VTC2019-Spring), IEEE, pp 1\u20135","DOI":"10.1109\/VTCSpring.2019.8746576"},{"issue":"2","key":"13914_CR46","doi-asserted-by":"publisher","first-page":"1559","DOI":"10.1007\/s12652-020-02228-z","volume":"12","author":"M Safaldin","year":"2021","unstructured":"Safaldin M, Otair M, Abualigah L (2021) Improved binary gray wolf optimizer and svm for intrusion detection system in wireless sensor networks. J Ambient Intell Human Comput 12(2):1559\u20131576","journal-title":"J Ambient Intell Human Comput"},{"key":"13914_CR47","unstructured":"Thanthrige USKPM, Samarabandu J, Wang X (2016) Machine learning techniques for intrusion detection on public dataset. In: 2016 IEEE canadian conference on electrical and computer engineering, (CCECE), IEEE, pp 1\u20134"},{"key":"13914_CR48","doi-asserted-by":"crossref","unstructured":"Vaca FD, Niyaz Q (2018) An ensemble learning based wi-fi network intrusion detection system (wnids). In: 2018 IEEE 17th international symposium on network computing and applications, (NCA), IEEE, pp 1\u20135","DOI":"10.1109\/NCA.2018.8548315"},{"key":"13914_CR49","doi-asserted-by":"crossref","unstructured":"Wang S, Li B, Yang M, Yan Z (2018) Intrusion detection for wifi network: A deep learning approach. In: International wireless internet conference, Springer, pp 95\u2013104","DOI":"10.1007\/978-3-030-06158-6_10"},{"key":"13914_CR50","doi-asserted-by":"publisher","first-page":"106871","DOI":"10.1016\/j.comnet.2019.106871","volume":"162","author":"S Zhang","year":"2019","unstructured":"Zhang S, Wang Y, Zhou W (2019) Towards secure 5g networks: a survey. Comput Netw 162:106871","journal-title":"Comput Netw"}],"updated-by":[{"DOI":"10.1007\/s11042-022-14059-5","type":"correction","label":"Correction","source":"publisher","updated":{"date-parts":[[2022,10,18]],"date-time":"2022-10-18T00:00:00Z","timestamp":1666051200000}}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-13914-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-022-13914-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-13914-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,3,21]],"date-time":"2023-03-21T10:38:21Z","timestamp":1679395101000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-022-13914-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,27]]},"references-count":50,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2023,4]]}},"alternative-id":["13914"],"URL":"https:\/\/doi.org\/10.1007\/s11042-022-13914-9","relation":{"correction":[{"id-type":"doi","id":"10.1007\/s11042-022-14059-5","asserted-by":"object"}]},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,9,27]]},"assertion":[{"value":"24 March 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 July 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 September 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 September 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 October 2022","order":5,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Correction","order":6,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"A Correction to this paper has been published:","order":7,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"https:\/\/doi.org\/10.1007\/s11042-022-14059-5","URL":"https:\/\/doi.org\/10.1007\/s11042-022-14059-5","order":8,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that there is no conflict of interest regarding the publication of this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Conflict of Interests"}}]}}