{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,20]],"date-time":"2026-01-20T05:23:36Z","timestamp":1768886616530,"version":"3.49.0"},"reference-count":60,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2021,10,8]],"date-time":"2021-10-08T00:00:00Z","timestamp":1633651200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,10,8]],"date-time":"2021-10-08T00:00:00Z","timestamp":1633651200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"name":"shandong normal university","award":["2017GGX10142"],"award-info":[{"award-number":["2017GGX10142"]}]},{"DOI":"10.13039\/501100005358","name":"Linyi University","doi-asserted-by":"publisher","award":["ZR2020MF058"],"award-info":[{"award-number":["ZR2020MF058"]}],"id":[{"id":"10.13039\/501100005358","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100005358","name":"Linyi University","doi-asserted-by":"publisher","award":["2019GNC106027"],"award-info":[{"award-number":["2019GNC106027"]}],"id":[{"id":"10.13039\/501100005358","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100005358","name":"Linyi University","doi-asserted-by":"publisher","award":["2019JZZY010134"],"award-info":[{"award-number":["2019JZZY010134"]}],"id":[{"id":"10.13039\/501100005358","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2022,3]]},"DOI":"10.1007\/s11227-021-04090-y","type":"journal-article","created":{"date-parts":[[2021,10,9]],"date-time":"2021-10-09T07:03:48Z","timestamp":1633763028000},"page":"5974-6005","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["EOS.IO blockchain data analysis"],"prefix":"10.1007","volume":"78","author":[{"given":"Wanshui","family":"Song","sequence":"first","affiliation":[]},{"given":"Wenyin","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Linbo","family":"Zhai","sequence":"additional","affiliation":[]},{"given":"Luanqi","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Jiuru","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Shanyun","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Bei","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,10,8]]},"reference":[{"key":"4090_CR1","doi-asserted-by":"publisher","first-page":"16440","DOI":"10.1109\/ACCESS.2020.2967218","volume":"8","author":"Q Zhou","year":"2020","unstructured":"Zhou Q, Huang H, Zheng Z (2020) Solutions to scalability of blockchain: a survey. IEEE Access 8:16440\u201316455","journal-title":"IEEE Access"},{"key":"4090_CR2","doi-asserted-by":"publisher","first-page":"1208","DOI":"10.1016\/j.ins.2020.10.001","volume":"546","author":"CM Chen","year":"2021","unstructured":"Chen CM, Chen L, Gan W, Qiu L, Ding W (2021) Discovering high utility-occupancy patterns from uncertain data. Inf Sci 546:1208\u20131229","journal-title":"Inf Sci"},{"issue":"4","key":"4090_CR3","doi-asserted-by":"publisher","first-page":"540","DOI":"10.1007\/s11704-015-4362-0","volume":"9","author":"X Chen","year":"2015","unstructured":"Chen X, Li A, Zeng X, Guo W, Huang G (2015) Runtime model based approach to IoT application development. Front Comput Sci 9(4):540\u2013553","journal-title":"Front Comput Sci"},{"issue":"8","key":"4090_CR4","doi-asserted-by":"publisher","first-page":"82102","DOI":"10.1007\/s11432-018-9749-8","volume":"62","author":"X Chen","year":"2019","unstructured":"Chen X, Chen S, Ma Y, Liu B, Zhang Y, Huang G (2019) An adaptive offloading framework for android applications in mobile edge computing. Sci China Inf Sci 62(8):82102","journal-title":"Sci China Inf Sci"},{"issue":"4","key":"4090_CR5","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1007\/s11704-012-2100-4","volume":"6","author":"G Huang","year":"2012","unstructured":"Huang G, Chen X, Zhang Y, Zhang X (2012) Towards architecture-based management of platforms in the cloud. Front Comput Sci 6(4):388\u2013397","journal-title":"Front Comput Sci"},{"issue":"8","key":"4090_CR6","doi-asserted-by":"publisher","first-page":"5456","DOI":"10.1109\/TII.2019.2961237","volume":"16","author":"B Lin","year":"2020","unstructured":"Lin B, Huang Y, Zhang J, Hu J, Chen X, Li J (2020) Cost-driven offloading for DNN-based applications over cloud, edge and end devices. IEEE Trans Ind Inf 16(8):5456\u20135466","journal-title":"IEEE Trans Ind Inf"},{"key":"4090_CR7","doi-asserted-by":"crossref","unstructured":"Chen X, Li M, Zhong H, Ma Y, Hsu C (2021) DNNOff: offloading DNN-based intelligent IoT applications in mobile edge computing. IEEE Trans Ind Inf 1","DOI":"10.1109\/TII.2021.3075464"},{"key":"4090_CR8","doi-asserted-by":"crossref","unstructured":"Saxena S, Bhushan B, Ahad MA (2021) Blockchain based solutions to secure IoT: background, integration trends and a way forward. J Netw Comput Appl 181:103050","DOI":"10.1016\/j.jnca.2021.103050"},{"issue":"1","key":"4090_CR9","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/s11276-020-02445-6","volume":"27","author":"B Bhushan","year":"2021","unstructured":"Bhushan B, Sahoo C, Sinha P, Khamparia A (2021) Unification of blockchain and internet of things (BIoT): requirements, working model, challenges and future directions. Wireless Netw 27(1):55\u201390","journal-title":"Wireless Netw"},{"key":"4090_CR10","unstructured":"Nakamoto S (2008) Bitcoin: a Peer-to-Peer electronic cash system. Consulted"},{"key":"4090_CR11","doi-asserted-by":"crossref","unstructured":"Bhushan B, Sinha P, Sagayam KM, J A, (2021) Untangling blockchain technology: a survey on state of the art, security threats, privacy services, applications and future research directions. Comput Electric Eng 90:106897","DOI":"10.1016\/j.compeleceng.2020.106897"},{"issue":"3","key":"4090_CR12","doi-asserted-by":"publisher","first-page":"494","DOI":"10.1109\/TSC.2014.2347293","volume":"8","author":"G Huang","year":"2015","unstructured":"Huang G, Ma Y, Liu X, Luo Y, Lu X, Blake M (2015) Model-based automated navigation and composition of complex service mashups. IEEE Trans Serv Comput 8(3):494\u2013506","journal-title":"IEEE Trans Serv Comput"},{"issue":"11","key":"4090_CR13","first-page":"2452","volume":"55","author":"H He","year":"2018","unstructured":"He H, Yan A, Chen Z (2018) Overview of smart contract technology and applications based on blockchain. Comput Res Develop 55(11):2452\u20132466","journal-title":"Comput Res Develop"},{"key":"4090_CR14","doi-asserted-by":"crossref","unstructured":"Wang Z, Jin H, Dai W, Choo KKR, Zou D (2021) Ethereum smart contract security research: survey and future research opportunities. Front Comput Sci 15(2) (in print)","DOI":"10.1007\/s11704-020-9284-9"},{"key":"4090_CR15","doi-asserted-by":"publisher","unstructured":"Chen X, Zhu F, Chen Z, Min G, Zheng X, Rong C (2021) Resource allocation for cloud-based software services using prediction-enabled feedback control with reinforcement learning. IEEE Trans Cloud Comput Publish Online, pp 1. https:\/\/doi.org\/10.1109\/TCC.2020.2992537","DOI":"10.1109\/TCC.2020.2992537"},{"key":"4090_CR16","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1016\/j.future.2019.12.005","volume":"105","author":"X Chen","year":"2020","unstructured":"Chen X, Wang H, Ma Y, Zheng X, Guo L (2020) Self-adaptive resource allocation for cloud-based software services based on iterative QoS prediction model. Future Gener Comput Syst 105:287\u2013296","journal-title":"Future Gener Comput Syst"},{"key":"4090_CR17","doi-asserted-by":"crossref","unstructured":"Chen X, Lin J, Ma Y, Lin B, Wang H, Huang G (2019) Self-adaptive resource allocation for cloud-based software services based on progressive QoS prediction model. Sci China Inf Sci 62(11):219101","DOI":"10.1007\/s11432-018-9750-2"},{"issue":"10","key":"4090_CR18","doi-asserted-by":"publisher","first-page":"2913","DOI":"10.1109\/TMC.2017.2651823","volume":"16","author":"G Huang","year":"2017","unstructured":"Huang G, Xu M, Lin X, Liu Y, Ma Y, Pushp S, Liu X (2017) ShuffleDog: characterizing and adapting user-perceived latency of android apps. IEEE Trans Mobile Comput 16(10):2913\u20132926","journal-title":"IEEE Trans Mobile Comput"},{"key":"4090_CR19","unstructured":"https:\/\/eos.io\/"},{"key":"4090_CR20","first-page":"4733","volume":"6","author":"S Goyal","year":"2021","unstructured":"Goyal S, Sharma N, Kaushik I, Bhushan B (2021) Blockchain as a solution for security attacks in named data networking of things. Secur Privacy Issues IoT Dev Sens Netw 6:4733\u20134741","journal-title":"Secur Privacy Issues IoT Dev Sens Netw"},{"key":"4090_CR21","doi-asserted-by":"crossref","unstructured":"Madaan L, Kumar A, Bhushan B (2020) Working principle, application areas and challenges for blockchain technology. 2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT), IEEE, pp 254\u2013259","DOI":"10.1109\/CSNT48778.2020.9115794"},{"issue":"7","key":"4090_CR22","doi-asserted-by":"publisher","first-page":"7791","DOI":"10.1007\/s11227-020-03558-7","volume":"77","author":"CL Chen","year":"2021","unstructured":"Chen CL, Deng YY, Weng W, Zhou M, Sun H (2021) A blockchain-based intelligent anti-switch package in tracing logistics system. J Supercomput 77(7):7791\u20137832","journal-title":"J Supercomput"},{"issue":"9","key":"4090_CR23","doi-asserted-by":"publisher","first-page":"9576","DOI":"10.1007\/s11227-021-03637-3","volume":"77","author":"T Veeramakali","year":"2021","unstructured":"Veeramakali T, Siva R, Sivakumar B, Mahesh P, Krishnaraj N (2021) An intelligent internet of things-based secure healthcare framework using blockchain technology with an optimal deep learning model. J Supercomput 77(9):9576","journal-title":"J Supercomput"},{"key":"4090_CR24","doi-asserted-by":"crossref","unstructured":"Bhushan B, Khamparia A, Sagayam KM, Sharma SK, Debnath NC (2020) Blockchain for smart cities: a review of architectures, integration trends and future research directions. Sustain Cities Soc 61:102360","DOI":"10.1016\/j.scs.2020.102360"},{"key":"4090_CR25","doi-asserted-by":"crossref","unstructured":"Chen W, Wu J, Zheng Z, Chen C, Zhou Y (2019) Market manipulation of bitcoin: evidence from mining the mt. gox transaction network. In: IEEE INFOCOM 2019\u2014IEEE Conference on Computer Communications, pp 964\u2013972","DOI":"10.1109\/INFOCOM.2019.8737364"},{"key":"4090_CR26","doi-asserted-by":"crossref","unstructured":"Ron D, Shamir A (2012) Quantitative analysis of the full bitcoin transaction graph. In: International Conference on Financial Cryptography and Data Security. pp 6\u201324","DOI":"10.1007\/978-3-642-39884-1_2"},{"key":"4090_CR27","doi-asserted-by":"crossref","unstructured":"Zheng B, Zhu L, Meng S, Du X, Jing Y, Feng G, Li Y, Zhang C, Sheng L, Shu Y (2017) Malicious bitcoin transaction tracing using incidence relation clustering. In: International Conference on Mobile Networks and Management, pp 313\u2013323","DOI":"10.1007\/978-3-319-90775-8_25"},{"issue":"1","key":"4090_CR28","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1109\/TSMC.2018.2883678","volume":"50","author":"I Alqassem","year":"2018","unstructured":"Alqassem I, Rahwan I, Svetinovic D (2018) The anti-social system properties: bitcoin network data analysis. IEEE Trans Syst Man Cybe Syst 50(1):21\u201331","journal-title":"IEEE Trans Syst Man Cybe Syst"},{"key":"4090_CR29","unstructured":"https:\/\/www.walletexplorer.com\/info"},{"key":"4090_CR30","doi-asserted-by":"crossref","unstructured":"Zheng B, Zhu L, Shen M, Du X, Guizani M (2020) Identifying the vulnerabilities of bitcoin anonymous mechanism based on address clustering. Sciece China. Inf Sci 63(3)","DOI":"10.1007\/s11432-019-9900-9"},{"key":"4090_CR31","first-page":"114","volume-title":"Ethereum analysis via node clustering in Anonymous","author":"H Sun","year":"2019","unstructured":"Sun H, Ruan N, Liu H (2019) Ethereum analysis via node clustering in Anonymous. Springer International Publishing, Cham, pp 114\u2013129"},{"key":"4090_CR32","doi-asserted-by":"crossref","unstructured":"Chen T, Zhu Y, Li Z, Chen J, X Zhang (2018) Understanding ethereum via graph analysis. In: IEEE INFOCOM 2018\u2013IEEE Conference on Computer Communications. 20(2):1-32","DOI":"10.1109\/INFOCOM.2018.8486401"},{"key":"4090_CR33","unstructured":"Xu B, Luthra D, Cole Z, Blakely N (2019) Eos: an architectural, performance, and economic analysis"},{"key":"4090_CR34","unstructured":"Lee S, Kim D, Kim D, Son S, Kim Y (2019) Who spent my EOS on the (in) security of resource management of eos. io. In: 13th USENIX workshop on offensive technologies (WOOT 19)"},{"key":"4090_CR35","unstructured":"Huang Y, Wang H, Wu L, Tyson G, Luo X, Zhang R, Liu X, Huang G, Jiang X (2020) Characterizing EOSIO Blockchain. ArXiv abs\/2002.05369"},{"key":"4090_CR36","doi-asserted-by":"crossref","unstructured":"Zheng W, Zheng Z, Dai HN, Chen X, Zheng P (2021) XBlock-EOS: extracting and exploring blockchain data from EOSIO. Inf Process Manag 58(3):102477","DOI":"10.1016\/j.ipm.2020.102477"},{"key":"4090_CR37","doi-asserted-by":"crossref","unstructured":"Zhao Y, Liu J, Han Q, Zheng W, Wu J (2020) Exploring EOSIO via graph characterization. ArXiv abs\/2004.10017","DOI":"10.1007\/978-981-15-9213-3_37"},{"key":"4090_CR38","doi-asserted-by":"crossref","unstructured":"Wu J, Liu J, Zhao Y, Zheng Z (2020) Analysis of cryptocurrency transactions from a network perspective: an overview. 190:103139","DOI":"10.1016\/j.jnca.2021.103139"},{"key":"4090_CR39","doi-asserted-by":"crossref","unstructured":"Liang J, Li L, Zeng D (2018) Evolutionary dynamics of cryptocurrency transaction networks: an empirical study 13(8):e0202202\u2013e0202202","DOI":"10.1371\/journal.pone.0202202"},{"issue":"2","key":"4090_CR40","first-page":"e86197","volume":"9","author":"D Kondor","year":"2014","unstructured":"Kondor D, Psfai M, Csabai I, Vattay G (2014) Do the rich get richer? An Emp Anal Bitcoin Trans Netw 9(2):e86197\u2013e86197","journal-title":"An Emp Anal Bitcoin Trans Netw"},{"key":"4090_CR41","unstructured":"Baumann A, Fabian B, Lischke M (2014) Exploring the Bitcoin network. In: WEBIST, pp 369\u2013374"},{"issue":"23","key":"4090_CR42","doi-asserted-by":"publisher","first-page":"5003","DOI":"10.3390\/app9235003","volume":"9","author":"F Zola","year":"2019","unstructured":"Zola F, Bruse JL, Eguimendia M, Galar M, Urrutia R (2019) Bitcoin and cybersecurity: temporal dissection of blockchain data to unveil changes in entity behavioral patterns. Appl Sci 9(23):5003","journal-title":"Appl Sci"},{"key":"4090_CR43","doi-asserted-by":"crossref","unstructured":"Ferretti S, Dangelo G (2020) On the ethereum blockchain structure: a complex networks theory perspective. Concurr Comput, p e5493","DOI":"10.1002\/cpe.5493"},{"key":"4090_CR44","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1016\/j.ins.2019.04.013","volume":"492","author":"D Guo","year":"2019","unstructured":"Guo D, Dong J, Wang K (2019) Graph structure and statistical properties of ethereum transaction relationships. Inf Sci 492:58\u201371","journal-title":"Inf Sci"},{"key":"4090_CR45","doi-asserted-by":"publisher","first-page":"2737","DOI":"10.1109\/TCSII.2020.2968376","volume":"67","author":"D Lin","year":"2020","unstructured":"Lin D, Wu J, Yuan Q, Zheng Z (2020) Modeling and understanding ethereum transaction records via a complex network approach. IEEE Trans Circuits Syst II Exp Briefs 67:2737\u20132741","journal-title":"IEEE Trans Circuits Syst II Exp Briefs"},{"key":"4090_CR46","doi-asserted-by":"publisher","first-page":"1060","DOI":"10.1126\/science.aaz8170","volume":"369","author":"D Lazer","year":"2020","unstructured":"Lazer D, Pentland A, Watts D, Aral S, Athey S, Contractor N, Freelon D, Gonzlez-Bailn S, King G, Margetts H, Nelson A, Salganik MJ, Strohmaier M, Vespignani A, Wagner C (2020) Computational social science: obstacles and opportunities. Science 369:1060\u20131062","journal-title":"Science"},{"key":"4090_CR47","volume-title":"Introduction to network science","author":"X Wang","year":"2012","unstructured":"Wang X, Li X, Chen G (2012) Introduction to network science. Higher Education Press, Beijing"},{"key":"4090_CR48","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1109\/OJCS.2020.2990458","volume":"1","author":"P Zheng","year":"2020","unstructured":"Zheng P, Zheng Z, Wu J, Dai H (2020) XBlock-ETH: extracting and exploring blockchain data from ethereum. IEEE Open J Comput Soc 1:95\u2013106","journal-title":"IEEE Open J Comput Soc"},{"key":"4090_CR49","unstructured":"Leong L (2020) Snapshot samplings of the Bitcoin transaction network and analysis of cryptocurrency growth. ArXiv abs\/2003.06068"},{"issue":"7","key":"4090_CR50","doi-asserted-by":"publisher","first-page":"e101357","DOI":"10.1371\/journal.pone.0101357","volume":"9","author":"J Kauffman","year":"2014","unstructured":"Kauffman J, Kittas A, Bennett L, Tsoka S (2014) DyCoNet: A Gephi plugin for community detection in dynamic complex networks. PloS One 9(7):e101357\u2013e101357","journal-title":"PloS One"},{"key":"4090_CR51","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1016\/j.osnem.2017.10.006","volume":"3\u20134","author":"D Maesa","year":"2017","unstructured":"Maesa D, Marino A, Ricci L (2017) Detecting artificial behaviours in the Bitcoin users graph. Online Soc Netw Media 3\u20134:63\u201374","journal-title":"Online Soc Netw Media"},{"issue":"1","key":"4090_CR52","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1108\/10662241111104866","volume":"21","author":"W Shu","year":"2011","unstructured":"Shu W, Chuang Y (2011) The perceived benefits of 6-degree-separation social networks. Internet Res 21(1):26\u201345","journal-title":"Internet Res"},{"key":"4090_CR53","doi-asserted-by":"publisher","first-page":"37229","DOI":"10.1109\/ACCESS.2021.3062652","volume":"9","author":"XF Liu","year":"2021","unstructured":"Liu XF, Jiang X, Liu S, Tse C (2021) knowledge discovery in cryptocurrency transactions: a survey. IEEE Access 9:37229\u201337254","journal-title":"IEEE Access"},{"key":"4090_CR54","doi-asserted-by":"publisher","first-page":"440","DOI":"10.1038\/30918","volume":"393","author":"D Watts","year":"1998","unstructured":"Watts D, Strogatz S (1998) Collective dynamics of small-world networks. Nature 393:440\u2013442","journal-title":"Nature"},{"key":"4090_CR55","unstructured":"https:\/\/tech.hqew.com\/fangan\\_2011588"},{"issue":"1","key":"4090_CR56","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1103\/RevModPhys.74.47","volume":"74","author":"R Albert","year":"2001","unstructured":"Albert R, Barabasi A (2001) Statistical mechanics of complex networks. Rev Mod Phys 74(1):47\u201397","journal-title":"Rev Mod Phys"},{"key":"4090_CR57","doi-asserted-by":"crossref","unstructured":"Meiklejohn S, Pomarole M, Jordan G, Levchenko K, McCoy D, Voelker G, Savage S (2013) A fistful of bitcoins: characterizing payments among men with no names. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp 127\u2013140","DOI":"10.1145\/2504730.2504747"},{"key":"4090_CR58","doi-asserted-by":"publisher","first-page":"37575","DOI":"10.1109\/ACCESS.2019.2905769","volume":"7","author":"W Chen","year":"2019","unstructured":"Chen W, Zheng Z, Ngai E, Zheng P, Zhou Y (2019) Exploiting blockchain data to detect smart Ponzi schemes on ethereum. IEEE Access 7:37575\u201337586","journal-title":"IEEE Access"},{"key":"4090_CR59","first-page":"717","volume":"2019","author":"E Brinckman","year":"2019","unstructured":"Brinckman E, Kuehlkamp A, Nabrzyski J, Taylor I (2019) Techniques and applications for crawling, ingesting and analyzing blockchain data. Int Conf Inf Commun Technol Converg ICTC 2019:717\u2013722","journal-title":"Int Conf Inf Commun Technol Converg ICTC"},{"issue":"4","key":"4090_CR60","first-page":"204","volume":"11","author":"R Galici","year":"2020","unstructured":"Galici R, Ordile L, Marchesi M, Pinna A, Tonelli R (2020) Applying the ETL process to blockchain data. Prosp Find Inf 11(4):204","journal-title":"Prosp Find Inf"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-021-04090-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-021-04090-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-021-04090-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,16]],"date-time":"2022-03-16T02:09:28Z","timestamp":1647396568000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-021-04090-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,8]]},"references-count":60,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2022,3]]}},"alternative-id":["4090"],"URL":"https:\/\/doi.org\/10.1007\/s11227-021-04090-y","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,10,8]]},"assertion":[{"value":"14 September 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 October 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}}]}}