{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T03:25:17Z","timestamp":1769916317622,"version":"3.49.0"},"reference-count":62,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2022,4,8]],"date-time":"2022-04-08T00:00:00Z","timestamp":1649376000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,4,8]],"date-time":"2022-04-08T00:00:00Z","timestamp":1649376000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61502215"],"award-info":[{"award-number":["61502215"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["51704138"],"award-info":[{"award-number":["51704138"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100010246","name":"Postdoctoral Science Foundation of Jiangsu Province","doi-asserted-by":"publisher","award":["2020M672134"],"award-info":[{"award-number":["2020M672134"]}],"id":[{"id":"10.13039\/501100010246","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Scientific Research Project of Department of Education of Liaoning Province","award":["LJC201913"],"award-info":[{"award-number":["LJC201913"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2022,8]]},"DOI":"10.1007\/s11227-022-04370-1","type":"journal-article","created":{"date-parts":[[2022,4,8]],"date-time":"2022-04-08T05:08:34Z","timestamp":1649394514000},"page":"14726-14755","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Blockchain-based multi-malicious double-spending attack blacklist management model"],"prefix":"10.1007","volume":"78","author":[{"given":"JunLu","family":"Wang","sequence":"first","affiliation":[]},{"given":"Qiang","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Baoyan","family":"Song","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,4,8]]},"reference":[{"key":"4370_CR1","unstructured":"Nakamoto S (2008) Bitcoin: a peer-to-peer electronic cash system. Decent Bus Rev:21260"},{"key":"4370_CR2","doi-asserted-by":"crossref","unstructured":"Yaga D, Mell P, Roby N, Scarfone K (2019) Blockchain technology overview. arXiv preprint arXiv:1906.11078","DOI":"10.6028\/NIST.IR.8202"},{"issue":"10","key":"4370_CR3","doi-asserted-by":"publisher","first-page":"e0163477","DOI":"10.1371\/journal.pone.0163477","volume":"11","author":"J Yli-Huumo","year":"2016","unstructured":"Yli-Huumo J, Ko D, Choi S, ParkS Smolander K (2016) Where is current research on blockchain technology?-a systematic review. PloS One 11(10):e0163477","journal-title":"PloS One"},{"key":"4370_CR4","doi-asserted-by":"crossref","unstructured":"Zheng Z, Xie S, Dai H, Chen X, Wang H (2017) An overview of blockchain technology: architecture, consensus, and future trends. In: 2017 IEEE International Congress on Big Data (BigData Congress), pp 557\u2013564, IEEE","DOI":"10.1109\/BigDataCongress.2017.85"},{"key":"4370_CR5","unstructured":"Belchior R, Vasconcelos A, Guerreiro S, Correia M (2020) A survey on blockchain interoperability: past, present, and future trends. arXiv preprint arXiv:2005.14282"},{"key":"4370_CR6","doi-asserted-by":"crossref","unstructured":"Yang W, Garg S, Raza A, Herbert D, Kang B (2018, August) Blockchain: trends and future. In: Pacific Rim Knowledge Acquisition Workshop, Springer, Cham, pp 201\u2013210","DOI":"10.1007\/978-3-319-97289-3_15"},{"issue":"12","key":"4370_CR7","doi-asserted-by":"publisher","first-page":"2214","DOI":"10.3390\/su9122214","volume":"9","author":"P Giungato","year":"2017","unstructured":"Giungato P, Rana R, Tarabella A, Tricase C (2017) Current trends in sustainability of bitcoins and related blockchain technology. Sustainability 9(12):2214","journal-title":"Sustainability"},{"issue":"1","key":"4370_CR8","first-page":"101","volume":"14","author":"GT Nguyen","year":"2018","unstructured":"Nguyen GT, Kim K (2018) A survey about consensus algorithms used in blockchain. J Inf Process Syst 14(1):101\u2013128","journal-title":"J Inf Process Syst"},{"key":"4370_CR9","doi-asserted-by":"crossref","unstructured":"Mingxiao D, Xiaofeng M, Zhe Z, Xiangwei W, Qijun C (2017) A review on consensus algorithm of blockchain. In: 2017 IEEE International Conference on Systems, Man, and Cybernetics (SMC), IEEE, pp 2567\u20132572","DOI":"10.1109\/SMC.2017.8123011"},{"key":"4370_CR10","doi-asserted-by":"publisher","first-page":"27324","DOI":"10.1109\/ACCESS.2018.2821705","volume":"6","author":"Y He","year":"2018","unstructured":"He Y, Li H, Cheng X, Liu Y, Yang C, Sun L (2018) A blockchain based truthful incentive mechanism for distributed P2P applications. IEEE Access 6:27324\u201327335","journal-title":"IEEE Access"},{"key":"4370_CR11","doi-asserted-by":"crossref","unstructured":"Donet J A D, P\u00e9rez-Sola C, Herrera-Joancomart\u00ed J (2014) The bitcoin P2P network. In: International Conference on Financial Cryptography and Data Security, Springer, Berlin, Heidelberg, pp 87\u2013102","DOI":"10.1007\/978-3-662-44774-1_7"},{"key":"4370_CR12","unstructured":"Ben Mariem S, Casas P, Donnet B (2018) Vivisecting blockchain P2P networks: unveiling the Bitcoin IP network. In: ACM CoNEXT student workshop"},{"key":"4370_CR13","doi-asserted-by":"publisher","first-page":"102656","DOI":"10.1016\/j.jnca.2020.102656","volume":"162","author":"NZ Benisi","year":"2020","unstructured":"Benisi NZ, Aminian M, Javadi B (2020) Blockchain-based decentralized storage networks: a survey. J Netw Comput Appl 162:102656","journal-title":"J Netw Comput Appl"},{"issue":"2","key":"4370_CR14","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/MCE.2017.2776459","volume":"7","author":"D Puthal","year":"2018","unstructured":"Puthal D, Malik N, Mohanty SP, Kougianos E, Yang C (2018) The blockchain as a decentralized security framework [future directions]. IEEE Consum Electron Mag 7(2):18\u201321","journal-title":"IEEE Consum Electron Mag"},{"key":"4370_CR15","doi-asserted-by":"crossref","unstructured":"Gencer AE, Basu S, Eyal I, Van Renesse R, Sirer EG (2018) Decentralization in bitcoin and ethereum networks. In: International Conference on Financial Cryptography and Data Security, Springer, Berlin, Heidelberg, pp 439\u2013457","DOI":"10.1007\/978-3-662-58387-6_24"},{"key":"4370_CR16","doi-asserted-by":"crossref","unstructured":"Nugent T, Upton D, Cimpoesu M (2016) Improving data transparency in clinical trials using blockchain smart contracts. F1000Research 5","DOI":"10.12688\/f1000research.9756.1"},{"key":"4370_CR17","doi-asserted-by":"crossref","unstructured":"Bhowmik D, Feng T (2017) The multimedia blockchain: a distributed and tamper-proof media transaction framework. In: 2017 22nd International Conference on Digital Signal Processing (DSP), IEEE, pp 1\u20135","DOI":"10.1109\/ICDSP.2017.8096051"},{"key":"4370_CR18","doi-asserted-by":"crossref","unstructured":"Xinyi Y, Yi Z, He Y (2018) Technical characteristics and model of blockchain. In: 2018 10th International Conference on Communication Software and Networks (ICCSN), IEEE, pp 562\u2013566","DOI":"10.1109\/ICCSN.2018.8488289"},{"key":"4370_CR19","first-page":"32","volume":"13","author":"W Viriyasitavat","year":"2019","unstructured":"Viriyasitavat W, Hoonsopon D (2019) Blockchain characteristics and consensus in modern business processes. J Ind Inf Integr 13:32\u201339","journal-title":"J Ind Inf Integr"},{"key":"4370_CR20","doi-asserted-by":"publisher","first-page":"641","DOI":"10.1016\/j.future.2018.04.061","volume":"86","author":"K Leng","year":"2018","unstructured":"Leng K, Bi Y, Jing L, Fu HC, Van Nieuwenhuyse I (2018) Research on agricultural supply chain system with double chain architecture based on blockchain technology. Fut Gener Comput Syst 86:641\u2013649","journal-title":"Fut Gener Comput Syst"},{"key":"4370_CR21","doi-asserted-by":"crossref","unstructured":"Liu X (2018) Research and application of electronic invoice based on blockchain. In: MATEC Web of Conferences , Vol. 232, EDP Sciences, p 04012","DOI":"10.1051\/matecconf\/201823204012"},{"key":"4370_CR22","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.jnca.2018.10.020","volume":"126","author":"Q Feng","year":"2019","unstructured":"Feng Q, He D, Zeadally S, Khan MK, Kumar N (2019) A survey on privacy protection in blockchain system. J Netw Comput Appl 126:45\u201358","journal-title":"J Netw Comput Appl"},{"issue":"5","key":"4370_CR23","first-page":"653","volume":"19","author":"IC Lin","year":"2017","unstructured":"Lin IC, Liao TC (2017) A survey of blockchain security issues and challenges. Int J Netw Secur 19(5):653\u2013659","journal-title":"Int J Netw Secur"},{"key":"4370_CR24","doi-asserted-by":"publisher","first-page":"1815","DOI":"10.1016\/j.procs.2018.05.140","volume":"132","author":"NM Kumar","year":"2018","unstructured":"Kumar NM, Mallick PK (2018) Blockchain technology for security issues and challenges in IoT. Proced Comput Sci 132:1815\u20131823","journal-title":"Proced Comput Sci"},{"key":"4370_CR25","doi-asserted-by":"crossref","unstructured":"Dai F, Shi Y, Meng N, Wei L, Ye Z (2017) From bitcoin to cybersecurity: a comparative study of blockchain application and security issues. In: 2017 4th International Conference on Systems and Informatics (ICSAI), IEEE, pp 975\u2013979","DOI":"10.1109\/ICSAI.2017.8248427"},{"key":"4370_CR26","doi-asserted-by":"crossref","unstructured":"Matzutt R, Hiller J, Henze M, Ziegeldorf J H, M\u00fcllmann D, Hohlfeld O, Wehrle K (2018) A quantitative analysis of the impact of arbitrary blockchain content on bitcoin. In: International Conference on Financial Cryptography and Data Security, Springer, Berlin, Heidelberg, pp 420\u2013438","DOI":"10.1007\/978-3-662-58387-6_23"},{"key":"4370_CR27","doi-asserted-by":"crossref","unstructured":"DuPont Q (2017) Experiments in algorithmic governance: a history and ethnography of \u201cThe DAO,\u201d a failed decentralized autonomous organization. Bitcoin Beyond:157\u2013177","DOI":"10.4324\/9781315211909-8"},{"key":"4370_CR28","unstructured":"bradbury D (2013) Czech bitcoin exchange Bitcash.cz hacked and up to 4,000 user wallets emptied. Coindesk. https:\/\/www.coindesk.com\/czech-bitcoin-exchange-bitcash-cz-hacked-4000-user-wallets-emptied"},{"key":"4370_CR29","unstructured":"Shane D (2018) $530 million cryptocurrency heist may be biggest ever. CNNMoney. https:\/\/money.cnn.com\/2018\/01\/29\/technology\/coincheck-cryptocurrency-exchange-hack-japan\/index.html"},{"key":"4370_CR30","unstructured":"Wood A (2018) Confirmed: monex group to acquire coincheck. Cointelegraph. https:\/\/cointelegraph.com\/news\/confirmed-monex-group-to-acquire-coincheck"},{"key":"4370_CR31","unstructured":"Whittaker Z (2015) Bitstamp exchange hacked, $5M worth of bitcoin stolen. zdnet. https:\/\/www.zdnet.com\/article\/bitstamp-bitcoin-exchange-suspended-amid-hack-concerns-heres-what-we-know\/"},{"key":"4370_CR32","first-page":"1","volume":"248","author":"G Karame","year":"2012","unstructured":"Karame G, Androulaki E, Capkun S (2012) Two bitcoins at the price of one? Double-spending attacks on fast payments in bitcoin. IACR Cryptol ePrint Arch 248:1\u201317","journal-title":"IACR Cryptol ePrint Arch"},{"key":"4370_CR33","doi-asserted-by":"crossref","unstructured":"Karame GO, Androulaki E, Capkun S (2012) Double-spending fast payments in bitcoin. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, pp 906\u2013917","DOI":"10.1145\/2382196.2382292"},{"key":"4370_CR34","unstructured":"Chaudhary KC, Chand V, Fehnker A (2020) Double-spending analysis of bitcoin. In Pacific Asia Conference on Information Systems Proceedings. Association for Information Systems"},{"key":"4370_CR35","doi-asserted-by":"crossref","unstructured":"Gervais A, Karame G O, W\u00fcst K, Glykantzis V, Ritzdorf H, Capkun S (2016) On the security and performance of proof of work blockchains. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp 3\u201316","DOI":"10.1145\/2976749.2978341"},{"key":"4370_CR36","doi-asserted-by":"crossref","unstructured":"Meneghetti A, Sala M, Taufer D (2020) A survey on pow-based consensus. Ann Emerg Technol Comput (AETiC) Print ISSN, 2516-0281","DOI":"10.33166\/AETiC.2020.01.002"},{"key":"4370_CR37","doi-asserted-by":"publisher","first-page":"38947","DOI":"10.1109\/ACCESS.2019.2902811","volume":"7","author":"W She","year":"2019","unstructured":"She W, Liu Q, Tian Z, Chen JS, Wang B, Liu W (2019) Blockchain trust model for malicious node detection in wireless sensor networks. IEEE Access 7:38947\u201338956","journal-title":"IEEE Access"},{"issue":"6","key":"4370_CR38","doi-asserted-by":"publisher","first-page":"3680","DOI":"10.1109\/TII.2019.2903342","volume":"15","author":"J Huang","year":"2019","unstructured":"Huang J, Kong L, Chen G, Wu MY, Liu X, Zeng P (2019) Towards secure industrial IoT: blockchain system with credit-based consensus mechanism. IEEE Trans Ind Inf 15(6):3680\u20133689","journal-title":"IEEE Trans Ind Inf"},{"issue":"3","key":"4370_CR39","doi-asserted-by":"publisher","first-page":"521","DOI":"10.3390\/electronics9030521","volume":"9","author":"S Gong","year":"2020","unstructured":"Gong S, Lee C (2020) Blocis: blockchain-based cyber threat intelligence sharing framework for sybil-resistance. Electronics 9(3):521","journal-title":"Electronics"},{"issue":"6","key":"4370_CR40","doi-asserted-by":"crossref","first-page":"e4158","DOI":"10.1002\/ett.4158","volume":"32","author":"YM Tukur","year":"2021","unstructured":"Tukur YM, Thakker D, Awan IU (2021) Edge-based blockchain enabled anomaly detection for insider attack prevention in Internet of Things. Trans Emerg Telecommun Technol 32(6):e4158","journal-title":"Trans Emerg Telecommun Technol"},{"key":"4370_CR41","doi-asserted-by":"crossref","unstructured":"Shafi Q, Basit A (2019) DDoS botnet prevention using blockchain in software defined internet of things. In: 2019 16th International Bhurban Conference on Applied Sciences and Technology (IBCAST), IEEE, pp 624\u2013628","DOI":"10.1109\/IBCAST.2019.8667147"},{"key":"4370_CR42","first-page":"462","volume-title":"Ruiqiang Ma. Multi-malicious nodes double-spending attack blacklist management model","author":"Liu Qiang","year":"2021","unstructured":"Qiang Liu, Song Yan, Jie Wan (2021) Ruiqiang Ma. Multi-malicious nodes double-spending attack blacklist management model. DSIT, Jianhang Xu, pp 462\u2013467"},{"key":"4370_CR43","unstructured":"Lewenberg Y, Bachrach Y, Sompolinsky Y, Zohar A, Rosenschein J S (2015) Bitcoin mining pools: a cooperative game theoretic analysis. In: Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, pp 919\u2013927"},{"key":"4370_CR44","doi-asserted-by":"crossref","unstructured":"Fisch B, Pass R, Shelat A (2017) Socially optimal mining pools. In: International Conference on Web and Internet Economics, Springer, Cham, pp 205\u2013218","DOI":"10.1007\/978-3-319-71924-5_15"},{"key":"4370_CR45","unstructured":"Daniel C (2014) Are 51% Attacks a Real Threat to Bitcoin? CoinDesk. https:\/\/www.coindesk.com\/51-attacks-real-threat-bitcoin"},{"key":"4370_CR46","unstructured":"Lylian T (2019) BTC.COM\u2019S BITCOIN MINING POOL DOMINANCE THREATENED BY POOLIN. 8btc. https:\/\/bitcoinmagazine.com\/business\/btc-coms-bitcoin-mining-pool-dominance-threatened-by-poolin"},{"issue":"4","key":"4370_CR47","doi-asserted-by":"publisher","first-page":"1115","DOI":"10.1007\/s10489-017-0944-x","volume":"47","author":"S Ji","year":"2017","unstructured":"Ji S, Ma H, Liang Y, Leung H, Zhang C (2017) A whitelist and blacklist-based co-evolutionary strategy for defensing against multifarious trust attacks. Appl Intell 47(4):1115\u20131131","journal-title":"Appl Intell"},{"key":"4370_CR48","doi-asserted-by":"crossref","unstructured":"Dony C, Raskinet M, Renaville F, Simon S, Thirion P (2020) How reliable and useful is Cabell\u2019s Blacklist? A data-driven analysis. Liber Q. 30(1)","DOI":"10.18352\/lq.10339"},{"key":"4370_CR49","doi-asserted-by":"crossref","unstructured":"Lee H, Shin M, Kim K S, Kang Y, Kim J (2018) Recipient-oriented transaction for preventing double spending attacks in private blockchain. In: 2018 15th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON), IEEE, pp 1\u20132","DOI":"10.1109\/SAHCN.2018.8397151"},{"issue":"4","key":"4370_CR50","doi-asserted-by":"publisher","first-page":"451","DOI":"10.1007\/s10207-018-0422-4","volume":"18","author":"C P\u00e9rez-Sol\u00e0","year":"2019","unstructured":"P\u00e9rez-Sol\u00e0 C, Delgado-Segura S, Navarro-Arribas G, Herrera-Joancomart\u00ed J (2019) Double-spending prevention for bitcoin zero-confirmation transactions. Int J Inf Secur 18(4):451\u2013463","journal-title":"Int J Inf Secur"},{"issue":"5","key":"4370_CR51","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1109\/MCE.2020.2988031","volume":"10","author":"S Zhang","year":"2020","unstructured":"Zhang S, Lee JH (2020) Mitigations on sybil-based double-spend attacks in bitcoin. IEEE Consum Electron Mag 10(5):23\u201328","journal-title":"IEEE Consum Electron Mag"},{"key":"4370_CR52","unstructured":"Ekparinya P, Gramoli V, Jourjon G (2018) Double-spending risk quantification in private, consortium and public ethereum blockchains. CoRR abs\/1805.05004"},{"key":"4370_CR53","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1016\/j.comcom.2020.01.079","volume":"154","author":"L Kovalchuk","year":"2020","unstructured":"Kovalchuk L, Kaidalov D, Nastenko A, Rodinko M, Shevtsov O, Oliynykov R (2020) Decreasing security threshold against double spend attack in networks with slow synchronization. Comput Commun 154:75\u201381","journal-title":"Comput Commun"},{"issue":"4","key":"4370_CR54","doi-asserted-by":"publisher","first-page":"1617","DOI":"10.3390\/app11041617","volume":"11","author":"K Fujita","year":"2021","unstructured":"Fujita K, Zhang Y, Sasabe M, Kasahara S (2021) Mining pool selection under block with holding attack. Appl Sci 11(4):1617","journal-title":"Appl Sci"},{"issue":"05","key":"4370_CR55","first-page":"1189","volume":"52","author":"T Yang","year":"2019","unstructured":"Yang T, Xue Z (2019) Game theory among mining pools in blockchain system. Commun Technol 52(05):1189\u20131195","journal-title":"Commun Technol"},{"key":"4370_CR56","doi-asserted-by":"crossref","unstructured":"Wang C, Chu X, Qin Y (2020, July) Measurement and analysis of the bitcoin networks: a view from mining pools. In: 2020 6th International Conference on Big Data Computing and Communications (BIGCOM), pp 180\u2013188, IEEE","DOI":"10.1109\/BigCom51056.2020.00032"},{"key":"4370_CR57","unstructured":"Romiti M, Judmayer A, Zamyatin A, Haslhofer B (2019) A deep dive into bitcoin mining pools: an empirical analysis of mining shares. arXiv preprint arXiv:1905.05999"},{"key":"4370_CR58","doi-asserted-by":"crossref","unstructured":"Sagirlar G, Carminati B, Ferrari E, Sheehan J D, Ragnoli E (2018) Hybrid-iot: hybrid blockchain architecture for internet of things-pow sub-blockchains. In: 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), IEEE, pp 1007\u20131016","DOI":"10.1109\/Cybermatics_2018.2018.00189"},{"key":"4370_CR59","unstructured":"Shi L, Wang T, Li J, Zhang S (2021) Pooling is not favorable: decentralize mining power of PoW blockchain using age-of-work. arXiv preprint arXiv:2104.01918"},{"key":"4370_CR60","doi-asserted-by":"crossref","unstructured":"Saad M, Njilla L, Kamhoua C, Kim J, Nyang D, Mohaisen A (2019) Mempool optimization for defending against ddos attacks in pow-based blockchain systems. In: 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), IEEE, pp 285\u2013292","DOI":"10.1109\/BLOC.2019.8751476"},{"issue":"2","key":"4370_CR61","doi-asserted-by":"publisher","first-page":"948","DOI":"10.1109\/JIOT.2019.2947339","volume":"7","author":"S He","year":"2019","unstructured":"He S, Ren W, Zhu T, Choo KKR (2019) BoSMoS: a blockchain-based status monitoring system for defending against unauthorized software updating in industrial Internet of Things. IEEE Internet of Things J 7(2):948\u2013959","journal-title":"IEEE Internet of Things J"},{"key":"4370_CR62","doi-asserted-by":"publisher","first-page":"113847","DOI":"10.1109\/ACCESS.2020.3000571","volume":"8","author":"K Wang","year":"2020","unstructured":"Wang K, Wang Y, Ji Z (2020) Defending blockchain forking attack by delaying MTC confirmation. IEEE Access 8:113847\u2013113859","journal-title":"IEEE Access"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-022-04370-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-022-04370-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-022-04370-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,19]],"date-time":"2023-11-19T20:03:23Z","timestamp":1700424203000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-022-04370-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,8]]},"references-count":62,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2022,8]]}},"alternative-id":["4370"],"URL":"https:\/\/doi.org\/10.1007\/s11227-022-04370-1","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,4,8]]},"assertion":[{"value":"11 February 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 April 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no potential conflict of interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}