{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T16:49:55Z","timestamp":1765039795727,"version":"3.33.0"},"reference-count":53,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2025,1,28]],"date-time":"2025-01-28T00:00:00Z","timestamp":1738022400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,28]],"date-time":"2025-01-28T00:00:00Z","timestamp":1738022400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100007129","name":"Natural Science Foundation of Shandong Province","doi-asserted-by":"publisher","award":["ZR2020MF005"],"award-info":[{"award-number":["ZR2020MF005"]}],"id":[{"id":"10.13039\/501100007129","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"DOI":"10.1007\/s11227-025-06942-3","type":"journal-article","created":{"date-parts":[[2025,1,28]],"date-time":"2025-01-28T16:13:45Z","timestamp":1738080825000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["MLDDoS: a distributed denial of service attack detection method using multi-level sketch"],"prefix":"10.1007","volume":"81","author":[{"given":"Junbi","family":"Xiao","sequence":"first","affiliation":[]},{"given":"Ruifeng","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Jianhang","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,1,28]]},"reference":[{"key":"6942_CR1","unstructured":"Hummel R, Hildebrand C, Modi H, Sockrider G (2020) NETSCOUT threat intelligence report with key findings from the 15th Annual Worldwide Infrastructure Security Report (WISR). Accessed: Mar. 20, 2020. [Online]. Available: https:\/\/www.netscout.com\/sites\/default\/files\/2020-02\/SECR_001_EN-2001_Web.pdf"},{"key":"6942_CR2","unstructured":"Kottler S (2018) February 28th DDoS Incident Report. GitHub. https:\/\/githubengineering.com\/ddos-incident-report\/ Accessed 2018-03"},{"key":"6942_CR3","doi-asserted-by":"publisher","unstructured":"Santanna JJ, Van Rijswijk-Deij R, Hofstede R, Sperotto A, Wierbosch M, Granville LZ, Pras A (2015) Booters \u2014 an analysis of DDoS-as-a-service attacks. In: 2015 IFIP\/IEEE International Symposium on Integrated Network Management (IM), pp 243\u2013251. IEEE, Ottawa, ON, Canada. https:\/\/doi.org\/10.1109\/INM.2015.7140298","DOI":"10.1109\/INM.2015.7140298"},{"key":"6942_CR4","unstructured":"What is IP spoofing? https:\/\/www.cloudflare.com\/learning\/ddos\/ glossary\/ip-spoofing\/. Accessed on 15 November 2024 (2024)"},{"key":"6942_CR5","doi-asserted-by":"crossref","unstructured":"Li G, Zhang M, Liu C, Kong X, Chen A, Gu G, Duan H (2019) Nethcf: Enabling line-rate and adaptive spoofed ip traffic filtering. In: 2019 IEEE 27th International Conference on Network Protocols (ICNP), pp 1\u201312. IEEE","DOI":"10.1109\/ICNP.2019.8888057"},{"issue":"2","key":"6942_CR6","doi-asserted-by":"publisher","first-page":"1641","DOI":"10.1109\/TDSC.2022.3161015","volume":"20","author":"M Zhang","year":"2022","unstructured":"Zhang M, Li G, Kong X, Liu C, Xu M, Gu G, Wu J (2022) Nethcf: filtering spoofed ip traffic with programmable switches. IEEE Trans Dependable Secure Comput 20(2):1641\u20131655","journal-title":"IEEE Trans Dependable Secure Comput"},{"issue":"10","key":"6942_CR7","doi-asserted-by":"publisher","first-page":"2358","DOI":"10.1109\/JSAC.2018.2869997","volume":"36","author":"K Kalkan","year":"2018","unstructured":"Kalkan K, Altay L, Gur G, Alagoz F (2018) JESS: joint entropy-based DDoS defense scheme in SDN. IEEE J Sel Areas Commun 36(10):2358\u20132372. https:\/\/doi.org\/10.1109\/JSAC.2018.2869997","journal-title":"IEEE J Sel Areas Commun"},{"key":"6942_CR8","doi-asserted-by":"publisher","unstructured":"Wang R, Jia Z, Ju L (2015) An entropy-based distributed DDoS detection mechanism in software-defined networking. In: 2015 IEEE Trustcom\/BigDataSE\/ISPA, pp 310\u2013317. IEEE, Helsinki, Finland. https:\/\/doi.org\/10.1109\/Trustcom.2015.389","DOI":"10.1109\/Trustcom.2015.389"},{"key":"6942_CR9","unstructured":"Yu M, Jose L, Miao R (2013) Software defined traffic measurement with opensketch. In: 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI 13), pp 29\u201342"},{"key":"6942_CR10","doi-asserted-by":"publisher","unstructured":"Liu Z, Manousis A, Vorsanger G, Sekar V, Braverman V (2016) One sketch to rule them all: rethinking network flow monitoring with UnivMon. In: Proceedings of the 2016 ACM SIGCOMM conference, pp 101\u2013114. ACM, Florianopolis Brazil. https:\/\/doi.org\/10.1145\/2934872.2934906","DOI":"10.1145\/2934872.2934906"},{"key":"6942_CR11","doi-asserted-by":"publisher","unstructured":"Huang Q, Jin X, Lee PPC, Li R, Tang L, Chen Y-C, Zhang G (2017) SketchVisor: robust network measurement for software packet processing. In: Proceedings of the Conference of the ACM Special Interest Group on Data Communication, pp 113\u2013126. ACM, Los Angeles CA USA. https:\/\/doi.org\/10.1145\/3098822.3098831","DOI":"10.1145\/3098822.3098831"},{"issue":"12","key":"6942_CR12","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1145\/2559899.2560327","volume":"11","author":"N Feamster","year":"2013","unstructured":"Feamster N, Rexford J, Zegura E (2013) The road to SDN: an intellectual history of programmable networks. Queue 11(12):20\u201340. https:\/\/doi.org\/10.1145\/2559899.2560327","journal-title":"Queue"},{"issue":"2","key":"6942_CR13","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1145\/1355734.1355746","volume":"38","author":"N McKeown","year":"2008","unstructured":"McKeown N, Anderson T, Balakrishnan H, Parulkar G, Peterson L, Rexford J, Shenker S, Turner J (2008) OpenFlow: enabling innovation in campus networks. ACM SIGCOMM Comput Commun Rev 38(2):69\u201374. https:\/\/doi.org\/10.1145\/1355734.1355746","journal-title":"ACM SIGCOMM Comput Commun Rev"},{"issue":"3","key":"6942_CR14","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1145\/2656877.2656890","volume":"44","author":"P Bosshart","year":"2014","unstructured":"Bosshart P, Daly D, Gibb G, Izzard M, McKeown N, Rexford J, Schlesinger C, Talayco D, Vahdat A, Varghese G, Walker D (2014) P4: programming protocol-independent packet processors. ACM SIGCOMM Comput Commun Rev 44(3):87\u201395. https:\/\/doi.org\/10.1145\/2656877.2656890","journal-title":"ACM SIGCOMM Comput Commun Rev"},{"key":"6942_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.108800","volume":"207","author":"A AlSabeh","year":"2022","unstructured":"AlSabeh A, Khoury J, Kfoury E, Crichigno J, Bou-Harb E (2022) A survey on security applications of p4 programmable switches and a stride-based vulnerability assessment. Comput Netw 207:108800","journal-title":"Comput Netw"},{"key":"6942_CR16","doi-asserted-by":"publisher","unstructured":"Krishnamurthy B, Sen S, Zhang Y, Chen Y (2003) Sketch-based change detection: methods, evaluation, and applications. In: Proceedings of the 2003 ACM SIGCOMM Conference on Internet Measurement - IMC \u201903, pp 234. ACM Press, Miami Beach, FL, USA. https:\/\/doi.org\/10.1145\/948205.948236","DOI":"10.1145\/948205.948236"},{"key":"6942_CR17","doi-asserted-by":"publisher","unstructured":"Zhang M, Li G, Wang S, Liu C, Chen A, Hu H, Gu G, Li Q, Xu M, Wu J (2020) Poseidon: mitigating volumetric DDoS attacks with programmable switches. In: Proceedings 2020 Network and Distributed System Security Symposium. Internet Society, San Diego, CA. https:\/\/doi.org\/10.14722\/ndss.2020.24007","DOI":"10.14722\/ndss.2020.24007"},{"key":"6942_CR18","unstructured":"Liu Z, Namkung H, Nikolaidis G, Lee J, Kim C, Jin X, Braverman V, Yu M, Sekar V Jaqen: A high-performance switch-native approach for detecting and mitigating volumetric DDoS attacks with programmable switches"},{"key":"6942_CR19","unstructured":"Xing J, Wu W, Chen A (2021) Ripple: A programmable, decentralized $$\\{$$Link-Flooding$$\\}$$ defense against adaptive adversaries. In: 30th USENIX Security Symposium (USENIX Security 21), pp 3865\u20133881"},{"key":"6942_CR20","unstructured":"Behavioral-model [Online]. Available: https:\/\/github.com\/p4lang\/behavioral-model"},{"issue":"1","key":"6942_CR21","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1016\/j.jalgor.2003.12.001","volume":"55","author":"G Cormode","year":"2005","unstructured":"Cormode G, Muthukrishnan S (2005) An improved data stream summary: the count-min sketch and its applications. J Algorithm 55(1):58\u201375. https:\/\/doi.org\/10.1016\/j.jalgor.2003.12.001","journal-title":"J Algorithm"},{"key":"6942_CR22","doi-asserted-by":"publisher","unstructured":"Moshref M, Yu M, Govindan R (2013) Resource\/accuracy tradeoffs in software-defined measurement. In: Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, pp 73\u201378. ACM, Hong Kong China. https:\/\/doi.org\/10.1145\/2491185.2491196","DOI":"10.1145\/2491185.2491196"},{"key":"6942_CR23","doi-asserted-by":"crossref","unstructured":"Yuan Q, Li F, Wang JH, Yu S, Hong A, Yao X (2022) Pnt sketch: a generic sketch algorithm for periodic network telemetry. In: 2022 IFIP Networking Conference (IFIP Networking), pp 1\u20139. IEEE","DOI":"10.23919\/IFIPNetworking55013.2022.9829805"},{"issue":"2","key":"6942_CR24","doi-asserted-by":"publisher","first-page":"738","DOI":"10.1109\/TNET.2022.3199506","volume":"31","author":"J Huang","year":"2022","unstructured":"Huang J, Zhang W, Li Y, Li L, Li Z, Ye J, Wang J (2022) Chainsketch: an efficient and accurate sketch for heavy flow detection. IEEE\/ACM Trans Netw 31(2):738\u2013753","journal-title":"IEEE\/ACM Trans Netw"},{"key":"6942_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2024.103853","volume":"224","author":"B Xiong","year":"2024","unstructured":"Xiong B, Liu Y, Liu R, Zhao J, He S, Zhao B, Yang K, Li K (2024) Activeguardian: an accurate and efficient algorithm for identifying active elephant flows in network traffic. J Netw Comput Appl 224:103853","journal-title":"J Netw Comput Appl"},{"key":"6942_CR26","doi-asserted-by":"crossref","unstructured":"Zhou S, Zhang H, Gao G, Sun Y-e, Huang H, Wang X, Wang Y (2024) Ktsketch: finding k-persistent t-spread flows in high-speed networks. In: Asia-Pacific Web (APWeb) and Web-Age Information Management (WAIM) Joint International Conference on Web and Big Data, pp 326\u2013342. Springer","DOI":"10.1007\/978-981-97-7241-4_21"},{"issue":"1","key":"6942_CR27","doi-asserted-by":"publisher","first-page":"505","DOI":"10.1109\/TNSE.2024.3503904","volume":"12","author":"G Gao","year":"2024","unstructured":"Gao G, Qian Z, Huang H, Sun Y-E, Du Y (2024) Tailoredsketch: a fast and adaptive sketch for efficient per-flow size measurement. IEEE Trans Netw Sci Eng 12(1):505\u2013517","journal-title":"IEEE Trans Netw Sci Eng"},{"key":"6942_CR28","unstructured":"Namkung H, Liu Z, Kim D, Sekar V, Steenkiste P (2023) Sketchovsky: enabling ensembles of sketches on programmable switches. In: 20th USENIX Symposium on Networked Systems Design and Implementation (NSDI 23), pp 1273\u20131292"},{"key":"6942_CR29","doi-asserted-by":"publisher","unstructured":"Huang Q, Lee PPC, Bao Y (2018) Sketchlearn: Relieving user burdens in approximate measurement with automated statistical inference. In: Proceedings of the 2018 Conference of the ACM Special Interest Group on Data Communication, pp 576\u2013590. ACM, Budapest Hungary. https:\/\/doi.org\/10.1145\/3230543.3230559","DOI":"10.1145\/3230543.3230559"},{"key":"6942_CR30","doi-asserted-by":"publisher","unstructured":"Zhou Z, Lv J, Cheng L, Chen X, Zhang T, Huang Q, Luo J, Zhu L, Zhang D, Wu C (2022) SketchGuide: reconfiguring Sketch-based Measurement on Programmable Switches. In: 2022 IEEE 30th International Conference on Network Protocols (ICNP), pp 1\u201311. IEEE, Lexington, KY, USA 2022. https:\/\/doi.org\/10.1109\/ICNP55882.2022.9940368","DOI":"10.1109\/ICNP55882.2022.9940368"},{"issue":"4","key":"6942_CR31","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-022-3794-1","volume":"67","author":"B Zhang","year":"2024","unstructured":"Zhang B, Huang H, Sun Y-E, Du Y, Wang D (2024) Jigsaw-sketch: a fast and accurate algorithm for finding top-k elephant flows in high-speed networks. Sci China Info Sci 67(4):142101","journal-title":"Sci China Info Sci"},{"key":"6942_CR32","doi-asserted-by":"crossref","unstructured":"Li W, Patras P (2024) Stable-sketch: A versatile sketch for accurate, fast, web-scale data stream processing. In: Proceedings of the ACM on Web Conference 2024, pp 4227\u20134238","DOI":"10.1145\/3589334.3645581"},{"key":"6942_CR33","doi-asserted-by":"crossref","unstructured":"Ding R, Yang S, Chen X, Huang Q (2023) Bitsense: Universal and nearly zero-error optimization for sketch counters with compressive sensing. In: Proceedings of the ACM SIGCOMM 2023 Conference, pp 220\u2013238","DOI":"10.1145\/3603269.3604865"},{"key":"6942_CR34","doi-asserted-by":"crossref","unstructured":"Zhang Y, Liu Z, Wang R, Yang T, Li J, Miao R, Liu P, Zhang R, Jiang J (2021) Cocosketch: High-performance sketch-based measurement over arbitrary partial key query. In: Proceedings of the 2021 ACM SIGCOMM 2021 Conference, pp 207\u2013222","DOI":"10.1145\/3452296.3472892"},{"issue":"11","key":"6942_CR35","doi-asserted-by":"publisher","first-page":"2876","DOI":"10.1109\/TPDS.2023.3303924","volume":"34","author":"K Yang","year":"2023","unstructured":"Yang K, Long S, Shi Q, Li Y, Liu Z, Wu Y, Yang T, Jia Z (2023) Sketchint: empowering int with towersketch for per-flow per-switch measurement. IEEE Trans Parallel Distrib Syst 34(11):2876\u20132894","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"6942_CR36","doi-asserted-by":"crossref","unstructured":"Guo J, Hong Y, Wu Y, Liu Y, Yang T, Cui B (2023) Sketchpolymer: Estimate per-item tail quantile using one sketch. In: Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, pp 590\u2013601","DOI":"10.1145\/3580305.3599505"},{"key":"6942_CR37","doi-asserted-by":"publisher","unstructured":"Xiong B, Liu Y, ZQ X, Zhao B, Zhang J (2024) Robustsketch: elastic method for elephant flow identificationsupporting network traffic jitters. Ruan Jian Xue Bao\/J Soft https:\/\/doi.org\/10.13328\/j.cnki.jos.007090 (in Chinese)","DOI":"10.13328\/j.cnki.jos.007090"},{"key":"6942_CR38","doi-asserted-by":"crossref","unstructured":"Song CH, Kannan PG, Low BKH, Chan MC (2020) Fcm-sketch: generic network measurements with data plane support. In: Proceedings of the 16th International Conference on Emerging Networking EXperiments and Technologies, pp 78\u201392","DOI":"10.1145\/3386367.3432729"},{"key":"6942_CR39","doi-asserted-by":"crossref","unstructured":"Tang L, Huang Q, Lee PP (2019) Mv-sketch: A fast and compact invertible sketch for heavy flow detection in network data streams. In: IEEE INFOCOM 2019-IEEE Conference on Computer Communications, pp 2026\u20132034. IEEE","DOI":"10.1109\/INFOCOM.2019.8737499"},{"issue":"2","key":"6942_CR40","doi-asserted-by":"publisher","first-page":"724","DOI":"10.1109\/TNET.2022.3198738","volume":"31","author":"L Tang","year":"2022","unstructured":"Tang L, Xiao Y, Huang Q, Lee PP (2022) A high-performance invertible sketch for network-wide superspreader detection. IEEE\/ACM Trans Netw 31(2):724\u2013737","journal-title":"IEEE\/ACM Trans Netw"},{"key":"6942_CR41","doi-asserted-by":"crossref","unstructured":"Li Y, Yang W, Zhou Z, Liu Q, Li Z, Li S (2022) P4-nsaf: defending ipv6 networks against icmpv6 dos and ddos attacks with p4. In: ICC 2022-IEEE International Conference on Communications, pp 5005\u20135010. IEEE","DOI":"10.1109\/ICC45855.2022.9839137"},{"key":"6942_CR42","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2023.109895","volume":"233","author":"Q Li","year":"2023","unstructured":"Li Q, Huang H, Li R, Lv J, Yuan Z, Ma L, Han Y, Jiang Y (2023) A comprehensive survey on DDoS defense systems: new trends and challenges. Comput Netw 233:109895. https:\/\/doi.org\/10.1016\/j.comnet.2023.109895","journal-title":"Comput Netw"},{"issue":"2","key":"6942_CR43","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/997150.997156","volume":"34","author":"J Mirkovic","year":"2004","unstructured":"Mirkovic J, Reiher P (2004) A taxonomy of DDoS attack and DDoS defense mechanisms. ACM SIGCOMM Comput Commun Rev 34(2):39\u201353. https:\/\/doi.org\/10.1145\/997150.997156","journal-title":"ACM SIGCOMM Comput Commun Rev"},{"key":"6942_CR44","doi-asserted-by":"publisher","unstructured":"Griffioen H, Oosthoek K, van der Knaap P, Doerr C (2021) Scan, test, execute: adversarial tactics in amplification DDoS attacks. In: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, pp 940\u2013954. ACM, Virtual Event Republic of Korea. https:\/\/doi.org\/10.1145\/3460120.3484747","DOI":"10.1145\/3460120.3484747"},{"key":"6942_CR45","unstructured":"Antonakakis M, April T, Bailey M, Bernhard M, Bursztein E, Cochran J, Durumeric Z, Halderman JA, Invernizzi L, Kallitsis M, et al (2017) Understanding the mirai botnet. In: 26th USENIX Security Symposium (USENIX Security 17), pp 1093\u20131110"},{"key":"6942_CR46","doi-asserted-by":"crossref","unstructured":"Soto JE, Vera S, Fern\u00e1ndez Y, Yunge D, Hern\u00e1ndez C, Figueroa M (2023) A sketch-based algorithm for network-flow entropy estimation on programmable switches using p4. In: 2023 26th Euromicro Conference on Digital System Design (DSD), pp 79\u201386. IEEE","DOI":"10.1109\/DSD60849.2023.00021"},{"key":"6942_CR47","doi-asserted-by":"crossref","unstructured":"Lai Y-K, Yu S-Y, Chan I-S, Huang B-H, Chang C-H, Chen JH, Mambretti J (2022) Sketch-based entropy estimation: a tabular interpolation approach using p4. In: Proceedings of the 5th International Workshop on P4 in Europe, pp 57\u201360","DOI":"10.1145\/3565475.3569082"},{"key":"6942_CR48","doi-asserted-by":"publisher","unstructured":"Yang T, Jiang J, Liu P, Huang Q, Gong J, Zhou Y, Miao R, Li X, Uhlig S (2018) Elastic sketch: adaptive and fast network-wide measurements. In: Proceedings of the 2018 Conference of the ACM Special Interest Group on Data Communication, pp 561\u2013575. ACM, Budapest Hungary. https:\/\/doi.org\/10.1145\/3230543.3230544","DOI":"10.1145\/3230543.3230544"},{"key":"6942_CR49","doi-asserted-by":"publisher","unstructured":"Flajolet P, Fusy \u00c9, Gandouet O, Meunier F (2007) HyperLogLog: The analysis of a near-optimal cardinality estimation algorithm. Discrete Mathematics & Theoretical Computer Science DMTCS Proceedings, vol AH, 3545, https:\/\/doi.org\/10.46298\/dmtcs.3545","DOI":"10.46298\/dmtcs.3545"},{"key":"6942_CR50","unstructured":"CAIDA: CAIDA UCSD Anonymized Internet Traces Dataset. [Online]. Available: http:\/\/www.caida.org\/data\/passive\/passive_dataset.xml (2019)"},{"key":"6942_CR51","unstructured":"CAIDA: CAIDA UCSD DDoS 2007 attack dataset. [Online] Available: http:\/\/www.caida.org\/data\/passive\/ddos-20070804_dataset.xml (2007)"},{"issue":"3","key":"6942_CR52","doi-asserted-by":"publisher","first-page":"3121","DOI":"10.1109\/TNSM.2020.3048265","volume":"18","author":"ADS Ilha","year":"2021","unstructured":"Ilha ADS, Lapolli AC, Marques JA, Gaspary LP (2021) Euclid: a fully in-network, P4-based approach for real-time DDoS attack detection and mitigation. IEEE Trans Netw Serv Manag 18(3):3121\u20133139. https:\/\/doi.org\/10.1109\/TNSM.2020.3048265","journal-title":"IEEE Trans Netw Serv Manag"},{"issue":"6","key":"6942_CR53","doi-asserted-by":"publisher","first-page":"4019","DOI":"10.1109\/TDSC.2021.3116345","volume":"19","author":"D Ding","year":"2022","unstructured":"Ding D, Savi M, Siracusa D (2022) Tracking normalized network traffic entropy to detect DDoS attacks in P4. IEEE Trans Dependable Secure Comput 19(6):4019\u20134031. https:\/\/doi.org\/10.1109\/TDSC.2021.3116345","journal-title":"IEEE Trans Dependable Secure Comput"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-025-06942-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-025-06942-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-025-06942-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,28]],"date-time":"2025-01-28T16:14:11Z","timestamp":1738080851000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-025-06942-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,28]]},"references-count":53,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2025,1]]}},"alternative-id":["6942"],"URL":"https:\/\/doi.org\/10.1007\/s11227-025-06942-3","relation":{},"ISSN":["1573-0484"],"issn-type":[{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1,28]]},"assertion":[{"value":"13 January 2025","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 January 2025","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"444"}}