{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,12]],"date-time":"2024-07-12T10:29:07Z","timestamp":1720780147234},"reference-count":53,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2016,11,1]],"date-time":"2016-11-01T00:00:00Z","timestamp":1477958400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Telecommun Syst"],"published-print":{"date-parts":[[2017,7]]},"DOI":"10.1007\/s11235-016-0245-4","type":"journal-article","created":{"date-parts":[[2016,11,1]],"date-time":"2016-11-01T15:51:31Z","timestamp":1478015491000},"page":"459-477","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Energy-efficient node position identification through payoff matrix and variability analysis"],"prefix":"10.1007","volume":"65","author":[{"given":"Anderson","family":"Silva","sequence":"first","affiliation":[]},{"given":"Fen","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Elvis","family":"Pontes","sequence":"additional","affiliation":[]},{"given":"Marcos A.","family":"Simplicio","sequence":"additional","affiliation":[]},{"given":"Rui","family":"Aguiar","sequence":"additional","affiliation":[]},{"given":"Adilson","family":"Guelfi","sequence":"additional","affiliation":[]},{"given":"Sergio","family":"Kofuji","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,1]]},"reference":[{"issue":"1","key":"245_CR1","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1109\/TDSC.2013.30","volume":"11","author":"N Basilico","year":"2014","unstructured":"Basilico, N., Gatti, N., Monga, M., & Sicari, S. (2014). Security games for node localization through verifiable multilateration. IEEE Transactions on Dependable and Secure Computing, 11(1), 72\u201385. doi:\n                        10.1109\/TDSC.2013.30\n                        \n                    .","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"issue":"7","key":"245_CR2","doi-asserted-by":"publisher","first-page":"1968","DOI":"10.1109\/TC.2014.2346209","volume":"64","author":"MZA Bhuiyan","year":"2015","unstructured":"Bhuiyan, M. Z. A., Wang, G., & Vasilakos, A. V. (2015). Local area prediction-based mobile target tracking in wireless sensor networks. IEEE Transactions on Computers, 64(7), 1968\u20131982. doi:\n                        10.1109\/TC.2014.2346209\n                        \n                    .","journal-title":"IEEE Transactions on Computers"},{"key":"245_CR3","volume-title":"Game theory with economic application","author":"HS Bierman","year":"1998","unstructured":"Bierman, H. S., & Fernandez, L. (1998). Game theory with economic application. Reading, MA: Addison-Wesley."},{"issue":"12","key":"245_CR4","doi-asserted-by":"publisher","first-page":"3010","DOI":"10.1016\/j.sigpro.2007.05.015","volume":"87","author":"YAL Borgne","year":"2007","unstructured":"Borgne, Y. A. L., Santini, S., & Bontempi, G. (2007). Adaptive model selection for time series prediction in wireless sensor networks. Signal Processing, 87(12), 3010\u20133020. doi:\n                        10.1016\/j.sigpro.2007.05.015\n                        \n                    .","journal-title":"Signal Processing"},{"key":"245_CR5","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/j.inffus.2016.04.007","volume":"33","author":"HH Bosman","year":"2017","unstructured":"Bosman, H. H., Iacca, G., Tejada, A., Wrtche, H. J., & Liotta, A. (2017). Spatial anomaly detection in sensor networks using neighborhood information. Information Fusion, 33, 41\u201356. doi:\n                        10.1016\/j.inffus.2016.04.007\n                        \n                    .","journal-title":"Information Fusion"},{"issue":"2","key":"245_CR6","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1109\/JSAC.2005.861380","volume":"24","author":"S Capkun","year":"2006","unstructured":"Capkun, S., & Hubaux, J. P. (2006). Secure positioning in wireless networks. IEEE Journal on Selected Areas in Communications, 24(2), 221\u2013232. doi:\n                        10.1109\/JSAC.2005.861380\n                        \n                    .","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"1","key":"245_CR7","first-page":"1","volume":"1","author":"JL Deng","year":"1989","unstructured":"Deng, J. L. (1989). Introduction to Grey system theory. The Journal of Grey System, 1(1), 1\u201324.","journal-title":"The Journal of Grey System"},{"issue":"1","key":"245_CR8","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1109\/JSYST.2013.2260631","volume":"8","author":"N Deshpande","year":"2014","unstructured":"Deshpande, N., Grant, E., & Henderson, T. C. (2014). Target localization and autonomous navigation using wireless sensor networks\u2014A pseudo-gradient algorithm approach. IEEE Systems Journal, 8(1), 93\u2013103. doi:\n                        10.1109\/JSYST.2013.2260631\n                        \n                    .","journal-title":"IEEE Systems Journal"},{"key":"245_CR9","doi-asserted-by":"crossref","unstructured":"Doherty, L., Pister, K. S., & Ghaoui, L. E. (2001). Convex position estimation in wireless sensor networks. In Proceedings of IEEE INFOCOM\u201901 (Vol. 3, pp. 1655\u20131663).","DOI":"10.1109\/INFCOM.2001.916662"},{"key":"245_CR10","volume-title":"Applied regression analysis","author":"NR Draper","year":"1966","unstructured":"Draper, N. R., Smith, H., & Pownell, E. (1966). Applied regression analysis (Vol. 3). New York: Wiley."},{"key":"245_CR11","unstructured":"Dricot, J. M., der Haegen, M. V., Borgne, Y. A. L., & Bontemp, G. (2008). A framework for user localization and tracking using machine learning techniques in wireless sensors networks. In Proceedings of IEEE sensors conference\u201908 (pp. 1088\u20131091)."},{"key":"245_CR12","volume-title":"Teoria dos jogos: com aplica\u00e7\u00f5es em economia, administra\u00e7\u00e3o e ci\u00eancias sociais, rev e atual","author":"R Fiani","year":"2006","unstructured":"Fiani, R. (2006). Teoria dos jogos: com aplica\u00e7\u00f5es em economia, administra\u00e7\u00e3o e ci\u00eancias sociais, rev e atual. Rio de Janeiro: Campus Elsevier."},{"key":"245_CR13","unstructured":"Furtado, V. H., Gimene, R., Camargo J\u00fanior, J., & Almeida J\u00fanior, J. (2008). Aspectos de seguran\u00e7a na integra\u00e7\u00e3o de ve\u00edculos a\u00e9reos n\u00e3o tripulados (vant) no espa\u00e7o a\u00e9reo brasileiro. In VII SITRAER, Rio de Janeiro, 2008."},{"key":"245_CR14","doi-asserted-by":"crossref","unstructured":"Guo, Y., Schildt, S., & Wolf, L. (2013). Detecting blackhole and Greyhole attacks in vehicular delay tolerant networks. In Proceedings of IEEE COMSNETS\u201913 (pp. 1\u20137).","DOI":"10.1109\/COMSNETS.2013.6465569"},{"issue":"7","key":"245_CR15","doi-asserted-by":"crossref","first-page":"3501","DOI":"10.1109\/TVT.2010.2049391","volume":"59","author":"Z Guo","year":"2010","unstructured":"Guo, Z., Guo, Y., Hong, F., Jin, Z., He, Y., Feng, Y., et al. (2010). Perpendicular intersection: Locating wireless sensors with mobile beacon. IEEE Transactions on Vehicular Technology, 59(7), 3501\u20133509.","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"245_CR16","doi-asserted-by":"publisher","first-page":"721","DOI":"10.1007\/978-81-322-2517-1","volume":"1","author":"SK Gupta","year":"2016","unstructured":"Gupta, S. K., Kuila, P., & Jana, P. K. (2016). Genetic algorithm for k-connected relay node placement in wireless sensor networks. Proceedings of the International Conference on Computer and Communication Technologies, 1, 721\u2013729. doi:\n                        10.1007\/978-81-322-2517-1\n                        \n                    .","journal-title":"Proceedings of the International Conference on Computer and Communication Technologies"},{"issue":"2014","key":"245_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2014\/308341","volume":"2014","author":"J He","year":"2014","unstructured":"He, J., Xu, J., Zhu, X., Zhang, Y., Zhang, T., & Fu, W. (2014). Reputation-based secure sensor localization in wireless sensor networks. The Scientific World Journal, 2014(2014), 1\u201310. doi:\n                        10.1155\/2014\/308341\n                        \n                    .","journal-title":"The Scientific World Journal"},{"key":"245_CR18","unstructured":"Huang, L., Jia, J., Yu, B., Chun, B. G., Maniatis, P., Naik, M. (2010). Predicting execution time of computer programs using sparse polynomial regression. In Advances in neural information processing systems (pp. 883\u2013891)."},{"issue":"1","key":"245_CR19","first-page":"95","volume":"2","author":"H Kaaniche","year":"2010","unstructured":"Kaaniche, H., & Kamoun, F. (2010). Mobility prediction in wireless ad hoc networks using neural networks. Journal of Telecommunications, 2(1), 95\u2013101.","journal-title":"Journal of Telecommunications"},{"issue":"2","key":"245_CR20","doi-asserted-by":"crossref","first-page":"1784","DOI":"10.1016\/j.eswa.2009.07.064","volume":"37","author":"E Kayacan","year":"2010","unstructured":"Kayacan, E., Ulutas, B., & Kaynak, O. (2010). Grey system theory-based models in time series prediction. Expert Systems with Applications, 37(2), 1784\u20131789.","journal-title":"Expert Systems with Applications"},{"issue":"3","key":"245_CR21","doi-asserted-by":"crossref","first-page":"346","DOI":"10.1109\/TPDS.2008.83","volume":"20","author":"SU Khan","year":"2009","unstructured":"Khan, S. U., & Ahmad, I. (2009). A cooperative game theoretical technique for joint optimization of energy consumption and response time in computational grids. IEEE Transactions on Parallel and Distributed Systems, 20(3), 346\u2013360.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"issue":"2","key":"245_CR22","doi-asserted-by":"crossref","first-page":"550","DOI":"10.1109\/TVT.2009.2030136","volume":"59","author":"A Kherani","year":"2010","unstructured":"Kherani, A., & Rao, A. (2010). Performance of node-eviction schemes in vehicular networks. IEEE Transactions on Vehicular Technology, 59(2), 550\u2013558.","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"6","key":"245_CR23","doi-asserted-by":"crossref","first-page":"3319","DOI":"10.1109\/TVT.2008.927986","volume":"57","author":"S Kraus","year":"2008","unstructured":"Kraus, S., Lin, R., & Shavitt, Y. (2008). On self-interested agents in vehicular networks with car-to-car gossiping. IEEE Transactions on Vehicular Technology, 57(6), 3319\u20133332.","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"2","key":"245_CR24","doi-asserted-by":"crossref","first-page":"592","DOI":"10.1109\/TVT.2010.2091658","volume":"60","author":"E Kuiper","year":"2011","unstructured":"Kuiper, E., & Nadjm-Tehrani, S. (2011). Geographical routing with location service in intermittently connected MANETs. IEEE Transactions on Vehicular Technology, 60(2), 592\u2013604.","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"1","key":"245_CR25","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1287\/opre.47.1.159","volume":"47","author":"P L\u2019ecuyer","year":"1999","unstructured":"L\u2019ecuyer, P. (1999). Good parameters and implementations for combined multiple recursive random number generators. Operations Research, 47(1), 159\u2013164.","journal-title":"Operations Research"},{"issue":"4","key":"245_CR26","first-page":"22","volume":"11","author":"D Liu","year":"2008","unstructured":"Liu, D., Ning, P., Liu, A., Wang, C., & Du, W. K. (2008). Attack-resistant location estimation in wireless sensor networks. ACM Transactions on Information and System Security, 11(4), 22.","journal-title":"ACM Transactions on Information and System Security"},{"issue":"5","key":"245_CR27","doi-asserted-by":"crossref","first-page":"2253","DOI":"10.1109\/TVT.2011.2114684","volume":"60","author":"J Liu","year":"2011","unstructured":"Liu, J., Jiang, X., Nishiyama, H., & Kato, N. (2011). Reliability assessment for wireless mesh networks under probabilistic region failure model. IEEE Transactions on Vehicular Technology, 60(5), 2253\u20132264.","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"3","key":"245_CR28","doi-asserted-by":"publisher","first-page":"539","DOI":"10.1007\/s12555-014-0309-8","volume":"13","author":"X Luo","year":"2015","unstructured":"Luo, X., & Chang, X. (2015). A novel data fusion scheme using Grey model and extreme learning machine in wireless sensor networks. International Journal of Control, Automation and Systems, 13(3), 539\u2013546. doi:\n                        10.1007\/s12555-014-0309-8\n                        \n                    .","journal-title":"International Journal of Control, Automation and Systems"},{"issue":"5","key":"245_CR29","doi-asserted-by":"publisher","first-page":"10631","DOI":"10.3390\/s150510631","volume":"15","author":"C Miao","year":"2015","unstructured":"Miao, C., Dai, G., Ying, K., & Chen, Q. (2015). Collaborative localization and location verification in WSNs. Sensors, 15(5), 10631\u201310649. doi:\n                        10.3390\/s150510631\n                        \n                    .","journal-title":"Sensors"},{"key":"245_CR30","unstructured":"Morettin, P. A., & Toloi, C. (2006). An\u00e1lise de s\u00e9ries temporais."},{"key":"245_CR31","unstructured":"Morettin, P. A., & Toloi, C. d. C. (1987). Previs\u00e3o de s\u00e9ries temporais. S\u00e3o Paulo: Atual."},{"issue":"2","key":"245_CR32","doi-asserted-by":"publisher","first-page":"1031","DOI":"10.1109\/TWC.2015.2481879","volume":"15","author":"LS Muppirisetty","year":"2016","unstructured":"Muppirisetty, L. S., Svensson, T., & Wymeersch, H. (2016). Spatial wireless channel prediction under location uncertainty. IEEE Transactions on Wireless Communications, 15(2), 1031\u20131044. doi:\n                        10.1109\/TWC.2015.2481879\n                        \n                    .","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"4","key":"245_CR33","doi-asserted-by":"crossref","first-page":"1576","DOI":"10.1109\/TWC.2012.020712.111502","volume":"11","author":"T Nadkar","year":"2012","unstructured":"Nadkar, T., Thumar, V., Tej, G. P., Merchant, S. N., & Desai, U. B. (2012). Distributed power allocation for secondary users in a cognitive radio scenario. IEEE Transactions on Wireless Communications, 11(4), 1576\u20131586.","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"5","key":"245_CR34","doi-asserted-by":"crossref","first-page":"2471","DOI":"10.1109\/TVT.2008.2010049","volume":"58","author":"H Nakayama","year":"2009","unstructured":"Nakayama, H., Kurosawa, S., Jamalipour, A., Nemoto, Y., & Kato, N. (2009). A dynamic anomaly detection scheme for AODV-based mobile ad hoc networks. IEEE Transactions on Vehicular Technology, 58(5), 2471\u20132481.","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"12","key":"245_CR35","doi-asserted-by":"publisher","first-page":"52","DOI":"10.5815\/ijcnis.2015.12.06","volume":"7","author":"MB Nirmala","year":"2015","unstructured":"Nirmala, M. B., & Manjunatha, A. S. (2015). Enhanced voting based secure localization for wireless sensor networks. International Journal of Computer Network and Information Security, 7(12), 52\u201359. doi:\n                        10.5815\/ijcnis.2015.12.06\n                        \n                    .","journal-title":"International Journal of Computer Network and Information Security"},{"issue":"11","key":"245_CR36","first-page":"148","volume":"3","author":"KS Padmanabhan","year":"2013","unstructured":"Padmanabhan, K. S. (2013). Energy efficient localization technique in wireless sensor network. International Journal of Emerging Technology and Advanced Engineering, 3(11), 148\u2013152.","journal-title":"International Journal of Emerging Technology and Advanced Engineering"},{"key":"245_CR37","doi-asserted-by":"crossref","unstructured":"Perkins, C., Belding-Royer, E., & Das, S. (2003). Ad-hoc on-demand distance vector (AODV) routing. Technical report.","DOI":"10.17487\/rfc3561"},{"issue":"3","key":"245_CR38","doi-asserted-by":"publisher","first-page":"4211","DOI":"10.3390\/s140304211","volume":"14","author":"D Pescaru","year":"2014","unstructured":"Pescaru, D., & Curiac, D. I. (2014). Anchor node localization for wireless sensor networks using video and compass information fusion. Sensors, 14(3), 4211\u20134224. doi:\n                        10.3390\/s140304211\n                        \n                    .","journal-title":"Sensors"},{"key":"245_CR39","doi-asserted-by":"publisher","unstructured":"Poornima, P., & Rajesh, R. (2016). Mobility control based dual data transmission for load balancing in WSN. Middle-East Journal of Scientific Research, 24, 193\u2013200. doi:\n                        10.5829\/idosi.mejsr.2016.24.TAET23427\n                        \n                    .","DOI":"10.5829\/idosi.mejsr.2016.24.TAET23427"},{"issue":"1","key":"245_CR40","doi-asserted-by":"crossref","first-page":"367","DOI":"10.1109\/TVT.2008.921621","volume":"58","author":"DR Raymond","year":"2009","unstructured":"Raymond, D. R., Marchany, R. C., Brownfield, M., & Midkiff, S. F. (2009). Effects of denial-of-sleep attacks on wireless sensor network MAC protocols. IEEE Transactions on Vehicular Technology, 58(1), 367\u2013380.","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"245_CR41","unstructured":"Shakhakarmi, N., & Vaman, D. R. (2012). Distributed position localization and tracking (DPLT) of malicious nodes in cluster based mobile ad hoc networks (MANETs). arXiv preprint. \n                        arXiv:1203.3601\n                        \n                    ."},{"key":"245_CR42","doi-asserted-by":"crossref","unstructured":"Silva, A., Pontes, E., Zhou, F., & Kofuji, S. T. (2014). Grey model and polynomial regression for identifying malicious nodes in MANETs. In Proceedings of IEEE GLOBECOM\u201914 (pp. 162\u2013168).","DOI":"10.1109\/GLOCOM.2014.7036801"},{"issue":"2","key":"245_CR43","doi-asserted-by":"crossref","first-page":"737","DOI":"10.1016\/j.camwa.2009.10.019","volume":"59","author":"YL Yun Su","year":"2010","unstructured":"Yun Su, Y. L. (2010). Prediction of multivariate chaotic time series with local polynomial fitting. Computers and Mathematics with Applications, 59(2), 737\u2013744.","journal-title":"Computers and Mathematics with Applications"},{"key":"245_CR44","doi-asserted-by":"crossref","unstructured":"Tan, X., & Lie, T. (2001). Allocation of transmission loss cost using cooperative game theory in the context of open transmission access. In Proceeding of IEEE Power Engineering Society winter meeting\u201901 (Vol. 3, pp. 1215\u20131219).","DOI":"10.1109\/PESW.2001.917248"},{"issue":"2","key":"245_CR45","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1016\/S0040-1625(99)00098-0","volume":"67","author":"FM Tseng","year":"2001","unstructured":"Tseng, F. M., Yu, H. C., & Tzeng, G. H. (2001). Applied hybrid Grey model to forecast seasonal time series. Technological Forecasting and Social Change, 67(2), 291\u2013302.","journal-title":"Technological Forecasting and Social Change"},{"issue":"3\u20134","key":"245_CR46","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1504\/IJSN.2006.011772","volume":"1","author":"H Wang","year":"2006","unstructured":"Wang, H., Sheng, B., & Li, Q. (2006). Elliptic curve cryptography-based access control in sensor networks. International Journal of Security and Networks, 1(3\u20134), 127\u2013137.","journal-title":"International Journal of Security and Networks"},{"key":"245_CR47","doi-asserted-by":"crossref","unstructured":"Wasef, A., & Shen, X. (2009). EDR: Efficient decentralized revocation protocol for vehicular ad hoc networks. IEEE Transactions on Vehicular Technology, 58(9), 5214\u20135224.","DOI":"10.1109\/TVT.2009.2023662"},{"issue":"8","key":"245_CR48","doi-asserted-by":"crossref","first-page":"1249","DOI":"10.1109\/TMC.2011.122","volume":"11","author":"Z Yang","year":"2012","unstructured":"Yang, Z., & Liu, Y. (2012). Understanding node localizability of wireless ad hoc and sensor networks. IEEE Transactions on Mobile Computing, 11(8), 1249\u20131260.","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"245_CR49","doi-asserted-by":"publisher","unstructured":"Yann-Ael, L., & Gianluca, B. (2005). Round robin cycle for predictions in wireless sensor networks. In Proceedings of international conference on intelligent sensors, sensor networks and information processing (pp. 253\u2013258). doi:\n                        10.1109\/SSNIP.2005.1595588\n                        \n                    .","DOI":"10.1109\/SSNIP.2005.1595588"},{"key":"245_CR50","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2015\/293403","volume":"2015","author":"Y Yao","year":"2015","unstructured":"Yao, Y., Han, Q., Xu, X., & Jiang, N. (2015). A RSSI-based distributed weighted search localization algorithm for WSNs. International Journal of Distributed Sensor Networks, 2015, 1\u201311. doi:\n                        10.1155\/2015\/293403\n                        \n                    .","journal-title":"International Journal of Distributed Sensor Networks"},{"issue":"4","key":"245_CR51","doi-asserted-by":"crossref","first-page":"839","DOI":"10.1109\/JSAC.2005.843561","volume":"23","author":"F Ye","year":"2005","unstructured":"Ye, F., Luo, H., Lu, S., & Zhang, L. (2005). Statistical en-route filtering of injected false data in sensor networks. IEEE Journal on Selected Areas in Communications, 23(4), 839\u2013850.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"6","key":"245_CR52","doi-asserted-by":"publisher","first-page":"145","DOI":"10.14257\/ijfgcn.2016.9.6.14","volume":"9","author":"A Yu","year":"2016","unstructured":"Yu, A., & Lv, S. (2016). Research into positioning of the least square support vector machine based on Fisher fishing in WSN. International Journal of Future Generation Communication and Networking, 9(6), 145\u2013150. doi:\n                        10.14257\/ijfgcn.2016.9.6.14\n                        \n                    .","journal-title":"International Journal of Future Generation Communication and Networking"},{"key":"245_CR53","unstructured":"Zhu, S., Setia, S., Jajodia, S., & Ning, P. (2004). An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks. In Proceeding of IEEE symposium on security and privacy\u201904 (pp. 259\u2013271)."}],"container-title":["Telecommunication Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11235-016-0245-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-016-0245-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-016-0245-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,2]],"date-time":"2017-06-02T14:11:49Z","timestamp":1496412709000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11235-016-0245-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11,1]]},"references-count":53,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2017,7]]}},"alternative-id":["245"],"URL":"https:\/\/doi.org\/10.1007\/s11235-016-0245-4","relation":{},"ISSN":["1018-4864","1572-9451"],"issn-type":[{"value":"1018-4864","type":"print"},{"value":"1572-9451","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,11,1]]}}}