{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T04:51:46Z","timestamp":1772772706698,"version":"3.50.1"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2019,9,7]],"date-time":"2019-09-07T00:00:00Z","timestamp":1567814400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,9,7]],"date-time":"2019-09-07T00:00:00Z","timestamp":1567814400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/100007224","name":"National Foundation for Science and Technology Development","doi-asserted-by":"crossref","award":["102.04-2017.317"],"award-info":[{"award-number":["102.04-2017.317"]}],"id":[{"id":"10.13039\/100007224","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Telecommun Syst"],"published-print":{"date-parts":[[2020,3]]},"DOI":"10.1007\/s11235-019-00608-1","type":"journal-article","created":{"date-parts":[[2019,9,7]],"date-time":"2019-09-07T17:02:47Z","timestamp":1567875767000},"page":"349-358","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["On the secrecy outage probability and performance trade-off of the multi-hop cognitive relay networks"],"prefix":"10.1007","volume":"73","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9564-6207","authenticated-orcid":false,"given":"Minh Nam","family":"Pham","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,9,7]]},"reference":[{"issue":"7","key":"608_CR1","doi-asserted-by":"publisher","first-page":"1250","DOI":"10.1109\/LCOMM.2014.2327631","volume":"18","author":"L Yang","year":"2014","unstructured":"Yang, L., Chen, J., Kuo, Y., & Zhang, H. (2014). Outage performance of DF-based cooperative multicast in spectrum-sharing cognitive relay networks. IEEE Communications Letters, 18(7), 1250\u20131253. \nhttps:\/\/doi.org\/10.1109\/LCOMM.2014.2327631\n\n.","journal-title":"IEEE Communications Letters"},{"issue":"5","key":"608_CR2","doi-asserted-by":"publisher","first-page":"894","DOI":"10.1109\/JPROC.2009.2015717","volume":"97","author":"A Goldsmith","year":"2009","unstructured":"Goldsmith, A., Jafar, S. A., Maric, I., & Srinivasa, S. (2009). Breaking spectrum gridlock with cognitive radios: An information theoretic perspective. Proceedins of the IEEE, 97(5), 894\u2013914. \nhttps:\/\/doi.org\/10.1109\/JPROC.2009.2015717\n\n.","journal-title":"Proceedins of the IEEE"},{"key":"608_CR3","doi-asserted-by":"publisher","unstructured":"Gu, Y., & A\u00efssa, S. (2014). Interference aided energy harvesting in decode-and-forward relaying systems. In 2014 IEEE international conference on communications (ICC), Sydney, NSW, Australia, 10\u201314 June 2014 2014 (pp. 5378\u20135382). IEEE. \nhttps:\/\/doi.org\/10.1109\/ICC.2014.6884176\n\n.","DOI":"10.1109\/ICC.2014.6884176"},{"issue":"11","key":"608_CR4","doi-asserted-by":"publisher","first-page":"741","DOI":"10.1109\/LSP.2012.2217327","volume":"19","author":"TQ Duong","year":"2012","unstructured":"Duong, T. Q., Yeoh, P. L., Bao, V. N. Q., Elkashlan, M., & Yang, N. (2012). Cognitive relay networks with multiple primary transceivers under spectrum-sharing. IEEE Signal Processing Letters, 19(11), 741\u2013744. \nhttps:\/\/doi.org\/10.1109\/LSP.2012.2217327\n\n.","journal-title":"IEEE Signal Processing Letters"},{"key":"608_CR5","doi-asserted-by":"publisher","unstructured":"Ngoc, P. T. D., Duy, T. T., Bao, V. N. Q., & Ho-Van, K. (2015). Performance enhancement for underlay cognitive radio with partial relay selection methods under impact of hardware impairment. In 2015 international conference on advanced technologies for communications (ATC), 14\u201316 Oct. 2015 2015 (pp. 645\u2013650). \nhttps:\/\/doi.org\/10.1109\/ATC.2015.7388411\n\n.","DOI":"10.1109\/ATC.2015.7388411"},{"key":"608_CR6","doi-asserted-by":"publisher","unstructured":"Duy, T. T., Bao, V. N. Q., & Duong, T. Q. (2014). Secured communication in cognitive MIMO schemes under hardware impairments. In 2014 international conference on advanced technologies for communications (ATC 2014), 15\u201317 Oct. 2014 (pp. 109\u2013112). \nhttps:\/\/doi.org\/10.1109\/ATC.2014.7043366\n\n.","DOI":"10.1109\/ATC.2014.7043366"},{"issue":"2","key":"608_CR7","doi-asserted-by":"publisher","first-page":"1139","DOI":"10.1109\/TWC.2010.03.090609","volume":"9","author":"C Conne","year":"2010","unstructured":"Conne, C., & Kim, I.-M. (2010). Outage probability of multi-hop amplify-and-forward relay systems. IEEE Transactions on Wireless Communications, 9(2), 1139\u20131149. \nhttps:\/\/doi.org\/10.1109\/TWC.2010.03.090609\n\n.","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"10","key":"608_CR8","doi-asserted-by":"publisher","first-page":"2761","DOI":"10.1109\/TCOMM.2012.081012.100156","volume":"60","author":"V Asghari","year":"2012","unstructured":"Asghari, V., Costa, D Bd, & Aissa, S. (2012). Performance analysis for multihop relaying channels with Nakagami-m fading: Ergodic capacity upper-bounds and outage probability. IEEE Transactions on Communications, 60(10), 2761\u20132767. \nhttps:\/\/doi.org\/10.1109\/TCOMM.2012.081012.100156\n\n.","journal-title":"IEEE Transactions on Communications"},{"issue":"3","key":"608_CR9","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1109\/JCN.2012.6253087","volume":"14","author":"TT Duy","year":"2012","unstructured":"Duy, T. T., Anpalagan, A., & Kong, H. (2012). Multi-hop cooperative transmission using fountain codes over Rayleigh fading channels. Journal of Communications and Networks, 14(3), 267\u2013272. \nhttps:\/\/doi.org\/10.1109\/JCN.2012.6253087\n\n.","journal-title":"Journal of Communications and Networks"},{"key":"608_CR10","doi-asserted-by":"publisher","unstructured":"Thanh, T. L., Bao, V. N. Q., & Duy, T. T. (2014). Capacity analysis of multi-hop decode-and-forward over Rician fading channels. In 2014 international conference on computing, management and telecommunications (ComManTel), Danang, Vietnam, 27\u201329 April 2014 (pp. 134-139). \nhttps:\/\/doi.org\/10.1109\/ComManTel.2014.6825593\n\n.","DOI":"10.1109\/ComManTel.2014.6825593"},{"issue":"2","key":"608_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1002\/dac.3854","volume":"32","author":"PM Nam","year":"2019","unstructured":"Nam, P. M., Duy, T. T., & Ca, P. V. (2019). End-to-end security-reliability analysis of multi-hop cognitive relaying protocol with TAS\/SC-based primary communication, total interference constraint and asymmetric fading channels. International Journal of Communication Systems, 32(2), 1\u201316. \nhttps:\/\/doi.org\/10.1002\/dac.3854\n\n.","journal-title":"International Journal of Communication Systems"},{"key":"608_CR12","unstructured":"Rasethuntsa T. R., Kumar S., Kaur M. (2019). A comprehensive performance evaluation of a DF-based multi-hop system over $$\\alpha -\\kappa -\\mu $$ and $$\\alpha -\\kappa -\\mu $$-extreme fading channels. \narXiv:1903.09353\n\n."},{"key":"608_CR13","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1016\/j.aeue.2018.10.027","volume":"97","author":"S Kumar","year":"2018","unstructured":"Kumar, S., Chauhan, P. S., Raghuwanshi, P., & Kaur, M. (2018). ED performance over $$\\alpha -\\eta -\\mu $$\/IG and $$\\alpha -\\kappa -\\mu $$\/IG generalized fading channels with diversity reception and cooperative sensing: A unified approach. AEU - International Journal of Electronics and Communications, 97, 273\u2013279. \nhttps:\/\/doi.org\/10.1016\/j.aeue.2018.10.027\n\n.","journal-title":"AEU - International Journal of Electronics and Communications"},{"issue":"3","key":"608_CR14","doi-asserted-by":"publisher","first-page":"200","DOI":"10.5573\/IEIESPC","volume":"6","author":"PT Tin","year":"2017","unstructured":"Tin, P. T., Nam, P. M., Duy, T. T., & Voznak, M. (2017). Security-reliability analysis for a cognitive multi-hop protocol in cluster networks with hardware imperfections. IEIE Transactions on Smart Processing & Computing, 6(3), 200\u2013209. \nhttps:\/\/doi.org\/10.5573\/IEIESPC\n\n.","journal-title":"IEIE Transactions on Smart Processing & Computing"},{"key":"608_CR15","doi-asserted-by":"publisher","unstructured":"Duy, T. T., & Bao, V. N. Q. (2013) Multi-hop transmission with diversity combining techniques under interference constraint. In 2013 international conference on advanced technologies for communications (ATC 2013), 16\u201318 Oct. 2013 (pp. 131\u2013135). \nhttps:\/\/doi.org\/10.1109\/ATC.2013.6698092\n\n.","DOI":"10.1109\/ATC.2013.6698092"},{"key":"608_CR16","doi-asserted-by":"publisher","unstructured":"Tran, D. T., & Bao, V. N. Q. (2013). Outage performance of cooperative multihop transmission in cognitive underlay networks. In 2013 international conference on computing, management and telecommunications (ComManTel), 21\u201324 Jan. 2013 (pp. 123\u2013127). \nhttps:\/\/doi.org\/10.1109\/ComManTel.2013.6482377\n\n.","DOI":"10.1109\/ComManTel.2013.6482377"},{"issue":"11","key":"608_CR17","doi-asserted-by":"publisher","first-page":"1822","DOI":"10.1080\/00207217.2016.1138534","volume":"103","author":"SQ Nguyen","year":"2016","unstructured":"Nguyen, S. Q., & Kong, H. Y. (2016). Exact outage analysis of the effect of co-channel interference on secured multi-hop relaying networks. International Journal of Electronics, 103(11), 1822\u20131838. \nhttps:\/\/doi.org\/10.1080\/00207217.2016.1138534\n\n.","journal-title":"International Journal of Electronics"},{"key":"608_CR18","doi-asserted-by":"publisher","unstructured":"Duy, T. T., Trang, C. N., Bao, V. N. Q., & Hanh, T. (2015). Joint impact of hardware impairment and co-channel interference on multi-hop relaying. In 2015 international conference on advanced technologies for communications (ATC), 14\u201316 Oct. 2015 (pp. 88\u201392). \nhttps:\/\/doi.org\/10.1109\/ATC.2015.7388424\n\n.","DOI":"10.1109\/ATC.2015.7388424"},{"issue":"12","key":"608_CR19","doi-asserted-by":"publisher","first-page":"5173","DOI":"10.1109\/JSEN.2018.2829145","volume":"18","author":"TD Hieu","year":"2018","unstructured":"Hieu, T. D., Duy, T. T., & Kim, B. (2018). Performance enhancement for multihop harvest-to-transmit WSNs with path-selection methods in presence of eavesdroppers and hardware noises. IEEE Sensors Journal, 18(12), 5173\u20135186. \nhttps:\/\/doi.org\/10.1109\/JSEN.2018.2829145\n\n.","journal-title":"IEEE Sensors Journal"},{"issue":"1","key":"608_CR20","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/TWC.2015.2466091","volume":"15","author":"J-H Lee","year":"2016","unstructured":"Lee, J.-H. (2016). Optimal power allocation for physical layer security in multi-hop DF relay networks. IEEE Transactions on Wireless Communications, 15(1), 28\u201338. \nhttps:\/\/doi.org\/10.1109\/TWC.2015.2466091\n\n.","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"11","key":"608_CR21","doi-asserted-by":"publisher","first-page":"3570","DOI":"10.1109\/TWC.2011.092711.101305","volume":"10","author":"K Lee","year":"2011","unstructured":"Lee, K., Chae, C., Heath, R. W., & Kang, J. (2011). MIMO transceiver designs for spatial sensing in cognitive radio networks. IEEE Transactions on Wireless Communications, 10(11), 3570\u20133576. \nhttps:\/\/doi.org\/10.1109\/TWC.2011.092711.101305\n\n.","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"6","key":"608_CR22","doi-asserted-by":"publisher","first-page":"3095","DOI":"10.1109\/TWC.2009.080655","volume":"8","author":"AI Sulyman","year":"2009","unstructured":"Sulyman, A. I., Takahara, G., Hassanein, H. S., & Kousa, M. (2009). Multi-hop capacity of MIMO-multiplexing relaying systems. IEEE Transactions on Wireless Communications, 8(6), 3095\u20133103. \nhttps:\/\/doi.org\/10.1109\/TWC.2009.080655\n\n.","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"10","key":"608_CR23","doi-asserted-by":"publisher","first-page":"4346","DOI":"10.1109\/TCOMM.2016.2591522","volume":"64","author":"JA Hussein","year":"2016","unstructured":"Hussein, J. A., Ikki, S. S., Boussakta, S., Tsimenidis, C. C., & Chambers, J. (2016). Performance analysis of a multi-hop UCRN with co-channel interference. IEEE Transactions on Communications, 64(10), 4346\u20134364. \nhttps:\/\/doi.org\/10.1109\/TCOMM.2016.2591522\n\n.","journal-title":"IEEE Transactions on Communications"},{"key":"608_CR24","doi-asserted-by":"publisher","unstructured":"Nam, P. M., Ca, P. V., Tuan, P. V., Duy, T. T., & Bao, V. N. Q. (2018). Security versus Reliability Study for Multi-hop Cognitive M2M Networks With Joint Impact of Interference Constraint and Hardware Noises. Paper presented at the International Conference on Advanced Technologies for Communications, Ho Chi Minh. \nhttps:\/\/doi.org\/10.1109\/ATC.2018.8587460\n\n.","DOI":"10.1109\/ATC.2018.8587460"},{"issue":"1","key":"608_CR25","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1109\/TIFS.2017.2746001","volume":"13","author":"H Fang","year":"2018","unstructured":"Fang, H., Xu, L., & Wang, X. (2018). Coordinated multiple-relays based physical-layer security improvement: A single-leader multiple-followers stackelberg game scheme. IEEE Transactions on Information Forensics and Security, 13(1), 197\u2013209. \nhttps:\/\/doi.org\/10.1109\/TIFS.2017.2746001\n\n.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"608_CR26","doi-asserted-by":"crossref","unstructured":"Do, N. T., & An, B. (2015). Secure transmission using decode-and-forward protocol for underlay cognitive radio networks. Paper presented at the 2015 seventh international conference on ubiquitous and future networks, Sapporo.","DOI":"10.1109\/ICUFN.2015.7182678"},{"issue":"2","key":"608_CR27","doi-asserted-by":"publisher","first-page":"377","DOI":"10.3390\/s17020377","volume":"17","author":"K Shim","year":"2017","unstructured":"Shim, K., Do, N. T., & An, B. (2017). Performance analysis of physical layer security of opportunistic scheduling in multiuser multirelay cooperative networks. Sensors (Basel, Switzerland), 17(2), 377. \nhttps:\/\/doi.org\/10.3390\/s17020377\n\n.","journal-title":"Sensors (Basel, Switzerland)"},{"issue":"17","key":"608_CR28","doi-asserted-by":"publisher","first-page":"2131","DOI":"10.1049\/iet-com.2015.0186","volume":"9","author":"PN Son","year":"2015","unstructured":"Son, P. N., & Kong, H. Y. (2015). Cooperative communication with energy-harvesting relays under physical layer security. IET Communications, 9(17), 2131\u20132139. \nhttps:\/\/doi.org\/10.1049\/iet-com.2015.0186\n\n.","journal-title":"IET Communications"},{"key":"608_CR29","doi-asserted-by":"publisher","unstructured":"Ding, X., Song, T., Zou, Y., & Chen, X. (2016) Intercept probability analysis of relay selection for wireless communications in the presence of multiple eavesdroppers. In 2016 IEEE wireless communications and networking conference, 3\u20136 April 2016 (pp. 1\u20136). \nhttps:\/\/doi.org\/10.1109\/WCNC.2016.7564932\n\n.","DOI":"10.1109\/WCNC.2016.7564932"},{"issue":"8","key":"608_CR30","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1109\/CC.2017.8014375","volume":"14","author":"G Sun","year":"2017","unstructured":"Sun, G., Han, Z., Jiao, J., Wang, Z., & Wang, D. (2017). Physical layer security in MIMO wiretap channels with antenna correlation. China Communications, 14(8), 149\u2013156. \nhttps:\/\/doi.org\/10.1109\/CC.2017.8014375\n\n.","journal-title":"China Communications"},{"issue":"11","key":"608_CR31","doi-asserted-by":"publisher","first-page":"4623","DOI":"10.3837\/tiis.2015.11.021","volume":"9","author":"TT Duy","year":"2015","unstructured":"Duy, T. T., & Son, P. N. (2015). Secrecy performances of multicast underlay cognitive protocols with partial relay selection and without Eavesdropper\u2019s information. KSII Transactions on Internet and Information Systems, 9(11), 4623\u20134643. \nhttps:\/\/doi.org\/10.3837\/tiis.2015.11.021\n\n.","journal-title":"KSII Transactions on Internet and Information Systems"},{"key":"608_CR32","doi-asserted-by":"publisher","unstructured":"Kolokotronis, N., & Athanasakos, M. (2016) Improving physical layer security in DF relay networks via two-stage cooperative jamming. In 2016 24th European signal processing conference (EUSIPCO), Aug. 29 2016\u2014Sept. 2 2016 (pp. 1173\u20131177). \nhttps:\/\/doi.org\/10.1109\/EUSIPCO.2016.7760433\n\n.","DOI":"10.1109\/EUSIPCO.2016.7760433"},{"key":"608_CR33","doi-asserted-by":"publisher","unstructured":"He, H., Ren, P., Du, Q., Sun, L., & Wang, Y. Jamming or Forwarding? Full-duplex relaying for physical layer security. In 2016 IEEE Globecom Workshops (GC Wkshps), 4\u20138 Dec. 2016 (pp. 1\u20136). \nhttps:\/\/doi.org\/10.1109\/GLOCOMW.2016.7848937\n\n.","DOI":"10.1109\/GLOCOMW.2016.7848937"},{"issue":"3","key":"608_CR34","doi-asserted-by":"publisher","first-page":"1317","DOI":"10.1109\/TSP.2010.2092774","volume":"59","author":"G Zheng","year":"2011","unstructured":"Zheng, G., Choo, L. C., & Wong, K. K. (2011). Optimal Cooperative Jamming to Enhance Physical Layer Security Using Relays. IEEE Transactions on Signal Processing, 59(3), 1317\u20131322. \nhttps:\/\/doi.org\/10.1109\/TSP.2010.2092774\n\n.","journal-title":"IEEE Transactions on Signal Processing"},{"key":"608_CR35","doi-asserted-by":"publisher","first-page":"8386","DOI":"10.1109\/ACCESS.2016.2607783","volume":"4","author":"X Ding","year":"2016","unstructured":"Ding, X., Song, T., Zou, Y., & Chen, X. (2016). Security-reliability tradeoff for friendly jammer assisted user-pair selection in the face of multiple Eavesdroppers. IEEE Access, 4, 8386\u20138393. \nhttps:\/\/doi.org\/10.1109\/ACCESS.2016.2607783\n\n.","journal-title":"IEEE Access"},{"issue":"7","key":"608_CR36","doi-asserted-by":"publisher","first-page":"1340","DOI":"10.1109\/LCOMM.2013.052013.122902","volume":"17","author":"C Cai","year":"2013","unstructured":"Cai, C., Cai, Y., Yang, W., & Yang, W. (2013). Secure connectivity using randomize-and-forward strategy in cooperative wireless networks. IEEE Communications Letters, 17(7), 1340\u20131343. \nhttps:\/\/doi.org\/10.1109\/LCOMM.2013.052013.122902\n\n.","journal-title":"IEEE Communications Letters"},{"issue":"1","key":"608_CR37","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/s11235-017-0325-0","volume":"65","author":"PM Nam","year":"2018","unstructured":"Nam, P. M., Do, D.-T., Tung, N. T., & Tin, P. T. (2018). Energy harvesting assisted cognitive radio: random location-based transceivers scheme and performance analysis. Telecommunication Systems, 65(1), 123\u2013132. \nhttps:\/\/doi.org\/10.1007\/s11235-017-0325-0\n\n.","journal-title":"Telecommunication Systems"},{"issue":"18","key":"608_CR38","doi-asserted-by":"publisher","first-page":"e3372","DOI":"10.1002\/dac.3372","volume":"30","author":"Tien-Tung Nguyen","year":"2017","unstructured":"Nguyen, T. T., Pham, N. M., & Do, D. T. (Dec. 2017). Wireless powered underlay cognitive radio network with multiple primary transceivers: Energy constraint, node arrangement, and performance analysis. International Journal of Communication Systems, 30(18), , \nhttps:\/\/doi.org\/10.1002\/dac.3372\n\n.","journal-title":"International Journal of Communication Systems"},{"issue":"1","key":"608_CR39","doi-asserted-by":"publisher","first-page":"49","DOI":"10.12928\/telkomnika.v17i1.9543","volume":"17","author":"Pham Minh Nam","year":"2019","unstructured":"Nam, P. M., Duy, T. T., & Ca, P. V. (2019). Performance of cluster-based cognitive multihop networks under joint impact of hardware noises and non-identical primary co-channel interference. TELKOMNIKA Telecommunication, Computing, Electronics and Control, 17(1). \nhttps:\/\/doi.org\/10.12928\/telkomnika.v17i1.9543\n\n.","journal-title":"TELKOMNIKA (Telecommunication Computing Electronics and Control)"},{"key":"608_CR40","volume-title":"Table of integrals, series, and products","author":"IS Gradshteyn","year":"2007","unstructured":"Gradshteyn, I. S., & Ryzhik, I. M. (2007). Table of integrals, series, and products (7th ed.). San Diego, CA: Elsevier Inc.","edition":"7"},{"key":"608_CR41","volume-title":"Probability and stochastic processes","author":"DR Yates","year":"1998","unstructured":"Yates, D. R., & Goodman, D. J. (1998). Probability and stochastic processes. Hoboken, NJ: Willey."},{"key":"608_CR42","volume-title":"An introduction to probability theory and mathematical statistics","author":"VK Rohatgi","year":"1976","unstructured":"Rohatgi, V. K. (1976). An introduction to probability theory and mathematical statistics. New York: Wiley."},{"key":"608_CR43","volume-title":"Probability, random variables, and stochastic processes","author":"A Papoulis","year":"1991","unstructured":"Papoulis, A. (1991). Probability, random variables, and stochastic processes (3rd ed.). New York: McGaw-Hill Inc.","edition":"3"}],"container-title":["Telecommunication Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-019-00608-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11235-019-00608-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-019-00608-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,6]],"date-time":"2020-09-06T00:23:10Z","timestamp":1599351790000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11235-019-00608-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9,7]]},"references-count":43,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2020,3]]}},"alternative-id":["608"],"URL":"https:\/\/doi.org\/10.1007\/s11235-019-00608-1","relation":{},"ISSN":["1018-4864","1572-9451"],"issn-type":[{"value":"1018-4864","type":"print"},{"value":"1572-9451","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,9,7]]},"assertion":[{"value":"7 September 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}