{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T16:17:03Z","timestamp":1761581823820},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,4,25]],"date-time":"2019-04-25T00:00:00Z","timestamp":1556150400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2019,9]]},"DOI":"10.1007\/s11277-019-06408-9","type":"journal-article","created":{"date-parts":[[2019,4,25]],"date-time":"2019-04-25T07:05:06Z","timestamp":1556175906000},"page":"389-408","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Secured Soft Combination Schemes Against Malicious-Users in Cooperative Spectrum Sensing"],"prefix":"10.1007","volume":"108","author":[{"given":"Noor","family":"Gul","sequence":"first","affiliation":[]},{"given":"Ijaz Mansoor","family":"Qureshi","sequence":"additional","affiliation":[]},{"given":"Aqdas","family":"Naveed","sequence":"additional","affiliation":[]},{"given":"Atif","family":"Elahi","sequence":"additional","affiliation":[]},{"given":"Imtiaz","family":"Rasool","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,4,25]]},"reference":[{"issue":"4","key":"6408_CR1","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/MCOM.2008.4481338","volume":"46","author":"A Ghasemi","year":"2008","unstructured":"Ghasemi, A., & Sousa, E. S. (2008). Spectrum sensing in cognitive radio networks: Requirements, challenges and design trade-offs. IEEE Communications Magazine,\n                           46(4), 32\u201339. \n                    https:\/\/doi.org\/10.1109\/MCOM.2008.4481338\n                    \n                  .","journal-title":"IEEE Communications Magazine"},{"issue":"4","key":"6408_CR2","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/MCOM.2008.4481340","volume":"46","author":"R Chen","year":"2008","unstructured":"Chen, R., Park, J. M., Hou, Y. T., & Reed, J. H. (2008). Toward secure distributed spectrum sensing in cognitive radio networks. IEEE Communications Magazine, 46(4), 50\u201355. \n                    https:\/\/doi.org\/10.1109\/MCOM.2008.4481340\n                    \n                  .","journal-title":"IEEE Communications Magazine"},{"key":"6408_CR3","doi-asserted-by":"publisher","unstructured":"Mishra, S., Sahai, A., & Brodersen, R. (2006). Cooperative sensing among cognitive radios. In IEEE international conference on communications (vol. 4, pp. 1658\u20131663). Istanbul. \n                    https:\/\/doi.org\/10.1109\/icc.2006.254957\n                    \n                  .","DOI":"10.1109\/icc.2006.254957"},{"issue":"2","key":"6408_CR4","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1109\/JSAC.2004.839380","volume":"23","author":"S Haykin","year":"2005","unstructured":"Haykin, S. (2005). Cognitive radio: Brain-empowered wireless communications. IEEE Journal on Selected Areas in Communications,\n                           23(2), 201\u2013220. \n                    https:\/\/doi.org\/10.1109\/JSAC.2004.839380\n                    \n                  .","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"6408_CR5","doi-asserted-by":"publisher","unstructured":"Axell, E., Leus, G., Larsson, E. G., & Poor, H. V. (2012). Spectrum sensing for cognitive radio: State-of-the-art and recent advances. In IEEE signal processing magazine (vol. 29, pp. 101\u2013116). \n                    https:\/\/doi.org\/10.1109\/msp.2012.2183771\n                    \n                  .","DOI":"10.1109\/msp.2012.2183771"},{"issue":"5","key":"6408_CR6","doi-asserted-by":"publisher","first-page":"2005","DOI":"10.1371\/journal.pone.0155074","volume":"11","author":"L Zhai","year":"2016","unstructured":"Zhai, L., Wang, H., & Gao, C. (2016). A spectrum access based on quality of service (QoS) in cognitive radio networks. PLoS ONE,\n                           11(5), 2005\u20132009. \n                    https:\/\/doi.org\/10.1371\/journal.pone.0155074\n                    \n                  .","journal-title":"PLoS ONE"},{"key":"6408_CR7","doi-asserted-by":"crossref","unstructured":"Ben Letaief, K., & Zhang, W. (2009). Cooperative communications for cognitive radio networks. In Proceedings of the IEEE (vol. 97, pp. 878\u2013893).","DOI":"10.1109\/JPROC.2009.2015716"},{"issue":"9","key":"6408_CR8","doi-asserted-by":"publisher","first-page":"3021","DOI":"10.1109\/JSEN.2014.2322034","volume":"14","author":"M Monemian","year":"2014","unstructured":"Monemian, M., & Mahdavi, M. (2014). Analysis of a new energy-based sensor selection method for cooperative spectrum sensing in cognitive radio networks. IEEE Sensors Journal,\n                           14(9), 3021\u20133032. \n                    https:\/\/doi.org\/10.1109\/JSEN.2014.2322034\n                    \n                  .","journal-title":"IEEE Sensors Journal"},{"issue":"2","key":"6408_CR9","doi-asserted-by":"publisher","first-page":"831","DOI":"10.1109\/TWC.2014.2360857","volume":"14","author":"D Lee","year":"2015","unstructured":"Lee, D. (2015). Adaptive random access for cooperative spectrum sensing in cognitive radio networks. IEEE Transactions on Wireless Communications,\n                           14(2), 831\u2013840.","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"1","key":"6408_CR10","doi-asserted-by":"publisher","first-page":"881","DOI":"10.1109\/JSYST.2016.2554464","volume":"12","author":"Y He","year":"2016","unstructured":"He, Y., Xue, J., Ratnarajah, T., Sellathurai, M., & Khan, F. (2016). On the performance of cooperative spectrum sensing in random cognitive radio networks. IEEE Systems Journal,\n                           12(1), 881\u2013892. \n                    https:\/\/doi.org\/10.1109\/jsyst.2016.2554464\n                    \n                  .","journal-title":"IEEE Systems Journal"},{"issue":"11","key":"6408_CR11","doi-asserted-by":"publisher","first-page":"3554","DOI":"10.1109\/TWC.2010.091510.100315","volume":"9","author":"H Li","year":"2010","unstructured":"Li, H., & Han, Z. (2010). Catch me if you can: An abnormality detection approach for collaborative spectrum sensing in cognitive radio networks. IEEE Transactions on Wireless Communications,\n                           9(11), 3554\u20133565. \n                    https:\/\/doi.org\/10.1109\/TWC.2010.091510.100315\n                    \n                  .","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"2","key":"6408_CR12","doi-asserted-by":"publisher","first-page":"2523","DOI":"10.1007\/s11277-017-4621-5","volume":"97","author":"S Kar","year":"2017","unstructured":"Kar, S., Sethi, S., & Sahoo, R. K. (2017). A multi-factor trust management scheme for secure spectrum sensing in cognitive radio networks. Wireless Personal Communications,\n                           97(2), 2523\u20132540. \n                    https:\/\/doi.org\/10.1007\/s11277-017-4621-5\n                    \n                  .","journal-title":"Wireless Personal Communications"},{"issue":"4","key":"6408_CR13","doi-asserted-by":"publisher","first-page":"1286","DOI":"10.1587\/transcom.E95.B.1286","volume":"E95-B","author":"H Vu-Van","year":"2012","unstructured":"Vu-Van, H., & Koo, I. (2012). A robust cooperative spectrum sensing based on Kullback-Leibler divergence. IEICE Transactions on Communications,\n                           E95-B(4), 1286\u20131290. \n                    https:\/\/doi.org\/10.1587\/trans.e0\n                    \n                  .","journal-title":"IEICE Transactions on Communications"},{"issue":"1","key":"6408_CR14","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1007\/s11277-016-3331-8","volume":"90","author":"AA Sharifi","year":"2016","unstructured":"Sharifi, A. A., & Niya, J. M. (2016). Securing collaborative spectrum sensing against malicious attackers in cognitive radio networks. Wireless Personal Communications,\n                           90(1), 75\u201391. \n                    https:\/\/doi.org\/10.1007\/s11277-016-3331-8\n                    \n                  .","journal-title":"Wireless Personal Communications"},{"issue":"3","key":"6408_CR15","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1109\/LCOMM.2010.03.092240","volume":"14","author":"K Zeng","year":"2010","unstructured":"Zeng, K., Pawe\u0142czak, P., & \u010cabri\u0107, D. (2010). Reputation-based cooperative spectrum sensing with trusted nodes assistance. IEEE Communications Letters,\n                           14(3), 226\u2013228. \n                    https:\/\/doi.org\/10.1109\/LCOMM.2010.03.092240\n                    \n                  .","journal-title":"IEEE Communications Letters"},{"key":"6408_CR16","doi-asserted-by":"crossref","unstructured":"Nabil, M. (2014). A cooperative spectrum sensing scheme based on task assignment algorithm for cognitive radio networks. In 2014 international wireless communications and mobile computing conference (IWCMC) (pp. 151\u2013156). Nicosia, Cyprus.","DOI":"10.1109\/IWCMC.2014.6906348"},{"issue":"4","key":"6408_CR17","doi-asserted-by":"publisher","first-page":"1806","DOI":"10.1109\/TSP.2011.2181839","volume":"60","author":"F Penna","year":"2012","unstructured":"Penna, F., Sun, Y., Dolecek, L., & Cabric, D. (2012). Detecting and counteracting statistical attacks in cooperative spectrum sensing. IEEE Transactions on Signal Processing,\n                           60(4), 1806\u20131822. \n                    https:\/\/doi.org\/10.1109\/TSP.2011.2181839\n                    \n                  .","journal-title":"IEEE Transactions on Signal Processing"},{"issue":"2","key":"6408_CR18","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1080\/03772063.2015.1083907","volume":"62","author":"AA Sharifi","year":"2016","unstructured":"Sharifi, A. A., Sharifi, M., & MuseviNiya, M. J. (2016). Collaborative spectrum sensing under primary user emulation attack in cognitive radio networks. IETE Journal of Research,\n                           62(2), 205\u2013211. \n                    https:\/\/doi.org\/10.1080\/03772063.2015.1083907\n                    \n                  .","journal-title":"IETE Journal of Research"},{"issue":"8","key":"6408_CR19","doi-asserted-by":"publisher","first-page":"2488","DOI":"10.1109\/TWC.2010.061510.090395","volume":"9","author":"P Kaligineedi","year":"2010","unstructured":"Kaligineedi, P., Khabbazian, M., & Bhargava, V. K. (2010). Malicious user detection in a cognitive radio cooperative sensing system. IEEE Transactions on Wireless Communications,\n                           9(8), 2488\u20132497.","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"4","key":"6408_CR20","doi-asserted-by":"publisher","first-page":"1147","DOI":"10.1109\/TCE.2012.6414979","volume":"58","author":"H-V Van","year":"2012","unstructured":"Van, H.-V., & Koo, I. (2012). A sequential cooperative spectrum sensing scheme based on cognitive user reputation. IEEE Transactions on Consumer Electronics,\n                           58(4), 1147\u20131152. \n                    https:\/\/doi.org\/10.1109\/TCE.2012.6414979\n                    \n                  .","journal-title":"IEEE Transactions on Consumer Electronics"},{"issue":"8","key":"6408_CR21","doi-asserted-by":"publisher","first-page":"e0183387","DOI":"10.1371\/journal.pone.0183387","volume":"12","author":"N Gul","year":"2017","unstructured":"Gul, N., Qureshi, I. M., Omar, A., Elahi, A., & Khan, M. S. (2017). History based forward and feedback mechanism in cooperative spectrum sensing including malicious users in cognitive radio network. PLoS ONE,\n                           12(8), e0183387.","journal-title":"PLoS ONE"},{"key":"6408_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2018\/3153915","volume":"2018","author":"N Gul","year":"2018","unstructured":"Gul, N., Qureshi, I. M., Akbar, S., Kamran, M., & Rasool, I. (2018). One-to-many relationship based Kullback\u2013Leibler divergence against malicious users in cooperative spectrum sensing. Wireless Communications and Mobile Computing,\n                           2018, 1\u201314. \n                    https:\/\/doi.org\/10.1155\/2018\/3153915\n                    \n                  .","journal-title":"Wireless Communications and Mobile Computing"},{"issue":"11","key":"6408_CR23","doi-asserted-by":"publisher","first-page":"4502","DOI":"10.1109\/T-WC.2008.070941","volume":"7","author":"J Ma","year":"2008","unstructured":"Ma, J., Zhao, G., & Li, Y. (2008). Soft combination and detection for cooperative spectrum sensing in cognitive radio networks. IEEE Transactions on Wireless Communications,\n                           7(11), 4502\u20134507. \n                    https:\/\/doi.org\/10.1109\/T-WC.2008.070941\n                    \n                  .","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"3","key":"6408_CR24","doi-asserted-by":"publisher","first-page":"437","DOI":"10.1016\/S1665-6423(13)71552-9","volume":"11","author":"YL Lee","year":"2013","unstructured":"Lee, Y. L., Saad, W. K., El-Saleh, A. A. B., & Ismail, M. (2013). Improved detection performance of cognitive radio networks in AWGN and rayleigh fading environments. Journal of Applied Research and Technology,\n                           11(3), 437\u2013446. \n                    https:\/\/doi.org\/10.1016\/S1665-6423(13)71552-9\n                    \n                  .","journal-title":"Journal of Applied Research and Technology"},{"issue":"8","key":"6408_CR25","doi-asserted-by":"publisher","first-page":"4334","DOI":"10.1109\/TWC.2014.2317788","volume":"13","author":"D Hamza","year":"2014","unstructured":"Hamza, D., A\u00efssa, S., & Aniba, G. (2014). Equal gain combining for cooperative spectrum sensing in cognitive radio networks. IEEE Transactions on Wireless Communications,\n                           13(8), 4334\u20134345. \n                    https:\/\/doi.org\/10.1109\/TWC.2014.2317788\n                    \n                  .","journal-title":"IEEE Transactions on Wireless Communications"},{"key":"6408_CR26","unstructured":"Teguig, D., Scheers, B., & Le Nir, V. (2012). Data fusion schemes for cooperative spectrum sensing in cognitive radio networks. In 2012 military communications and information systems conference, MCC 2012 (pp. 104\u2013110). Gdansk, Poland."},{"key":"6408_CR27","doi-asserted-by":"publisher","unstructured":"Jiang, T., & Qu, D. (2008). On minimum sensing error with spectrum sensing using counting rule in cognitive radio networks. In Proceedings of the 4th international ICST conference on wireless internet (pp. 1\u20139). Brussels, Belgium. \n                    https:\/\/doi.org\/10.4108\/icst.wicon2008.4954\n                    \n                  .","DOI":"10.4108\/icst.wicon2008.4954"},{"key":"6408_CR28","unstructured":"Marchang, N., Rajkumari, R., Brahmachary, S. B.,& Taggu, A. (2015). dynamic decision rule for cooperative spectrum. In 2015 IEEE international conference on electrical, computer and communication technologies (ICECCT) (pp. 1\u20135). Coimbatore, India, March 2015."},{"key":"6408_CR29","doi-asserted-by":"publisher","unstructured":"Unnikrishnan, J., & Veeravalli, V. V. (2007). Cooperative spectrum sensing and detection for cognitive radio. In IEEE global telecommunications conference ({GLOBECOM}) (pp. 2972\u20132976). Washington, DC. November 2007. \n                    https:\/\/doi.org\/10.1109\/glocom.2007.563\n                    \n                  .","DOI":"10.1109\/glocom.2007.563"},{"key":"6408_CR30","doi-asserted-by":"crossref","unstructured":"Liu, X., Yan, J., & Chen, K. (2016). Optimal energy harvest-based weighed cooperative spectrum sensing in cognitive radio. In 2016 international workshop on sustainability, implementation and resilience of energy-aware networks, ICNC workshop (pp. 16\u201320). Kauai, HI, USA.","DOI":"10.1109\/ICCNC.2016.7440554"},{"key":"6408_CR31","doi-asserted-by":"crossref","unstructured":"Bhattacharjee, S., Das, P., Mandal, S., & Sardar, B. (2015). Optimization of probability of false alarm and probability of detection in cognitive radio networks using GA. In Proceedings of ReTIS\u201915\u20142nd IEEE international conference on recent trends in information systems (pp. 53\u201357). Kolkata, India, July 2015.","DOI":"10.1109\/ReTIS.2015.7232852"},{"key":"6408_CR32","series-title":"Springer: Soft Computing","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-016-2070-9","volume-title":"Genetic algorithms in wireless networking: Techniques, applications, and issues","author":"U Mehboob","year":"2016","unstructured":"Mehboob, U., Qadir, J., Ali, S., & Vasilakos, A. (2016). Genetic algorithms in wireless networking: Techniques, applications, and issues (Vol. 20)., Springer: Soft Computing Berlin: Springer. \n                    https:\/\/doi.org\/10.1007\/s00500-016-2070-9\n                    \n                  ."},{"issue":"2","key":"6408_CR33","doi-asserted-by":"publisher","first-page":"1017","DOI":"10.1007\/s11277-014-1915-8","volume":"79","author":"M Akbari","year":"2014","unstructured":"Akbari, M., & Ghanbarisabagh, M. (2014). A novel evolutionary-based cooperative spectrum sensing mechanism for cognitive radio networks. Wireless Personal Communications,\n                           79(2), 1017\u20131030. \n                    https:\/\/doi.org\/10.1007\/s11277-014-1915-8\n                    \n                  .","journal-title":"Wireless Personal Communications"},{"issue":"3","key":"6408_CR34","first-page":"169","volume":"2","author":"MK Hossain","year":"2013","unstructured":"Hossain, M. K., & Abd El-Saleh, A. (2013). Cognitive radio engine model utilizing soft fusion based genetic algorithm for cooperative spectrum optimization. International Journal of Computer Networks & Communications (IJCNC),\n                           2(3), 169\u2013173.","journal-title":"International Journal of Computer Networks & Communications (IJCNC)"},{"issue":"2","key":"6408_CR35","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1109\/CJECE.2014.2378258","volume":"38","author":"RA Rashid","year":"2015","unstructured":"Rashid, R. A., Hadi, A., Bin, F., Hamid, A., Fisal, N., Syed-yusof, S. K., et al. (2015). Efficient in-band spectrum sensing using swarm intelligence for cognitive radio network. D\u00e9tectionspectraleintrabandeefficace en utilisantl\u2019 optimisation par essaimsparticulaires pour un r\u00e9seau sans filcognitif. Canadian Journal of Electrical and Computer Engineering,\n                           38(2), 106\u2013115.","journal-title":"Canadian Journal of Electrical and Computer Engineering"},{"key":"6408_CR36","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2018\/2346317","volume":"2018","author":"N Gul","year":"2018","unstructured":"Gul, N., Qureshi, I. M., Elahi, A., & Rasool, I. (2018). Defense against malicious users in cooperative spectrum sensing using genetic algorithm. International Journal of Antennas and Propagation,\n                           2018, 1\u201311. \n                    https:\/\/doi.org\/10.1155\/2018\/2346317\n                    \n                  .","journal-title":"International Journal of Antennas and Propagation"},{"key":"6408_CR37","doi-asserted-by":"crossref","unstructured":"Gul, N., Naveed, A., Elahi, A., Khattak, T., & Qureshi, I. (2017). A combination of double sided neighbor distance and genetic algorithm in cooperative spectrum sensing against malicious users. In Proceedings of 2017 14th international Bhurban conference on applied sciences & technology (IBCAST) (pp. 746\u2013753). Islamabad, Pakistan.","DOI":"10.1109\/IBCAST.2017.7868137"},{"key":"6408_CR38","doi-asserted-by":"publisher","unstructured":"Herath, S. P., & Rajatheva, N. (2008). Analysis of equal gain combining in energy detection for cognitive radio over Nakagami channels. iN GLOBECOM\u2014IEEE global telecommunications conference (pp. 2972\u20132976). \n                    https:\/\/doi.org\/10.1109\/glocom.2008.ecp.570\n                    \n                  .","DOI":"10.1109\/glocom.2008.ecp.570"},{"issue":"346","key":"6408_CR39","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1080\/01621459.1974.10482962","volume":"69","author":"FR Hampel","year":"1974","unstructured":"Hampel, F. R. (1974). The influence curve and its role in robust estimation. Journal of the American Statistical Association,\n                           69(346), 383\u2013393. \n                    https:\/\/doi.org\/10.1080\/01621459.1974.10482962\n                    \n                  .","journal-title":"Journal of the American Statistical Association"},{"issue":"6","key":"6408_CR40","doi-asserted-by":"publisher","first-page":"1887","DOI":"10.1214\/aoms\/1177693054","volume":"42","author":"FR Hampel","year":"1971","unstructured":"Hampel, F. R. (1971). A general qualitative definition of robustness. The Annals of Mathematical Statistics,\n                           42(6), 1887\u20131896. \n                    https:\/\/doi.org\/10.1214\/aoms\/1177693054\n                    \n                  .","journal-title":"The Annals of Mathematical Statistics"},{"issue":"9","key":"6408_CR41","doi-asserted-by":"publisher","first-page":"1635","DOI":"10.1016\/j.compchemeng.2004.01.009","volume":"28","author":"H Liu","year":"2004","unstructured":"Liu, H., Shah, S., & Jiang, W. (2004). On-line outlier detection and data cleaning. Computers & Chemical Engineering,\n                           28(9), 1635\u20131647. \n                    https:\/\/doi.org\/10.1016\/j.compchemeng.2004.01.009\n                    \n                  .","journal-title":"Computers & Chemical Engineering"},{"issue":"1","key":"6408_CR42","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1109\/87.974338","volume":"10","author":"RK Pearson","year":"2002","unstructured":"Pearson, R. K. (2002). Outliers in process modeling and identification. IEEE Transactions on Control Systems Technology,\n                           10(1), 55\u201363. \n                    https:\/\/doi.org\/10.1109\/87.974338\n                    \n                  .","journal-title":"IEEE Transactions on Control Systems Technology"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-019-06408-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-019-06408-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-019-06408-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,23]],"date-time":"2020-04-23T23:33:13Z","timestamp":1587684793000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-019-06408-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4,25]]},"references-count":42,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,9]]}},"alternative-id":["6408"],"URL":"https:\/\/doi.org\/10.1007\/s11277-019-06408-9","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,4,25]]},"assertion":[{"value":"25 April 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with Ethical Standards"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}