{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T10:31:46Z","timestamp":1771065106101,"version":"3.50.1"},"reference-count":57,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2021,10,27]],"date-time":"2021-10-27T00:00:00Z","timestamp":1635292800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,10,27]],"date-time":"2021-10-27T00:00:00Z","timestamp":1635292800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2022,4]]},"DOI":"10.1007\/s11277-021-09280-8","type":"journal-article","created":{"date-parts":[[2021,10,27]],"date-time":"2021-10-27T05:02:31Z","timestamp":1635310951000},"page":"3127-3145","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["Evaluating the Performance of Various SVM Kernel Functions Based on Basic Features Extracted from KDDCUP'99 Dataset by Random Forest Method for Detecting DDoS Attacks"],"prefix":"10.1007","volume":"123","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6514-0395","authenticated-orcid":false,"given":"Kaushik","family":"Adhikary","sequence":"first","affiliation":[]},{"given":"Shashi","family":"Bhushan","sequence":"additional","affiliation":[]},{"given":"Sunil","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Kamlesh","family":"Dutta","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,10,27]]},"reference":[{"issue":"6","key":"9280_CR1","doi-asserted-by":"publisher","first-page":"1034","DOI":"10.1080\/00207217.2017.1285433","volume":"104","author":"S Kumar","year":"2017","unstructured":"Kumar, S., & Dutta, K. (2017). Direct trust-based security scheme for RREQ flooding attack in mobile ad hoc networks. International Journal of Electronics, 104(6), 1034\u20131049.","journal-title":"International Journal of Electronics"},{"issue":"5","key":"9280_CR2","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1016\/j.comnet.2003.10.003","volume":"44","author":"C Douligeris","year":"2004","unstructured":"Douligeris, C., & Mitrokotsa, A. (2004). DDoS attacks and defense mechanisms: Classification and state-of-the-art. Computer Networks, 44(5), 643\u2013666.","journal-title":"Computer Networks"},{"key":"9280_CR3","unstructured":"https:\/\/usa.kaspersky.com\/about\/press-releases\/2017_kaspersky-lab-research-shows-ddos-devastation-on-organizations-continues-to-climb. Accessed 12 September 2021."},{"key":"9280_CR4","unstructured":"https:\/\/usa.kaspersky.com\/about\/press-releases\/2020_kaspersky-research-finds-ddos-attacks-tripled-year-on-year-in-q2-2020. Accessed 13 September 2021."},{"key":"9280_CR5","unstructured":"https:\/\/www.cdn.neustar\/resources\/whitepapers\/security\/neustar-cyber-threats-trends-report-2020.pdf. Accessed 13 September 2021."},{"issue":"1","key":"9280_CR6","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1080\/21642583.2017.1331768","volume":"5","author":"P Kaur","year":"2017","unstructured":"Kaur, P., Kumar, M., & Bhandari, A. (2017). A review of detection approaches for distributed denial of service attacks. Systems Science & Control Engineering, 5(1), 301\u2013320.","journal-title":"Systems Science & Control Engineering"},{"key":"9280_CR7","doi-asserted-by":"crossref","unstructured":"De Lima Filho, F. S., Silveira, F. A. F., De Medeiros Brito Junior, A., Vargas-Solar, G., & Silveira, L. F. (2021). Smart detection: An online approach for DoS\/DDoS attack detection using machine learning. In Security and Communication Networks (Vol. 2019). Accessed 12 September 2021.","DOI":"10.1155\/2019\/1574749"},{"issue":"4","key":"9280_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5121\/ijci.2014.3401","volume":"3","author":"S Pourfallah","year":"2014","unstructured":"Pourfallah, S., Jafari, A. H., Shahhoseini, H. S., & Oleyaeyan, M. (2014). An intrusion detection algorithm for AMI systems based on SVM and PCA. International Journal on Cybernetics & Informatics, 3(4), 1\u20139.","journal-title":"International Journal on Cybernetics & Informatics"},{"issue":"6","key":"9280_CR9","doi-asserted-by":"publisher","first-page":"39","DOI":"10.5121\/ijcnc.2016.8604","volume":"8","author":"MAM Hasan","year":"2016","unstructured":"Hasan, M. A. M., Xu, S., Kabir, M. M. J., & Ahmad, S. (2016). Performance evaluation of different kernels for support vector machine used in intrusion detection system. International Journal of Computer Networks & Communications, 8(6), 39\u201353.","journal-title":"International Journal of Computer Networks & Communications"},{"issue":"5","key":"9280_CR10","doi-asserted-by":"publisher","first-page":"649","DOI":"10.1109\/TSMCC.2008.923876","volume":"38","author":"J Zhang","year":"2008","unstructured":"Zhang, J., Zulkernine, M., & Haque, A. (2008). Random-forests-based network intrusion detection systems. IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), 38(5), 649\u2013659.","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews)"},{"key":"9280_CR11","doi-asserted-by":"crossref","unstructured":"Bao, C. M. (2009). Intrusion detection based on one-class SVM and SNMP MIB data. In 2009 fifth international conference on Information Assurance and Security IAS 2009, Vol. 2, pp. 346\u2013349.","DOI":"10.1109\/IAS.2009.124"},{"issue":"20","key":"9280_CR12","first-page":"9909","volume":"12","author":"D Kim","year":"2017","unstructured":"Kim, D., & Lee, K. Y. (2017). Detection of DDoS attack on the client side using support vector machine. Journal of Applied Engineering Research IJARE, 12(20), 9909\u20139913.","journal-title":"Journal of Applied Engineering Research IJARE"},{"key":"9280_CR13","doi-asserted-by":"publisher","first-page":"3209","DOI":"10.1007\/s11277-020-07977-w","volume":"117","author":"PS Varma","year":"2021","unstructured":"Varma, P. S., & Anand, V. (2021). Random forest learning based indoor localization as an IoT service for smart buildings. Wireless Personal Communications, 117, 3209\u20133227.","journal-title":"Wireless Personal Communications"},{"key":"9280_CR14","doi-asserted-by":"crossref","unstructured":"Berral, J. L., Poggi, N., Alonso, J., Gavald\u00e0, R., Torres, J., & Parashar, M. (2008). Adaptive distributed mechanism against flooding network attacks based on machine learning. In Proceedings of the 1st ACM workshop on Workshop on AISec\u2014AISec 08, p. 43.","DOI":"10.1145\/1456377.1456389"},{"key":"9280_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2016\/3095971","volume":"2016","author":"S Chen","year":"2016","unstructured":"Chen, S., Peng, M., Xiong, H., & Yu, X. (2016). SVM intrusion detection model based on compressed sampling. Journal of Electrical and Computer Engineering, 2016, 1\u20136.","journal-title":"Journal of Electrical and Computer Engineering"},{"issue":"1","key":"9280_CR16","first-page":"55","volume":"60","author":"N Kausar","year":"2014","unstructured":"Kausar, N., Samir, B. B., Ahmad, I., & Hussain, M. (2014). Efficient intrusion detection system based on support vector machines using optimized kernel function. Journal of Theoretical and Applied Information Technology, 60(1), 55\u201363.","journal-title":"Journal of Theoretical and Applied Information Technology"},{"key":"9280_CR17","doi-asserted-by":"crossref","unstructured":"Xie, Y., & Zhang, Y. (2012). An intelligent anomaly analysis for intrusion detection based on SVM. In Proceeding\u20142012 2012 International Conference on Computer Science and Information Processing (CSIP), pp. 739\u2013742.","DOI":"10.1109\/CSIP.2012.6308959"},{"key":"9280_CR18","doi-asserted-by":"crossref","unstructured":"Kausar, N., Samir, B. B., Abdullah, A., & Ahmad, I. (2011). A review of classification approaches using support vector machine in intrusion detection. In International conference on informatics engineering and information science (pp. 24\u201334). Springer.","DOI":"10.1007\/978-3-642-25462-8_3"},{"issue":"14","key":"9280_CR19","doi-asserted-by":"publisher","first-page":"2484","DOI":"10.1002\/sec.1484","volume":"9","author":"S Kumar","year":"2016","unstructured":"Kumar, S., & Dutta, K. (2016). Intrusion detection in mobile ad hoc networks: Techniques, systems, and future challenges. Security and Communication Networks, 9(14), 2484\u20132556.","journal-title":"Security and Communication Networks"},{"key":"9280_CR20","doi-asserted-by":"crossref","unstructured":"Tavallaee, M., Bagheri, E., Lu, W., & Ghorbani, A. A. (2009). A detailed analysis of the KDD CUP 99 data set. In IEEE symposium on computational intelligence for security and defense applications, pp. 1\u20136.","DOI":"10.1109\/CISDA.2009.5356528"},{"issue":"3","key":"9280_CR21","doi-asserted-by":"publisher","first-page":"121","DOI":"10.5121\/ijnsa.2012.4308","volume":"4","author":"P Natesan","year":"2012","unstructured":"Natesan, P. (2012). Multi stage filter using enhanced Adaboost for network intrusion detection. International Journal of Network Security & Its Applications, 4(3), 121\u2013135.","journal-title":"International Journal of Network Security & Its Applications"},{"issue":"10","key":"9280_CR22","first-page":"390","volume":"6","author":"KRWV Bandara","year":"2016","unstructured":"Bandara, K. R. W. V., et al. (2016). Preventing DDoS attack using data mining algorithms. International Journal of Scientific and Research Publications, 6(10), 390.","journal-title":"International Journal of Scientific and Research Publications"},{"key":"9280_CR23","unstructured":"Jha, J., & Ragha, L. (2013). Intrusion detection system using support vector machine. In IJAIS Proceedings on International Conference and workshop on Advanced Computing 2013 ICWAC(3), Vol. 2013, pp. 25\u201330."},{"issue":"11","key":"9280_CR24","doi-asserted-by":"publisher","first-page":"1328","DOI":"10.1016\/j.comcom.2011.01.012","volume":"34","author":"PAR Kumar","year":"2011","unstructured":"Kumar, P. A. R., & Selvakumar, S. (2011). Detection of distributed denial of service attacks using an ensemble of adaptive and hybrid neuro-fuzzy systems. Computer Communications, 34(11), 1328\u20131341.","journal-title":"Computer Communications"},{"key":"9280_CR25","doi-asserted-by":"crossref","unstructured":"Sung, A. H., & Mukkamala, S. (2004). The feature selection and intrusion detection problems. In Annual Asian Computing Science Conference, Vol. 3321, pp. 468\u2013482.","DOI":"10.1007\/978-3-540-30502-6_34"},{"key":"9280_CR26","doi-asserted-by":"crossref","unstructured":"Suresh, M., & Anitha, R. (2011). Evaluating machine learning algorithms for detecting DDoS attacks. In Communications in Computer and Information Science, CCIS, Vol. 196, pp. 441\u2013452.","DOI":"10.1007\/978-3-642-22540-6_42"},{"key":"9280_CR27","unstructured":"https:\/\/catalog.caida.org\/details\/dataset\/telescope_codered_worm. Accessed 13 September 2021."},{"key":"9280_CR28","doi-asserted-by":"publisher","first-page":"145","DOI":"10.14355\/ijcsa.2014.0304.02","volume":"3","author":"S Balakrishnan","year":"2014","unstructured":"Balakrishnan, S., Venkatalakshmi, K., & Kannan, A. (2014). Intrusion detection system using feature selection and classification technique. International Journal of Computer Science and Application, 3, 145\u2013151.","journal-title":"International Journal of Computer Science and Application"},{"key":"9280_CR29","doi-asserted-by":"publisher","first-page":"428","DOI":"10.1016\/j.procs.2015.03.174","volume":"45","author":"U Ravale","year":"2015","unstructured":"Ravale, U., Marathe, N., & Padiya, P. (2015). Feature selection based hybrid anomaly intrusion detection system using K Means and RBF kernel function. Procedia Computer Science, 45, 428\u2013435.","journal-title":"Procedia Computer Science"},{"issue":"5","key":"9280_CR30","doi-asserted-by":"publisher","first-page":"374","DOI":"10.7763\/IJCTE.2017.V9.1169","volume":"9","author":"S Potluri","year":"2017","unstructured":"Potluri, S., & Diedrich, C. (2017). Deep feature extraction for multi-class intrusion detection in industrial control systems. International Journal of Computer Theory and Engineering, 9(5), 374\u2013379.","journal-title":"International Journal of Computer Theory and Engineering"},{"issue":"3","key":"9280_CR31","first-page":"100","volume":"6","author":"N Sharma","year":"2016","unstructured":"Sharma, N., Mahajan, A., & Mansotra, V. (2016). Machine learning techniques used in detection of DOS attacks\u202f: A literature review. International Journal of Advanced Research in Computer Science and Software Engineering, 6(3), 100\u2013105.","journal-title":"International Journal of Advanced Research in Computer Science and Software Engineering"},{"issue":"2","key":"9280_CR32","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1016\/j.comnet.2004.08.014","volume":"48","author":"D Gavrilis","year":"2005","unstructured":"Gavrilis, D., & Dermatas, E. (2005). Real-time detection of distributed denial-of-service attacks using RBF networks and statistical features. Computer Networks, 48(2), 235\u2013245.","journal-title":"Computer Networks"},{"issue":"3","key":"9280_CR33","first-page":"3703","volume":"4","author":"S Pingale","year":"2016","unstructured":"Pingale, S., Parihar, R., & Solankar, P. (2016). Multivariate correlation information based SVM method for Dos attack detection. International Journal of Innovative Research in Computer and Communication Engineering, 4(3), 3703\u20133709.","journal-title":"International Journal of Innovative Research in Computer and Communication Engineering"},{"key":"9280_CR34","doi-asserted-by":"crossref","unstructured":"Wang, L., Dong, C., Hu, J., & Li, G. (2015). Network intrusion detection using support vector machine based on particle swarm optimization. In International Conference on Applied Science and Engineering Innovation (ASEI 2015) Network, pp. 665\u2013670.","DOI":"10.2991\/asei-15.2015.125"},{"issue":"5","key":"9280_CR35","first-page":"1203","volume":"13","author":"BA Tama","year":"2017","unstructured":"Tama, B. A., & Rhee, K. H. (2017). A detailed analysis of classifier ensembles for intrusion detection in wireless network. Journal of Information Processing Systems, 13(5), 1203\u20131212.","journal-title":"Journal of Information Processing Systems"},{"issue":"3","key":"9280_CR36","first-page":"808","volume":"4","author":"V Manekar","year":"2014","unstructured":"Manekar, V., & Waghmare, K. (2014). Intrusion detection system using Support Vector Machine (SVM) and Particle Swarm Optimization (PSO). International Journal of Advanced Computer Research, 4(3), 808\u2013812.","journal-title":"International Journal of Advanced Computer Research"},{"issue":"4","key":"9280_CR37","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1007\/s00778-006-0002-5","volume":"16","author":"L Khan","year":"2007","unstructured":"Khan, L., Awad, M., & Thuraisingham, B. (2007). A new intrusion detection system using support vector machines and hierarchical clustering. VLDB Journal, 16(4), 507\u2013521.","journal-title":"VLDB Journal"},{"issue":"3","key":"9280_CR38","doi-asserted-by":"publisher","first-page":"40","DOI":"10.5120\/758-993","volume":"3","author":"SA Mulay","year":"2010","unstructured":"Mulay, S. A., Devale, P. R., & Garje, G. V. (2010). Intrusion detection system using support vector machine and decision tree. International Journal of Computer Applications, 3(3), 40\u201343.","journal-title":"International Journal of Computer Applications"},{"issue":"7\u20138","key":"9280_CR39","first-page":"1671","volume":"24","author":"I Ahmad","year":"2013","unstructured":"Ahmad, I., Hussain, M., Alghamdi, A., & Alelaiwi, A. (2013). Enhancing SVM performance in intrusion detection using optimal feature subset selection based on genetic principal components. Neural Computing and Applications, 24(7\u20138), 1671\u20131682.","journal-title":"Neural Computing and Applications"},{"issue":"2","key":"9280_CR40","doi-asserted-by":"publisher","first-page":"133","DOI":"10.20532\/cit.2016.1002701","volume":"24","author":"ST Ikram","year":"2016","unstructured":"Ikram, S. T. (2016). Improving accuracy of intrusion detection model using PCA and optimized SVM. Journal of Computing and Information Technology, 24(2), 133\u2013148.","journal-title":"Journal of Computing and Information Technology"},{"key":"9280_CR41","unstructured":"\u201cKDDCUP'99.\u201d http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html. Accessed 23 March 2020."},{"issue":"1","key":"9280_CR42","doi-asserted-by":"publisher","first-page":"30","DOI":"10.21917\/ijsc.2010.0005","volume":"1","author":"PG Kumar","year":"2010","unstructured":"Kumar, P. G., & Devaraj, D. (2010). Intrusion detection using artificial neural network with reduced input features. ICTACT Journal on Soft Computing, 1(1), 30\u201336.","journal-title":"ICTACT Journal on Soft Computing"},{"issue":"7","key":"9280_CR43","first-page":"589","volume":"7","author":"TAL Ibaisi","year":"2008","unstructured":"Ibaisi, T. A. L., Abu-dalhoum, A. B. D. E., Al-rawi, M., Alfonseca, M., & Ortega, A. (2008). Network intrusion detection using genetic algorithm to find best DNA signature. WSEAS Transactions on Systems, 7(7), 589\u2013599.","journal-title":"WSEAS Transactions on Systems"},{"issue":"1","key":"9280_CR44","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman, L. (2001). Random forests. Machine Learning, 45(1), 5\u201332.","journal-title":"Machine Learning"},{"issue":"1","key":"9280_CR45","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1007\/s11277-019-06864-3","volume":"111","author":"RA Ghazy","year":"2020","unstructured":"Ghazy, R. A., El-Rabaie, E. S. M., Dessouky, M. I., El-Fishawy, N. A., & El-Samie, F. E. A. (2020). Feature selection ranking and subset-based techniques with different classifiers for intrusion detection. Wireless Personal Communication, 111(1), 375\u2013393.","journal-title":"Wireless Personal Communication"},{"issue":"4","key":"9280_CR46","doi-asserted-by":"publisher","first-page":"1689","DOI":"10.1007\/s11277-018-5662-0","volume":"100","author":"RA Ghazy","year":"2018","unstructured":"Ghazy, R. A., EL-Rabaie, E.-S.M., Dessouky, M. I., El-Fishawy, N. A., & Abd El-Samie, F. E. (2018). Efficient techniques for attack detection using different features selection algorithms and classifiers. Wireless Personal Communication, 100(4), 1689\u20131706.","journal-title":"Wireless Personal Communication"},{"issue":"1","key":"9280_CR47","doi-asserted-by":"publisher","first-page":"45","DOI":"10.4236\/jilsa.2014.61005","volume":"6","author":"MAM Hasan","year":"2014","unstructured":"Hasan, M. A. M., Nasser, M., Pal, B., & Ahmad, S. (2014). Support Vector Machine and random forest modeling for Intrusion Detection System (IDS). Journal of Intelligent Learning Systems and Applications, 6(1), 45\u201352.","journal-title":"Journal of Intelligent Learning Systems and Applications"},{"issue":"9","key":"9280_CR48","first-page":"1454","volume":"4","author":"MAM Hasan","year":"2013","unstructured":"Hasan, M. A. M., Nasser, M., Pal, B., & Ahmad, S. (2013). Intrusion detection using combination of various kernels based support vector machine. International Journal of Scientific & Engineering Research, 4(9), 1454\u20131463.","journal-title":"International Journal of Scientific & Engineering Research"},{"issue":"6","key":"9280_CR49","first-page":"703","volume":"8","author":"J Hussain","year":"2018","unstructured":"Hussain, J., & Mishra, A. (2018). An effective intrusion detection framework based on support vector machine using Nsl\u2014Kdd dataset. Indian Journal of Computer Science and Engineering (IJCSE), 8(6), 703\u2013713.","journal-title":"Indian Journal of Computer Science and Engineering (IJCSE)"},{"key":"9280_CR50","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-021-08721-8","author":"S Narayanasami","year":"2021","unstructured":"Narayanasami, S., et al. (2021). Biological feature selection and classification techniques for intrusion detection on BAT. Wireless Personal Communication. https:\/\/doi.org\/10.1007\/s11277-021-08721-8","journal-title":"Wireless Personal Communication"},{"key":"9280_CR51","doi-asserted-by":"crossref","unstructured":"Onem, I. M. (2013). Testing and improving the performance of SVM classifier in intrusion detection scenario. In Communications in computer and information science knowledge discovery, knowledge engineering and knowledge management, pp. 173\u2013184.","DOI":"10.1007\/978-3-642-29764-9_12"},{"key":"9280_CR52","doi-asserted-by":"crossref","unstructured":"Gedam, A. G. (2017). Direct kernel method for machine learning with support vector machine. In International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT) (pp. 1772\u20131775). IEEE.","DOI":"10.1109\/ICICICT1.2017.8342839"},{"issue":"5","key":"9280_CR53","first-page":"1","volume":"9","author":"MA Nanda","year":"2018","unstructured":"Nanda, M. A., Seminar, K. B., Nandika, D., & Maddu, A. (2018). A comparison study of kernel functions in the support vector machine and its application for termite detection. Information, 9(5), 1\u201314.","journal-title":"Information"},{"issue":"4","key":"9280_CR54","first-page":"1164","volume":"4","author":"MAM Hasan","year":"2013","unstructured":"Hasan, M. A. M., Nasser, M., & Pal, B. (2013). On the KDD\u201999 dataset: Support vector machine based Intrusion Detection System (IDS) with different kernels. International Journal of Electronics Communication and Computer Engineering, 4(4), 1164\u20131170.","journal-title":"International Journal of Electronics Communication and Computer Engineering"},{"issue":"4","key":"9280_CR55","first-page":"1164","volume":"4","author":"RR Reddy","year":"2013","unstructured":"Reddy, R. R., Kavya, B., & Ramadevi, Y. (2013). A survey on svm classifiers for intrusion detection. International Journal of Electronics Communication and Computer Engineering, 4(4), 1164\u20131170.","journal-title":"International Journal of Electronics Communication and Computer Engineering"},{"issue":"02","key":"9280_CR56","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1142\/S0219720015500055","volume":"13","author":"PS Rana","year":"2015","unstructured":"Rana, P. S., Sharma, H., Bhattacharya, M., & Shukla, A. (2015). Quality assessment of modeled protein structure using physicochemical properties. Journal of Bioinformatics and Computational Biology, 13(02), 1\u201316.","journal-title":"Journal of Bioinformatics and Computational Biology"},{"key":"9280_CR57","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/j.imlet.2017.01.017","volume":"184","author":"D Khanna","year":"2017","unstructured":"Khanna, D., & Rana, P. S. (2017). Multilevel ensemble model for prediction of IgA and IgG antibodies. Immunology Letters, 184, 51\u201360.","journal-title":"Immunology Letters"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-021-09280-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-021-09280-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-021-09280-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,7]],"date-time":"2022-04-07T23:05:45Z","timestamp":1649372745000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-021-09280-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,27]]},"references-count":57,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2022,4]]}},"alternative-id":["9280"],"URL":"https:\/\/doi.org\/10.1007\/s11277-021-09280-8","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,10,27]]},"assertion":[{"value":"19 October 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 October 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no conflict of interest to declare that are relevant to the content of this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}