{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,19]],"date-time":"2026-05-19T06:27:45Z","timestamp":1779172065340,"version":"3.51.4"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,3,19]],"date-time":"2023-03-19T00:00:00Z","timestamp":1679184000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,3,19]],"date-time":"2023-03-19T00:00:00Z","timestamp":1679184000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2023,5]]},"DOI":"10.1007\/s11277-023-10287-6","type":"journal-article","created":{"date-parts":[[2023,3,19]],"date-time":"2023-03-19T06:02:18Z","timestamp":1679205738000},"page":"321-346","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["Malicious Node Detection in Vehicular Ad-hoc Network (VANET) using Enhanced Beacon Trust Management with Clustering Protocol (EBTM-CP)"],"prefix":"10.1007","volume":"130","author":[{"given":"Chitvan","family":"Gupta","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0956-6989","authenticated-orcid":false,"given":"Laxman","family":"Singh","sequence":"additional","affiliation":[]},{"given":"Rajdev","family":"Tiwari","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,3,19]]},"reference":[{"key":"10287_CR1","first-page":"125","volume":"2015","author":"VK Tripathi","year":"2015","unstructured":"Tripathi, V. K., & Venkaeswari, S. (2015). Secure communication with privacy preservation in VANET-using multilingual translation. Proc. IEEE GCCT, 2015, 125\u2013127.","journal-title":"Proc. IEEE GCCT"},{"issue":"5","key":"10287_CR2","doi-asserted-by":"publisher","first-page":"2273","DOI":"10.1109\/TVT.2012.2228682","volume":"62","author":"C Xu","year":"2013","unstructured":"Xu, C., Zhao, F., & Guan, J. (2013). QoE-driven user-centric VoD services in urban multihomed P2P-based vehicular networks. IEEE Transactions on Vehicular Technology, 62(5), 2273\u20132289.","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"10287_CR3","doi-asserted-by":"crossref","unstructured":"Hussain, S., Faizan, M., & Hayee, M.I. (2018). Real-time relative lane and position identification of surrounding vehicles using GPS and DSRC based vehicle-to-vehicle communication. In Proc. IEEE ICC, pp. 1\u20137.","DOI":"10.1109\/ICC.2018.8422980"},{"key":"10287_CR4","doi-asserted-by":"crossref","unstructured":"S. Mitra, B., Jana, & Poray, J. (2016). A novel scheme to detect and remove black hole attack in cognitive radio vehicular ad hoc networks (CRVANETs). In Proc. IEEE ICCECE, pp.1\u20135.","DOI":"10.1109\/ICCECE.2016.8009589"},{"issue":"11","key":"10287_CR5","doi-asserted-by":"publisher","first-page":"2193","DOI":"10.1109\/TMC.2012.189","volume":"12","author":"C Xu","year":"2013","unstructured":"Xu, C., Liu, T., & Guan, J. (2013). CMT-QA: Quality-aware adaptive concurrent multipath data transfer in heterogeneous wireless networks. IEEE Transactions on Mobile Computing, 12(11), 2193\u20132205.","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"10287_CR6","doi-asserted-by":"crossref","unstructured":"Vighnesh. N. V., Kavita, N., Urs, S. R. (2011). Vehicle authentication scheme based on random permutation for VANET. In Proc. IEEE World Congress on Information and Communication Technologies, pp. 722\u2013726.","DOI":"10.1109\/WICT.2011.6141335"},{"issue":"4","key":"10287_CR7","doi-asserted-by":"publisher","first-page":"1784","DOI":"10.1109\/TITS.2014.2377074","volume":"16","author":"X Cheng","year":"2015","unstructured":"Cheng, X., Yang, L., & Shen, X. (2015). D2D for intelligent transportation systems: A feasibility study. IEEE Transactions on Intelligent Transportation Systems, 16(4), 1784\u20131793.","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"issue":"3","key":"10287_CR8","doi-asserted-by":"publisher","first-page":"616","DOI":"10.1109\/JSAC.2011.110311","volume":"29","author":"Y Hao","year":"2011","unstructured":"Hao, Y., Cheng, Y., Zhou, C., & Song, W. (2011). A distributed key management framework with cooperative message authentication in VANETs. IEEE Journal on Selected Areas in Communications, 29(3), 616\u2013629.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"10287_CR9","first-page":"1","volume":"99","author":"H Tan","year":"2017","unstructured":"Tan, H., Choi, D., Kim, P., Pan, S., & Chung, I. (2017). Comments on \u2019 \u2019dual authentication and key management techniques for secure data transmission in vehicular ad hoc networks. IEEE Transactions on Intelligent Transportation Systems, 99, 1\u20133.","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"issue":"10","key":"10287_CR10","doi-asserted-by":"publisher","first-page":"4983","DOI":"10.1109\/TWC.2013.090413.121697","volume":"12","author":"MC Chuang","year":"2013","unstructured":"Chuang, M. C., & Chen, M. C. (2013). DEEP: Density-aware emergency message extension protocol for VANETs. IEEE Transactions on Wireless Communications, 12(10), 4983\u20134993.","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"9","key":"10287_CR11","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1109\/CC.2014.6969774","volume":"11","author":"J Song","year":"2014","unstructured":"Song, J., He, C., Zhang, L., Tang, S., & Zhang, H. (2014). Toward an RSU-unavailable lightweight certificateless key agreement scheme for VANETs. China Communications, 11(9), 93\u2013103.","journal-title":"China Communications"},{"issue":"4","key":"10287_CR12","doi-asserted-by":"publisher","first-page":"722","DOI":"10.1109\/TMC.2012.42","volume":"12","author":"M Slavik","year":"2012","unstructured":"Slavik, M., & Mahgoub, I. (2012). Spatial distribution and channel quality adaptive protocol for multi hop wireless broadcast routing in VANET. IEEE Transactions on Mobile Computing, 12(4), 722\u2013734.","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"10287_CR13","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1155\/2018\/5672154","volume":"2018","author":"H Khelifi","year":"2018","unstructured":"Khelifi, H., Luo, S., Nour, B., & Shah, S. C. (2018). Security and privacy issues in vehicular named data networks: An overview. Mobile Information Systems, 2018, 11.","journal-title":"Mobile Information Systems"},{"key":"10287_CR14","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1155\/2021\/9997771","volume":"2021","author":"J Mahmood","year":"2021","unstructured":"Mahmood, J., Duan, Z., Yang, Y., Wang, Q., Nebhen, J., & Bhutta, M. N. M. (2021). Security in vehicular ad hoc networks: Challenges and countermeasures. Security and Communication Networks, 2021, 20.","journal-title":"Security and Communication Networks"},{"issue":"3","key":"10287_CR15","doi-asserted-by":"publisher","first-page":"155014772110002","DOI":"10.1177\/15501477211000287","volume":"17","author":"FA Alhaidari","year":"2021","unstructured":"Alhaidari, F. A., & Alrehan, A. M. (2021). A simulation work for generating a novel dataset to detect distributed denial of service attacks on Vehicular Ad hoc network systems. International Journal of Distributed Sensor Networks, 17(3), 15501477211000288.","journal-title":"International Journal of Distributed Sensor Networks"},{"key":"10287_CR16","unstructured":"Aggarwal, S. S., Kumar, P. (2016). Analysis of various issues in non-local means image denoising algorithm. International Journal of Advanced Research in Computer and Communication Engineering, 5(5)."},{"key":"10287_CR17","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1080\/17445760.2019.1617865","volume":"36","author":"S Hamdan","year":"2021","unstructured":"Hamdan, S., Hudaib, A., & Awajan, A. (2021). Detecting Sybil attacks in vehicular ad hoc networks. International Journal of Parallel, Emergent and Distributed Systems, 36, 69\u201370.","journal-title":"International Journal of Parallel, Emergent and Distributed Systems"},{"issue":"46","key":"10287_CR18","doi-asserted-by":"publisher","first-page":"965","DOI":"10.1016\/j.procs.2015.01.006","volume":"22","author":"U Khan","year":"2015","unstructured":"Khan, U., Agrawala, S., & Silakari, S. (2015). Detection of malicious nodes (DMN) in vehicular ad-hoc networks. Procedia Computer Science, 22(46), 965\u2013972.","journal-title":"Procedia Computer Science"},{"issue":"1","key":"10287_CR19","doi-asserted-by":"publisher","first-page":"44","DOI":"10.22149\/teee.v3i1.130","volume":"3","author":"DAD Nascimento","year":"2019","unstructured":"Nascimento, D. A. D., Iano, Y., Loschi, H. J., Razmjooy, N., Sroufe, R., Oliveira, V. D. J. S., & Montagner, M. (2019). Sustainable Adoption of connected vehicles in the Brazilian landscape: Policies. Technical Specifications and Challenges Transactions on Environment and Electrical Engineering, 3(1), 44.","journal-title":"Technical Specifications and Challenges Transactions on Environment and Electrical Engineering"},{"key":"10287_CR20","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1016\/j.comcom.2013.12.005","volume":"41","author":"OA Wahab","year":"2014","unstructured":"Wahab, O. A., Otrok, H., & Mourad, A. (2014). A cooperative watchdog model based on Dempster Shafer for detecting misbehaving vehicles. Computer Communications, 41, 43\u201354.","journal-title":"Computer Communications"},{"key":"10287_CR21","unstructured":"Ghosh, M., Varghese, A., Gupta, A., Kherani, A., & Muthaiah, S. N. (2010) Detecting misbehaviour in VANET with integrated root-cause analysis. In Proceedings of the sixth ACM international workshop on Vehicular Inter networking, Association for Computing Machinery, vol. 8, pp. 123\u2013124"},{"key":"10287_CR22","doi-asserted-by":"publisher","first-page":"223","DOI":"10.3390\/fi14080223","volume":"14","author":"M Alkhalidy","year":"2022","unstructured":"Alkhalidy, M., Serhan, A. F., Alsarhan, A., & Igried, B. (2022). A new scheme for detecting malicious nodes in vehicular ad hoc networks based on monitoring node behavior. Future Internet, 14, 223.","journal-title":"Future Internet"},{"key":"10287_CR23","first-page":"27","volume":"2022","author":"X Xu","year":"2022","unstructured":"Xu, X., Wang, Y., & Wang, P. (2022). Comprehensive review on misbehaviour detection for vehicular ad-hoc networks. Hindawi Journal of Advanced Transportation, 2022, 27.","journal-title":"Hindawi Journal of Advanced Transportation"},{"issue":"5","key":"10287_CR24","doi-asserted-by":"publisher","first-page":"1897","DOI":"10.3390\/s22051897","volume":"22","author":"A Malik","year":"2022","unstructured":"Malik, A., Khan, M. Z., Faisal, M., Khan, F., & Seo, J. T. (2022). An efficient dynamic solution for the detection and prevention of black hole attack in VANETs. Sensors, 22(5), 1897.","journal-title":"Sensors"},{"key":"10287_CR25","doi-asserted-by":"publisher","first-page":"110561","DOI":"10.1016\/j.jss.2020.110561","volume":"165","author":"H Fatemidokht","year":"2020","unstructured":"Fatemidokht, H., & Rafsanjani, M. K. (2020). QMM-VANET: An efficient clustering algorithm based on QoS and monitoring of malicious vehicles in vehicular ad hoc networks. Journal of Systems and Software, 165, 110561.","journal-title":"Journal of Systems and Software"},{"key":"10287_CR26","doi-asserted-by":"publisher","first-page":"199618","DOI":"10.1109\/ACCESS.2020.3034327","volume":"8","author":"Z Hassan","year":"2020","unstructured":"Hassan, Z., Mehmood, A., Maple, C., Khan, M. A., & Aldegheishem, A. (2020). Intelligent detection of black hole attacks for secure communication in autonomous and connected vehicles. IEEE Access, 8, 199618\u2013199628.","journal-title":"IEEE Access"},{"key":"10287_CR27","doi-asserted-by":"publisher","first-page":"183532","DOI":"10.1109\/ACCESS.2019.2960367","volume":"7","author":"M Poongodi","year":"2019","unstructured":"Poongodi, M., Hamdi, M., Sharma, A., Ma, M., & Singh, P. K. (2019). DoS detection mechanism using trust-based evaluation system in VANET. IEEE Access, 7, 183532\u2013183544.","journal-title":"IEEE Access"},{"key":"10287_CR28","doi-asserted-by":"publisher","first-page":"47258","DOI":"10.1109\/ACCESS.2018.2864111","volume":"6","author":"C Iwendi","year":"2018","unstructured":"Iwendi, C., Uddin, M., Ansere, J. A., Nkurunziza, P., Anajemba, J. H., & Bashir, A. K. (2018). On detection of Sybil attack in large-scale VANETs using spider-monkey technique. IEEE Access, 6, 47258\u201347267.","journal-title":"IEEE Access"},{"key":"10287_CR29","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1016\/j.vehcom.2018.08.001","volume":"13","author":"A Oubabas","year":"2018","unstructured":"Oubabas, A., Aoudjit, R., Rodrigues, J. J. P. C., & Talbi, S. (2018). Secure and stable Vehicular Ad Hoc Network clustering algorithm based on hybrid mobility similarities and trust management scheme. Vehicular Communications, 13, 128\u2013138.","journal-title":"Vehicular Communications"},{"issue":"8","key":"10287_CR30","doi-asserted-by":"publisher","first-page":"1316","DOI":"10.1016\/j.jcss.2016.05.006","volume":"82","author":"X Liu","year":"2016","unstructured":"Liu, X., Xia, Y., Chen, W., Xiang, Y., Hassan, M. M., & Alelaiwi, A. (2016). SEMD: Secure and efficient message dissemination with policy enforcement in VANET. Journal of Computer and System Sciences, 82(8), 1316\u20131328.","journal-title":"Journal of Computer and System Sciences"},{"key":"10287_CR31","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1016\/j.ins.2016.08.024","volume":"372","author":"TBM De Sales","year":"2016","unstructured":"De Sales, T. B. M., Perkusich, A., de Sales, L. M., de Almeida, H. O., Soares, G., & de Sales, M. (2016). ASAP-V: A privacy-preserving authentication and sybil detection protocol for VANETs. Information Sciences, 372, 208\u2013224.","journal-title":"Information Sciences"},{"issue":"2","key":"10287_CR32","doi-asserted-by":"publisher","first-page":"1786","DOI":"10.1109\/TVT.2016.2565001","volume":"66","author":"H Hu","year":"2017","unstructured":"Hu, H., Lu, R., Zhang, Z., & Shao, J. (2017). REPLACE: A reliable trust-based platoon service recommendation scheme in VANET. IEEE Transactions on Vehicular Technology, 66(2), 1786\u20131797. https:\/\/doi.org\/10.1109\/TVT.2016.2565001","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"10287_CR33","first-page":"180","volume":"3","author":"H Badis","year":"2007","unstructured":"Badis, H., & Al Agha, K. (2007). Quality of service for the ad hoc optimized link state routing protocol (QOLSR). Digital Communications and Networks, 3, 180\u2013187.","journal-title":"Digital Communications and Networks"},{"issue":"4","key":"10287_CR34","doi-asserted-by":"publisher","first-page":"960","DOI":"10.1109\/TITS.2015.2494017","volume":"17","author":"W Li","year":"2015","unstructured":"Li, W., & Song, H. (2015). ART: An attack-resistant trust management scheme for securing vehicular ad hoc networks. IEEE Transactions on Intelligent Transportation Systems, 17(4), 960\u2013969.","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"issue":"6","key":"10287_CR35","doi-asserted-by":"publisher","first-page":"1042","DOI":"10.1016\/j.jcss.2014.12.016","volume":"81","author":"N Kumar","year":"2015","unstructured":"Kumar, N., Iqbal, R., Misra, S., & Rodrigues, J. J. P. C. (2015). An intelligent approach for building a secure decentralized public key infrastructure in VANET. Journal of Computer and System Sciences, 81(6), 1042\u20131058.","journal-title":"Journal of Computer and System Sciences"},{"key":"10287_CR36","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1016\/j.peva.2015.01.003","volume":"87","author":"L Mokdad","year":"2015","unstructured":"Mokdad, L., Ben-Othman, J., & Nguyen, A. T. (2015). DJAVAN: Detecting jamming attacks in vehicle ad hoc networks. Performance Evaluation, 87, 47\u201359.","journal-title":"Performance Evaluation"},{"issue":"8","key":"10287_CR37","doi-asserted-by":"publisher","first-page":"3657","DOI":"10.1109\/TVT.2014.2360883","volume":"64","author":"N Haddadou","year":"2014","unstructured":"Haddadou, N., Rachedi, A., & Doudane, Y. G. (2014). A job market signaling scheme for incentive and trust management in vehicular ad hoc networks. IEEE Transactions on Vehicular Technology, 64(8), 3657\u20133674.","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"6","key":"10287_CR38","doi-asserted-by":"publisher","first-page":"1981","DOI":"10.1016\/j.compeleceng.2014.01.009","volume":"40","author":"N Kumar","year":"2014","unstructured":"Kumar, N., & Chilamkurti, N. (2014). Collaborative trust aware intelligent intrusion detection in VANETs. Computers and Electrical Engineering, 40(6), 1981\u20131996.","journal-title":"Computers and Electrical Engineering"},{"key":"10287_CR39","doi-asserted-by":"crossref","unstructured":"Sultan, S., Javaid, Q., Malik, A. J., Turjman, F. A., & Attique, M. (2021). Collaborative\u2011trust approach toward malicious node detection in vehicular ad hoc networks. Environment, Development and Sustainability. 29.","DOI":"10.1007\/s10668-021-01632-5"},{"key":"10287_CR40","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1023\/A:1013941929408","volume":"5","author":"M Chatterjee","year":"2002","unstructured":"Chatterjee, M., Das, S. K., & Turgut, D. (2002). WCA: A weighted clustering algorithm for mobile ad hoc networks. Cluster Computing, 5, 193\u2013204.","journal-title":"Cluster Computing"},{"issue":"4","key":"10287_CR41","doi-asserted-by":"publisher","first-page":"1115","DOI":"10.1016\/j.aej.2015.07.011","volume":"54","author":"B Mokhtar","year":"2015","unstructured":"Mokhtar, B., & Azab, M. (2015). Survey on security issues in vehicular ad hoc networks. Alexandria Engineering Journal, 54(4), 1115.","journal-title":"Alexandria Engineering Journal"},{"key":"10287_CR42","doi-asserted-by":"publisher","first-page":"37","DOI":"10.3390\/jsan7030037","volume":"7","author":"R M\u00fchlbauer","year":"2018","unstructured":"M\u00fchlbauer, R., & Kleinschmidt, J. H. (2018). Bring your own reputation: A feasible trust system for vehicular ad hoc networks article. Journal of Sensor and Actuator Networks, 7, 37.","journal-title":"Journal of Sensor and Actuator Networks"},{"issue":"3","key":"10287_CR43","doi-asserted-by":"publisher","first-page":"6138251","DOI":"10.1155\/2016\/6138251","volume":"12","author":"J Wang","year":"2016","unstructured":"Wang, J., Zhang, Y., Wang, Y., & Gu, X. (2016). RPRep: a robust and privacy-preserving reputation management scheme for pseudonym-enabled VANETs. International Journal of Distributed Sensor Networks, 12(3), 6138251.","journal-title":"International Journal of Distributed Sensor Networks"},{"key":"10287_CR44","doi-asserted-by":"publisher","first-page":"62747","DOI":"10.1109\/ACCESS.2018.2875906","volume":"6","author":"AMR Tolba","year":"2018","unstructured":"Tolba, A. M. R. (2018). Trust-based distributed authentication method for collision attack avoidance in VANETs. IEEE Access, 6, 62747\u201362755.","journal-title":"IEEE Access"},{"key":"10287_CR45","first-page":"1","volume":"62","author":"M Arshad","year":"2018","unstructured":"Arshad, M., Ullah, Z., Ahmad, N., Khalid, M., Criuckshank, H., & Cao, Y. (2018). A survey of local\/cooperative-based malicious information detection techniques in VANETs. EURASIP Journal on Wireless Communications and Networking, 62, 1\u201317.","journal-title":"EURASIP Journal on Wireless Communications and Networking"},{"key":"10287_CR46","first-page":"575","volume":"10","author":"D Roy","year":"2017","unstructured":"Roy, D., & Das, P. (2017). Trust and group leader based model to avoid broadcast storm problem in vehicular ad-hoc networks. Advances in Computational Sciences and Technology, Research India Publications, 10, 575\u2013597.","journal-title":"Advances in Computational Sciences and Technology, Research India Publications"},{"issue":"2","key":"10287_CR47","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1109\/JCN.2013.000028","volume":"15","author":"YM Chen","year":"2013","unstructured":"Chen, Y. M., & Wei, Y. C. (2013). A beacon-based trust management system for enhancing user centric location privacy in VANETs. Journal of Communications and Networks, 15(2), 153\u2013163.","journal-title":"Journal of Communications and Networks"},{"issue":"1","key":"10287_CR48","doi-asserted-by":"publisher","first-page":"260","DOI":"10.1515\/comp-2022-0245","volume":"12","author":"C Gupta","year":"2022","unstructured":"Gupta, C., Singh, L., & Tiwari, R. (2022). Wormhole attack detection techniques in ad-hoc network: A systematic review. Open Computer Science, 12(1), 260\u2013288.","journal-title":"Open Computer Science"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-023-10287-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-023-10287-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-023-10287-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,24]],"date-time":"2023-04-24T15:19:38Z","timestamp":1682349578000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-023-10287-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,19]]},"references-count":48,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2023,5]]}},"alternative-id":["10287"],"URL":"https:\/\/doi.org\/10.1007\/s11277-023-10287-6","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,3,19]]},"assertion":[{"value":"24 February 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 March 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Authors have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}}]}}