{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,20]],"date-time":"2026-04-20T23:28:40Z","timestamp":1776727720132,"version":"3.51.2"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,10,20]],"date-time":"2023-10-20T00:00:00Z","timestamp":1697760000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,10,20]],"date-time":"2023-10-20T00:00:00Z","timestamp":1697760000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Comput Virol Hack Tech"],"DOI":"10.1007\/s11416-023-00505-x","type":"journal-article","created":{"date-parts":[[2023,10,20]],"date-time":"2023-10-20T09:02:51Z","timestamp":1697792571000},"page":"153-172","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":21,"title":["Using deep graph learning to improve dynamic analysis-based malware detection in PE files"],"prefix":"10.1007","volume":"20","author":[{"given":"Minh Tu","family":"Nguyen","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9818-4455","authenticated-orcid":false,"given":"Viet Hung","family":"Nguyen","sequence":"additional","affiliation":[]},{"given":"Nathan","family":"Shone","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,10,20]]},"reference":[{"key":"505_CR1","unstructured":"Skybox Security: Vulnerability and threat trends report 2021\u2014cybersecurity comes of age. Technical report, Skybox Security (2021)"},{"key":"505_CR2","unstructured":"Cybersecurity Statistics During the Spiraling Panic Around COVID-19. https:\/\/www.greycampus.com\/blog\/cybersecurity\/covid-cybersecurity-statistics\/. Accessed: 2021-06-23"},{"key":"505_CR3","unstructured":"A Not-So-Common Cold: Malware Statistics in 2021. https:\/\/dataprot.net\/statistics\/malware-statistics\/. Accessed: 2021-06-24"},{"key":"505_CR4","volume-title":"Practical Malware Analysis: The Hands-on Guide to Dissecting Malicious Software","author":"M Sikorski","year":"2012","unstructured":"Sikorski, M., Honig, A.: Practical Malware Analysis: The Hands-on Guide to Dissecting Malicious Software, 1st edn. No Starch Press, USA (2012)","edition":"1"},{"key":"505_CR5","doi-asserted-by":"publisher","unstructured":"He, K., Kim, D.-S.: Malware detection with malware images using deep learning techniques. In: 2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications\/13th IEEE International Conference on Big Data Science and Engineering (TrustCom\/BigDataSE), pp. 95\u2013102 (2019). https:\/\/doi.org\/10.1109\/TrustCom\/BigDataSE.2019.00022","DOI":"10.1109\/TrustCom\/BigDataSE.2019.00022"},{"key":"505_CR6","doi-asserted-by":"publisher","unstructured":"Bendiab, G., Shiaeles, S., Alruban, A., Kolokotronis, N.: IoT malware network traffic classification using visual representation and deep learning. In: 2020 6th IEEE Conference on Network Softwarization (NetSoft), pp. 444\u2013449 (2020). https:\/\/doi.org\/10.1109\/NetSoft48620.2020.9165381","DOI":"10.1109\/NetSoft48620.2020.9165381"},{"key":"505_CR7","doi-asserted-by":"publisher","unstructured":"Kishore, P., Barisal, S.K., Mohapatra, D.P.: An incremental malware detection model for meta-feature api and system call sequence. In: 2020 15th Conference on Computer Science and Information Systems (FedCSIS), pp. 629\u2013638 (2020). https:\/\/doi.org\/10.15439\/2020F73","DOI":"10.15439\/2020F73"},{"key":"505_CR8","doi-asserted-by":"publisher","unstructured":"Saxe, J., Berlin, K.: Deep neural network based malware detection using two dimensional binary program features. In: 2015 10th International Conference on Malicious and Unwanted Software (MALWARE), pp. 11\u201320 (2015). https:\/\/doi.org\/10.1109\/MALWARE.2015.7413680","DOI":"10.1109\/MALWARE.2015.7413680"},{"key":"505_CR9","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1109\/OJCS.2020.3033974","volume":"1","author":"T-L Wan","year":"2020","unstructured":"Wan, T.-L., Ban, T., Cheng, S.-M., Lee, Y.-T., Sun, B., Isawa, R., Takahashi, T., Inoue, D.: Efficient detection and classification of internet-of-things malware based on byte sequences from executable files. IEEE Open J. Comput. Soc. 1, 262\u2013275 (2020). https:\/\/doi.org\/10.1109\/OJCS.2020.3033974","journal-title":"IEEE Open J. Comput. Soc."},{"key":"505_CR10","doi-asserted-by":"publisher","unstructured":"Tobiyama, S., Yamaguchi, Y., Shimada, H., Ikuse, T., Yagi, T.: Malware detection with deep neural network using process behavior. In: 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC), vol. 2, pp. 577\u2013582 (2016). https:\/\/doi.org\/10.1109\/COMPSAC.2016.151","DOI":"10.1109\/COMPSAC.2016.151"},{"key":"505_CR11","doi-asserted-by":"publisher","unstructured":"W\u00fcchner, T., Ochoa, M., Pretschner, A.: Malware detection with quantitative data flow graphs. In: Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security. ASIA CCS \u201914, pp. 271\u2013282. Association for Computing Machinery, New York (2014). https:\/\/doi.org\/10.1145\/2590296.2590319","DOI":"10.1145\/2590296.2590319"},{"key":"505_CR12","doi-asserted-by":"publisher","unstructured":"Hung, N.V., Ngoc\u00a0Dung, P., Ngoc, T.N., Dinh\u00a0Phai, V., Shi, Q.: Malware detection based on directed multi-edge dataflow graph representation and convolutional neural network. In: 2019 11th International Conference on Knowledge and Systems Engineering (KSE), pp. 1\u20135 (2019). https:\/\/doi.org\/10.1109\/KSE.2019.8919284","DOI":"10.1109\/KSE.2019.8919284"},{"key":"505_CR13","doi-asserted-by":"publisher","first-page":"583","DOI":"10.1631\/FITEE.1601745","volume":"19","author":"B Yu","year":"2018","unstructured":"Yu, B., Fang, Y., Yang, Q., Tang, Y., Liu, L.: A survey of malware behavior description and analysis. Front. Inf. Technol. Electron. Eng. 19, 583\u2013603 (2018)","journal-title":"Front. Inf. Technol. Electron. Eng."},{"key":"505_CR14","doi-asserted-by":"publisher","first-page":"65889","DOI":"10.1109\/ACCESS.2019.2917668","volume":"7","author":"H Xue","year":"2019","unstructured":"Xue, H., Sun, S., Venkataramani, G., Lan, T.: Machine learning-based analysis of program binaries: a comprehensive study. IEEE Access 7, 65889\u201365912 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2917668","journal-title":"IEEE Access"},{"key":"505_CR15","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1016\/j.cose.2014.04.003","volume":"44","author":"Y Ding","year":"2014","unstructured":"Ding, Y., Dai, W., Yan, S., Zhang, Y.: Control flow-based opcode behavior analysis for malware detection. Comput. Secur. 44, 65\u201374 (2014). https:\/\/doi.org\/10.1016\/j.cose.2014.04.003","journal-title":"Comput. Secur."},{"issue":"6","key":"505_CR16","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/659101","volume":"11","author":"Y Ki","year":"2015","unstructured":"Ki, Y., Kim, E., Kim, H.K.: A novel approach to detect malware based on API call sequence analysis. Int. J. Distrib. Sens. Netw. 11(6), 659101 (2015). https:\/\/doi.org\/10.1155\/2015\/659101","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"505_CR17","doi-asserted-by":"publisher","unstructured":"Tran, T.K., Sato, H.: NLP-based approaches for malware classification from API sequences. In: 2017 21st Asia Pacific Symposium on Intelligent and Evolutionary Systems (IES), pp. 101\u2013105 (2017). https:\/\/doi.org\/10.1109\/IESYS.2017.8233569","DOI":"10.1109\/IESYS.2017.8233569"},{"key":"505_CR18","doi-asserted-by":"publisher","unstructured":"Pascanu, R., Stokes, J.W., Sanossian, H., Marinescu, M., Thomas, A.: Malware classification with recurrent networks. In: 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1916\u20131920 (2015). https:\/\/doi.org\/10.1109\/ICASSP.2015.7178304","DOI":"10.1109\/ICASSP.2015.7178304"},{"key":"505_CR19","doi-asserted-by":"publisher","unstructured":"Kolosnjaji, B., Eraisha, G., Webster, G., Zarras, A., Eckert, C.: Empowering convolutional networks for malware classification and analysis. In: 2017 International Joint Conference on Neural Networks (IJCNN), pp. 3838\u20133845 (2017). https:\/\/doi.org\/10.1109\/IJCNN.2017.7966340","DOI":"10.1109\/IJCNN.2017.7966340"},{"key":"505_CR20","unstructured":"Wang, X., Yiu, S.: A multi-task learning model for malware classification with useful file access pattern from API call sequence. CoRR (2016) arXiv:1610.05945"},{"issue":"4","key":"505_CR21","doi-asserted-by":"publisher","first-page":"3979","DOI":"10.1007\/s11042-017-5104-0","volume":"78","author":"X Xiao","year":"2019","unstructured":"Xiao, X., Zhang, S., Mercaldo, F., Hu, G., Sangaiah, A.K.: Android malware detection based on system call sequences and LSTM. Multimed. Tools Appl. 78(4), 3979\u20133999 (2019). https:\/\/doi.org\/10.1007\/s11042-017-5104-0","journal-title":"Multimed. Tools Appl."},{"key":"505_CR22","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1016\/j.future.2018.07.045","volume":"90","author":"S Homayoun","year":"2019","unstructured":"Homayoun, S., Dehghantanha, A., Ahmadzadeh, M., Hashemi, S., Khayami, R., Choo, K.-K.R., Newton, D.E.: DRTHIS: deep ransomware threat hunting and intelligence system at the fog layer. Futur. Gener. Comput. Syst. 90, 94\u2013104 (2019). https:\/\/doi.org\/10.1016\/j.future.2018.07.045","journal-title":"Futur. Gener. Comput. Syst."},{"key":"505_CR23","doi-asserted-by":"publisher","unstructured":"Qin, B., Wang, Y., Ma, C.: API call based ransomware dynamic detection approach using textCNN. In: 2020 International Conference on Big Data, Artificial Intelligence and Internet of Things Engineering (ICBAIE), pp. 162\u2013166 (2020). https:\/\/doi.org\/10.1109\/ICBAIE49996.2020.00041","DOI":"10.1109\/ICBAIE49996.2020.00041"},{"key":"505_CR24","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1007\/978-3-030-12942-2_19","volume-title":"Innovative Security Solutions for Information Technology and Communications","author":"AG Kakisim","year":"2019","unstructured":"Kakisim, A.G., Nar, M., Carkaci, N., Sogukpinar, I.: Analysis and evaluation of dynamic feature-based malware detection methods. In: Lanet, J.-L., Toma, C. (eds.) Innovative Security Solutions for Information Technology and Communications, pp. 247\u2013258. Springer, Cham (2019)"},{"key":"505_CR25","doi-asserted-by":"publisher","unstructured":"Bai, J.R., An, Z.Z., Zou, G.Z., Mu, S.G.: A dynamic malware detection approach by mining the frequency of API calls. In: Computer and Information Technology. Applied Mechanics and Materials, vol. 519, pp. 309\u2013312. Trans Tech Publications Ltd (2014). https:\/\/doi.org\/10.4028\/www.scientific.net\/AMM.519-520.309","DOI":"10.4028\/www.scientific.net\/AMM.519-520.309"},{"issue":"6","key":"505_CR26","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/659101","volume":"11","author":"Y Ki","year":"2015","unstructured":"Ki, Y., Kim, E., Kim, H.K.: A novel approach to detect malware based on API call sequence analysis. Int. J. Distrib. Sens. Netw. 11(6), 659101 (2015). https:\/\/doi.org\/10.1155\/2015\/659101","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"505_CR27","doi-asserted-by":"publisher","unstructured":"Alazab, M., Venkataraman, S., Watters, P.: Towards understanding malware behaviour by the extraction of API calls. In: 2010 Second Cybercrime and Trustworthy Computing Workshop, pp. 52\u201359 (2010). https:\/\/doi.org\/10.1109\/CTC.2010.8","DOI":"10.1109\/CTC.2010.8"},{"key":"505_CR28","doi-asserted-by":"publisher","unstructured":"Salehi, Z., Ghiasi, M., Sami, A.: A miner for malware detection based on API function calls and their arguments. In: The 16th CSI International Symposium on Artificial Intelligence and Signal Processing (AISP 2012), pp. 563\u2013568 (2012). https:\/\/doi.org\/10.1109\/AISP.2012.6313810","DOI":"10.1109\/AISP.2012.6313810"},{"issue":"6","key":"505_CR29","doi-asserted-by":"publisher","first-page":"1455","DOI":"10.1109\/TIFS.2018.2879302","volume":"14","author":"H Cai","year":"2019","unstructured":"Cai, H., Meng, N., Ryder, B., Yao, D.: DroidCat: effective android malware detection and categorization via app-level profiling. IEEE Trans. Inf. Forensics Secur. 14(6), 1455\u20131470 (2019). https:\/\/doi.org\/10.1109\/TIFS.2018.2879302","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"6","key":"505_CR30","doi-asserted-by":"publisher","first-page":"1252","DOI":"10.1109\/TIFS.2016.2523912","volume":"11","author":"K Xu","year":"2016","unstructured":"Xu, K., Li, Y., Deng, R.H.: ICCDetector: ICC-based malware detection on android. IEEE Trans. Inf. Forensics Secur. 11(6), 1252\u20131264 (2016). https:\/\/doi.org\/10.1109\/TIFS.2016.2523912","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"505_CR31","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1007\/s11416-011-0152-x","volume":"7","author":"B Anderson","year":"2011","unstructured":"Anderson, B., Quist, D., Neil, J., Storlie, C., Lane, T.: Graph-based malware detection using dynamic analysis. J. Comput. Virol. 7, 247\u2013258 (2011). https:\/\/doi.org\/10.1007\/s11416-011-0152-x","journal-title":"J. Comput. Virol."},{"issue":"12","key":"505_CR32","doi-asserted-by":"publisher","first-page":"2591","DOI":"10.1109\/TIFS.2015.2469253","volume":"10","author":"S Naval","year":"2015","unstructured":"Naval, S., Laxmi, V., Rajarajan, M., Gaur, M.S., Conti, M.: Employing program semantics for malware detection. IEEE Trans. Inf. Forensics Secur. 10(12), 2591\u20132604 (2015). https:\/\/doi.org\/10.1109\/TIFS.2015.2469253","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"505_CR33","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/s11416-016-0267-1","volume":"13","author":"SD Nikolopoulos","year":"2016","unstructured":"Nikolopoulos, S.D., Polenakis, I.: A graph-based model for malware detection and classification using system-call groups. J. Comput. Virol. Hacking Tech. 13, 29\u201346 (2016)","journal-title":"J. Comput. Virol. Hacking Tech."},{"key":"505_CR34","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1016\/j.cose.2017.10.007","volume":"73","author":"Y Ding","year":"2018","unstructured":"Ding, Y., Xia, X., Chen, S., Li, Y.: A malware detection method based on family behavior graph. Comput. Secur. 73, 73\u201386 (2018). https:\/\/doi.org\/10.1016\/j.cose.2017.10.007","journal-title":"Comput. Secur."},{"key":"505_CR35","doi-asserted-by":"publisher","unstructured":"Zhang, S., Zhou, Z., Li, D., Zhong, Y., Liu, Q., Yang, W., Li, S.: Attributed heterogeneous graph neural network for malicious domain detection. In: 2021 IEEE 24th International Conference on Computer Supported Cooperative Work in Design (CSCWD), pp. 397\u2013403 (2021). https:\/\/doi.org\/10.1109\/CSCWD49262.2021.9437852","DOI":"10.1109\/CSCWD49262.2021.9437852"},{"key":"505_CR36","doi-asserted-by":"publisher","first-page":"44652","DOI":"10.1109\/ACCESS.2020.2978335","volume":"8","author":"Y Zhang","year":"2020","unstructured":"Zhang, Y., Chang, X., Lin, Y., Mi\u0160i\u0107, J., Mi\u0160i\u0107, V.B.: Exploring function call graph vectorization and file statistical features in malicious PE file classification. IEEE Access 8, 44652\u201344660 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.2978335","journal-title":"IEEE Access"},{"key":"505_CR37","doi-asserted-by":"publisher","unstructured":"Jiang, J., Liu, Z., Yu, M., Li, G., Li, S., Liu, C., Huang, W.: HeterSupervise: package-level android malware analysis based on heterogeneous graph. In: 2020 IEEE 22nd International Conference on High Performance Computing and Communications; IEEE 18th International Conference on Smart City; IEEE 6th International Conference on Data Science and Systems (HPCC\/SmartCity\/DSS), pp. 328\u2013335 (2020). https:\/\/doi.org\/10.1109\/HPCC-SmartCity-DSS50907.2020.00040","DOI":"10.1109\/HPCC-SmartCity-DSS50907.2020.00040"},{"key":"505_CR38","unstructured":"Chen, K.Z., Johnson, N.M., D\u2019Silva, V., Dai, S., MacNamara, K., Magrino, T.R., Wu, E.X., Rinard, M., Song, D.X.: Contextual policy enforcement in android applications with permission event graphs. In: 2013 20th Network and Distributed System Security Symposium (NDSS\u201913), vol. 234 (2013)"},{"key":"505_CR39","doi-asserted-by":"publisher","unstructured":"Atici, M.A., Sagiroglu, S., Dogru, I.A.: Android malware analysis approach based on control flow graphs and machine learning algorithms. In: 2016 4th International Symposium on Digital Forensic and Security (ISDFS), pp. 26\u201331 (2016). https:\/\/doi.org\/10.1109\/ISDFS.2016.7473512","DOI":"10.1109\/ISDFS.2016.7473512"},{"key":"505_CR40","doi-asserted-by":"publisher","first-page":"21235","DOI":"10.1109\/ACCESS.2019.2896003","volume":"7","author":"Z Ma","year":"2019","unstructured":"Ma, Z., Ge, H., Liu, Y., Zhao, M., Ma, J.: A combination method for android malware detection based on control flow graphs and machine learning algorithms. IEEE Access 7, 21235\u201321245 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2896003","journal-title":"IEEE Access"},{"key":"505_CR41","doi-asserted-by":"publisher","first-page":"99024","DOI":"10.1109\/ACCESS.2021.3094517","volume":"9","author":"SA Ebad","year":"2021","unstructured":"Ebad, S.A., Darem, A., Abawajy, J.H.: Measuring software obfuscation quality-a systematic literature review. IEEE Access 9, 99024\u201399038 (2021)","journal-title":"IEEE Access"},{"issue":"1","key":"505_CR42","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/TNNLS.2020.2978386","volume":"32","author":"Z Wu","year":"2021","unstructured":"Wu, Z., Pan, S., Chen, F., Long, G., Zhang, C., Yu, P.S.: A comprehensive survey on graph neural networks. IEEE Trans. Neural Netw. Learn. Syst. 32(1), 4\u201324 (2021). https:\/\/doi.org\/10.1109\/TNNLS.2020.2978386","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"505_CR43","unstructured":"Zhou, J., Cui, G., Zhang, Z., Yang, C., Liu, Z., Sun, M.: Graph neural networks: a review of methods and applications. CoRR (2018) arXiv:1812.08434"},{"key":"505_CR44","doi-asserted-by":"publisher","unstructured":"Wang, X., Ji, H., Shi, C., Wang, B., Ye, Y., Cui, P., Yu, P.S.: Heterogeneous graph attention network. In: The World Wide Web Conference. WWW \u201919, pp. 2022\u20132032. Association for Computing Machinery, New York (2019). https:\/\/doi.org\/10.1145\/3308558.3313562","DOI":"10.1145\/3308558.3313562"},{"key":"505_CR45","doi-asserted-by":"crossref","unstructured":"Tu, N.M., Hung, N.V., Anh, P.V., Van Loi, C., Shone, N.: Detecting malware based on dynamic analysis techniques using deep graph learning. In: Dang, T.K., K\u00fcng, J., Takizawa, M., Chung, T.M. (eds.) Future Data and Security Engineering, pp. 357\u2013378. Springer, Cham (2020)","DOI":"10.1007\/978-3-030-63924-2_21"},{"key":"505_CR46","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/978-3-030-16657-1_9","volume-title":"Intelligent Systems Design and Applications","author":"J Mathew","year":"2020","unstructured":"Mathew, J., Ajay Kumara, M.A.: API call based malware detection approach using recurrent neural network\u2014LSTM. In: Abraham, A., Cherukuri, A.K., Melin, P., Gandhi, N. (eds.) Intelligent Systems Design and Applications, pp. 87\u201399. Springer, Cham (2020)"},{"key":"505_CR47","doi-asserted-by":"publisher","unstructured":"Perozzi, B., Al-Rfou, R., Skiena, S.: DeepWalk: online learning of social representations. In: Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. KDD \u201914, pp. 701\u2013710. Association for Computing Machinery, New York (2014). https:\/\/doi.org\/10.1145\/2623330.2623732","DOI":"10.1145\/2623330.2623732"},{"key":"505_CR48","doi-asserted-by":"publisher","unstructured":"He, Y., Song, Y., Li, J., Ji, C., Peng, J., Peng, H.: HeteSpaceyWalk: a heterogeneous spacey random walk for heterogeneous information network embedding. In: Proceedings of the 28th ACM International Conference on Information and Knowledge Management. CIKM \u201919, pp. 639\u2013648. Association for Computing Machinery, New York (2019). https:\/\/doi.org\/10.1145\/3357384.3358061","DOI":"10.1145\/3357384.3358061"}],"container-title":["Journal of Computer Virology and Hacking Techniques"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-023-00505-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11416-023-00505-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-023-00505-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,23]],"date-time":"2024-02-23T11:24:29Z","timestamp":1708687469000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11416-023-00505-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,20]]},"references-count":48,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024,3]]}},"alternative-id":["505"],"URL":"https:\/\/doi.org\/10.1007\/s11416-023-00505-x","relation":{},"ISSN":["2263-8733"],"issn-type":[{"value":"2263-8733","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,10,20]]},"assertion":[{"value":"28 September 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 September 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 October 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}