{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T15:33:25Z","timestamp":1772120005432,"version":"3.50.1"},"reference-count":59,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,6,7]],"date-time":"2019-06-07T00:00:00Z","timestamp":1559865600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,6,7]],"date-time":"2019-06-07T00:00:00Z","timestamp":1559865600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/100011541","name":"Division of Cancer Epidemiology and Genetics, National Cancer Institute","doi-asserted-by":"publisher","award":["P30 CA008748"],"award-info":[{"award-number":["P30 CA008748"]}],"id":[{"id":"10.13039\/100011541","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Theory Biosci."],"published-print":{"date-parts":[[2020,2]]},"DOI":"10.1007\/s12064-019-00295-1","type":"journal-article","created":{"date-parts":[[2019,6,7]],"date-time":"2019-06-07T03:02:39Z","timestamp":1559876559000},"page":"87-93","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Do cells use passwords in cell-state transitions? Is cell signaling sometimes encrypted?"],"prefix":"10.1007","volume":"139","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1206-7010","authenticated-orcid":false,"given":"Alex","family":"Root","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,7]]},"reference":[{"key":"295_CR1","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1038\/nchembio.2576","volume":"14","author":"R Aebersold","year":"2018","unstructured":"Aebersold R et al (2018) How many human proteoforms are there? Nat Chem Biol 14:206\u2013214","journal-title":"Nat Chem Biol"},{"key":"295_CR2","doi-asserted-by":"publisher","first-page":"867","DOI":"10.1038\/nrmicro2452","volume":"8","author":"VI Agol","year":"2010","unstructured":"Agol VI, Gmyl AP (2010) Viral security proteins: counteracting host defences. Nat Rev Microbiol 8:867\u2013878","journal-title":"Nat Rev Microbiol"},{"key":"295_CR3","doi-asserted-by":"publisher","first-page":"e0186324","DOI":"10.1371\/journal.pone.0186324","volume":"12","author":"T Ahsendorf","year":"2017","unstructured":"Ahsendorf T, Muller FJ, Topkar V, Gunawardena J, Eils R (2017) Transcription factors, coregulators, and epigenetic marks are linearly correlated and highly redundant. PLoS ONE 12:e0186324","journal-title":"PLoS ONE"},{"key":"295_CR4","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1038\/35019019","volume":"406","author":"R Albert","year":"2000","unstructured":"Albert R, Jeong H, Barabasi AL (2000) Error and attack tolerance of complex networks. Nature 406:378\u2013382","journal-title":"Nature"},{"key":"295_CR5","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1038\/nri980","volume":"3","author":"A Alcami","year":"2003","unstructured":"Alcami A (2003) Viral mimicry of cytokines, chemokines and their receptors. Nat Rev Immunol 3:36\u201350","journal-title":"Nat Rev Immunol"},{"key":"295_CR6","doi-asserted-by":"publisher","first-page":"a006114","DOI":"10.1101\/cshperspect.a006114","volume":"4","author":"NM Alto","year":"2012","unstructured":"Alto NM, Orth K (2012) Subversion of cell signaling by pathogens. Cold Spring Harb Perspect Biol 4:a006114","journal-title":"Cold Spring Harb Perspect Biol"},{"key":"295_CR7","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1038\/sj.cdd.4400950","volume":"9","author":"JC Ameisen","year":"2002","unstructured":"Ameisen JC (2002) On the origin, evolution, and nature of programmed cell death: a timeline of four billion years. Cell Death Differ 9:367\u2013393","journal-title":"Cell Death Differ"},{"key":"295_CR8","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.coisb.2016.12.003","volume":"1","author":"YE Antebi","year":"2017","unstructured":"Antebi YE, Nandagopal N, Elowitz MB (2017a) An operational view of intercellular signaling pathways. Curr Opin Syst Biol 1:16\u201324","journal-title":"Curr Opin Syst Biol"},{"key":"295_CR9","doi-asserted-by":"publisher","first-page":"1184","DOI":"10.1016\/j.cell.2017.08.015","volume":"170","author":"YE Antebi","year":"2017","unstructured":"Antebi YE et al (2017b) Combinatorial signal perception in the BMP pathway. Cell 170:1184\u20131196 e24","journal-title":"Cell"},{"key":"295_CR10","doi-asserted-by":"publisher","first-page":"a005934","DOI":"10.1101\/cshperspect.a005934","volume":"7","author":"EU Azeloglu","year":"2015","unstructured":"Azeloglu EU, Iyengar R (2015) Signaling networks: information flow, computation, and decision making. Cold Spring Harb Perspect Biol 7:a005934","journal-title":"Cold Spring Harb Perspect Biol"},{"key":"295_CR11","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1038\/nature23461","volume":"549","author":"DJ Bernstein","year":"2017","unstructured":"Bernstein DJ, Lange T (2017) Post-quantum cryptography. Nature 549:188\u2013194","journal-title":"Nature"},{"key":"295_CR12","doi-asserted-by":"publisher","first-page":"720","DOI":"10.1126\/science.aab2956","volume":"351","author":"L Bintu","year":"2016","unstructured":"Bintu L et al (2016) Dynamics of epigenetic regulation at the single-cell level. Science 351:720\u2013724","journal-title":"Science"},{"key":"295_CR13","doi-asserted-by":"publisher","first-page":"2397","DOI":"10.1210\/en.2018-00149","volume":"159","author":"MF Broekema","year":"2018","unstructured":"Broekema MF et al (2018) Profiling of 3696 nuclear receptor\u2013coregulator interactions: a resource for biological and clinical discovery. Endocrinology 159:2397\u20132407","journal-title":"Endocrinology"},{"key":"295_CR14","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1016\/j.jbiotec.2016.03.044","volume":"226","author":"TD Brunet","year":"2016","unstructured":"Brunet TD (2016) Aims and methods of biosteganography. J Biotechnol 226:56\u201364","journal-title":"J Biotechnol"},{"key":"295_CR15","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1016\/j.jtbi.2016.08.038","volume":"410","author":"J Burns","year":"2016","unstructured":"Burns J et al (2016) Recurring patterns among scrambled genes in the encrypted genome of the ciliate Oxytricha trifallax. J Theor Biol 410:171\u2013180","journal-title":"J Theor Biol"},{"key":"295_CR16","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1016\/j.jtbi.2018.05.038","volume":"454","author":"R Cazzolla Gatti","year":"2018","unstructured":"Cazzolla Gatti R, Fath B, Hordijk W, Kauffman S, Ulanowicz R (2018) Niche emergence as an autocatalytic process in the evolution of ecosystems. J Theor Biol 454:110\u2013117","journal-title":"J Theor Biol"},{"key":"295_CR17","doi-asserted-by":"publisher","first-page":"1041","DOI":"10.1016\/j.cell.2016.07.007","volume":"166","author":"JM Drake","year":"2016","unstructured":"Drake JM et al (2016) Phosphoproteome integration reveals patient-specific networks in prostate cancer. Cell 166:1041\u20131054","journal-title":"Cell"},{"key":"295_CR18","doi-asserted-by":"publisher","first-page":"13398","DOI":"10.1073\/pnas.0506597102","volume":"102","author":"HA Ebhardt","year":"2005","unstructured":"Ebhardt HA, Thi EP, Wang MB, Unrau PJ (2005) Extensive 3\u2019 modification of plant small RNAs is modulated by helper component-proteinase expression. Proc Natl Acad Sci USA 102:13398\u201313403","journal-title":"Proc Natl Acad Sci USA"},{"key":"295_CR19","doi-asserted-by":"publisher","first-page":"659","DOI":"10.1146\/annurev.cellbio.21.022404.142018","volume":"21","author":"XH Feng","year":"2005","unstructured":"Feng XH, Derynck R (2005) Specificity and versatility in TGF-beta signaling through Smads. Annu Rev Cell Dev Biol 21:659\u2013693","journal-title":"Annu Rev Cell Dev Biol"},{"key":"295_CR20","volume-title":"Codes, ciphers, and secret writing","author":"M Gardner","year":"1972","unstructured":"Gardner M (1972) Codes, ciphers, and secret writing. Dover Publications Inc, New York"},{"key":"295_CR21","doi-asserted-by":"publisher","first-page":"24456","DOI":"10.1038\/srep24456","volume":"6","author":"AJ Gates","year":"2016","unstructured":"Gates AJ, Rocha LM (2016) Control of complex networks requires both structure and dynamics. Sci Rep 6:24456","journal-title":"Sci Rep"},{"key":"295_CR22","doi-asserted-by":"publisher","first-page":"587","DOI":"10.1038\/nature08533","volume":"462","author":"T Graf","year":"2009","unstructured":"Graf T, Enver T (2009) Forcing cells to change lineages. Nature 462:587\u2013594","journal-title":"Nature"},{"key":"295_CR23","doi-asserted-by":"publisher","first-page":"646","DOI":"10.1016\/j.cell.2011.02.013","volume":"144","author":"D Hanahan","year":"2011","unstructured":"Hanahan D, Weinberg RA (2011) Hallmarks of cancer: the next generation. Cell 144:646\u2013674","journal-title":"Cell"},{"key":"295_CR24","doi-asserted-by":"publisher","first-page":"416","DOI":"10.1016\/S0167-4048(97)82246-8","volume":"16","author":"HJ Highland","year":"1997","unstructured":"Highland HJ (1997) History of computer viruses. Comput Secur 16:416\u2013429","journal-title":"Comput Secur"},{"key":"295_CR25","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1016\/0092-8674(85)90133-3","volume":"40","author":"L Hood","year":"1985","unstructured":"Hood L, Kronenberg M, Hunkapiller T (1985) T cell antigen receptors and the immunoglobulin supergene family. Cell 40:225\u2013229","journal-title":"Cell"},{"key":"295_CR26","doi-asserted-by":"publisher","first-page":"3343","DOI":"10.1080\/15384101.2016.1238119","volume":"15","author":"US Kamaraj","year":"2016","unstructured":"Kamaraj US, Gough J, Polo JM, Petretto E, Rackham OJ (2016) Computational methods for direct cell conversion. Cell Cycle 15:3343\u20133354","journal-title":"Cell Cycle"},{"key":"295_CR27","doi-asserted-by":"publisher","first-page":"e1603076","DOI":"10.1126\/sciadv.1603076","volume":"3","author":"AH Knoll","year":"2017","unstructured":"Knoll AH, Nowak MA (2017) The timetable of evolution. Sci Adv 3:e1603076","journal-title":"Sci Adv"},{"key":"295_CR28","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1016\/j.virol.2015.02.039","volume":"479\u2013480","author":"EV Koonin","year":"2015","unstructured":"Koonin EV, Dolja VV, Krupovic M (2015) Origins and evolution of viruses of eukaryotes: the ultimate modularity. Virology 479\u2013480:2\u201325","journal-title":"Virology"},{"key":"295_CR29","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1016\/j.jtbi.2011.01.051","volume":"276","author":"DC Krakauer","year":"2011","unstructured":"Krakauer DC et al (2011) The challenges and scope of theoretical biology. J Theor Biol 276:269\u2013276","journal-title":"J Theor Biol"},{"key":"295_CR30","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/s12064-016-0239-5","volume":"135","author":"DC Krakauer","year":"2016","unstructured":"Krakauer DC, Muller L, Prohaska SJ, Stadler PF (2016) Design specifications for cellular regulation. Theory Biosci 135:231\u2013240","journal-title":"Theory Biosci"},{"key":"295_CR31","doi-asserted-by":"publisher","first-page":"e1602565","DOI":"10.1126\/sciadv.1602565","volume":"3","author":"E Lara","year":"2017","unstructured":"Lara E et al (2017) Unveiling the role and life strategies of viruses from the surface to the dark ocean. Sci Adv 3:e1602565","journal-title":"Sci Adv"},{"key":"295_CR32","volume-title":"Hackers","author":"S Levy","year":"2010","unstructured":"Levy S (2010) Hackers. O\u2019Reilly Media, Sebastopol"},{"key":"295_CR33","doi-asserted-by":"publisher","first-page":"e1003165","DOI":"10.1371\/journal.pcbi.1003165","volume":"9","author":"C Li","year":"2013","unstructured":"Li C, Wang J (2013) Quantifying cell fate decisions for differentiation and reprogramming of a human stem cell network: landscape and biological paths. PLoS Comput Biol 9:e1003165","journal-title":"PLoS Comput Biol"},{"key":"295_CR34","doi-asserted-by":"publisher","first-page":"26810","DOI":"10.1038\/srep26810","volume":"6","author":"A Li","year":"2016","unstructured":"Li A, Hu Q, Liu J, Pan Y (2016) Resistance and security index of networks: structural information perspective of network security. Sci Rep 6:26810","journal-title":"Sci Rep"},{"key":"295_CR35","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1038\/nature10011","volume":"473","author":"YY Liu","year":"2011","unstructured":"Liu YY, Slotine JJ, Barabasi AL (2011) Controllability of complex networks. Nature 473:167\u2013173","journal-title":"Nature"},{"key":"295_CR36","doi-asserted-by":"publisher","first-page":"2831","DOI":"10.1099\/vir.0.067884-0","volume":"95","author":"NI Lukhovitskaya","year":"2014","unstructured":"Lukhovitskaya NI et al (2014) A viral transcription factor exhibits antiviral RNA silencing suppression activity independent of its nuclear localization. J Gen Virol 95:2831\u20132837","journal-title":"J Gen Virol"},{"key":"295_CR37","doi-asserted-by":"publisher","first-page":"1678","DOI":"10.1002\/cphc.201700506","volume":"18","author":"O Lustgarten","year":"2017","unstructured":"Lustgarten O, Motiei L, Margulies D (2017) User authorization at the molecular scale. ChemPhysChem 18:1678\u20131687","journal-title":"ChemPhysChem"},{"key":"295_CR38","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1016\/j.celrep.2013.11.045","volume":"6","author":"C McKinney","year":"2014","unstructured":"McKinney C et al (2014) Global reprogramming of the cellular translational landscape facilitates cytomegalovirus replication. Cell Rep 6:9\u201317","journal-title":"Cell Rep"},{"key":"295_CR39","doi-asserted-by":"publisher","first-page":"3387","DOI":"10.1016\/j.jmb.2016.07.007","volume":"428","author":"C Miller","year":"2016","unstructured":"Miller C, Celli J (2016) Avoidance and subversion of eukaryotic homeostatic autophagy mechanisms by bacterial pathogens. J Mol Biol 428:3387\u20133398","journal-title":"J Mol Biol"},{"key":"295_CR40","doi-asserted-by":"publisher","first-page":"621","DOI":"10.1111\/cmi.12432","volume":"17","author":"JH Moffatt","year":"2015","unstructured":"Moffatt JH, Newton P, Newton HJ (2015) Coxiella burnetii: turning hostility into a home. Cell Microbiol 17:621\u2013631","journal-title":"Cell Microbiol"},{"key":"295_CR41","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.semcdb.2015.12.007","volume":"51","author":"Z Mousavian","year":"2016","unstructured":"Mousavian Z, Kavousi K, Masoudi-Nejad A (2016a) Information theory in systems biology. Part I: gene regulatory and metabolic networks. Semin Cell Dev Biol 51:3\u201313","journal-title":"Semin Cell Dev Biol"},{"key":"295_CR42","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1016\/j.semcdb.2015.12.006","volume":"51","author":"Z Mousavian","year":"2016","unstructured":"Mousavian Z, Diaz J, Masoudi-Nejad A (2016b) Information theory in systems biology. Part II: protein\u2013protein interaction and signaling networks. Semin Cell Dev Biol 51:14\u201323","journal-title":"Semin Cell Dev Biol"},{"key":"295_CR43","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1093\/molbev\/mst184","volume":"31","author":"K Mukherjee","year":"2014","unstructured":"Mukherjee K, Korithoski B, Kolaczkowski B (2014) Ancient origins of vertebrate-specific innate antiviral immunity. Mol Biol Evol 31:140\u2013153","journal-title":"Mol Biol Evol"},{"key":"295_CR44","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1016\/j.csbj.2016.05.005","volume":"14","author":"P Pinweha","year":"2016","unstructured":"Pinweha P, Rattanapornsompong K, Charoensawan V, Jitrapakdee S (2016) MicroRNAs and oncogenic transcriptional regulatory networks controlling metabolic reprogramming in cancers. Comput Struct Biotechnol J 14:223\u2013233","journal-title":"Comput Struct Biotechnol J"},{"key":"295_CR45","doi-asserted-by":"publisher","first-page":"664","DOI":"10.1016\/j.cels.2018.05.004","volume":"6","author":"S Sampattavanich","year":"2018","unstructured":"Sampattavanich S et al (2018) Encoding growth factor identity in the temporal dynamics of FOXO3 under the combinatorial control of ERK and AKT kinases. Cell Syst 6:664\u2013678","journal-title":"Cell Syst"},{"key":"295_CR46","first-page":"3","volume":"32","author":"S Sirisinha","year":"2014","unstructured":"Sirisinha S (2014) Evolutionary insights into the origin of innate and adaptive immune systems: different shades of grey. Asian Pac J Allergy Immunol 32:3\u201315","journal-title":"Asian Pac J Allergy Immunol"},{"key":"295_CR47","doi-asserted-by":"publisher","first-page":"838","DOI":"10.1002\/1873-3468.12977","volume":"592","author":"EA Spickard","year":"2018","unstructured":"Spickard EA, Joshi PM, Rothman JH (2018) The multipotency-to-commitment transition in Caenorhabditis elegans-implications for reprogramming from cells to organs. FEBS Lett 592:838\u2013851","journal-title":"FEBS Lett"},{"key":"295_CR48","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1038\/47412","volume":"403","author":"BD Strahl","year":"2000","unstructured":"Strahl BD, Allis CD (2000) The language of covalent histone modifications. Nature 403:41\u201345","journal-title":"Nature"},{"key":"295_CR49","doi-asserted-by":"publisher","first-page":"413","DOI":"10.1038\/clpt.2014.8","volume":"95","author":"TJ Stuhlmiller","year":"2014","unstructured":"Stuhlmiller TJ, Earp HS, Johnson GL (2014) Adaptive reprogramming of the breast cancer kinome. Clin Pharmacol Ther 95:413\u2013415","journal-title":"Clin Pharmacol Ther"},{"key":"295_CR50","doi-asserted-by":"publisher","DOI":"10.1201\/9781439833032","volume-title":"Information security management handbook","author":"HF Tipton","year":"2007","unstructured":"Tipton HF, Krause M (2007) Information security management handbook, vol 3280. CRC Press, Boca Raton"},{"key":"295_CR51","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1016\/j.jbior.2014.04.001","volume":"55","author":"A Toker","year":"2014","unstructured":"Toker A, Marmiroli S (2014) Signaling specificity in the Akt pathway in biology and disease. Adv Biol Regul 55:28\u201338","journal-title":"Adv Biol Regul"},{"key":"295_CR52","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1016\/j.semcdb.2015.12.011","volume":"51","author":"S Uda","year":"2016","unstructured":"Uda S, Kuroda S (2016) Analysis of cellular signal transduction from an information theoretic approach. Semin Cell Dev Biol 51:24\u201331","journal-title":"Semin Cell Dev Biol"},{"key":"295_CR53","doi-asserted-by":"publisher","first-page":"26234","DOI":"10.1038\/srep26234","volume":"6","author":"M Uhart","year":"2016","unstructured":"Uhart M, Flores G, Bustos DM (2016) Controllability of protein\u2013protein interaction phosphorylation-based networks: participation of the hub 14-3-3 protein family. Sci Rep 6:26234","journal-title":"Sci Rep"},{"key":"295_CR54","doi-asserted-by":"publisher","first-page":"745","DOI":"10.1128\/MMBR.00011-16","volume":"80","author":"S van Houte","year":"2016","unstructured":"van Houte S, Buckling A, Westra ER (2016) Evolutionary ecology of prokaryotic immune mechanisms. Microbiol Mol Biol Rev 80:745\u2013763","journal-title":"Microbiol Mol Biol Rev"},{"key":"295_CR55","doi-asserted-by":"publisher","first-page":"986","DOI":"10.1016\/j.cell.2011.02.016","volume":"144","author":"M Vidal","year":"2011","unstructured":"Vidal M, Cusick ME, Barabasi AL (2011) Interactome networks and human disease. Cell 144:986\u2013998","journal-title":"Cell"},{"key":"295_CR56","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1016\/j.cell.2012.09.002","volume":"151","author":"P Voigt","year":"2012","unstructured":"Voigt P et al (2012) Asymmetrically modified nucleosomes. Cell 151:181\u2013193","journal-title":"Cell"},{"key":"295_CR57","doi-asserted-by":"publisher","first-page":"924","DOI":"10.1016\/j.bbagen.2011.07.009","volume":"1810","author":"C Waltermann","year":"2011","unstructured":"Waltermann C, Klipp E (2011) Information theory based approaches to cellular signaling. Biochim Biophys Acta 1810:924\u2013932","journal-title":"Biochim Biophys Acta"},{"key":"295_CR58","doi-asserted-by":"publisher","first-page":"8257","DOI":"10.1073\/pnas.1017017108","volume":"108","author":"J Wang","year":"2011","unstructured":"Wang J, Zhang K, Xu L, Wang E (2011) Quantifying the Waddington landscape and biological paths for development and differentiation. Proc Natl Acad Sci USA 108:8257\u20138262","journal-title":"Proc Natl Acad Sci USA"},{"key":"295_CR59","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1146\/annurev-immunol-032713-120156","volume":"32","author":"J Wu","year":"2014","unstructured":"Wu J, Chen ZJ (2014) Innate immune sensing and signaling of cytosolic nucleic acids. Annu Rev Immunol 32:461\u2013488","journal-title":"Annu Rev Immunol"}],"container-title":["Theory in Biosciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12064-019-00295-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12064-019-00295-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12064-019-00295-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,20]],"date-time":"2022-04-20T08:37:09Z","timestamp":1650443829000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12064-019-00295-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6,7]]},"references-count":59,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,2]]}},"alternative-id":["295"],"URL":"https:\/\/doi.org\/10.1007\/s12064-019-00295-1","relation":{"has-preprint":[{"id-type":"doi","id":"10.1101\/432120","asserted-by":"object"}]},"ISSN":["1431-7613","1611-7530"],"issn-type":[{"value":"1431-7613","type":"print"},{"value":"1611-7530","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,6,7]]},"assertion":[{"value":"6 July 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 June 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 June 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The author declares that he has no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}