{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T15:33:43Z","timestamp":1772120023090,"version":"3.50.1"},"reference-count":77,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2023,7,12]],"date-time":"2023-07-12T00:00:00Z","timestamp":1689120000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,7,12]],"date-time":"2023-07-12T00:00:00Z","timestamp":1689120000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100012335","name":"National Defense Basic Scientific Research Program of China","doi-asserted-by":"publisher","award":["JCKY2018602B015"],"award-info":[{"award-number":["JCKY2018602B015"]}],"id":[{"id":"10.13039\/501100012335","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012335","name":"National Defense Basic Scientific Research Program of China","doi-asserted-by":"publisher","award":["JCKY2018602B015"],"award-info":[{"award-number":["JCKY2018602B015"]}],"id":[{"id":"10.13039\/501100012335","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012335","name":"National Defense Basic Scientific Research Program of China","doi-asserted-by":"publisher","award":["JCKY2018602B015"],"award-info":[{"award-number":["JCKY2018602B015"]}],"id":[{"id":"10.13039\/501100012335","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012335","name":"National Defense Basic Scientific Research Program of China","doi-asserted-by":"publisher","award":["JCKY2018602B015"],"award-info":[{"award-number":["JCKY2018602B015"]}],"id":[{"id":"10.13039\/501100012335","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012335","name":"National Defense Basic Scientific Research Program of China","doi-asserted-by":"publisher","award":["JCKY2018602B015"],"award-info":[{"award-number":["JCKY2018602B015"]}],"id":[{"id":"10.13039\/501100012335","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012335","name":"National Defense Basic Scientific Research Program of China","doi-asserted-by":"publisher","award":["JCKY2018602B015"],"award-info":[{"award-number":["JCKY2018602B015"]}],"id":[{"id":"10.13039\/501100012335","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2023,9]]},"DOI":"10.1007\/s12083-023-01514-9","type":"journal-article","created":{"date-parts":[[2023,7,12]],"date-time":"2023-07-12T04:01:35Z","timestamp":1689134495000},"page":"2218-2241","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["B-Tor: Anonymous communication system based on consortium blockchain"],"prefix":"10.1007","volume":"16","author":[{"given":"Dawei","family":"Xu","sequence":"first","affiliation":[]},{"given":"Jiaqi","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Liehuang","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Feng","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Han","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,7,12]]},"reference":[{"key":"1514_CR1","doi-asserted-by":"publisher","unstructured":"Rakin AS, Chowdhuryy MHI, Yao F, Fan D. DeepSteal: Advanced model extractions leveraging efficient weight stealing in memories. In: 2022 IEEE Symposium on Security and Privacy (SP), pp 1157\u20131174. IEEE. https:\/\/doi.org\/10.1109\/SP46214.2022.9833743. https:\/\/ieeexplore.ieee.org\/document\/9833743\/. Accessed 22 Dec 2022","DOI":"10.1109\/SP46214.2022.9833743"},{"key":"1514_CR2","doi-asserted-by":"publisher","unstructured":"Zhao B, Fan K, Yang K, Wang Z, Li H, Yang Y. Anonymous and privacy-preserving federated learning with industrial big data 17(9):6314\u20136323. https:\/\/doi.org\/10.1109\/TII.2021.3052183. Accessed 12 Dec 2022","DOI":"10.1109\/TII.2021.3052183"},{"key":"1514_CR3","doi-asserted-by":"crossref","unstructured":"Spadaccino P, Garlisi D, Cuomo F, Pillon G, Pisani P. Discovery privacy threats via device de-anonymization in LoRaWAN 189:1\u201310. Publisher: Elsevier","DOI":"10.1016\/j.comcom.2022.02.017"},{"key":"1514_CR4","doi-asserted-by":"crossref","unstructured":"Xueshuo X, Jiming W, Junyi Y, Yaozheng F, Ye L, Tao L, Guiling W. AWAP: Adaptive weighted attribute propagation enhanced community detection model for bitcoin de-anonymization 109:107507. Publisher: Elsevier","DOI":"10.1016\/j.asoc.2021.107507"},{"key":"1514_CR5","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-6575-5","volume-title":"Accountability and Privacy in Network Security","author":"Y Ma","year":"2020","unstructured":"Ma Y, Wu Y, Ge J (2020) Accountability and Privacy in Network Security. Springer"},{"key":"1514_CR6","unstructured":"Dingledine R, Mathewson N, Syverson P. Tor: The Second-generation Onion Router"},{"key":"1514_CR7","unstructured":"Hoang NP, Doreen S, Polychronakis M. Measuring ${$i2p$}$ censorship at a global scale. In: 9th USENIX Workshop on Free and Open Communications on the Internet (FOCI 19)"},{"key":"1514_CR8","unstructured":"Mislove A, Oberoi G, Post A, Reis C, Druschel P, Wallach DS. AP3: Cooperative, decentralized anonymous communication. In: Proceedings of the 11th Workshop on ACM SIGOPS European Workshop, p 30"},{"key":"1514_CR9","doi-asserted-by":"crossref","unstructured":"Clarke I, Sandberg O, Wiley B, Hong TW. Freenet: A distributed anonymous information storage and retrieval system. In: Designing Privacy Enhancing Technologies, p 46\u201366. Springer","DOI":"10.1007\/3-540-44702-4_4"},{"key":"1514_CR10","unstructured":"Piotrowska AM, Hayes J, Elahi T, Meiser S, Danezis G. The loopix anonymity system. In: 26th USENIX Security Symposium (USENIX Security 17), p 1199\u20131216"},{"key":"1514_CR11","unstructured":"Torproject\/tor. original-date: 2013-06-05T21:50:25Z. https:\/\/github.com\/torproject\/tor. Accessed 22 Dec 2022"},{"key":"1514_CR12","unstructured":"Users - Tor Metrics. https:\/\/metrics.torproject.org\/userstats-relay-country.html. Accessed 22 Dec 2022"},{"key":"1514_CR13","doi-asserted-by":"crossref","unstructured":"Meland PH, Bayoumy YFF, Sindre G. The ransomware-as-a-service economy within the darknet 92:101762. Publisher: Elsevier","DOI":"10.1016\/j.cose.2020.101762"},{"key":"1514_CR14","doi-asserted-by":"crossref","unstructured":"Abu\u00a0Al-Haija Q, Krichen M, Abu\u00a0Elhaija W. Machine-learning-based darknet traffic detection system for IoT applications 11(4):556. Publisher: MDPI","DOI":"10.3390\/electronics11040556"},{"key":"1514_CR15","doi-asserted-by":"crossref","unstructured":"Sarwar MB, Hanif MK, Talib R, Younas M, Sarwar MU. DarkDetect: darknet traffic detection and categorization using modified convolution-long short-term memory 9:113705\u2013113713. Publisher: IEEE","DOI":"10.1109\/ACCESS.2021.3105000"},{"key":"1514_CR16","doi-asserted-by":"crossref","unstructured":"Lan J, Liu X, Li B, Li Y, Geng T. DarknetSec: A novel self-attentive deep learning method for darknet traffic classification and application identification 116:102663. Publisher: Elsevier","DOI":"10.1016\/j.cose.2022.102663"},{"key":"1514_CR17","doi-asserted-by":"crossref","unstructured":"Nazah S, Huda S, Abawajy J, Hassan MM. Evolution of dark web threat analysis and detection: A systematic approach 8:171796\u2013171819. Publisher: IEEE","DOI":"10.1109\/ACCESS.2020.3024198"},{"issue":"4","key":"1514_CR18","doi-asserted-by":"publisher","first-page":"865","DOI":"10.1177\/0894439321994894","volume":"40","author":"M van der Bruggen","year":"2022","unstructured":"van der Bruggen M, Blokland A (2022) Profiling darkweb child sexual exploitation material forum members using longitudinal posting history data. Soc Sci Comput Rev 40(4):865\u2013891","journal-title":"Soc Sci Comput Rev"},{"key":"1514_CR19","unstructured":"Proposals - Torspec - Tor\u2019s Protocol Specifications. https:\/\/gitweb.torproject.org\/torspec.git\/tree\/proposals. Accessed 22 Dec 2022"},{"key":"1514_CR20","unstructured":"Welcome to Simple Bandwidth Scanner\u2019s Documentation! \u2013 Sbws Get_versions()[\"version\"] Documentation. https:\/\/tpo.pages.torproject.net\/network-health\/sbws\/index.html. Accessed 22 Dec 2022"},{"key":"1514_CR21","unstructured":"OnBaSca - OnBaSca 0.2.0 documentation. https:\/\/onbasca.readthedocs.io\/en\/latest\/. Accessed June 2023"},{"key":"1514_CR22","doi-asserted-by":"crossref","unstructured":"Traudt M, Jansen R, Johnson A. Flashflow: A secure speed test for tor. In: 2021 IEEE 41st International Conference on Distributed Computing Systems (ICDCS), p 381\u2013391. IEEE","DOI":"10.1109\/ICDCS51616.2021.00044"},{"key":"1514_CR23","unstructured":"Mellette WM, Das R, Guo Y, McGuinness R, Snoeren AC, Porter G. Expanding across time to deliver bandwidth efficiency and low latency. In: 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20), p 1\u201318"},{"key":"1514_CR24","doi-asserted-by":"crossref","unstructured":"Jansen R, Johnson A. On the accuracy of tor bandwidth estimation. In: International Conference on Passive and Active Network Measurement, p 481\u2013498. Springer","DOI":"10.1007\/978-3-030-72582-2_28"},{"key":"1514_CR25","unstructured":"Winter P, Edmundson A, Roberts LM, Dutkowska-Zuk A, Chetty M, Feamster N. How do tor users interact with onion services? In: 27th USENIX Security Symposium (USENIX Security 18), p 411\u2013428"},{"key":"1514_CR26","unstructured":"Sanatinia A, Noubir G. Off-path man-in-the-middle attack on tor hidden services"},{"key":"1514_CR27","doi-asserted-by":"crossref","unstructured":"Pries R, Yu W, Fu X, Zhao W. A new replay attack against anonymous communication networks. In: 2008 IEEE International Conference on Communications, p 1578\u20131582. IEEE","DOI":"10.1109\/ICC.2008.305"},{"key":"1514_CR28","doi-asserted-by":"crossref","unstructured":"Zhang Y (2009) Effective attacks in the tor authentication protocol. In: 2009 Third International Conference on Network and System Security, p 81\u201386. IEEE","DOI":"10.1109\/NSS.2009.94"},{"key":"1514_CR29","doi-asserted-by":"crossref","unstructured":"Alhijawi B, Almajali S, Elgala H, Salameh HB, Ayyash M. A survey on DoS\/DDoS mitigation techniques in SDNs: Classification, comparison, solutions, testing tools and datasets 99:107706. Publisher: Elsevier","DOI":"10.1016\/j.compeleceng.2022.107706"},{"key":"1514_CR30","unstructured":"Jansen R, Tschorsch F, Johnson A, Scheuermann B. The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network"},{"key":"1514_CR31","unstructured":"Bocovich C, Dingledine R, Hanna K, Winter P, Yu T. Addressing denial of service attacks on free and open communication on the internet"},{"key":"1514_CR32","unstructured":"Debiasi A, Dingledine R, Edelstein A. Addressing denial of service attacks on free and open communication on the internet"},{"key":"1514_CR33","unstructured":"Mathewson N. Denial-of-service attacks in tor: Taxonomy and defenses"},{"key":"1514_CR34","unstructured":"Jansen R, Vaidya T, Sherr M. Point break: A study of bandwidth ${$denial-of-service$}$ attacks against tor. In: 28th USENIX Security Symposium (USENIX Security 19), p 1823\u20131840"},{"key":"1514_CR35","doi-asserted-by":"crossref","unstructured":"Wang R, Yang Z, Li K, Chen C, Chen Y. Research on tor-based anonymous DDoS attack. In: MATEC Web of Conferences, vol. 336. EDP Sciences","DOI":"10.1051\/matecconf\/202133608007"},{"key":"1514_CR36","unstructured":"Anti-censorship $$\\cdot$$ GitLab. https:\/\/gitlab.torproject.org\/tpo\/anti-censorship. Accessed 22 Dec 2022"},{"key":"1514_CR37","unstructured":"Challenges, Priorities, and Progress in Anti-censorship Technology at Tor | Tor Project. https:\/\/blog.torproject.org\/anti-censorship-challenges-priorities-progress\/. Accessed 22 Dec 2022"},{"key":"1514_CR38","unstructured":"Abe K, Goto S. Fingerprinting attack on tor anonymity using deep learning 42:15\u201320"},{"key":"1514_CR39","doi-asserted-by":"crossref","unstructured":"Jahani H, Jalili S. Online tor privacy breach through website fingerprinting attack 27(2):289\u2013326. Publisher: Springer","DOI":"10.1007\/s10922-018-9466-z"},{"key":"1514_CR40","unstructured":"Angel Y. Yawning\/obfs4. original-date: 2014-05-09T10:19:31Z. https:\/\/github.com\/Yawning\/obfs4. Accessed 22 Dec 2022"},{"key":"1514_CR41","unstructured":"BRIDGES | Tor Project | Tor Browser Manual. https:\/\/tb-manual.torproject.org\/bridges\/. Accessed 22 Dec 2022"},{"key":"1514_CR42","doi-asserted-by":"crossref","unstructured":"Fifield D, Lan C, Hynes R, Wegmann P, Paxson V. Blocking-resistant communication through domain fronting 2015(2):46\u201364","DOI":"10.1515\/popets-2015-0009"},{"key":"1514_CR43","unstructured":"The Tor Project \/ Anti-censorship \/ Pluggable Transports \/ Snowflake $$\\cdot$$ GitLab. https:\/\/gitlab.torproject.org\/tpo\/anti-censorship\/pluggable-transports\/snowflake. Accessed 22 Dec 2022"},{"key":"1514_CR44","doi-asserted-by":"crossref","unstructured":"Saleem J, Islam R, Kabir MA. The anonymity of the dark web: A survey 10:33628\u201333660. Publisher: IEEE","DOI":"10.1109\/ACCESS.2022.3161547"},{"key":"1514_CR45","unstructured":"Nakamoto S. Bitcoin: A peer-to-peer electronic cash system, 21260"},{"key":"1514_CR46","doi-asserted-by":"crossref","unstructured":"Monrat AA, Schel\u00e9n O, Andersson K. A survey of blockchain from the perspectives of applications, challenges, and opportunities 7:117134\u2013117151. Publisher: IEEE","DOI":"10.1109\/ACCESS.2019.2936094"},{"key":"1514_CR47","doi-asserted-by":"crossref","unstructured":"Rajasekaran AS, Azees M, Al-Turjman F. A comprehensive survey on blockchain technology 52, 102039. Publisher: Elsevier","DOI":"10.1016\/j.seta.2022.102039"},{"key":"1514_CR48","doi-asserted-by":"crossref","unstructured":"Merlo V, Pio G, Giusto F, Bilancia M. On the exploitation of the blockchain technology in the healthcare sector: A systematic review, 118897. Publisher: Elsevier","DOI":"10.1016\/j.eswa.2022.118897"},{"key":"1514_CR49","unstructured":"Hyperledger Fabric. original-date: 2016-08-25T16:05:27Z. https:\/\/github.com\/hyperledger\/fabric. Accessed 22 Dec 2022"},{"key":"1514_CR50","doi-asserted-by":"crossref","unstructured":"AlSabah M, Goldberg I. Performance and security improvements for tor: A survey 49(2):1\u201336. Publisher: ACM New York, NY, USA","DOI":"10.1145\/2946802"},{"key":"1514_CR51","unstructured":"Grif?th V. Tor growth rates and improving torperf throughput"},{"key":"1514_CR52","unstructured":"Loesing K, Gunasekaran S, Butler K. Requirements and software design for a better tor performance measurement tool"},{"key":"1514_CR53","doi-asserted-by":"crossref","unstructured":"Geddes J, Jansen R, Hopper N. IMUX: Managing tor connections from two to infinity, and beyond. In: Proceedings of the 13th Workshop on Privacy in the Electronic Society, p 181\u2013190","DOI":"10.1145\/2665943.2665948"},{"key":"1514_CR54","doi-asserted-by":"crossref","unstructured":"AlSabah M, Bauer K, Elahi T, Goldberg I. The path less travelled: Overcoming tor\u2019s bottlenecks with traffic splitting. In: International Symposium on Privacy Enhancing Technologies Symposium, p 143\u2013163. Springer","DOI":"10.1007\/978-3-642-39077-7_8"},{"key":"1514_CR55","doi-asserted-by":"crossref","unstructured":"Gopal D, Heninger N. Torchestra: Reducing interactive traffic delays over tor. In: Proceedings of the 2012 ACM Workshop on Privacy in the Electronic Society, p 31\u201342","DOI":"10.1145\/2381966.2381972"},{"key":"1514_CR56","doi-asserted-by":"crossref","unstructured":"AlSabah M, Goldberg I. PCTCP: per-circuit TCP-over-IPsec transport for anonymous communication overlay networks. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, p 349\u2013360","DOI":"10.1145\/2508859.2516715"},{"key":"1514_CR57","doi-asserted-by":"crossref","unstructured":"Tang C, Goldberg I. An improved algorithm for tor circuit scheduling. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, p 329\u2013339","DOI":"10.1145\/1866307.1866345"},{"key":"1514_CR58","doi-asserted-by":"crossref","unstructured":"AlSabah M, Bauer K, Goldberg I. Enhancing tor\u2019s performance using real-time traffic classification. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, p 73\u201384","DOI":"10.1145\/2382196.2382208"},{"key":"1514_CR59","doi-asserted-by":"crossref","unstructured":"Panchenko A, Lanze F, Engel T. Improving performance and anonymity in the tor network. In: 2012 IEEE 31st International Performance Computing and Communications Conference (IPCCC), p 1\u201310. IEEE","DOI":"10.1109\/PCCC.2012.6407715"},{"key":"1514_CR60","doi-asserted-by":"crossref","unstructured":"Wang T, Bauer K, Forero C, Goldberg I. Congestion-aware path selection for tor. In: International Conference on Financial Cryptography and Data Security, p 98\u2013113. Springer","DOI":"10.1007\/978-3-642-32946-3_9"},{"key":"1514_CR61","doi-asserted-by":"crossref","unstructured":"Akhoondi M, Yu C, Madhyastha HV. LASTor: A low-latency AS-aware tor client. In: 2012 IEEE Symposium on Security and Privacy, p 476\u2013490. IEEE","DOI":"10.1109\/SP.2012.35"},{"key":"1514_CR62","doi-asserted-by":"crossref","unstructured":"Sherr M, Blaze M, Loo BT. Scalable link-based relay selection for anonymous routing. In: International Symposium on Privacy Enhancing Technologies Symposium, p 73\u201393. Springer","DOI":"10.1007\/978-3-642-03168-7_5"},{"key":"1514_CR63","doi-asserted-by":"crossref","unstructured":"Basyoni L, Erbad A, Alsabah M, Fetais N, Mohamed A, Guizani M. QuicTor: Enhancing tor for real-time communication using QUIC transport protocol 9:28769\u201328784. Publisher: IEEE","DOI":"10.1109\/ACCESS.2021.3059672"},{"key":"1514_CR64","unstructured":"Mittal P, Olumofin F, Troncoso C, Borisov N, Goldberg I (2011) $$\\{$$PIR-Tor$$\\}$$: Scalable anonymous communication using private information retrieval. In: 20th USENIX Security Symposium (USENIX Security 11)"},{"key":"1514_CR65","doi-asserted-by":"crossref","unstructured":"Han Y, Xu D, Gao J, Zhu L. Using blockchains for censorship-resistant bootstrapping in anonymity networks. In: International Conference on Information and Communications Security, p 240\u2013260. Springer","DOI":"10.1007\/978-3-031-15777-6_14"},{"key":"1514_CR66","doi-asserted-by":"crossref","unstructured":"Johnson A, Wacek C, Jansen R, Sherr M, Syverson P. Users get routed: Traffic correlation on tor by realistic adversaries. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, p 337\u2013348","DOI":"10.1145\/2508859.2516651"},{"key":"1514_CR67","unstructured":"Relay Search. https:\/\/metrics.torproject.org\/rs.html#search\/flag:Authority. Accessed 22 Dec 2022"},{"key":"1514_CR68","unstructured":"Servers - Tor Metrics. https:\/\/metrics.torproject.org\/relayflags.html. Accessed 22 Dec 2022"},{"key":"1514_CR69","unstructured":"Monthly Churn Values per Relay Flag. https:\/\/nymity.ch\/sybilhunting\/churn-values\/. Accessed 22 Dec 2022"},{"key":"1514_CR70","unstructured":"Release Tor-0.4.6.6 $$\\cdot$$ Torproject\/tor. https:\/\/github.com\/torproject\/tor\/releases\/tag\/tor-0.4.6.6. Accessed 22 Dec 2022"},{"key":"1514_CR71","unstructured":"The Shadow Simulator. original-date: 2011-05-17T08:18:57Z. https:\/\/github.com\/shadow\/shadow. Accessed 22 Dec 2022"},{"key":"1514_CR72","unstructured":"Tornettools. original-date: 2020-03-09T19:22:36Z. https:\/\/github.com\/shadow\/tornettools. Accessed 24 Dec 2022"},{"key":"1514_CR73","unstructured":"Index of \/archive. https:\/\/collector.torproject.org\/archive\/. Accessed 22 Dec 2022"},{"key":"1514_CR74","unstructured":"Hyperledger Caliper. https:\/\/hyperledger.github.io\/caliper\/. Accessed 22 Dec 2022"},{"key":"1514_CR75","unstructured":"Overview \u2013 Prometheus. https:\/\/prometheus.io\/docs\/introduction\/overview\/. Accessed 22 Dec 2022"},{"key":"1514_CR76","unstructured":"Grafana: The Open Observability Platform | Grafana Labs. https:\/\/grafana.com\/. Accessed 22 Dec 2022"},{"key":"1514_CR77","unstructured":"Is Intel Planning to Stop Support for SGX? Section: Intel\u00ae Software Guard Extensions (Intel\u00ae SGX). https:\/\/community.intel.com\/t5\/Intel-Software-Guard-Extensions\/Is-Intel-planning-to-stop-support-for-SGX\/m-p\/1308243#M4842. Accessed 22 Dec 2022"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-023-01514-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-023-01514-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-023-01514-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T20:31:42Z","timestamp":1729715502000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-023-01514-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,12]]},"references-count":77,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2023,9]]}},"alternative-id":["1514"],"URL":"https:\/\/doi.org\/10.1007\/s12083-023-01514-9","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-1680101\/v1","asserted-by":"object"}]},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,7,12]]},"assertion":[{"value":"21 May 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 June 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 July 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval and Consent to participate"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Human and Animal Ethics"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare that there is no conflict of interest regarding the publication of this paper.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}