{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,12]],"date-time":"2026-04-12T03:56:50Z","timestamp":1775966210329,"version":"3.50.1"},"reference-count":51,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2024,7,18]],"date-time":"2024-07-18T00:00:00Z","timestamp":1721260800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,7,18]],"date-time":"2024-07-18T00:00:00Z","timestamp":1721260800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2024,9]]},"DOI":"10.1007\/s12083-024-01749-0","type":"journal-article","created":{"date-parts":[[2024,7,18]],"date-time":"2024-07-18T07:01:48Z","timestamp":1721286108000},"page":"3385-3407","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["A hierarchical hybrid intrusion detection model for industrial internet of things"],"prefix":"10.1007","volume":"17","author":[{"given":"Zhendong","family":"Wang","sequence":"first","affiliation":[]},{"given":"Xin","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Zhiyuan","family":"Zeng","sequence":"additional","affiliation":[]},{"given":"Daojing","family":"He","sequence":"additional","affiliation":[]},{"given":"Sammy","family":"Chan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,7,18]]},"reference":[{"issue":"1","key":"1749_CR1","doi-asserted-by":"publisher","first-page":"591","DOI":"10.1109\/COMST.2022.3218527","volume":"25","author":"S Duan","year":"2022","unstructured":"Duan S et al (2022) Distributed artificial intelligence empowered by end-edge-cloud computing: a survey. IEEE Commun Surv Tutor 25(1):591\u2013624","journal-title":"IEEE Commun Surv Tutor"},{"issue":"3","key":"1749_CR2","doi-asserted-by":"publisher","first-page":"1693","DOI":"10.1109\/COMST.2021.3078433","volume":"23","author":"M Centenaro","year":"2021","unstructured":"Centenaro M et al (2021) A survey on technologies, standards and open challenges in satellite IoT. IEEE Commun Surv Tutor 23(3):1693\u20131720","journal-title":"IEEE Commun Surv Tutor"},{"key":"1749_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.compind.2018.04.015","volume":"101","author":"H Boyes","year":"2018","unstructured":"Boyes H et al (2018) The industrial internet of things (IIoT): An analysis framework. Comput Ind 101:1\u201312","journal-title":"Comput Ind"},{"issue":"2","key":"1749_CR4","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1109\/TMC.2023.3241206","volume":"23","author":"Wu","year":"2024","unstructured":"Wu et al (2024) Characterizing internet card user portraits for efficient churn prediction model design. IEEE Trans Mob Comput 23(2):1735\u20131752. https:\/\/doi.org\/10.1109\/TMC.2023.3241206","journal-title":"IEEE Trans Mob Comput"},{"issue":"2","key":"1749_CR5","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/997150.997156","volume":"34","author":"J Mirkovic","year":"2004","unstructured":"Mirkovic J, Reiher P (2004) A taxonomy of DDoS attack and DDoS defense mechanisms. ACM SIGCOMM Comput Commun Rev 34(2):39\u201353","journal-title":"ACM SIGCOMM Comput Commun Rev"},{"key":"1749_CR6","unstructured":"Antonakakis M, April T, Bailey M, Bernhard M, Bursztein E, Cochran J, Durumeric Z, Halderman JA, Invernizzi L, Kallitsis M, Kumar D, Lever C, Ma Z, Mason J, Menscher D, Seaman C, Sullivan N, Thomas K, Zhou Y (2017) Understanding the mirai botnet. In Proceedings of the 26th USENIX Conference on Security Symposium (SEC'17). USENIX Association, USA 1093\u20131110"},{"key":"1749_CR7","doi-asserted-by":"publisher","unstructured":"Chen Q, Bridges RA (2017) Automated behavioral analysis of malware: A case study of wannacry ransomware. In 2017 16th IEEE International Conference on Machine Learning and Applications (ICMLA), Cancun, Mexico, pp 454\u2013460.\u00a0https:\/\/doi.org\/10.1109\/ICMLA.2017.0-119","DOI":"10.1109\/ICMLA.2017.0-119"},{"issue":"1","key":"1749_CR8","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.jnca.2012.09.004","volume":"36","author":"H-J Liao","year":"2013","unstructured":"Liao H-J et al (2013) Intrusion detection system: A comprehensive review. J Netw Comput Appl 36(1):16\u201324","journal-title":"J Netw Comput Appl"},{"issue":"3","key":"1749_CR9","first-page":"35","volume":"1","author":"V Kumar","year":"2012","unstructured":"Kumar V, Sangwan OP (2012) Signature based intrusion detection system using SNORT. Int J Comput Appl Inf Technol 1(3):35\u201341","journal-title":"Int J Comput Appl Inf Technol"},{"key":"1749_CR10","doi-asserted-by":"publisher","unstructured":"Samrin R, Vasumathi\u00a0D (2017) Review on anomaly based network intrusion detection system. In 2017 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT), Mysuru, India, pp 141\u2013147.\u00a0https:\/\/doi.org\/10.1109\/ICEECCOT.2017.8284655","DOI":"10.1109\/ICEECCOT.2017.8284655"},{"key":"1749_CR11","doi-asserted-by":"publisher","first-page":"37131","DOI":"10.1109\/ACCESS.2023.3266979","volume":"11","author":"V Hnamte","year":"2023","unstructured":"Hnamte V, Nhung-Nguyen H, Hussain J, Hwa-Kim Y (2023) A novel two-stage deep learning model for network intrusion detection: LSTM-AE. IEEE Access 11:37131\u201337148. https:\/\/doi.org\/10.1109\/ACCESS.2023.3266979","journal-title":"IEEE Access"},{"key":"1749_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.teler.2023.100053","volume":"10","author":"V Hnamte","year":"2023","unstructured":"Hnamte V, Hussain J (2023) DCNNBiLSTM: An efficient hybrid deep learning-based intrusion detection system. Telematics Inform Rep 10:100053","journal-title":"Telematics Inform Rep"},{"issue":"2","key":"1749_CR13","doi-asserted-by":"publisher","first-page":"1147","DOI":"10.1007\/s10586-022-03779-w","volume":"26","author":"A Belhadi","year":"2023","unstructured":"Belhadi A et al (2023) Group intrusion detection in the Internet of Things using a hybrid recurrent neural network. Clust Comput 26(2):1147\u20131158","journal-title":"Clust Comput"},{"key":"1749_CR14","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1016\/j.cose.2019.02.008","volume":"83","author":"F Gottwalt","year":"2019","unstructured":"Gottwalt F, Chang E, Dillon T (2019) CorrCorr: A feature selection method for multivariate correlation network anomaly detection techniques. Comput Secur 83:234\u2013245","journal-title":"Comput Secur"},{"key":"1749_CR15","doi-asserted-by":"publisher","unstructured":"Yerong T, Sai S, Ke X, Zhe L (2014)\u00a0Intrusion detection based on support vector machine using heuristic genetic algorithm. In 2014 Fourth International Conference on Communication Systems and Network Technologies, Bhopal, India, pp 681\u2013684.\u00a0https:\/\/doi.org\/10.1109\/CSNT.2014.143","DOI":"10.1109\/CSNT.2014.143"},{"key":"1749_CR16","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1016\/j.sse.2018.10.007","volume":"150","author":"J-H Yang","year":"2018","unstructured":"Yang J-H et al (2018) Introduction of lithography-compatible conducting polymer as flexible electrode for oxide-based charge-trap memory transistors on plastic poly (ethylene naphthalate) substrates. Solid-State Electron 150:35\u201340","journal-title":"Solid-State Electron"},{"key":"1749_CR17","doi-asserted-by":"publisher","unstructured":"Sahu S, Mehtre BM (2015) Network intrusion detection system using J48 Decision Tree. In 2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI), Kochi, India, pp 2023\u20132026.\u00a0https:\/\/doi.org\/10.1109\/ICACCI.2015.7275914","DOI":"10.1109\/ICACCI.2015.7275914"},{"key":"1749_CR18","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1016\/j.procs.2016.06.047","volume":"89","author":"N Farnaaz","year":"2016","unstructured":"Farnaaz N, Jabbar M (2016) Random forest modeling for network intrusion detection system. Procedia Comput Sci 89:213\u2013217","journal-title":"Procedia Comput Sci"},{"issue":"1","key":"1749_CR19","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/S0167-7012(00)00201-3","volume":"43","author":"IA Basheer","year":"2000","unstructured":"Basheer IA, Hajmeer M (2000) Artificial neural networks: fundamentals, computing, design, and application. J Microbiol Methods 43(1):3\u201331","journal-title":"J Microbiol Methods"},{"key":"1749_CR20","first-page":"25","volume":"3","author":"J Jha","year":"2013","unstructured":"Jha J, Ragha L (2013) Intrusion detection system using support vector machine. Int J Appl Inf Syst (IJAIS) 3:25\u201330","journal-title":"Int J Appl Inf Syst (IJAIS)"},{"key":"1749_CR21","doi-asserted-by":"publisher","unstructured":"Benaddi H, Ibrahimi K, Benslimane A (2018) Improving the intrusion detection system for NSL-KDD dataset based on PCA-fuzzy clustering-KNN. In 2018 6th International Conference on Wireless Networks and Mobile Communications (WINCOM), Marrakesh, Morocco, pp 1\u20136.\u00a0https:\/\/doi.org\/10.1109\/WINCOM.2018.8629718","DOI":"10.1109\/WINCOM.2018.8629718"},{"key":"1749_CR22","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1016\/j.eswa.2016.09.041","volume":"67","author":"WL Al-Yaseen","year":"2017","unstructured":"Al-Yaseen WL, Othman ZA, Nazri MZA (2017) Multi-level hybrid support vector machine and extreme learning machine based on modified K-means for intrusion detection system. Expert Syst Appl 67:296\u2013303","journal-title":"Expert Syst Appl"},{"key":"1749_CR23","doi-asserted-by":"publisher","first-page":"82512","DOI":"10.1109\/ACCESS.2019.2923640","volume":"7","author":"X Gao","year":"2019","unstructured":"Gao X et al (2019) An adaptive ensemble machine learning model for intrusion detection. IEEE Access 7:82512\u201382521","journal-title":"IEEE Access"},{"key":"1749_CR24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-05918-7_20","volume-title":"Mining intelligence and knowledge exploration. MIKE 2018. Lecture Notes in Computer Science","author":"S Potluri","year":"2018","unstructured":"Potluri S, Ahmed S, Diedrich C (2018) Convolutional neural networks for multi-class intrusion detection system. In: Groza A, Prasath R (eds) Mining intelligence and knowledge exploration. MIKE 2018. Lecture Notes in Computer Science, vol 11308. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-030-05918-7_20"},{"key":"1749_CR25","doi-asserted-by":"publisher","first-page":"1792","DOI":"10.1109\/ACCESS.2017.2780250","volume":"6","author":"W Wang","year":"2017","unstructured":"Wang W et al (2017) HAST-IDS: Learning hierarchical spatial-temporal features using deep neural networks to improve intrusion detection. IEEE Access 6:1792\u20131806","journal-title":"IEEE Access"},{"key":"1749_CR26","doi-asserted-by":"publisher","unstructured":"Wu P, Guo H (2019) LuNet: A deep neural network for network intrusion detection. In 2019 IEEE Symposium Series on Computational Intelligence (SSCI), Xiamen, China, pp 617\u2013624. https:\/\/doi.org\/10.1109\/SSCI44817.2019.9003126","DOI":"10.1109\/SSCI44817.2019.9003126"},{"key":"1749_CR27","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.117671","volume":"206","author":"Z Wang","year":"2022","unstructured":"Wang Z et al (2022) A lightweight approach for network intrusion detection in industrial cyber-physical systems based on knowledge distillation and deep metric learning. Expert Syst Appl 206:117671","journal-title":"Expert Syst Appl"},{"key":"1749_CR28","doi-asserted-by":"publisher","unstructured":"Wang Z, Li J, Xu Z, Yang S, He D, Chan S (2023) Application of deep neural network with frequency domain filtering in the field of intrusion detection. Int J Intell Syst\u00a0vol. 2023, Article ID 8825587, 33 pages. https:\/\/doi.org\/10.1155\/2023\/8825587","DOI":"10.1155\/2023\/8825587"},{"key":"1749_CR29","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1016\/j.procs.2015.12.117","volume":"72","author":"R Panthong","year":"2015","unstructured":"Panthong R, Srivihok A (2015) Wrapper feature subset selection for dimension reduction based on ensemble learning algorithm. Procedia Comput Sci 72:162\u2013169","journal-title":"Procedia Comput Sci"},{"key":"1749_CR30","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.122045","volume":"238","author":"Z Wang","year":"2024","unstructured":"Wang Z et al (2024) A lightweight IoT intrusion detection model based on improved BERT-of-Theseus. Expert Syst Appl 238:122045","journal-title":"Expert Syst Appl"},{"key":"1749_CR31","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101752","volume":"92","author":"SM Kasongo","year":"2020","unstructured":"Kasongo SM, Sun Y (2020) A deep learning method with wrapper based feature extraction for wireless intrusion detection system. Comput Secur 92:101752","journal-title":"Comput Secur"},{"key":"1749_CR32","doi-asserted-by":"publisher","first-page":"38597","DOI":"10.1109\/ACCESS.2019.2905633","volume":"7","author":"SM Kasongo","year":"2019","unstructured":"Kasongo SM, Sun Y (2019) A deep learning method with filter based feature engineering for wireless intrusion detection system. IEEE Access 7:38597\u201338607","journal-title":"IEEE Access"},{"issue":"5","key":"1749_CR33","doi-asserted-by":"publisher","first-page":"3962","DOI":"10.1109\/JIOT.2021.3102056","volume":"9","author":"M Al-Hawawreh","year":"2021","unstructured":"Al-Hawawreh M, Sitnikova E, Aboutorab N (2021) X-IIoTID: A connectivity-agnostic and device-agnostic intrusion data set for industrial Internet of Things. IEEE Internet Things J 9(5):3962\u20133977","journal-title":"IEEE Internet Things J"},{"key":"1749_CR34","doi-asserted-by":"publisher","DOI":"10.1016\/j.teler.2023.100077","volume":"11","author":"V Hnamte","year":"2023","unstructured":"Hnamte V, Hussain J (2023) Dependable intrusion detection system using deep convolutional neural network: A novel framework and performance evaluation approach. Telematics Inform Rep 11:100077","journal-title":"Telematics Inform Rep"},{"key":"1749_CR35","doi-asserted-by":"crossref","unstructured":"Takahashi N, Yuki M (2020) Densely connected multidilated convolutional networks for dense prediction tasks. 2021 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp 993\u20131002","DOI":"10.1109\/CVPR46437.2021.00105"},{"key":"1749_CR36","unstructured":"Ioffe S, Szegedy C (2015) Batch normalization: accelerating deep network training by reducing internal covariate shift. In Proceedings of the 32nd International Conference on International Conference on Machine Learning - Volume 37 (ICML'15) pp 448\u2013456.\u00a0JMLR.org"},{"key":"1749_CR37","doi-asserted-by":"publisher","unstructured":"Woo S, Park J, Lee JY, Kweon IS (2018) CBAM: convolutional block attention module. In Computer Vision \u2013 ECCV 2018: 15th European Conference, Munich, Germany, September 8\u201314, 2018, Proceedings, Part VII. Springer-Verlag, Berlin, Heidelberg, 3\u201319. https:\/\/doi.org\/10.1007\/978-3-030-01234-2_1","DOI":"10.1007\/978-3-030-01234-2_1"},{"key":"1749_CR38","doi-asserted-by":"publisher","unstructured":"Tan J, Lu X, Zhang G, Yin C, Li Q (2021) Equalization loss v2: a new gradient balance approach for long-tailed object detection. In 2021 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Nashville, TN, USA, pp 1685\u20131694. https:\/\/doi.org\/10.1109\/CVPR46437.2021.00173","DOI":"10.1109\/CVPR46437.2021.00173"},{"key":"1749_CR39","unstructured":"Powers DMW (2011) Evaluation: from precision, recall and F-measure to ROC, informedness, markedness and correlation. ArXiv.abs\/2010.16061 (n. pag)"},{"issue":"4","key":"1749_CR40","doi-asserted-by":"crossref","first-page":"462","DOI":"10.1016\/j.jksus.2017.05.013","volume":"29","author":"IS Thaseen","year":"2017","unstructured":"Thaseen IS, Kumar CA (2017) Intrusion detection model using fusion of chi-square feature selection and multi class SVM. J King Saud Univ-Comput Inf Sci 29(4):462\u2013472","journal-title":"J King Saud Univ-Comput Inf Sci"},{"key":"1749_CR41","doi-asserted-by":"publisher","unstructured":"Sinha J, Manollas M\u00a0(2020) Efficient deep CNN-BiLSTM model for network intrusion detection. In Proceedings of the 2020 3rd International Conference on Artificial Intelligence and Pattern Recognition (AIPR '20). Association for Computing Machinery, New York, NY, USA, pp 223\u2013231. https:\/\/doi.org\/10.1145\/3430199.3430224","DOI":"10.1145\/3430199.3430224"},{"key":"1749_CR42","doi-asserted-by":"publisher","first-page":"99837","DOI":"10.1109\/ACCESS.2022.3206425","volume":"10","author":"A Halbouni","year":"2022","unstructured":"Halbouni A et al (2022) CNN-LSTM: hybrid deep neural network for network intrusion detection system. IEEE Access 10:99837\u201399849","journal-title":"IEEE Access"},{"key":"1749_CR43","doi-asserted-by":"publisher","first-page":"24808","DOI":"10.1109\/ACCESS.2023.3254915","volume":"11","author":"J Du","year":"2023","unstructured":"Du J et al (2023) Nids-cnnlstm: Network intrusion detection classification model based on deep learning. IEEE Access 11:24808\u201324821","journal-title":"IEEE Access"},{"issue":"4","key":"1749_CR44","doi-asserted-by":"publisher","first-page":"2339","DOI":"10.1007\/s10586-022-03735-8","volume":"26","author":"AK Mishra","year":"2023","unstructured":"Mishra AK, Paliwal S (2023) Mitigating cyber threats through integration of feature selection and stacking ensemble learning: the LGBM and random forest intrusion detection perspective. Clust Comput 26(4):2339\u20132350","journal-title":"Clust Comput"},{"key":"1749_CR45","doi-asserted-by":"publisher","first-page":"33789","DOI":"10.1109\/ACCESS.2018.2841987","volume":"6","author":"I Ahmad","year":"2018","unstructured":"Ahmad I et al (2018) Performance comparison of support vector machine, random forest, and extreme learning machine for intrusion detection. IEEE Access 6:33789\u201333795","journal-title":"IEEE Access"},{"issue":"18","key":"1749_CR46","doi-asserted-by":"publisher","first-page":"7856","DOI":"10.3390\/s23187856","volume":"23","author":"UK Lilhore","year":"2023","unstructured":"Lilhore UK et al (2023) HIDM: Hybrid intrusion detection model for industry 4.0 networks using an optimized CNN-LSTM with transfer learning. Sensors 23(18):7856","journal-title":"Sensors"},{"key":"1749_CR47","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.116545","volume":"194","author":"PR Kanna","year":"2022","unstructured":"Kanna PR, Santhi P (2022) Hybrid intrusion detection using mapreduce based black widow optimized convolutional long short-term memory neural networks. Expert Syst Appl 194:116545","journal-title":"Expert Syst Appl"},{"key":"1749_CR48","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2023.126886","volume":"564","author":"Y Lu","year":"2024","unstructured":"Lu Y et al (2024) Intrusion detection for Industrial Internet of Things based on deep learning. Neurocomputing 564:126886","journal-title":"Neurocomputing"},{"key":"1749_CR49","doi-asserted-by":"publisher","unstructured":"Wu P, Guo H, Moustafa N (2020) Pelican: a deep residual network for network intrusion detection. In 2020 50th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W), Valencia, Spain,\u00a0pp 55\u201362.\u00a0https:\/\/doi.org\/10.1109\/DSN-W50199.2020.00018","DOI":"10.1109\/DSN-W50199.2020.00018"},{"key":"1749_CR50","doi-asserted-by":"publisher","first-page":"148738","DOI":"10.1109\/ACCESS.2021.3124634","volume":"9","author":"M Al-Hawawreh","year":"2021","unstructured":"Al-Hawawreh M, Sitnikova E, Aboutorab N (2021) Asynchronous peer-to-peer federated capability-based targeted ransomware detection model for industrial iot. IEEE Access 9:148738\u2013148755","journal-title":"IEEE Access"},{"key":"1749_CR51","volume":"38","author":"HC Altunay","year":"2023","unstructured":"Altunay HC, Albayrak Z (2023) A hybrid CNN+ LSTMbased intrusion detection system for industrial IoT networks. Eng Sci Technol Int J 38:101322","journal-title":"Eng Sci Technol Int J"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01749-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-024-01749-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01749-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,3]],"date-time":"2024-10-03T16:16:30Z","timestamp":1727972190000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-024-01749-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,18]]},"references-count":51,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2024,9]]}},"alternative-id":["1749"],"URL":"https:\/\/doi.org\/10.1007\/s12083-024-01749-0","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,7,18]]},"assertion":[{"value":"19 December 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 June 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 July 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"There are no human subjects in this article and informed consent is not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}},{"value":"All authors have read and agreed to the published version of the manuscript.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to publish"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}