{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T15:40:12Z","timestamp":1758987612972,"version":"3.44.0"},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2025,6,6]],"date-time":"2025-06-06T00:00:00Z","timestamp":1749168000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,6,6]],"date-time":"2025-06-06T00:00:00Z","timestamp":1749168000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,7]]},"DOI":"10.1007\/s12083-025-02027-3","type":"journal-article","created":{"date-parts":[[2025,6,5]],"date-time":"2025-06-05T21:51:59Z","timestamp":1749160319000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Content caching in relay-assisted D2D communications using robust combinatorial optimization"],"prefix":"10.1007","volume":"18","author":[{"given":"Ali","family":"Al-Balaghee","sequence":"first","affiliation":[]},{"given":"Vesal","family":"Hakami","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,6]]},"reference":[{"issue":"4","key":"2027_CR1","doi-asserted-by":"publisher","first-page":"2827","DOI":"10.1109\/TWC.2018.2803816","volume":"17","author":"TX Vu","year":"2018","unstructured":"Vu TX, Chatzinotas S, Ottersten B (2018) Edge-Caching Wireless Networks: Performance Analysis and Optimization. IEEE Trans Wireless Commun 17(4):2827\u20132839. https:\/\/doi.org\/10.1109\/TWC.2018.2803816","journal-title":"IEEE Trans Wireless Commun"},{"issue":"9","key":"2027_CR2","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/MCOM.2016.7565183","volume":"54","author":"D Liu","year":"2016","unstructured":"Liu D, Chen B, Yang C, Molisch AF (2016) Caching at the wireless edge: design aspects, challenges, and future directions. IEEE Commun Mag 54(9):22\u201328. https:\/\/doi.org\/10.1109\/MCOM.2016.7565183","journal-title":"IEEE Commun Mag"},{"issue":"10","key":"2027_CR3","doi-asserted-by":"publisher","first-page":"4557","DOI":"10.1109\/TII.2018.2855187","volume":"14","author":"LT Tan","year":"2018","unstructured":"Tan LT, Hu RQ, Qian Y (2018) D2D communications in heterogeneous networks with full-duplex relays and edge caching. IEEE Trans Industr Inf 14(10):4557\u20134567. https:\/\/doi.org\/10.1109\/TII.2018.2855187","journal-title":"IEEE Trans Industr Inf"},{"key":"2027_CR4","doi-asserted-by":"publisher","first-page":"166079","DOI":"10.1109\/ACCESS.2019.2953172","volume":"7","author":"M Mehrabi","year":"2019","unstructured":"Mehrabi M, You D, Latzko V, Salah H, Reisslein M, Fitzek FHP (2019) Device-enhanced MEC: Multi-access edge computing (MEC) aided by end device computation and caching: A survey. IEEE Access 7:166079\u2013166108. https:\/\/doi.org\/10.1109\/ACCESS.2019.2953172","journal-title":"IEEE Access"},{"issue":"8","key":"2027_CR5","doi-asserted-by":"publisher","first-page":"5001","DOI":"10.1109\/TWC.2017.2705038","volume":"16","author":"R Wang","year":"2017","unstructured":"Wang R, Zhang J, Song SH, Letaief KB (2017) Mobility-aware caching in D2D networks. IEEE Trans Wireless Commun 16(8):5001\u20135015. https:\/\/doi.org\/10.1109\/TWC.2017.2705038","journal-title":"IEEE Trans Wireless Commun"},{"key":"2027_CR6","doi-asserted-by":"publisher","first-page":"10857","DOI":"10.1109\/ACCESS.2019.2890820","volume":"7","author":"L Feng","year":"2019","unstructured":"Feng L, Yang Q, Kim K, Kwak KS (2019) Two-timescale resource allocation for wireless powered D2D communications with self-interested nodes. IEEE Access 7:10857\u201310869. https:\/\/doi.org\/10.1109\/ACCESS.2019.2890820","journal-title":"IEEE Access"},{"key":"2027_CR7","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-2620-6","volume-title":"Robust Discrete Optimization and Its Applications","author":"P Kouvelis","year":"1997","unstructured":"Kouvelis P, Yu G (1997) Robust Discrete Optimization and Its Applications, vol 14. Kluwer Academic Publishers, Dordrecht, Germany"},{"key":"2027_CR8","doi-asserted-by":"publisher","first-page":"103005","DOI":"10.1016\/j.jnca.2021.103005","volume":"181","author":"J Shuja","year":"2021","unstructured":"Shuja J, Bilal K, Alasmary W, Sinky H, Alanazi E (2021) Applying machine learning techniques for caching in next-generation edge networks: a comprehensive survey. J Netw Comput Appl 181:103005. https:\/\/doi.org\/10.1016\/j.jnca.2021.103005","journal-title":"J Netw Comput Appl"},{"issue":"13","key":"2027_CR9","doi-asserted-by":"publisher","first-page":"11922","DOI":"10.1109\/JIOT.2023.3244621","volume":"10","author":"D Li","year":"2023","unstructured":"Li D, Zhang H, Ding H, Li T, Liang D, Yuan D (2023) User-preference-learning-based proactive edge caching for D2D-assisted wireless networks. IEEE Internet Things J 10(13):11922\u201311937. https:\/\/doi.org\/10.1109\/JIOT.2023.3244621","journal-title":"IEEE Internet Things J"},{"issue":"1","key":"2027_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TPDS.2023.3326187","volume":"35","author":"Q Xia","year":"2024","unstructured":"Xia Q, Jiao Z, Xu Z (2024) Online learning algorithms for context-aware video caching in D2D edge networks. IEEE Trans Parallel Distrib Syst 35(1):1\u201319. https:\/\/doi.org\/10.1109\/TPDS.2023.3326187","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"2027_CR11","doi-asserted-by":"publisher","unstructured":"Teng Z, Fang J and Liu Y (2024) \"Combining Lyapunov optimization and deep reinforcement learning for D2D assisted heterogeneous collaborative edge caching,\" IEEE Transactions on Network and Service Management. https:\/\/doi.org\/10.1109\/TNSM.2024.3361796","DOI":"10.1109\/TNSM.2024.3361796"},{"issue":"8","key":"2027_CR12","doi-asserted-by":"publisher","first-page":"2445","DOI":"10.1109\/JSAC.2021.3087232","volume":"39","author":"H Zhou","year":"2021","unstructured":"Zhou H, Wu T, Zhang H, Wu J (2021) Incentive-driven deep reinforcement learning for content caching and D2D offloading. IEEE J Sel Areas Commun 39(8):2445\u20132460. https:\/\/doi.org\/10.1109\/JSAC.2021.3087232","journal-title":"IEEE J Sel Areas Commun"},{"issue":"11","key":"2027_CR13","doi-asserted-by":"publisher","first-page":"9634","DOI":"10.1109\/JIOT.2023.3234705","volume":"10","author":"Y Bai","year":"2023","unstructured":"Bai Y, Wang D, Huang G, Song B (2023) A deep-reinforcement-learning-based social-aware cooperative caching scheme in D2D communication networks. IEEE Internet Things J 10(11):9634\u20139645. https:\/\/doi.org\/10.1109\/JIOT.2023.3234705","journal-title":"IEEE Internet Things J"},{"issue":"3","key":"2027_CR14","doi-asserted-by":"publisher","first-page":"1610","DOI":"10.1109\/TWC.2019.2894403","volume":"18","author":"W Jiang","year":"2019","unstructured":"Jiang W, Feng G, Qin S, Yum TSP, Cao G (2019) Multi-agent reinforcement learning for efficient content caching in mobile D2D networks. IEEE Trans Wireless Commun 18(3):1610\u20131622. https:\/\/doi.org\/10.1109\/TWC.2019.2894403","journal-title":"IEEE Trans Wireless Commun"},{"key":"2027_CR15","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1287\/opre.1030.0065","volume":"52","author":"D Bertsimas","year":"2004","unstructured":"Bertsimas D, Sim M (2004) The price of robustness. Oper Res 52:35\u201353. https:\/\/doi.org\/10.1287\/opre.1030.0065","journal-title":"Oper Res"},{"key":"2027_CR16","unstructured":"Korte B, Vygen J (2007) Combinatorial Optimization: Theory and Algorithms, 4th ed. Springer Publishing Company"},{"issue":"1","key":"2027_CR17","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1002\/nav.3800020109","volume":"2","author":"HW Kuhn","year":"1955","unstructured":"Kuhn HW (1955) The Hungarian method for the assignment problem. Naval Res Logist Quart 2(1):83\u201397. https:\/\/doi.org\/10.1002\/nav.3800020109","journal-title":"Naval Res Logist Quart"},{"key":"2027_CR18","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/s10107-003-0396-4","volume":"98","author":"D Bertsimas","year":"2003","unstructured":"Bertsimas D, Sim M (2003) Robust discrete optimization and network flows. Mathematic Prog Series B 98:49\u201372. https:\/\/doi.org\/10.1007\/s10107-003-0396-4","journal-title":"Mathematic Prog Series B"},{"key":"2027_CR19","doi-asserted-by":"publisher","first-page":"1154","DOI":"10.1287\/opre.21.5.1154","volume":"21","author":"L Soyster","year":"1973","unstructured":"Soyster L (1973) Convex programming with set-inclusive constraints and applications to inexact linear programming. Oper Res 21:1154\u20131157. https:\/\/doi.org\/10.1287\/opre.21.5.1154","journal-title":"Oper Res"},{"issue":"22","key":"2027_CR20","doi-asserted-by":"publisher","first-page":"28159","DOI":"10.1109\/JSEN.2023.3305014","volume":"23","author":"X Gao","year":"2023","unstructured":"Gao X, Qian Z, Wang X (2023) Delay-oriented probabilistic edge caching strategy in a device-to-device-enabled IoT system. IEEE Sens J 23(22):28159\u201328171. https:\/\/doi.org\/10.1109\/JSEN.2023.3305014","journal-title":"IEEE Sens J"},{"key":"2027_CR21","doi-asserted-by":"publisher","unstructured":"Bhat JR, Chang YC, Sheu JP (2019) \"Revenue maximization in D2D content relaying,\" in Proc. IEEE Wireless Communications and Networking Conference (WCNC), Marrakesh, Morocco pp. 1\u20137. https:\/\/doi.org\/10.1109\/WCNC.2019.8886066","DOI":"10.1109\/WCNC.2019.8886066"},{"key":"2027_CR22","doi-asserted-by":"publisher","first-page":"6181","DOI":"10.1109\/ACCESS.2016.2593047","volume":"4","author":"Z Zhou","year":"2016","unstructured":"Zhou Z, Ma G, Dong M, Ota K, Xu C, Jia Y (2016) Iterative energy-efficient stable matching approach for context-aware resource allocation in D2D communications. IEEE Access 4:6181\u20136196. https:\/\/doi.org\/10.1109\/ACCESS.2016.2593047","journal-title":"IEEE Access"},{"issue":"11","key":"2027_CR23","doi-asserted-by":"publisher","first-page":"17485","DOI":"10.1109\/TVT.2024.3419012","volume":"73","author":"M Yan","year":"2024","unstructured":"Yan M, Luo M, Chan CA, Gygax AF, Li C (2024) Energy-efficient content fetching strategies in cache-enabled D2D networks via an actor-critic reinforcement learning structure. IEEE Trans Vehic Technol 73(11):17485\u201317495. https:\/\/doi.org\/10.1109\/TVT.2024.3419012","journal-title":"IEEE Trans Vehic Technol"},{"issue":"10","key":"2027_CR24","doi-asserted-by":"publisher","first-page":"102249","DOI":"10.1016\/j.jksuci.2024.102249","volume":"36","author":"M Sheraz","year":"2024","unstructured":"Sheraz M, Chuah TC, Sultan K, Ahmed M, Lee IE, Tan SC (2024) Improving cache-enabled D2D communications using actor\u2013critic networks over licensed and unlicensed spectrum. J King Saud Univ Comp Inform Sci 36(10):102249. https:\/\/doi.org\/10.1016\/j.jksuci.2024.102249","journal-title":"J King Saud Univ Comp Inform Sci"},{"key":"2027_CR25","doi-asserted-by":"publisher","first-page":"569","DOI":"10.1007\/s11276-022-03135-1","volume":"29","author":"MK Somesula","year":"2023","unstructured":"Somesula MK, Mothku SK, Kotte A (2023) Deep reinforcement learning mechanism for deadline-aware cache placement in device-to-device mobile edge networks. Wireless Netw 29:569\u2013588. https:\/\/doi.org\/10.1007\/s11276-022-03135-1","journal-title":"Wireless Netw"},{"key":"2027_CR26","doi-asserted-by":"publisher","first-page":"2100","DOI":"10.1007\/s11036-022-02010-9","volume":"27","author":"MK Somesula","year":"2022","unstructured":"Somesula MK, Kotte A, Annadanam SC, Mothku SK (2022) Deadline-aware cache placement scheme using fuzzy reinforcement learning in device-to-device mobile edge networks. Mobile Netw Appl 27:2100\u20132117. https:\/\/doi.org\/10.1007\/s11036-022-02010-9","journal-title":"Mobile Netw Appl"},{"key":"2027_CR27","doi-asserted-by":"publisher","unstructured":"Wu Q, Huang P, Zheng Q, Song H (2023) A segmented D2D caching strategy based on user preferences and overall popularity, in Proc. 2023 8th International Conference on Computer and Communication Systems (ICCCS), Guangzhou, China, pp. 239\u2013246. https:\/\/doi.org\/10.1109\/ICCCS57501.2023.10151227","DOI":"10.1109\/ICCCS57501.2023.10151227"},{"key":"2027_CR28","doi-asserted-by":"publisher","first-page":"10031","DOI":"10.1109\/ACCESS.2022.3142859","volume":"10","author":"TM Shami","year":"2022","unstructured":"Shami TM, El-Saleh AA, Alswaitti M, Al-Tashi Q, Summakieh MA, Mirjalili S (2022) Particle swarm optimization: a comprehensive survey. IEEE Access 10:10031\u201310061. https:\/\/doi.org\/10.1109\/ACCESS.2022.3142859","journal-title":"IEEE Access"},{"issue":"4","key":"2027_CR29","doi-asserted-by":"publisher","first-page":"1240","DOI":"10.1109\/LCOMM.2023.3247894","volume":"27","author":"Q-N Tran","year":"2023","unstructured":"Tran Q-N, Vo N-S, Phan T-M, Lam TC, Masaracchia A (2023) Multi-rate probabilistic caching optimized video offloading in dense D2D networks. IEEE Commun Lett 27(4):1240\u20131244. https:\/\/doi.org\/10.1109\/LCOMM.2023.3247894","journal-title":"IEEE Commun Lett"},{"issue":"10","key":"2027_CR30","doi-asserted-by":"publisher","first-page":"14749","DOI":"10.1109\/TVT.2024.3398681","volume":"73","author":"X Gao","year":"2024","unstructured":"Gao X, Wang X, Qian Z, Quek TQS (2024) A stochastic geometry-based cost-efficient caching strategy in device-to-device-enabled multi-layer heterogeneous networks. IEEE Trans Veh Technol 73(10):14749\u201314762. https:\/\/doi.org\/10.1109\/TVT.2024.3398681","journal-title":"IEEE Trans Veh Technol"},{"key":"2027_CR31","doi-asserted-by":"publisher","first-page":"1963","DOI":"10.1007\/s11277-015-2492-1","volume":"84","author":"RG Cheng","year":"2015","unstructured":"Cheng RG, Chen NS, Chou YF et al (2015) Offloading multiple mobile data contents through opportunistic device-to-device communications. Wireless Pers Commun 84:1963\u20131979. https:\/\/doi.org\/10.1007\/s11277-015-2492-1","journal-title":"Wireless Pers Commun"},{"issue":"6","key":"2027_CR32","doi-asserted-by":"publisher","first-page":"857","DOI":"10.26599\/TST.2020.9010044","volume":"26","author":"K Yu","year":"2021","unstructured":"Yu K, Ma Z, Ni R, Zhang T (2021) A caching strategy based on many-to-many matching game in D2D networks. Tsinghua Sci Technol 26(6):857\u2013868. https:\/\/doi.org\/10.26599\/TST.2020.9010044","journal-title":"Tsinghua Sci Technol"},{"issue":"3","key":"2027_CR33","doi-asserted-by":"publisher","first-page":"2665","DOI":"10.1109\/TNSE.2021.3103896","volume":"8","author":"S Pang","year":"2021","unstructured":"Pang S, Li X, Xiong NN, Wang M, Qiao S (2021) Optimal target user selection policy for D2D wireless caching networks. IEEE TransNetw Sci Eng 8(3):2665\u20132678. https:\/\/doi.org\/10.1109\/TNSE.2021.3103896","journal-title":"IEEE TransNetw Sci Eng"},{"issue":"4","key":"2027_CR34","doi-asserted-by":"publisher","first-page":"2322","DOI":"10.1109\/TWC.2014.031314.131651","volume":"13","author":"M Hasan","year":"2014","unstructured":"Hasan M, Hossain E, Kim DI (2014) Resource allocation under channel uncertainties for relay-aided device-to-device communication underlaying LTE-A cellular networks. IEEE Trans Wireless Commun 13(4):2322\u20132338. https:\/\/doi.org\/10.1109\/TWC.2014.031314.131651","journal-title":"IEEE Trans Wireless Commun"},{"issue":"8","key":"2027_CR35","doi-asserted-by":"publisher","first-page":"5048","DOI":"10.1109\/TWC.2017.2705062","volume":"16","author":"S Gong","year":"2017","unstructured":"Gong S, Wu SX, So AM-C, Huang X (2017) Distributionally robust collaborative beamforming in D2D relay networks with interference constraints. IEEE Trans Wireless Commun 16(8):5048\u20135060. https:\/\/doi.org\/10.1109\/TWC.2017.2705062","journal-title":"IEEE Trans Wireless Commun"},{"issue":"11","key":"2027_CR36","doi-asserted-by":"publisher","first-page":"11208","DOI":"10.1109\/TVT.2018.2870675","volume":"67","author":"J Yan","year":"2018","unstructured":"Yan J, Wu D, Wang H, Wang R (2018) User-centric content sharing based on D2D cellular networks. IEEE Trans Veh Technol 67(11):11208\u201311218. https:\/\/doi.org\/10.1109\/TVT.2018.2870675","journal-title":"IEEE Trans Veh Technol"},{"key":"2027_CR37","doi-asserted-by":"publisher","first-page":"769","DOI":"10.1287\/moor.23.4.769","volume":"23","author":"A Ben-Tal","year":"1998","unstructured":"Ben-Tal A, Nemirovski A (1998) Robust convex optimization. Mathematics Operat Res 23:769\u2013805. https:\/\/doi.org\/10.1287\/moor.23.4.769","journal-title":"Mathematics Operat Res"},{"key":"2027_CR38","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1007\/PL00011380","volume":"88","author":"A Ben-Tal","year":"2000","unstructured":"Ben-Tal A, Nemirovski A (2000) Robust solution of linear programming problems contaminated with uncertain data. Mathematic Prog. 88:411\u2013424. https:\/\/doi.org\/10.1007\/PL00011380","journal-title":"Mathematic Prog."},{"issue":"5","key":"2027_CR39","doi-asserted-by":"publisher","first-page":"1382","DOI":"10.1109\/TMC.2016.2597851","volume":"16","author":"W Jiang","year":"2017","unstructured":"Jiang W, Feng G, Qin S (2017) Optimal cooperative content caching and delivery policy for heterogeneous cellular networks. IEEE Trans Mob Comput 16(5):1382\u20131393. https:\/\/doi.org\/10.1109\/TMC.2016.2597851","journal-title":"IEEE Trans Mob Comput"},{"issue":"4","key":"2027_CR40","doi-asserted-by":"publisher","first-page":"1674","DOI":"10.1109\/TCOMM.2016.2522370","volume":"64","author":"N Bharath","year":"2016","unstructured":"Bharath N, Nagananda KG, Poor HV (2016) A learning-based approach to caching in heterogeneous small cell networks. IEEE Trans Commun 64(4):1674\u20131686. https:\/\/doi.org\/10.1109\/TCOMM.2016.2522370","journal-title":"IEEE Trans Commun"},{"issue":"12","key":"2027_CR41","doi-asserted-by":"publisher","first-page":"8402","DOI":"10.1109\/TIT.2013.2282715","volume":"59","author":"K Shanmugam","year":"2013","unstructured":"Shanmugam K, Golrezaei N, Dimakis AG, Molisch AF, Caire G (2013) FemtoCaching: Wireless content delivery through distributed caching helpers. IEEE Trans Inf Theory 59(12):8402\u20138413. https:\/\/doi.org\/10.1109\/TIT.2013.2282715","journal-title":"IEEE Trans Inf Theory"},{"issue":"4","key":"2027_CR42","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1145\/248157.248161","volume":"26","author":"M Abrams","year":"1996","unstructured":"Abrams M, Standridge CR, Abdulla G, Fox EA, Williams S (1996) Removal policies in network caches for World Wide Web documents. ACM SIGCOMM Comp Commun Rev 26(4):293\u2013305. https:\/\/doi.org\/10.1145\/248157.248161","journal-title":"ACM SIGCOMM Comp Commun Rev"},{"issue":"4","key":"2027_CR43","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/346000.346011","volume":"27","author":"M Arlitt","year":"2000","unstructured":"Arlitt M, Cherkasova L, Dilley J, Friedrich R, Jin T (2000) Evaluating content management techniques for web proxy caches. ACM SIGMETRICS Perform Evaluat Rev 27(4):3\u201311. https:\/\/doi.org\/10.1145\/346000.346011","journal-title":"ACM SIGMETRICS Perform Evaluat Rev"},{"issue":"9","key":"2027_CR44","doi-asserted-by":"publisher","first-page":"e30697","DOI":"10.1016\/j.heliyon.2024.e30697","volume":"10","author":"EH Sumiea","year":"2024","unstructured":"Sumiea EH, Abdulkadir SJ, Alhussian HS, Al-Selwi SM, Alqushaibi A, Ragab MG, Fati SM (2024) Deep deterministic policy gradient algorithm: A systematic review. Heliyon 10(9):e30697. https:\/\/doi.org\/10.1016\/j.heliyon.2024.e30697","journal-title":"Heliyon"},{"key":"2027_CR45","unstructured":"Tilbury R, Christianos F, Albrecht SV (2023) Revisiting the Gumbel\u2013Softmax in MADDPG, arXiv preprint, arXiv:2302.11793"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02027-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-025-02027-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02027-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T15:22:51Z","timestamp":1758986571000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-025-02027-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,6]]},"references-count":45,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,7]]}},"alternative-id":["2027"],"URL":"https:\/\/doi.org\/10.1007\/s12083-025-02027-3","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2025,6,6]]},"assertion":[{"value":"18 July 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 May 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 June 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}},{"value":"Not Applicable","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to publish"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"201"}}