{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T15:33:28Z","timestamp":1772120008094,"version":"3.50.1"},"reference-count":49,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,7,7]],"date-time":"2025-07-07T00:00:00Z","timestamp":1751846400000},"content-version":"vor","delay-in-days":6,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"Council of Higher Education of T\u00fcrkiye","award":["100\/2000"],"award-info":[{"award-number":["100\/2000"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,7]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>Sybil attacks, where malicious nodes use multiple identities, pose a critical threat to Vehicular Ad-Hoc Networks (VANETs). While Received Signal Strength Indicator (RSSI)-based detection offers a promising approach, existing research is hampered by the lack of realistic datasets that capture the complexities of real-world vehicular environments. Current datasets often simplify traffic conditions, neglecting the impact of congestion and packet drops on RSSI readings. This work addresses this gap by creating a large-scale, realistic VANET simulation environment for generating RSSI data. Using OpenStreetMap data for a region of Istanbul, we model realistic traffic flows calibrated with municipal data, incorporating packet loss due to congestion and interference. Critically, we employ a carefully calibrated log-normal shadowing model to capture the impact of environmental factors on RSSI. We implement four common Sybil attack methods with various power control strategies, creating a diverse set of attack scenarios. Rigorous validation against real-world traffic patterns, RSSI characteristics, attack distribution, and packet collisions demonstrates the realism of our dataset. We provide a sample dataset, along with our open-source simulation environment, enabling researchers to develop and evaluate robust Sybil attack detection mechanisms for real-world VANETs<\/jats:p>","DOI":"10.1007\/s12083-025-02058-w","type":"journal-article","created":{"date-parts":[[2025,7,6]],"date-time":"2025-07-06T23:51:04Z","timestamp":1751845864000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Creating a realistic sybil attack dataset for inter-vehicle communication"],"prefix":"10.1007","volume":"18","author":[{"given":"Taner","family":"Guven","sequence":"first","affiliation":[]},{"given":"Ziya Cihan","family":"Taysi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,7]]},"reference":[{"key":"2058_CR1","unstructured":"European Telecommunications Standards Institute (2019) Intelligent Transport Systems (ITS); Vehicular Communications; Basic Set of Applications; Part 2: Specification of Cooperative Awareness Basic Service"},{"key":"2058_CR2","unstructured":"European Telecommunications Standards Institute (2019) Intelligent Transport Systems (ITS); Vehicular Communications; Basic Set of Applications; Part 3: Specifications of Decentralized Environmental Notification Basic Service"},{"issue":"1","key":"2058_CR3","doi-asserted-by":"publisher","first-page":"770","DOI":"10.1109\/COMST.2017.2771522","volume":"20","author":"A Boualouache","year":"2018","unstructured":"Boualouache A, Senouci S-M, Moussaoui S (2018) A survey on pseudonym changing strategies for vehicular ad-hoc networks. IEEE Commun Surv Tutor 20(1):770\u2013790. https:\/\/doi.org\/10.1109\/COMST.2017.2771522","journal-title":"IEEE Commun Surv Tutor"},{"key":"2058_CR4","doi-asserted-by":"publisher","unstructured":"Lamssaggad A, Benamar N, Hafid AS, Msahli M (2021) A survey on the current security landscape of intelligent transportation systems. IEEE Access 9:9180\u20139208. https:\/\/doi.org\/10.1109\/ACCESS.2021.3050038","DOI":"10.1109\/ACCESS.2021.3050038"},{"key":"2058_CR5","doi-asserted-by":"publisher","unstructured":"Kamel J, Jemaa IB, Kaiser A, Cantat L, Urien P (2019) Misbehavior Detection in C-ITS: A comparative approach of local detection mechanisms. In: 2019 IEEE Vehicular Networking Conference (VNC), pp 1\u20138. https:\/\/doi.org\/10.1109\/VNC48660.2019.9062831","DOI":"10.1109\/VNC48660.2019.9062831"},{"key":"2058_CR6","doi-asserted-by":"publisher","unstructured":"Hasrouny H, Samhat AE, Bassil C, Laouiti A (2017) VANet security challenges and solutions: A survey. Veh Commun 7:7\u201320. https:\/\/doi.org\/10.1016\/j.vehcom.2017.01.002","DOI":"10.1016\/j.vehcom.2017.01.002"},{"issue":"1","key":"2058_CR7","doi-asserted-by":"publisher","first-page":"779","DOI":"10.1109\/COMST.2018.2873088","volume":"21","author":"RW Heijden","year":"2018","unstructured":"Heijden RW, Dietzel S, Leinm\u00fcller T, Kargl F (2018) Survey on misbehavior detection in cooperative intelligent transportation systems. IEEE Commun Surv Tutor 21(1):779\u2013811. https:\/\/doi.org\/10.1109\/COMST.2018.2873088","journal-title":"IEEE Commun Surv Tutor"},{"key":"2058_CR8","doi-asserted-by":"publisher","unstructured":"Kamel J, Kaiser A, Jemaa I, Cincilla P, Urien P (2019) CaTch: A Confidence Range Tolerant Misbehavior Detection Approach. In: 2019 IEEE Wireless Communications and Networking Conference (WCNC), pp 1\u20138. https:\/\/doi.org\/10.1109\/WCNC.2019.8885740","DOI":"10.1109\/WCNC.2019.8885740"},{"key":"2058_CR9","doi-asserted-by":"publisher","unstructured":"So S, Sharma P, Petit J (2018) Integrating Plausibility Checks and Machine Learning for Misbehavior Detection in VANET. In: 2018 17th IEEE International Conference on Machine Learning and Applications (ICMLA), pp 564\u2013571. https:\/\/doi.org\/10.1109\/ICMLA.2018.00091","DOI":"10.1109\/ICMLA.2018.00091"},{"key":"2058_CR10","doi-asserted-by":"publisher","unstructured":"Garip MT, Kim PH, Reiher P, Gerla M (2017) INTERLOC: An interference-aware RSSI-based localization and sybil attack detection mechanism for vehicular ad hoc networks. In: 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC), pp 1\u20136. https:\/\/doi.org\/10.1109\/CCNC.2017.8013424","DOI":"10.1109\/CCNC.2017.8013424"},{"issue":"11","key":"2058_CR11","doi-asserted-by":"publisher","first-page":"2588","DOI":"10.1109\/JSAC.2019.2933888","volume":"37","author":"Y Yao","year":"2019","unstructured":"Yao Y, Xiao B, Yang G, Hu Y, Wang L, Zhou X (2019) Power Control Identification: A Novel Sybil Attack Detection Scheme in VANETs Using RSSI. IEEE J Select Areas Commun 37(11):2588\u20132602. https:\/\/doi.org\/10.1109\/JSAC.2019.2933888","journal-title":"IEEE J Select Areas Commun"},{"key":"2058_CR12","doi-asserted-by":"publisher","unstructured":"Heijden RW, Lukaseder T, Kargl F (2018) VeReMi: A Dataset for Comparable Evaluation of Misbehavior Detection in VANETs. In: Security and Privacy in Communication Networks, pp 318\u2013337. Springer, ???. https:\/\/doi.org\/10.1007\/978-3-030-01701-9_18","DOI":"10.1007\/978-3-030-01701-9_18"},{"issue":"6","key":"2058_CR13","doi-asserted-by":"publisher","first-page":"6631","DOI":"10.1109\/TVT.2020.2984878","volume":"69","author":"J Kamel","year":"2020","unstructured":"Kamel J, Ansari MR, Petit J, Kaiser A, Jemaa IB, Urien P (2020) Simulation framework for misbehavior detection in vehicular networks. IEEE Trans Veh Technol 69(6):6631\u20136643. https:\/\/doi.org\/10.1109\/TVT.2020.2984878","journal-title":"IEEE Trans Veh Technol"},{"key":"2058_CR14","doi-asserted-by":"publisher","unstructured":"Kamel, J., Wolf, M., Hei, R.W., Kaiser, A., Urien, P., Kargl, F.: VeReMi Extension: A Dataset for Comparable Evaluation of Misbehavior Detection in VANETs. In: ICC 2020 - 2020 IEEE International Conference on Communications (ICC), pp. 1\u20136 (2020). https:\/\/doi.org\/10.1109\/ICC40277.2020.9149132","DOI":"10.1109\/ICC40277.2020.9149132"},{"key":"2058_CR15","doi-asserted-by":"publisher","unstructured":"Li T, Alhilal A, Zhang A, Hoque MA, Chatzopoulos D, Xiao Z, Li Y, Hui P (2019) Driving big data: A first look at driving behavior via a large-scale private car dataset. In: 2019 IEEE 35th International Conference on Data Engineering Workshops (ICDEW), pp 61\u201368. https:\/\/doi.org\/10.1109\/ICDEW.2019.00-34","DOI":"10.1109\/ICDEW.2019.00-34"},{"issue":"4","key":"2058_CR16","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1109\/MNET.018.2300125","volume":"37","author":"Z Xiao","year":"2023","unstructured":"Xiao Z, Shu J, Jiang H, Min G, Chen H, Han Z (2023) Overcoming occlusions: Perception task-oriented information sharing in connected and autonomous vehicles. IEEE Network 37(4):224\u2013229. https:\/\/doi.org\/10.1109\/MNET.018.2300125","journal-title":"IEEE Network"},{"issue":"4","key":"2058_CR17","doi-asserted-by":"publisher","first-page":"2346","DOI":"10.1109\/TCYB.2021.3117705","volume":"53","author":"Z Xiao","year":"2023","unstructured":"Xiao Z, Fang H, Jiang H, Bai J, Havyarimana V, Chen H, Jiao L (2023) Understanding private car aggregation effect via spatio-temporal analysis of trajectory data. IEEE Trans Cybern 53(4):2346\u20132357. https:\/\/doi.org\/10.1109\/TCYB.2021.3117705","journal-title":"IEEE Trans Cybern"},{"key":"2058_CR18","doi-asserted-by":"publisher","unstructured":"Cheng Q, Chen W, Sun R, Wang J, Weng D (2024) Ransac-based instantaneous real-time kinematic positioning with gnss triple-frequency signals in urban areas. J Geodesy 98(4):2024. https:\/\/doi.org\/10.1007\/s00190-024-01833-6. Publisher Copyright: $$\\copyright $$ Springer-Verlag GmbH Germany, part of Springer Nature","DOI":"10.1007\/s00190-024-01833-6"},{"key":"2058_CR19","doi-asserted-by":"publisher","unstructured":"Yao Y, Xiao B, Wu G, Liu X, Yu Z, Zhang K, Zhou X (2017) Voiceprint: A Novel Sybil Attack Detection Method Based on RSSI for VANETs. In: 2017 47th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN), pp 591\u2013602. https:\/\/doi.org\/10.1109\/DSN.2017.10","DOI":"10.1109\/DSN.2017.10"},{"key":"2058_CR20","doi-asserted-by":"publisher","unstructured":"So S, Petit J, Starobinski D (2019) Physical layer plausibility checks for misbehavior detection in V2X networks. In: Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, pp 84\u201393. https:\/\/doi.org\/10.1145\/3317549.3323406","DOI":"10.1145\/3317549.3323406"},{"issue":"2","key":"2058_CR21","doi-asserted-by":"publisher","first-page":"362","DOI":"10.1109\/TMC.2018.2833849","volume":"18","author":"Y Yao","year":"2019","unstructured":"Yao Y, Xiao B, Wu G, Liu X, Yu Z, Zhang K, Zhou X (2019) Multi-Channel Based Sybil Attack Detection in Vehicular Ad Hoc Networks Using RSSI. IEEE Trans Mobile Comput 18(2):362\u2013375. https:\/\/doi.org\/10.1109\/TMC.2018.2833849","journal-title":"IEEE Trans Mobile Comput"},{"issue":"10","key":"2058_CR22","doi-asserted-by":"publisher","first-page":"18273","DOI":"10.1109\/TITS.2022.3165513","volume":"23","author":"B Hammi","year":"2022","unstructured":"Hammi B, Idir YM, Zeadally S, Khatoun R, Nebhen J (2022) Is it Really Easy to Detect Sybil Attacks in C-ITS Environments: A Position Paper. IEEE Trans Intell Transport Syst 23(10):18273\u201318287. https:\/\/doi.org\/10.1109\/TITS.2022.3165513","journal-title":"IEEE Trans Intell Transport Syst"},{"key":"2058_CR23","doi-asserted-by":"publisher","unstructured":"Kristianto E, Lin P-C, Hwang R-H (2023) Misbehavior detection system with semi-supervised federated learning. Veh Commun 41:100597. https:\/\/doi.org\/10.1016\/j.vehcom.2023.100597","DOI":"10.1016\/j.vehcom.2023.100597"},{"key":"2058_CR24","doi-asserted-by":"publisher","unstructured":"Ercan S, Ayaida M, Messai N (2022) Misbehavior Detection for Position Falsification Attacks in VANETs Using Machine Learning. IEEE Access 10:1893\u20131904. https:\/\/doi.org\/10.1109\/ACCESS.2021.3136706","DOI":"10.1109\/ACCESS.2021.3136706"},{"key":"2058_CR25","doi-asserted-by":"publisher","unstructured":"Codeca L, Frank R, Engel T (2015) Luxembourg SUMO Traffic (LuST) Scenario: 24 hours of mobility for vehicular networking research. In: 2015 IEEE Vehicular Networking Conference (VNC), pp 1\u20138 . https:\/\/doi.org\/10.1109\/VNC.2015.7385539","DOI":"10.1109\/VNC.2015.7385539"},{"key":"2058_CR26","unstructured":"Sommer C (2021) The open source vehicular network simulation framework. https:\/\/veins.car2x.org\/. [Online; accessed 10-October-2023]"},{"key":"2058_CR27","doi-asserted-by":"publisher","unstructured":"Haidar F, Kamel J, Jemaa IB, Kaiser A, Lonc B, Urien P (2020) DARE: A Reports Dataset for Global Misbehavior Authority Evaluation in C-ITS. In: 2020 IEEE 91st Vehicular Technology Conference (VTC2020-Spring), pp 1\u20136. https:\/\/doi.org\/10.1109\/VTC2020-Spring48590.2020.9128687","DOI":"10.1109\/VTC2020-Spring48590.2020.9128687"},{"key":"2058_CR28","doi-asserted-by":"publisher","unstructured":"Kamel J, Ben\u00a0Jemaa I, Kaiser A, Urien P (2018) Misbehavior Reporting Protocol for C-ITS. In: 2018 IEEE Vehicular Networking Conference (VNC), pp 1\u20134. https:\/\/doi.org\/10.1109\/VNC.2018.8628407","DOI":"10.1109\/VNC.2018.8628407"},{"key":"2058_CR29","doi-asserted-by":"publisher","unstructured":"Amanullah MA, Baruwal\u00a0Chhetri M, Loke SW, Doss R (2022) Burst-adma: Towards an australian dataset for misbehaviour detection in the internet of vehicles. In: 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and Other Affiliated Events (PerCom Workshops), pp 624\u2013629. https:\/\/doi.org\/10.1109\/PerComWorkshops53856.2022.9767505","DOI":"10.1109\/PerComWorkshops53856.2022.9767505"},{"key":"2058_CR30","doi-asserted-by":"publisher","unstructured":"Gon\u00e7alves F, Ribeiro B, Gama O, Santos J, Costa A, Dias B, Nicolau MJ, Macedo J, Santos A (2020) Synthesizing datasets with security threats for vehicular ad-hoc networks. In: GLOBECOM 2020 - 2020 IEEE Global Communications Conference, pp 1\u20136. https:\/\/doi.org\/10.1109\/GLOBECOM42002.2020.9348149","DOI":"10.1109\/GLOBECOM42002.2020.9348149"},{"key":"2058_CR31","unstructured":"SAE International (2020) V2X Communications Message Set Dictionary. document SURFACE VEHICLE STANDARD J2735 JUL2020, 31"},{"key":"2058_CR32","doi-asserted-by":"publisher","unstructured":"Kim C, Chang S-Y, Lee D, Kim J, Park K, Kim J (2023) Reliable detection of location spoofing and variation attacks. IEEE Access 11:10813\u201310825. https:\/\/doi.org\/10.1109\/ACCESS.2023.3241236","DOI":"10.1109\/ACCESS.2023.3241236"},{"issue":"4","key":"2058_CR33","doi-asserted-by":"publisher","first-page":"4158","DOI":"10.1109\/TITS.2022.3233536","volume":"24","author":"GO Anyanwu","year":"2023","unstructured":"Anyanwu GO, Nwakanma CI, Lee J-M, Kim D-S (2023) Falsification detection system for iov using randomized search optimization ensemble algorithm. IEEE Trans Intell Transport Syst 24(4):4158\u20134172. https:\/\/doi.org\/10.1109\/TITS.2022.3233536","journal-title":"IEEE Trans Intell Transport Syst"},{"issue":"11","key":"2058_CR34","doi-asserted-by":"publisher","first-page":"12013","DOI":"10.1109\/TVT.2021.3113807","volume":"70","author":"T Alladi","year":"2021","unstructured":"Alladi T, Gera B, Agrawal A, Chamola V, Yu FR (2021) Deepadv: A deep neural network framework for anomaly detection in vanets. IEEE Trans Veh Technol 70(11):12013\u201312023. https:\/\/doi.org\/10.1109\/TVT.2021.3113807","journal-title":"IEEE Trans Veh Technol"},{"key":"2058_CR35","doi-asserted-by":"publisher","unstructured":"Zhang Z, Lai Y, Chen Y, Wei J, Wang Y (2023) Detection method to eliminate sybil attacks in vehicular ad-hoc networks. Ad Hoc Networks 141:103092. https:\/\/doi.org\/10.1016\/j.adhoc.2023.103092","DOI":"10.1016\/j.adhoc.2023.103092"},{"key":"2058_CR36","doi-asserted-by":"publisher","unstructured":"Ercan S, Ayaida M, Messai N (2021) New Features for Position Falsification Detection in VANETs using Machine Learning. In: ICC 2021 - IEEE International Conference on Communications, pp 1\u20136. https:\/\/doi.org\/10.1109\/ICC42927.2021.9500411","DOI":"10.1109\/ICC42927.2021.9500411"},{"key":"2058_CR37","doi-asserted-by":"crossref","unstructured":"Chen Y, Lai Y, Zhang Z, Li H, Wang Y (2023) Mdfd: A multi-source data fusion detection framework for sybil attack detection in vanets. Comput Netw 224:109608","DOI":"10.1016\/j.comnet.2023.109608"},{"issue":"1","key":"2058_CR38","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1109\/TMC.2010.133","volume":"10","author":"C Sommer","year":"2011","unstructured":"Sommer C, German R, Dressler F (2011) Bidirectionally Coupled Network and Road Traffic Simulation for Improved IVC Analysis. IEEE Trans Mobile Comput 10(1):3\u201315. https:\/\/doi.org\/10.1109\/TMC.2010.133","journal-title":"IEEE Trans Mobile Comput"},{"key":"2058_CR39","unstructured":"OpenStreetMap: OpenStreetMap. https:\/\/www.openstreetmap.org. [Online; accessed 17-October-2023] (2023)"},{"key":"2058_CR40","unstructured":"T\u00fcrkiye \u0130statistik Kurumu (T\u00dc\u0130K) (2020) Adrese Dayal\u0131 N\u00fcfus Kay\u0131t Sistemi Sonu\u00e7lar\u0131. https:\/\/data.tuik.gov.tr\/Bulten\/Index?p=Adrese-Dayali-Nufus-Kayit-Sistemi-Sonuclari-2020-37210. [Online; accessed 10-October-2023]"},{"key":"2058_CR41","unstructured":"Fatih Kaymakaml\u0131\u011f\u0131 TC (2017) \u0130DAR\u0130 YAPI VE N\u00dcFUS. http:\/\/www.fatih.gov.tr\/idari-yapi-ve-nufus. [Online; accessed 10-October-2023]"},{"key":"2058_CR42","unstructured":"Beyo\u011flu Kaymakaml\u0131\u011f\u0131 TC (2018) N\u00fcfus. http:\/\/beyoglu.gov.tr\/nufus. [Online; accessed 10-October-2023]"},{"key":"2058_CR43","unstructured":"Neis P (2023) OSMStats - Statistics of the free wiki world map. https:\/\/osmstats.neis-one.org\/?item=countries. [Online; accessed 11-October-2023]"},{"key":"2058_CR44","unstructured":"German Aerospace Center (DLR) and others (2023) OpenStreetMap - SUMO Docummentation. https:\/\/sumo.dlr.de\/docs\/Networks\/Import\/OpenStreetMap.html. [Online; accessed 17-October-2023]"},{"key":"2058_CR45","unstructured":"German Aerospace Center (DLR) and others (2023) netedit - SUMO docummentation. https:\/\/sumo.dlr.de\/docs\/Netedit\/index.html. [Online; accessed 17-October-2023]"},{"key":"2058_CR46","unstructured":"Google (2022) 10 Bedrettin Sk - Google Maps. https:\/\/www.google.com\/maps\/@41.0286651,28.9722082,3a,75y,297.43h,76.92t\/data=!3m7!1e1!3m5!1sQM-RaSTOJK5prXE2I1aFLg!2e0!5s20220601T000000!7i16384!8i8192?entry=ttu. [Online; accessed 10-October-2023]"},{"key":"2058_CR47","unstructured":"Google (2022) Google Maps. https:\/\/www.google.com\/maps\/@41.0112826,28.9537805,250m\/data=!3m1!1e3?entry=ttu. [Online; accessed 10-October-2023]"},{"key":"2058_CR48","unstructured":"Istanbul Metropolitan Municipality (2022) Traffic Density Map. https:\/\/data.ibb.gov.tr\/en\/dataset\/traffic-density-map. [Online; accessed 10-October-2023]"},{"issue":"1","key":"2058_CR49","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1109\/TDSC.2020.2993769","volume":"19","author":"M Baza","year":"2022","unstructured":"Baza M, Nabil M, Mahmoud MMEA, Bewermeier N, Fidan K, Alasmary W, Abdallah M (2022) Detecting Sybil Attacks Using Proofs of Work and Location in VANETs. IEEE Trans Depend Secur Comput 19(1):39\u201353. https:\/\/doi.org\/10.1109\/TDSC.2020.2993769","journal-title":"IEEE Trans Depend Secur Comput"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02058-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-025-02058-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02058-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T15:22:07Z","timestamp":1758986527000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-025-02058-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7]]},"references-count":49,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,7]]}},"alternative-id":["2058"],"URL":"https:\/\/doi.org\/10.1007\/s12083-025-02058-w","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-5417476\/v1","asserted-by":"object"}]},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,7]]},"assertion":[{"value":"8 November 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 June 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 July 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interests"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}},{"value":"This article does not contain any studies on human or animal subjects.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Human and Animal Rights"}},{"value":"Not applicable.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed Consent"}}],"article-number":"234"}}