{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T11:53:38Z","timestamp":1775822018340,"version":"3.50.1"},"reference-count":53,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T00:00:00Z","timestamp":1775779200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T00:00:00Z","timestamp":1775779200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"DOI":"10.1007\/s12083-026-02222-w","type":"journal-article","created":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T09:21:20Z","timestamp":1775812880000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["TITAN: Logarithm-based trust-aware integrated technique for robust anomaly neutralization in industrial WSNs"],"prefix":"10.1007","volume":"19","author":[{"given":"Khushboo","family":"Tripathi","sequence":"first","affiliation":[]},{"family":"Shalu","sequence":"additional","affiliation":[]},{"given":"Sheetal","family":"Kaushik","sequence":"additional","affiliation":[]},{"given":"Shubham","family":"Vyas","sequence":"additional","affiliation":[]},{"given":"Mohd Anas","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Ali","family":"Ahmadian","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,4,10]]},"reference":[{"key":"2222_CR1","doi-asserted-by":"crossref","unstructured":"Zhang J et al (2010) A trust management architecture for hierarchical wireless sensor networks. IEEE Local computer network conference. IEEE","DOI":"10.1109\/LCN.2010.5735718"},{"issue":"6","key":"2222_CR2","doi-asserted-by":"publisher","first-page":"924","DOI":"10.1109\/TIFS.2013.2240299","volume":"8","author":"X Li","year":"2013","unstructured":"Li X, Zhou F, Du J (2013) LDTS: a lightweight and dependable trust system for clustered wireless sensor networks. IEEE Trans Inf For Secur 8(6):924\u2013935","journal-title":"IEEE Trans Inf For Secur"},{"issue":"4","key":"2222_CR3","doi-asserted-by":"publisher","first-page":"605","DOI":"10.1007\/s11235-016-0254-3","volume":"65","author":"S Talbi","year":"2017","unstructured":"Talbi S et al (2017) Adaptive and dual data-communication trust scheme for clustered wireless sensor networks. Telecommun Syst 65(4):605\u2013619","journal-title":"Telecommun Syst"},{"issue":"3","key":"2222_CR4","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1080\/03772063.2017.1284613","volume":"63","author":"M Singh","year":"2017","unstructured":"Singh M et al (2017) A lightweight trust mechanism and overhead analysis for clustered WSN. IETE J Res 63(3):297\u2013308","journal-title":"IETE J Res"},{"issue":"11","key":"2222_CR5","doi-asserted-by":"publisher","first-page":"1698","DOI":"10.1109\/TPDS.2008.258","volume":"20","author":"RA Shaikh","year":"2009","unstructured":"Shaikh RA, Jameel H, d\u2019Auriol BJ, Lee H, Lee S (2009) Group-based trust management scheme for clustered wireless sensor networks. IEEE Trans Parallel Distrib Syst 20(11):1698\u20131712","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"12","key":"2222_CR6","doi-asserted-by":"publisher","first-page":"4372","DOI":"10.3390\/s18124372","volume":"18","author":"S Kwon","year":"2018","unstructured":"Kwon S, Jeong J, Shon T (2018) Toward security enhanced provisioning in industrial IoT systems. Sensors 18(12):4372","journal-title":"Sensors"},{"key":"2222_CR7","doi-asserted-by":"publisher","first-page":"184133","DOI":"10.1109\/ACCESS.2019.2960609","volume":"7","author":"T-H Kim","year":"2019","unstructured":"Kim T-H, Goyat R, Rai MK, Kumar G, Buchanan WJ, Saha R, Thomas R (2019) A novel trust evaluation process for secure localization using a decentralized blockchain in wireless sensor networks. IEEE Access 7:184133\u2013184144","journal-title":"IEEE Access"},{"key":"2222_CR8","doi-asserted-by":"crossref","unstructured":"Smache M, Olivereau A, Franco-Rondisson T, Tria A (2019) Time synchronization attack scenarios and analysis of effective self-detection parameters in a distributed industrial wireless sensor network. In: 2019 17th International conference on privacy, security and trust (PST), IEEE, pp 1\u20135","DOI":"10.1109\/PST47121.2019.8949065"},{"key":"2222_CR9","doi-asserted-by":"publisher","first-page":"3169","DOI":"10.1007\/s11276-019-02129-w","volume":"26","author":"W Fang","year":"2020","unstructured":"Fang W, Zhang W, Chen W, Liu Y, Tang C (2020) TMSRS: trust management-based secure routing scheme in industrial wireless sensor network with fog computing. Wirel Netw 26:3169\u20133182","journal-title":"Wirel Netw"},{"issue":"7","key":"2222_CR10","doi-asserted-by":"publisher","first-page":"4837","DOI":"10.1109\/TII.2020.3019286","volume":"17","author":"L Yang","year":"2020","unstructured":"Yang L, Lu Y, Yang SX, Guo T, Liang Z (2020) A secure clustering protocol with fuzzy trust evaluation and outlier detection for industrial wireless sensor networks. IEEE Trans Ind Inform 17(7):4837\u20134847","journal-title":"IEEE Trans Ind Inform"},{"issue":"1","key":"2222_CR11","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1109\/TSMC.2020.3040789","volume":"51","author":"J Leng","year":"2020","unstructured":"Leng J, Ye S, Zhou M, Zhao JL, Liu Q, Guo W, Cao W, Fu L (2020) Blockchain-secured smart manufacturing in industry 4.0: A survey. IEEE Trans Syst, Man, Cybern: Syst 51(1):237\u2013252","journal-title":"IEEE Trans Syst, Man, Cybern: Syst"},{"issue":"5","key":"2222_CR12","first-page":"1","volume":"53","author":"J Wang","year":"2020","unstructured":"Wang J, Jing X, Yan Z, Fu Y, Pedrycz W, Yang LT (2020) A survey on trust evaluation based on machine learning. ACM Comput Surv (CSUR) 53(5):1\u201336","journal-title":"ACM Comput Surv (CSUR)"},{"key":"2222_CR13","doi-asserted-by":"publisher","first-page":"102215","DOI":"10.1016\/j.adhoc.2020.102215","volume":"106","author":"A Saidi","year":"2020","unstructured":"Saidi A, Benahmed K, Seddiki N (2020) Secure cluster head election algorithm and misbehavior detection approach based on trust management technique for clustered wireless sensor networks. Ad Hoc Networks 106:102215","journal-title":"Ad Hoc Networks"},{"issue":"5","key":"2222_CR14","doi-asserted-by":"publisher","first-page":"888","DOI":"10.1049\/iet-com.2019.0172","volume":"14","author":"P Nancy","year":"2020","unstructured":"Nancy P, Muthurajkumar S, Ganapathy S, Santhosh Kumar SVN, Selvi M, Arputharaj K (2020) Intrusion detection using dynamic feature selection and fuzzy temporal decision tree classification for wireless sensor networks. IET Commun 14(5):888\u2013895","journal-title":"IET Commun"},{"issue":"23","key":"2222_CR15","doi-asserted-by":"publisher","first-page":"17361","DOI":"10.1007\/s00521-020-05189-8","volume":"32","author":"K Demertzis","year":"2020","unstructured":"Demertzis K, Iliadis L, Tziritas N, Kikiras P (2020) Anomaly detection via blockchained deep learning smart contracts in industry 4.0. Neural Comput Appl 32(23):17361\u201317378","journal-title":"Neural Comput Appl"},{"key":"2222_CR16","doi-asserted-by":"publisher","first-page":"110112","DOI":"10.1016\/j.rser.2020.110112","volume":"132","author":"J Leng","year":"2020","unstructured":"Leng J, Ruan G, Jiang P, Xu K, Liu Q, Zhou X, Liu C (2020) Blockchain-empowered sustainable manufacturing and product lifecycle management in industry 4.0: A survey. Renew Sustain Energy Rev 132:110112","journal-title":"Renew Sustain Energy Rev"},{"key":"2222_CR17","doi-asserted-by":"publisher","first-page":"921","DOI":"10.1016\/j.future.2021.06.049","volume":"125","author":"T Khan","year":"2021","unstructured":"Khan T, Singh K, Hasan MH, Ahmad K, Reddy GT, Mohan S, Ahmadian A (2021) ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs. Futur Gener Comput Syst 125:921\u2013943","journal-title":"Futur Gener Comput Syst"},{"issue":"1","key":"2222_CR18","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1007\/s12652-020-02017-8","volume":"12","author":"G Rathee","year":"2021","unstructured":"Rathee G, Balasaraswathi M, Chandran KP, Gupta SD, Boopathi CS (2021) A secure WSN sensors communication in industry 4.0 using blockchain technology. J Ambient Intell Humaniz Comput 12(1):533\u2013545","journal-title":"J Ambient Intell Humaniz Comput"},{"issue":"8","key":"2222_CR19","doi-asserted-by":"publisher","first-page":"8377","DOI":"10.1109\/TIE.2022.3212378","volume":"70","author":"L Yang","year":"2022","unstructured":"Yang L, Yang SX, Li Y, Lu Y, Guo T (2022) Generative adversarial learning for trusted and secure clustering in industrial wireless sensor networks. IEEE Trans Ind Electron 70(8):8377\u20138387","journal-title":"IEEE Trans Ind Electron"},{"issue":"3","key":"2222_CR20","doi-asserted-by":"publisher","first-page":"3465","DOI":"10.1109\/TNSM.2022.3173975","volume":"19","author":"PK Roy","year":"2022","unstructured":"Roy PK, Bhattacharya A (2022) SDIWSN: A software-defined networking-based authentication protocol for real-time data transfer in industrial wireless sensor networks. IEEE Trans Netw Serv Manage 19(3):3465\u20133477","journal-title":"IEEE Trans Netw Serv Manage"},{"key":"2222_CR21","first-page":"102154","volume":"52","author":"V Kavitha","year":"2022","unstructured":"Kavitha V, Ganapathy K (2022) Galactic swarm optimized convolute network and cluster head elected energy-efficient routing protocol in WSN. Sustain Energy Technol Assess 52:102154","journal-title":"Sustain Energy Technol Assess"},{"key":"2222_CR22","first-page":"100889","volume":"29","author":"S Anitha","year":"2023","unstructured":"Anitha S, Saravanan S, Chandrasekar A (2023) Trust management based multidimensional secure cluster with RSA cryptography algorithm in WSN for secure data transmission. Measurement: Sensors 29:100889","journal-title":"Measurement: Sensors"},{"issue":"1","key":"2222_CR23","doi-asserted-by":"publisher","first-page":"1910","DOI":"10.1038\/s41598-023-28721-x","volume":"13","author":"T Khan","year":"2023","unstructured":"Khan T, Singh K, Ahmad K, Bin Ahmad KA (2023) A secure and dependable trust assessment (SDTS) scheme for industrial communication networks. Sci Rep 13(1):1910","journal-title":"Sci Rep"},{"key":"2222_CR24","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.aej.2024.10.026","volume":"111","author":"S Kumar","year":"2025","unstructured":"Kumar S, Chinthaginjala R, Ahmad S, Kim T (2025) Energy-efficient unequal multi-level clustering for underwater wireless sensor networks. Alex Eng J 111:33\u201346","journal-title":"Alex Eng J"},{"key":"2222_CR25","doi-asserted-by":"publisher","first-page":"46422","DOI":"10.1109\/ACCESS.2024.3381520","volume":"12","author":"T Shafique","year":"2024","unstructured":"Shafique T, Soliman A-H, Amjad A (2024) Data traffic based shape independent adaptive unequal clustering for heterogeneous wireless sensor networks. IEEE Access 12:46422\u201346443","journal-title":"IEEE Access"},{"key":"2222_CR26","doi-asserted-by":"crossref","unstructured":"Mir F, Meziane F (2024) Unequal-radius clustering in WSN-based IoT networks: energy optimization and load balancing in UDCOPA protocol. J Supercomput 80(19):26890\u201326921. https:\/\/link.springer.com\/article\/10.1007\/s11227-024-06426-w","DOI":"10.1007\/s11227-024-06426-w"},{"issue":"2","key":"2222_CR27","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1007\/s42979-023-02584-5","volume":"5","author":"G Srivastava","year":"2024","unstructured":"Srivastava G, Singh JN, Manjul M, Paul A (2024) Dyclust: A hybrid key management scheme for wireless sensor network. SN Computer Science, 5(2):269. https:\/\/link.springer.com\/article\/10.1007\/s42979-023-02584-5","journal-title":"SN Comput Sci"},{"issue":"2","key":"2222_CR28","doi-asserted-by":"publisher","first-page":"1049","DOI":"10.1007\/s12083-023-01458-0","volume":"16","author":"PPI Vazhuthi","year":"2023","unstructured":"Vazhuthi PPI, Prasanth A, Manikandan SP, Devi Sowndarya KK (2023) A hybrid ANFIS reptile optimization algorithm for energy-efficient inter-cluster routing in internet of things-enabled wireless sensor networks. Peer-to-Peer Network Appl 16(2):1049\u20131068","journal-title":"Peer-to-Peer Network Appl"},{"key":"2222_CR29","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1016\/j.comcom.2023.06.014","volume":"209","author":"T Khan","year":"2023","unstructured":"Khan T, Singh K, Shariq M, Ahmad K, Savita KS, Ahmadian A, Salahshour S, Conti M (2023) An efficient trust-based decision-making approach for WSNs: Machine learning oriented approach. Comput Commun 209:217\u2013229","journal-title":"Comput Commun"},{"key":"2222_CR30","doi-asserted-by":"publisher","first-page":"103919","DOI":"10.1016\/j.compind.2023.103919","volume":"149","author":"L Leontaris","year":"2023","unstructured":"Leontaris L, Mitsiaki A, Charalampous P, Dimitriou N, Leivaditou E, Karamanidis A, Margetis G et al (2023) A blockchain-enabled deep residual architecture for accountable, in-situ quality control in industry 4.0 with minimal latency. Comput Ind 149:103919","journal-title":"Comput Ind"},{"key":"2222_CR31","doi-asserted-by":"publisher","first-page":"12866","DOI":"10.1109\/TMC.2024.3418826","volume":"12","author":"C Wang","year":"2024","unstructured":"Wang C, Liu G, Jiang T (2024) Malicious node detection in wireless weak-link sensor networks using dynamic trust management. IEEE Trans Mobile Comput 12:12866\u201312877","journal-title":"IEEE Trans Mobile Comput"},{"issue":"3","key":"2222_CR32","doi-asserted-by":"publisher","first-page":"e5656","DOI":"10.1002\/dac.5656","volume":"37","author":"P Ravikumar","year":"2024","unstructured":"Ravikumar P, Ganesh Kumar P (2024) A novel energy\u2010efficient routing protocol for industrial WSN using hybrid COOT\u2010LS algorithm with LSTM\u2010based DOM prediction. Int J Commun Syst 37(3):e5656","journal-title":"Int J Commun Syst"},{"key":"2222_CR33","doi-asserted-by":"crossref","unstructured":"Dinesh K, Svn SK (2024) GWO-SMSLO: Grey wolf optimization based clustering with secured modified Sea Lion optimization routing algorithm in wireless sensor networks. Peer-to-Peer Netw Appl 1\u201327","DOI":"10.1007\/s12083-023-01603-9"},{"issue":"2","key":"2222_CR34","doi-asserted-by":"publisher","first-page":"953","DOI":"10.1007\/s11277-022-10165-7","volume":"129","author":"T Khan","year":"2023","unstructured":"Khan T, Singh K (2023) RTM: realistic weight-based reliable trust model for large scale WSNs. Wirel Pers Commun 129(2):953\u2013991","journal-title":"Wirel Pers Commun"},{"key":"2222_CR35","doi-asserted-by":"crossref","unstructured":"Khan T, Singh K (2024) DTMS: A dual trust-based multi-level sybil attack detection approach in WSNs. Wireless Person Commun 1\u201332","DOI":"10.21203\/rs.3.rs-2566539\/v1"},{"key":"2222_CR36","doi-asserted-by":"crossref","unstructured":"Singh S, Anand V, Yadav S (2024) Trust-based clustering and routing in WSNs using DST-WOA. Peer-to-Peer Network Appl 1\u201313","DOI":"10.1007\/s12083-024-01651-9"},{"issue":"4","key":"2222_CR37","doi-asserted-by":"publisher","first-page":"1997","DOI":"10.1007\/s11277-024-11391-x","volume":"137","author":"MA Khan","year":"2024","unstructured":"Khan MA, Shalu QN, Naveed AL, Kaushik S, Kumar S (2024) A multi-layered assessment system for trustworthiness enhancement and reliability for industrial wireless sensor networks. Wireless Person Commun 137(4):1997\u20132036","journal-title":"Wireless Person Commun"},{"key":"2222_CR38","doi-asserted-by":"crossref","unstructured":"Singh H, Bala M, Bamber SS, Angurala M (2024) Detection of wormhole attack via bio-inspired ant colony optimization based trust model in WSN assisted IoT Network. Wireless Person Commun 1\u201322","DOI":"10.1007\/s11277-024-11566-6"},{"key":"2222_CR39","doi-asserted-by":"publisher","first-page":"103380","DOI":"10.1016\/j.adhoc.2023.103380","volume":"154","author":"N Baharloo","year":"2024","unstructured":"Baharloo N, Bentahar J, Alwhishi G, Drawel N, Pedrycz W (2024) Verifying trust over IoT-ad hoc network-based applications under uncertainty. Ad Hoc Netw 154:103380","journal-title":"Ad Hoc Netw"},{"key":"2222_CR40","doi-asserted-by":"crossref","unstructured":"Kumar N, Sharma S (2024) PathGuard: Trustworthy routing for sustainable and secure IoT-WSN networks. Wireless Person Commun 1\u201319","DOI":"10.21203\/rs.3.rs-3039565\/v1"},{"issue":"16","key":"2222_CR41","doi-asserted-by":"publisher","first-page":"8996","DOI":"10.3390\/app15168996","volume":"15","author":"A Juwaied","year":"2025","unstructured":"Juwaied A, Jackowska-Strumillo L (2025) DL-HEED: a deep learning approach to energy-efficient clustering in heterogeneous wireless sensor networks. Appl Sci 15(16):8996","journal-title":"Appl Sci"},{"issue":"3","key":"2222_CR42","doi-asserted-by":"publisher","first-page":"26","DOI":"10.3390\/network5030026","volume":"5","author":"A Juwaied","year":"2025","unstructured":"Juwaied A, Jackowska-Strumillo L (2025) Applying machine learning to DEEC protocol: improved cluster formation in wireless sensor networks. Network 5(3):26","journal-title":"Network"},{"key":"2222_CR43","doi-asserted-by":"crossref","unstructured":"Dinesh K, Santhosh Kumar SVN (2023) Energy-efficient trust-aware secured neuro-fuzzy clustering with sparrow search optimization in wireless sensor network. Int J Inf Sec 1\u201325","DOI":"10.1007\/s10207-023-00737-4"},{"key":"2222_CR44","doi-asserted-by":"crossref","unstructured":"Bangali H, Rodrigues P, Pandimurugan V, Rajasoundaran S, Santhosh Kumar SVN, Selvi M, Kannan A (2023) Prediction of middle box-based attacks in Internet of Healthcare Things using ranking subsets and convolutional neural network. Wireless Netw 1\u201319","DOI":"10.1007\/s11276-023-03603-2"},{"issue":"5","key":"2222_CR45","doi-asserted-by":"publisher","first-page":"2682","DOI":"10.3390\/s23052682","volume":"23","author":"SVN Santhosh Kumar","year":"2023","unstructured":"Santhosh Kumar SVN, Yesuraj R, Munuswamy S, Arputharaj K (2023) A comprehensive survey on certificate-less authentication schemes for vehicular ad hoc networks in intelligent transportation systems. Sensors 23(5):2682","journal-title":"Sensors"},{"issue":"1","key":"2222_CR46","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1007\/s11276-023-03473-8","volume":"30","author":"Y Rajkumar","year":"2024","unstructured":"Rajkumar Y, Santhosh Kumar SVN (2024) An elliptic curve cryptography based certificate-less sigTITAN aggregation scheme for efficient authentication in vehicular ad hoc networks. Wireless Netw 30(1):335\u2013362","journal-title":"Wireless Netw"},{"issue":"1","key":"2222_CR47","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/s11276-023-03470-x","volume":"30","author":"S Rajasoundaran","year":"2024","unstructured":"Rajasoundaran S, Santhosh Kumar SVN, Selvi M, Thangaramya K, Arputharaj K (2024) Secure and optimized intrusion detection scheme using LSTM-MAC principles for underwater wireless sensor networks. Wireless Netw 30(1):209\u2013231","journal-title":"Wireless Netw"},{"issue":"1","key":"2222_CR48","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/s11276-023-03459-6","volume":"30","author":"S Jayashree","year":"2024","unstructured":"Jayashree S, Santhosh Kumar SVN (2024) LAPEP\u2014Lightweight authentication protocol with enhanced privacy for effective secured communication in vehicular ad-hoc network. Wireless Netw 30(1):151\u2013178","journal-title":"Wireless Netw"},{"key":"2222_CR49","doi-asserted-by":"crossref","unstructured":"Sharma V, Beniwal R, Kumar V (2024) Multi-level trust-based secure and optimal IoT-WSN routing for environmental monitoring applications. J Supercomput 1\u201344","DOI":"10.1007\/s11227-023-05875-z"},{"issue":"9","key":"2222_CR50","doi-asserted-by":"publisher","first-page":"2852","DOI":"10.3390\/s24092852","volume":"24","author":"P Gangwani","year":"2024","unstructured":"Gangwani P, Perez-Pons A, Upadhyay H (2024) Evaluating trust management frameworks for wireless sensor networks. Sensors 24(9):2852","journal-title":"Sensors"},{"issue":"3","key":"2222_CR51","doi-asserted-by":"publisher","first-page":"294","DOI":"10.2174\/1872212114666191231150916","volume":"14","author":"T Khan","year":"2020","unstructured":"Khan T, Singh K, Purohit KC (2020) ICMA: an efficient integrated congestion control approach. Recent Pat Eng 14(3):294\u2013309","journal-title":"Recent Pat Eng"},{"key":"2222_CR52","unstructured":"Khan T, Singh K, Gupta S, Manjul M (2022) Multi trust-based secure trust model for WSNs. J Inf Technol Manage 14(Special Issue: Security and Resource Management challenges for Internet of Things):147\u2013158"},{"issue":"4","key":"2222_CR53","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1007\/s10586-024-04914-5","volume":"28","author":"I Dohare","year":"2025","unstructured":"Dohare I, Singh K, Khan T, Mohan Y, Alam I (2025) Coati optimization algorithm for node localization in sensor enabled-IoT. Cluster Comput 28(4):221","journal-title":"Cluster Comput"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-026-02222-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-026-02222-w","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-026-02222-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T11:03:41Z","timestamp":1775819021000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-026-02222-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,4,10]]},"references-count":53,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2026,5]]}},"alternative-id":["2222"],"URL":"https:\/\/doi.org\/10.1007\/s12083-026-02222-w","relation":{},"ISSN":["1936-6450"],"issn-type":[{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,4,10]]},"assertion":[{"value":"10 July 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 March 2026","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 April 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests. AI Usage Disclosure: Artificial intelligence tools (Grammarly, ChatGPT) were used solely for language refinement and grammatical correction. All scientific and technical content was developed and validated by the authors.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"79"}}