{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T19:05:54Z","timestamp":1774551954800,"version":"3.50.1"},"reference-count":63,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2020,6,15]],"date-time":"2020-06-15T00:00:00Z","timestamp":1592179200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,6,15]],"date-time":"2020-06-15T00:00:00Z","timestamp":1592179200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/100010667","name":"H2020 Industrial Leadership","doi-asserted-by":"publisher","award":["780139"],"award-info":[{"award-number":["780139"]}],"id":[{"id":"10.13039\/100010667","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Evolving Systems"],"published-print":{"date-parts":[[2021,3]]},"DOI":"10.1007\/s12530-020-09347-0","type":"journal-article","created":{"date-parts":[[2020,6,17]],"date-time":"2020-06-17T18:04:11Z","timestamp":1592417051000},"page":"19-36","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":103,"title":["A graph neural network method for distributed anomaly detection in IoT"],"prefix":"10.1007","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4544-2454","authenticated-orcid":false,"given":"Aikaterini","family":"Protogerou","sequence":"first","affiliation":[]},{"given":"Stavros","family":"Papadopoulos","sequence":"additional","affiliation":[]},{"given":"Anastasios","family":"Drosou","sequence":"additional","affiliation":[]},{"given":"Dimitrios","family":"Tzovaras","sequence":"additional","affiliation":[]},{"given":"Ioannis","family":"Refanidis","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,6,15]]},"reference":[{"key":"9347_CR1","doi-asserted-by":"publisher","first-page":"52843","DOI":"10.1109\/ACCESS.2018.2869577","volume":"6","author":"M Al-Qatf","year":"2018","unstructured":"Al-Qatf M, Lasheng Y, Al-Habib M, Al-Sabahi K (2018) Deep learning approach combining sparse autoencoder with svm for network intrusion detection. IEEE Access 6:52843\u201352856","journal-title":"IEEE Access"},{"key":"9347_CR2","doi-asserted-by":"crossref","unstructured":"Angelov P (2014) Anomaly detection based on eccentricity analysis. In: 2014 IEEE symposium on evolving and autonomous learning systems (EALS), pp. 1\u20138","DOI":"10.1109\/EALS.2014.7009497"},{"issue":"3","key":"9347_CR3","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1002\/int.20462","volume":"26","author":"P Angelov","year":"2011","unstructured":"Angelov P, Sadeghi-Tehran P, Ramezani R (2011) An approach to automatic real-time novelty detection, object identification, and tracking in video streams based on recursive density estimation and evolving takagi-sugeno fuzzy systems. Int J Intell Syst 26(3):189\u2013205","journal-title":"Int J Intell Syst"},{"key":"9347_CR4","doi-asserted-by":"crossref","unstructured":"Bars BL, Kalogeratos A (2019) A probabilistic framework to node-level anomaly detection in communication networks. arXiv preprint arXiv:1902.04521","DOI":"10.1109\/INFOCOM.2019.8737421"},{"key":"9347_CR5","unstructured":"Battaglia PW, Hamrick JB, Bapst V, Sanchez-Gonzalez A, Zambaldi V, Malinowski M, Tacchetti A, Raposo D, Santoro A, Faulkner R, et\u00a0al. (2018) Relational inductive biases, deep learning, and graph networks. arXiv preprint arXiv:1806.01261"},{"key":"9347_CR6","unstructured":"Beigi EB, Jazi HH, Stakhanova N, Ghorbani AA (2014) Towards effective feature selection in machine learning-based botnet detection approaches. In: 2014 IEEE Conference on Communications and Network Security, pp. 247\u2013255. IEEE"},{"key":"9347_CR7","doi-asserted-by":"publisher","first-page":"458","DOI":"10.1016\/j.procs.2018.07.183","volume":"134","author":"O Brun","year":"2018","unstructured":"Brun O, Yin Y, Gelenbe E (2018) Deep learning with dense random neural network for detecting attacks against iot-connected home environments. Proced Computer Sci 134:458\u2013463","journal-title":"Proced Computer Sci"},{"key":"9347_CR8","doi-asserted-by":"crossref","unstructured":"Chaudhary A, Mittal H, Arora A (2019) Anomaly detection using graph neural networks. In: 2019 International Conference on Machine Learning, Big Data, Cloud and Parallel Computing (COMITCon), pp. 346\u2013350. IEEE","DOI":"10.1109\/COMITCon.2019.8862186"},{"key":"9347_CR9","unstructured":"Chen X, Pawlowski N, Rajchl M, Glocker B, Konukoglu E (2018) Deep generative models in the real-world: An open challenge from medical imaging. arXiv preprint arXiv:1806.05452"},{"key":"9347_CR10","doi-asserted-by":"crossref","unstructured":"Cheng M, Xu Q, Lv J, Liu W, Li Q, Wang J (2016) Ms-lstm: A multi-scale lstm model for bgp anomaly detection. In: 2016 IEEE 24th International Conference on Network Protocols (ICNP), pp. 1\u20136. IEEE","DOI":"10.1109\/ICNP.2016.7785326"},{"key":"9347_CR11","unstructured":"Creech G (2014) Developing a high-accuracy cross platform host-based intrusion detection system capable of reliably detecting zero-day attacks. Ph.D. thesis, University of New South Wales, Canberra, Australia"},{"key":"9347_CR12","doi-asserted-by":"publisher","first-page":"761","DOI":"10.1016\/j.future.2017.08.043","volume":"82","author":"AA Diro","year":"2018","unstructured":"Diro AA, Chilamkurti N (2018) Distributed attack detection scheme using deep learning approach for internet of things. Future Gener Computer Syst 82:761\u2013768","journal-title":"Future Gener Computer Syst"},{"key":"9347_CR13","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1016\/j.patcog.2016.03.028","volume":"58","author":"SM Erfani","year":"2016","unstructured":"Erfani SM, Rajasegarar S, Karunasekera S, Leckie C (2016) High-dimensional and large-scale anomaly detection using a linear one-class svm with deep learning. Pattern Recogn 58:121\u2013134","journal-title":"Pattern Recogn"},{"key":"9347_CR14","doi-asserted-by":"crossref","unstructured":"Eswaran D, Faloutsos C, Guha S, Mishra N (2018) Spotlight: Detecting anomalies in streaming graphs. In: Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, pp. 1378\u20131386","DOI":"10.1145\/3219819.3220040"},{"key":"9347_CR15","unstructured":"Fey M, Lenssen JE (2019) Fast graph representation learning with pytorch geometric. arXiv preprint arXiv:1903.02428"},{"key":"9347_CR16","doi-asserted-by":"crossref","unstructured":"Garcia S, Grill M, Stiborek J, Zunino A (2014) An empirical comparison of botnet detection methods. computers & security 45, 100\u2013123","DOI":"10.1016\/j.cose.2014.05.011"},{"key":"9347_CR17","unstructured":"Garcia V, Bruna J (2017) Few-shot learning with graph neural networks. arXiv preprint arXiv:1711.04043"},{"issue":"3","key":"9347_CR18","doi-asserted-by":"publisher","first-page":"924","DOI":"10.1109\/TNSM.2019.2927886","volume":"16","author":"S Garg","year":"2019","unstructured":"Garg S, Kaur K, Kumar N, Kaddoum G, Zomaya AY, Ranjan R (2019) A hybrid deep learning-based model for anomaly detection in cloud datacenter networks. IEEE Transact Network Service Manag 16(3):924\u2013935","journal-title":"IEEE Transact Network Service Manag"},{"key":"9347_CR19","doi-asserted-by":"crossref","unstructured":"Guo M, Chou E, Huang DA, Song S, Yeung S, Fei-Fei L (2018) Neural graph matching networks for fewshot 3d action recognition. In: Proceedings of the European Conference on Computer Vision (ECCV), pp. 653\u2013669","DOI":"10.1007\/978-3-030-01246-5_40"},{"key":"9347_CR20","unstructured":"Hallman R, Bryan J, Palavicini G, Divita J, Romero-Mariona J (2017) Ioddos\u2013the internet of distributed denial of service attacks"},{"key":"9347_CR21","unstructured":"Hamilton W, Ying Z, Leskovec J (2017) Inductive representation learning on large graphs. In: Advances in neural information processing systems, pp. 1024\u20131034"},{"key":"9347_CR22","doi-asserted-by":"crossref","unstructured":"Irfan M, Ahmad N (2018) Internet of medical things: Architectural model, motivational factors and impediments. In: 2018 15th Learning and Technology Conference (L&T), pp. 6\u201313. IEEE","DOI":"10.1109\/LT.2018.8368495"},{"key":"9347_CR23","unstructured":"Google. edge tpu (2018) https:\/\/cloud.google.com\/edge-tpu\/"},{"key":"9347_CR24","unstructured":"Nvidia jetson tx2 module. (2018) https:\/\/developer.nvidia.com\/embedded\/buy\/jetson-tx2"},{"key":"9347_CR25","doi-asserted-by":"crossref","unstructured":"Javaid A, Niyaz Q, Sun W, Alam M (2016) A deep learning approach for network intrusion detection system. In: Proceedings of the 9th EAI International Conference on Bio-inspired Information and Communications Technologies (formerly BIONETICS), pp. 21\u201326. ICST (Institute for Computer Sciences, Social-Informatics and","DOI":"10.4108\/eai.3-12-2015.2262516"},{"issue":"6","key":"9347_CR26","doi-asserted-by":"publisher","first-page":"e0155781","DOI":"10.1371\/journal.pone.0155781","volume":"11","author":"MJ Kang","year":"2016","unstructured":"Kang MJ, Kang JW (2016) Intrusion detection system using deep neural network for in-vehicle network security. PloS One 11(6):e0155781","journal-title":"PloS One"},{"key":"9347_CR27","doi-asserted-by":"publisher","first-page":"1038","DOI":"10.1016\/j.neuroimage.2016.09.046","volume":"146","author":"J Kawahara","year":"2017","unstructured":"Kawahara J, Brown CJ, Miller SP, Booth BG, Chau V, Grunau RE, Zwicker JG, Hamarneh G (2017) Brainnetcnn: Convolutional neural networks for brain networks; towards predicting neurodevelopment. NeuroImage 146:1038\u20131049","journal-title":"NeuroImage"},{"key":"9347_CR28","doi-asserted-by":"crossref","unstructured":"Kim J, Kim J, Thu HLT, Kim H (2016) Long short term memory recurrent neural network classifier for intrusion detection. In: 2016 International Conference on Platform Technology and Service (PlatCon), pp. 1\u20135. IEEE","DOI":"10.1109\/PlatCon.2016.7456805"},{"key":"9347_CR29","unstructured":"Kingma DP, Ba J (2014) Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980"},{"key":"9347_CR30","unstructured":"Kipf TN, Welling M (2016) Semi-supervised classification with graph convolutional networks. arXiv preprint arXiv:1609.02907"},{"issue":"7","key":"9347_CR31","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1109\/MC.2017.201","volume":"50","author":"C Kolias","year":"2017","unstructured":"Kolias C, Kambourakis G, Stavrou A, Voas J (2017) Ddos in the iot: Mirai and other botnets. Computer 50(7):80\u201384","journal-title":"Computer"},{"key":"9347_CR32","doi-asserted-by":"crossref","unstructured":"Liu L, Zhou T, Long G, Jiang J, Yao L, Zhang C (2019) Prototype propagation networks (ppn) for weakly-supervised few-shot learning on category graph. arXiv preprint arXiv:1905.04042","DOI":"10.24963\/ijcai.2019\/418"},{"key":"9347_CR33","unstructured":"Logenthiran T, Srinivasan D (2015) Computational intelligence and smart grid. Computational Intelligence-Volume II p. 202"},{"issue":"5","key":"9347_CR34","doi-asserted-by":"publisher","first-page":"1174","DOI":"10.1109\/JIOT.2017.2709942","volume":"4","author":"L Lyu","year":"2017","unstructured":"Lyu L, Jin J, Rajasegarar S, He X, Palaniswami M (2017) Fog-empowered anomaly detection in iot using hyperellipsoidal clustering. IEEE Internet Things J 4(5):1174\u20131184","journal-title":"IEEE Internet Things J"},{"issue":"10","key":"9347_CR35","doi-asserted-by":"publisher","first-page":"1701","DOI":"10.3390\/s16101701","volume":"16","author":"T Ma","year":"2016","unstructured":"Ma T, Wang F, Cheng J, Yu Y, Chen X (2016) A hybrid spectral clustering and deep neural network ensemble algorithm for intrusion detection in sensor networks. Sensors 16(10):1701","journal-title":"Sensors"},{"key":"9347_CR36","doi-asserted-by":"publisher","first-page":"7700","DOI":"10.1109\/ACCESS.2018.2803446","volume":"6","author":"LF Maim\u00f3","year":"2018","unstructured":"Maim\u00f3 LF, G\u00f3mez \u00c1LP, Clemente FJG, P\u00e9rez MG, P\u00e9rez GM (2018) A self-adaptive deep learning-based system for anomaly detection in 5g networks. IEEE Access 6:7700\u20137712","journal-title":"IEEE Access"},{"issue":"3","key":"9347_CR37","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1109\/MPRV.2018.03367731","volume":"17","author":"Y Meidan","year":"2018","unstructured":"Meidan Y, Bohadana M, Mathov Y, Mirsky Y, Shabtai A, Breitenbacher D, Elovici Y (2018) N-baiot-network-based detection of iot botnet attacks using deep autoencoders. IEEE Pervasive Comput 17(3):12\u201322","journal-title":"IEEE Pervasive Comput"},{"issue":"5","key":"9347_CR38","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1109\/MNET.2019.1800324","volume":"33","author":"A Moubayed","year":"2019","unstructured":"Moubayed A, Refaey A, Shami A (2019) Software-defined perimeter (sdp): State of the art secure solution for modern networks. IEEE Network 33(5):226\u2013233","journal-title":"IEEE Network"},{"key":"9347_CR39","doi-asserted-by":"crossref","unstructured":"Moustafa N, Turnbull B, Choo KKR (2018) An ensemble intrusion detection technique based on proposed statistical flow features for protecting network traffic of internet of things. IEEE Internet Things J","DOI":"10.1109\/JIOT.2018.2871719"},{"key":"9347_CR40","doi-asserted-by":"publisher","first-page":"101557","DOI":"10.1016\/j.media.2019.101557","volume":"59","author":"T Nair","year":"2020","unstructured":"Nair T, Precup D, Arnold DL, Arbel T (2020) Exploring uncertainty measures in deep networks for multiple sclerosis lesion detection and segmentation. Med Image Analys 59:101557","journal-title":"Med Image Analys"},{"key":"9347_CR41","unstructured":"Paszke A, Gross S, Chintala S, Chanan G, Yang E, DeVito Z, Lin Z, Desmaison A, Antiga L, Lerer A (2017) Automatic differentiation in pytorch"},{"issue":"1","key":"9347_CR42","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1007\/s11009-005-6653-7","volume":"7","author":"R Rubinstein","year":"2005","unstructured":"Rubinstein R (2005) A stochastic minimum cross-entropy method for combinatorial optimization and rare-event estimation. Methodol Comput Appl Probab 7(1):5\u201350","journal-title":"Methodol Comput Appl Probab"},{"key":"9347_CR43","doi-asserted-by":"crossref","unstructured":"Sedjelmaci H, Senouci SM, Al-Bahri M (2016) A lightweight anomaly detection technique for low-resource iot devices: A game-theoretic methodology. In: 2016 IEEE International Conference on Communications (ICC), pp. 1\u20136. IEEE","DOI":"10.1109\/ICC.2016.7510811"},{"issue":"1","key":"9347_CR44","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1109\/TMI.2019.2919951","volume":"39","author":"P Seeb\u00f6ck","year":"2019","unstructured":"Seeb\u00f6ck P, Orlando JI, Schlegl T, Waldstein SM, Bogunovi\u0107 H, Klimscha S, Langs G, Schmidt-Erfurth U (2019) Exploiting epistemic uncertainty of anatomy segmentation for anomaly detection in retinal oct. IEEE Transact Med Imag 39(1):87\u201398","journal-title":"IEEE Transact Med Imag"},{"key":"9347_CR45","doi-asserted-by":"crossref","unstructured":"Sharafaldin I, Lashkari AH, Ghorbani AA (2018) Toward generating a new intrusion detection dataset and intrusion traffic characterization. In: ICISSP, pp. 108\u2013116","DOI":"10.5220\/0006639801080116"},{"key":"9347_CR46","doi-asserted-by":"publisher","first-page":"264","DOI":"10.1007\/978-3-319-46128-1_17","volume-title":"Joint European Conference on Machine Learning and Knowledge Discovery in Databases","author":"K Shin","year":"2016","unstructured":"Shin K, Hooi B, Faloutsos C (2016) M-zoom: Fast dense-block detection in tensors with quality guarantees. Joint European Conference on Machine Learning and Knowledge Discovery in Databases. Springer, Berlin, pp 264\u2013280"},{"issue":"3","key":"9347_CR47","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1016\/j.cose.2011.12.012","volume":"31","author":"A Shiravi","year":"2012","unstructured":"Shiravi A, Shiravi H, Tavallaee M, Ghorbani AA (2012) Toward developing a systematic approach to generate benchmark datasets for intrusion detection. Computers Secur 31(3):357\u2013374","journal-title":"Computers Secur"},{"key":"9347_CR48","doi-asserted-by":"crossref","unstructured":"Singh VK, Ozen A, Govindarasu M (2018) A hierarchical multi-agent based anomaly detection for wide-area protection in smart grid. In: 2018 Resilience Week (RWS), pp. 63\u201369. IEEE","DOI":"10.1109\/RWEEK.2018.8473514"},{"key":"9347_CR49","doi-asserted-by":"crossref","unstructured":"Summerville DH, Zach KM, Chen Y (2015) Ultra-lightweight deep packet anomaly detection for internet of things devices. In: 2015 IEEE 34th international performance computing and communications conference (IPCCC), pp. 1\u20138. IEEE","DOI":"10.1109\/PCCC.2015.7410342"},{"key":"9347_CR50","doi-asserted-by":"crossref","unstructured":"Tang TA, Mhamdi L, McLernon D, Zaidi SAR, Ghogho M (2016) Deep learning approach for network intrusion detection in software defined networking. In: 2016 International Conference on Wireless Networks and Mobile Communications (WINCOM), pp. 258\u2013263. IEEE","DOI":"10.1109\/WINCOM.2016.7777224"},{"key":"9347_CR51","doi-asserted-by":"crossref","unstructured":"Tavallaee M, Bagheri E, Lu W, Ghorbani AA (2009) A detailed analysis of the kdd cup 99 data set. In: 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, pp. 1\u20136. IEEE","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"9347_CR52","unstructured":"Tcpdump\/libpcap public repository (2018). https:\/\/www.tcpdump.org"},{"key":"9347_CR53","doi-asserted-by":"crossref","unstructured":"Thing VL (2017) Ieee 802.11 network anomaly detection and attack classification: A deep learning approach. In: 2017 IEEE Wireless Communications and Networking Conference (WCNC), pp. 1\u20136. IEEE","DOI":"10.1109\/WCNC.2017.7925567"},{"issue":"1","key":"9347_CR54","first-page":"57","volume":"3","author":"MC Tran","year":"2014","unstructured":"Tran MC, Heejeong L, Nakamura Y (2014) Abnormal web traffic detection using connection graph. Bull Networki Comput Syst Software 3(1):57\u201362","journal-title":"Bull Networki Comput Syst Software"},{"key":"9347_CR55","unstructured":"Vargaftik S, Keslassy I, Ben-Itzhak Y (2019) Rade: Resource-efficient supervised anomaly detection using decision tree-based ensemble methods. arXiv preprint arXiv:1909.11877"},{"issue":"8","key":"9347_CR56","doi-asserted-by":"publisher","first-page":"1524","DOI":"10.1109\/JSAC.2014.2335312","volume":"32","author":"A Vishwanath","year":"2014","unstructured":"Vishwanath A, Hinton K, Ayre RW, Tucker RS (2014) Modeling energy consumption in high-capacity routers and switches. IEEE J Selected Areas Commun 32(8):1524\u20131532","journal-title":"IEEE J Selected Areas Commun"},{"key":"9347_CR57","doi-asserted-by":"publisher","first-page":"1792","DOI":"10.1109\/ACCESS.2017.2780250","volume":"6","author":"W Wang","year":"2017","unstructured":"Wang W, Sheng Y, Wang J, Zeng X, Ye X, Huang Y, Zhu M (2017) Hast-ids: Learning hierarchical spatial-temporal features using deep neural networks to improve intrusion detection. IEEE Access 6:1792\u20131806","journal-title":"IEEE Access"},{"key":"9347_CR58","unstructured":"Wu, Z., Pan, S., Chen, F., Long, G., Zhang, C., Yu, P.S.: A comprehensive survey on graph neural networks. arXiv preprint arXiv:1901.00596 (2019)"},{"key":"9347_CR59","unstructured":"Xu K, Hu W, Leskovec J, Jegelka S (2018) How powerful are graph neural networks? arXiv preprint arXiv:1810.00826"},{"issue":"1","key":"9347_CR60","doi-asserted-by":"publisher","first-page":"39","DOI":"10.2991\/ijcis.2018.25905181","volume":"12","author":"FY Yavuz","year":"2018","unstructured":"Yavuz FY, \u00dcnal D, G\u00fcl E (2018) Deep learning for detection of routing attacks in the internet of things. Int J Comput Intell Syst 12(1):39\u201358","journal-title":"Int J Comput Intell Syst"},{"key":"9347_CR61","doi-asserted-by":"crossref","unstructured":"Yu W, Cheng W, Aggarwal CC, Zhang K, Chen H, Wang W (2018) Netwalk: A flexible deep embedding approach for anomaly detection in dynamic networks. In: Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, pp. 2672\u20132681","DOI":"10.1145\/3219819.3220024"},{"key":"9347_CR62","doi-asserted-by":"crossref","unstructured":"Zheng L, Li Z, Li J, Li Z, Gao J (2019) Addgraph: anomaly detection in dynamic graph using attention-based temporal gcn. In: Proceedings of the 28th International Joint Conference on Artificial Intelligence, pp. 4419\u20134425. AAAI Press","DOI":"10.24963\/ijcai.2019\/614"},{"key":"9347_CR63","doi-asserted-by":"crossref","unstructured":"Zou Z, Jin Y, Nevalainen P, Huan Y, Heikkonen J, Westerlund T (2019) Edge and fog computing enabled ai for iot-an overview. In: 2019 IEEE International Conference on Artificial Intelligence Circuits and Systems (AICAS), pp. 51\u201356. IEEE","DOI":"10.1109\/AICAS.2019.8771621"}],"container-title":["Evolving Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12530-020-09347-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12530-020-09347-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12530-020-09347-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,14]],"date-time":"2021-06-14T23:42:49Z","timestamp":1623714169000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12530-020-09347-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,15]]},"references-count":63,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,3]]}},"alternative-id":["9347"],"URL":"https:\/\/doi.org\/10.1007\/s12530-020-09347-0","relation":{},"ISSN":["1868-6478","1868-6486"],"issn-type":[{"value":"1868-6478","type":"print"},{"value":"1868-6486","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,6,15]]},"assertion":[{"value":"10 November 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 May 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 June 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}