{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,6]],"date-time":"2026-02-06T13:36:31Z","timestamp":1770384991137,"version":"3.49.0"},"reference-count":63,"publisher":"Springer Science and Business Media LLC","issue":"5-6","license":[{"start":{"date-parts":[[2024,12,25]],"date-time":"2024-12-25T00:00:00Z","timestamp":1735084800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,25]],"date-time":"2024-12-25T00:00:00Z","timestamp":1735084800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Mach. Learn. &amp; Cyber."],"published-print":{"date-parts":[[2025,6]]},"DOI":"10.1007\/s13042-024-02486-9","type":"journal-article","created":{"date-parts":[[2024,12,25]],"date-time":"2024-12-25T15:22:46Z","timestamp":1735140166000},"page":"3865-3885","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["ExBCIL: an exemplar-based class incremental learning for intrusion detection system"],"prefix":"10.1007","volume":"16","author":[{"given":"Parvati","family":"Bhurani","sequence":"first","affiliation":[]},{"given":"Satyendra Singh","family":"Chouhan","sequence":"additional","affiliation":[]},{"given":"Namita","family":"Mittal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,25]]},"reference":[{"issue":"2","key":"2486_CR1","doi-asserted-by":"publisher","first-page":"1153","DOI":"10.1109\/COMST.2015.2494502","volume":"18","author":"AL Buczak","year":"2015","unstructured":"Buczak AL, Guven E (2015) A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Commun Surv Tutor 18(2):1153\u20131176","journal-title":"IEEE Commun Surv Tutor"},{"key":"2486_CR2","unstructured":"Cisco kernel description. https:\/\/www.cisco.com\/c\/en\/us\/solutions\/collateral\/executive-perspectives\/annual-internet-report\/white-paper-c11-741490.html"},{"issue":"1","key":"2486_CR3","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4150","volume":"32","author":"Z Ahmad","year":"2021","unstructured":"Ahmad Z, Shahid Khan A, Wai Shiang C, Abdullah J, Ahmad F (2021) Network intrusion detection system: a systematic study of machine learning and deep learning approaches. Trans Emerg Telecommun Technol 32(1):e4150","journal-title":"Trans Emerg Telecommun Technol"},{"key":"2486_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2019.105124","volume":"189","author":"A Aldweesh","year":"2020","unstructured":"Aldweesh A, Derhab A, Emam AZ (2020) Deep learning approaches for anomaly-based intrusion detection systems: a survey, taxonomy, and open issues. Knowl-Based Syst 189:105124","journal-title":"Knowl-Based Syst"},{"key":"2486_CR5","doi-asserted-by":"crossref","unstructured":"Shmelkov K, Schmid C, Alahari K (2017) Incremental learning of object detectors without catastrophic forgetting. In: Proceedings of the IEEE international conference on computer vision, pp. 3400\u20133409","DOI":"10.1109\/ICCV.2017.368"},{"key":"2486_CR6","doi-asserted-by":"crossref","unstructured":"Rebuffi SA, Kolesnikov A, Sperl G, Lampert CH (2017) icarl: Incremental classifier and representation learning. In: Proceedings of the IEEE conference on Computer Vision and Pattern Recognition, pp. 2001\u20132010","DOI":"10.1109\/CVPR.2017.587"},{"key":"2486_CR7","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/S0079-7421(08)60536-8","volume":"24","author":"McCloskey Michael","year":"1989","unstructured":"Michael McCloskey, Cohen Neal J (1989) Catastrophic interference in connectionist networks: the sequential learning problem. Psychol Learn Motiv 24:109\u2013165","journal-title":"Psychol Learn Motiv"},{"key":"2486_CR8","doi-asserted-by":"crossref","unstructured":"Hou S, Pan X, Loy CC, Wang Z, Lin D (2019) Learning a unified classifier incrementally via rebalancing. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 831\u2013839","DOI":"10.1109\/CVPR.2019.00092"},{"issue":"13","key":"2486_CR9","doi-asserted-by":"publisher","first-page":"3521","DOI":"10.1073\/pnas.1611835114","volume":"114","author":"J Kirkpatrick","year":"2017","unstructured":"Kirkpatrick J, Pascanu R, Rabinowitz N, Veness J, Desjardins G, Rusu AA, Milan K, Quan J, Ramalho T, Grabska-Barwinska A et al (2017) Overcoming catastrophic forgetting in neural networks. Proc Natl Acad Sci 114(13):3521\u20133526","journal-title":"Proc Natl Acad Sci"},{"key":"2486_CR10","unstructured":"Zenke F, Poole B, Ganguli S (2017) Continual learning through synaptic intelligence. In: International Conference on Machine Learning, pp 3987\u20133995"},{"key":"2486_CR11","unstructured":"Rusu AA, Rabinowitz NC, Desjardins G, Soyer H, Kirkpatrick J, Kavukcuoglu K, Pascanu R, Hadsell R (2016) Progressive neural networks. arXiv preprint arXiv:1606.04671"},{"key":"2486_CR12","doi-asserted-by":"crossref","unstructured":"Mallya A, Lazebnik S (2018) Packnet: Adding multiple tasks to a single network by iterative pruning. In: Proceedings of the IEEE conference on Computer Vision and Pattern Recognition, pp. 7765\u20137773,","DOI":"10.1109\/CVPR.2018.00810"},{"key":"2486_CR13","doi-asserted-by":"crossref","unstructured":"Belouadah E, Popescu A (2019) Il2m: Class incremental learning with dual memory. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 583\u2013592","DOI":"10.1109\/ICCV.2019.00067"},{"key":"2486_CR14","doi-asserted-by":"crossref","unstructured":"Welling M (2009) Herding dynamical weights to learn. In: Proceedings of the 26th Annual International Conference on Machine Learning, pp 1121\u20131128","DOI":"10.1145\/1553374.1553517"},{"key":"2486_CR15","unstructured":"Monarch RM (2021) Human-in-the-Loop Machine Learning: Active learning and annotation for human-centered AI. Simon and Schuster"},{"key":"2486_CR16","unstructured":"Van de Ven GM, Tuytelaars T, Tolias AS (2018) Three continual learning scenarios. In: NeurIPS Continual Learning Workshop, 1"},{"key":"2486_CR17","doi-asserted-by":"crossref","unstructured":"Yang T, Huang L, Luo R (2023) Data-free class-incremental learning with implicit representation of prototypes. In: ECAI 2023, pp. 2866\u20132873. IOS Press","DOI":"10.3233\/FAIA230599"},{"issue":"12","key":"2486_CR18","doi-asserted-by":"publisher","first-page":"2935","DOI":"10.1109\/TPAMI.2017.2773081","volume":"40","author":"Z Li","year":"2017","unstructured":"Li Z, Hoiem D (2017) Learning without forgetting. IEEE Trans Pattern Anal Mach Intell 40(12):2935\u20132947","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"2486_CR19","unstructured":"Hinton G (2015) Oriol Vinyals, and Jeff Dean. Distilling the knowledge in a neural network. arXiv preprint arXiv:1503.02531"},{"key":"2486_CR20","doi-asserted-by":"crossref","unstructured":"Castro FM, Mar\u00edn-Jim\u00e9nez MJ, Guil N, Schmid C, Alahari K (2018) End-to-end incremental learning. In: Proceedings of the European conference on computer vision (ECCV), pp. 233\u2013248","DOI":"10.1007\/978-3-030-01258-8_15"},{"key":"2486_CR21","unstructured":"Aljundi R, Lin M, Goujaud B, Bengio Y (2019) Gradient based sample selection for online continual learning. Adv Neural Inform Process Systems 32"},{"issue":"1","key":"2486_CR22","doi-asserted-by":"publisher","first-page":"4069","DOI":"10.1038\/s41467-020-17866-2","volume":"11","author":"GM Van de Ven","year":"2020","unstructured":"Van de Ven GM, Siegelmann HT, Tolias AS (2020) Brain-inspired replay for continual learning with artificial neural networks. Nat Commun 11(1):4069","journal-title":"Nat Commun"},{"key":"2486_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/j.ecoinf.2022.101760","volume":"71","author":"H Zhu","year":"2022","unstructured":"Zhu H, Tian Ye, Zhang J (2022) Class incremental learning for wildlife biodiversity monitoring in camera trap images. Eco Inform 71:101760","journal-title":"Eco Inform"},{"key":"2486_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.neucom.2021.01.078","volume":"439","author":"G Sokar","year":"2021","unstructured":"Sokar G, Mocanu DC, Pechenizkiy M (2021) Make free space for continual learning Spacenet. Neurocomputing 439:1\u201311","journal-title":"Neurocomputing"},{"issue":"3","key":"2486_CR25","doi-asserted-by":"publisher","first-page":"628","DOI":"10.1109\/TC.2021.3057082","volume":"71","author":"H Peng","year":"2021","unstructured":"Peng H, Yang R, Wang Z, Li J, Lifang He S, Philip Albert Y, Zomaya Rajiv R (2021) Lime: Low-cost and incremental learning for dynamic heterogeneous information networks. IEEE Trans Comput 71(3):628\u2013642","journal-title":"IEEE Trans Comput"},{"key":"2486_CR26","doi-asserted-by":"crossref","unstructured":"Peng H, Li J, Song Y, Liu Y (2017) Incrementally learning the hierarchical softmax function for neural language models. In: Proceedings of the AAAI Conference on Artificial Intelligence, 31","DOI":"10.1609\/aaai.v31i1.10994"},{"key":"2486_CR27","doi-asserted-by":"crossref","unstructured":"Alom MZ, Taha TM (2017) Network intrusion detection for cyber security using unsupervised deep learning approaches. In: 2017 IEEE national aerospace and electronics conference (NAECON), pp. 63\u201369. IEEE","DOI":"10.1109\/NAECON.2017.8268746"},{"key":"2486_CR28","doi-asserted-by":"crossref","unstructured":"Fu Y, Lou F, Meng F, Tian Z, Zhang H, Jiang F (2018) An intelligent network attack detection method based on rnn. In: 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC), pp. 483\u2013489. IEEE","DOI":"10.1109\/DSC.2018.00078"},{"key":"2486_CR29","doi-asserted-by":"crossref","unstructured":"Lin WH, Lin HC, Wang P, Wu BH, Tsai JY (2018) Using convolutional neural networks to network intrusion detection for cyber threats. In: 2018 IEEE International Conference on Applied System Invention (ICASI), pp. 1107\u20131110. IEEE","DOI":"10.1109\/ICASI.2018.8394474"},{"key":"2486_CR30","doi-asserted-by":"publisher","DOI":"10.1016\/j.teler.2023.100053","volume":"10","author":"V Hnamte","year":"2023","unstructured":"Hnamte V, Hussain J (2023) Dcnnbilstm: an efficient hybrid deep learning-based intrusion detection system. Telemat Informa Rep 10:100053","journal-title":"Telemat Informa Rep"},{"key":"2486_CR31","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.123027","volume":"245","author":"R Devendiran","year":"2024","unstructured":"Devendiran R, Turukmane AV (2024) Dugat-lstm: deep learning based network intrusion detection system using chaotic optimization strategy. Expert Syst Appl 245:123027","journal-title":"Expert Syst Appl"},{"key":"2486_CR32","doi-asserted-by":"crossref","unstructured":"El-Ghaish H, Miqrish H, Elmogy A, Elawady W (2024) An adaptive nonlinear whale optimization multi-layer perceptron cyber intrusion detection framework. Int J Mach Learn Cybern pp. 1\u201314","DOI":"10.21203\/rs.3.rs-3451858\/v1"},{"key":"2486_CR33","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2024.123919","volume":"251","author":"D Suja Mary","year":"2024","unstructured":"Suja Mary D, Jaya Singh Dhas L, Deepa AR, Chaurasia Mousmi Ajay, Jaspin Jeba Sheela C (2024) Network intrusion detection: An optimized deep learning approach using big data analytics. Expert Syst Appl 251:123919","journal-title":"Expert Syst Appl"},{"key":"2486_CR34","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1016\/j.inffus.2021.11.011","volume":"81","author":"R Shwartz-Ziv","year":"2022","unstructured":"Shwartz-Ziv R, Armon Amitai (2022) Tabular data: deep learning is not all you need. Inform Fus 81:84\u201390","journal-title":"Inform Fus"},{"key":"2486_CR35","first-page":"507","volume":"35","author":"L Grinsztajn","year":"2022","unstructured":"Grinsztajn L, Oyallon E, Varoquaux G (2022) Why do tree-based models still outperform deep learning on typical tabular data? Adv Neural Inf Process Syst 35:507\u2013520","journal-title":"Adv Neural Inf Process Syst"},{"key":"2486_CR36","doi-asserted-by":"publisher","first-page":"951","DOI":"10.1016\/j.future.2024.06.051","volume":"160","author":"T Zoppi","year":"2024","unstructured":"Zoppi T, Gazzini S, Ceccarelli A (2024) Anomaly-based error and intrusion detection in tabular data: No dnn outperforms tree-based classifiers. Futur Gener Comput Syst 160:951\u2013965","journal-title":"Futur Gener Comput Syst"},{"key":"2486_CR37","unstructured":"Channappayya S, Tamma BR et al (2024) Augmented memory replay-based continual learning approaches for network intrusion detection. Adv Neural Inform Process Syst 36"},{"key":"2486_CR38","doi-asserted-by":"crossref","unstructured":"Amalapuram SK, Reddy TT, Channappayya SS, Tamma BR (2021) On handling class imbalance in continual learning based network intrusion detection systems. In: The First International Conference on AI-ML-Systems, pp. 1\u20137","DOI":"10.1145\/3486001.3486231"},{"key":"2486_CR39","doi-asserted-by":"crossref","unstructured":"Amalapuram SK, Tadwai A, Vinta R, Channappayya SS, Tamma BR (2022) Continual learning for anomaly based network intrusion detection. In: 2022 14th International Conference on COMmunication Systems & NETworkS (COMSNETS), pp. 497\u2013505. IEEE","DOI":"10.1109\/COMSNETS53615.2022.9668482"},{"key":"2486_CR40","doi-asserted-by":"crossref","unstructured":"Lomonaco V, Pellegrini L, Cossu A, Carta A, Graffieti G, Hayes TL, De Lange M, Masana M, Pomponi J, Van de Ven GM, et\u00a0al (2021) Avalanche: an end-to-end library for continual learning. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 3600\u20133610","DOI":"10.1109\/CVPRW53098.2021.00399"},{"key":"2486_CR41","doi-asserted-by":"publisher","first-page":"154156","DOI":"10.1109\/ACCESS.2021.3127985","volume":"9","author":"M Data","year":"2021","unstructured":"Data M, Aritsugi M (2021) T-dfnn: An incremental learning algorithm for intrusion detection systems. IEEE Access 9:154156\u2013154171","journal-title":"IEEE Access"},{"key":"2486_CR42","doi-asserted-by":"crossref","unstructured":"Data M, Aritsugi M (2022) An incremental learning algorithm on imbalanced data for network intrusion detection systems. In: Proceedings of the 10th International Conference on Computer and Communications Management, pp. 191\u2013199","DOI":"10.1145\/3556223.3556252"},{"key":"2486_CR43","doi-asserted-by":"crossref","unstructured":"Zhang C, Liu J, Zhi J, Zhang X, Wang J, Wu Z (2023) Oceancl-ids: A continual learning-based intrusion detection system for ocean-going ship-satellite communication network. In: 2023 7th International Conference on Transportation Information and Safety (ICTIS), pp. 1150\u20131155. IEEE","DOI":"10.1109\/ICTIS60134.2023.10243816"},{"key":"2486_CR44","unstructured":"Chrysakis A, Moens MF (2020) Online continual learning from imbalanced data. In: International Conference on Machine Learning, pp. 1952\u20131961. PMLR"},{"key":"2486_CR45","doi-asserted-by":"publisher","first-page":"1649","DOI":"10.1007\/s13042-020-01264-7","volume":"12","author":"Z Zhang","year":"2021","unstructured":"Zhang Z, Zhang Y, Guo D, Song M (2021) A scalable network intrusion detection system towards detecting, discovering, and learning unknown attacks. Int J Mach Learn Cybern 12:1649\u20131665","journal-title":"Int J Mach Learn Cybern"},{"key":"2486_CR46","unstructured":"Lopez-Paz D, Ranzato MA (2017) Gradient episodic memory for continual learning. Adv Neural Inform Process Syst 30"},{"key":"2486_CR47","doi-asserted-by":"crossref","unstructured":"Cerasuolo F, Bovenzi G, Marescalco C, Cirillo F, Ciuonzo , Pescap\u00e8 A (2023) Adaptive intrusion detection systems: Class incremental learning for iot emerging threats. In: 2023 IEEE International Conference on Big Data (BigData), pp. 3547\u20133555. IEEE","DOI":"10.1109\/BigData59044.2023.10386129"},{"key":"2486_CR48","unstructured":"Bovenzi G, Yang L, Finamore A, Aceto G, Ciuonzo D, Pescape A, Rossi D (2021) A first look at class incremental learning in deep learning mobile traffic classification. arXiv preprint arXiv:2107.04464"},{"key":"2486_CR49","doi-asserted-by":"crossref","unstructured":"Wu Y, Chen Y, Wang L, Ye Y, Liu Z, Guo Y, Fu Y (2019) Large scale incremental learning. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp. 374\u2013382","DOI":"10.1109\/CVPR.2019.00046"},{"key":"2486_CR50","unstructured":"Aljundi R (2019) Continual learning in neural networks. arXiv preprint arXiv:1910.02718"},{"issue":"4","key":"2486_CR51","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1016\/S1364-6613(99)01294-2","volume":"3","author":"Robert M French","year":"1999","unstructured":"French Robert M (1999) Catastrophic forgetting in connectionist networks. Trends Cogn Sci 3(4):128\u2013135","journal-title":"Trends Cogn Sci"},{"key":"2486_CR52","doi-asserted-by":"crossref","unstructured":"Yong Zhang X, Guo Da C, Mei S, Yinglei T, Xiaojuan W (2019) Pccn: parallel cross convolutional neural network for abnormal network traffic flows detection in multi-class imbalanced network traffic flows. IEEE Access 7:119904\u2013119916","DOI":"10.1109\/ACCESS.2019.2933165"},{"key":"2486_CR53","unstructured":"Hinton G, Vinyals O, Dean J (2015) Distilling the knowledge in a neural network. arXiv preprintarXiv:1503.02531"},{"key":"2486_CR54","doi-asserted-by":"crossref","unstructured":"Moustafa N, Slay J (2015) Unsw-nb15: a comprehensive data set for network intrusion detection systems (unsw-nb15 network data set). In: 2015 military communications and information systems conference (MilCIS), pp. 1\u20136. IEEE","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"2486_CR55","unstructured":"Bergstra J, Bengio Y (2012) Random search for hyper-parameter optimization. J Mach Learn Res 13(2)"},{"key":"2486_CR56","first-page":"108","volume":"1","author":"I Sharafaldin","year":"2018","unstructured":"Sharafaldin I, Lashkari Arash Habibi, Ghorbani AA et al (2018) Toward generating a new intrusion detection dataset and intrusion traffic characterization. ICISSp 1:108\u2013116","journal-title":"ICISSp"},{"issue":"8","key":"2486_CR57","first-page":"317","volume":"4","author":"S Mishra","year":"2017","unstructured":"Mishra S (2017) Handling imbalanced data: Smote vs. random undersampling. Int Res J Eng Technol 4(8):317\u2013320","journal-title":"Int Res J Eng Technol"},{"key":"2486_CR58","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1613\/jair.953","volume":"16","author":"NV Chawla","year":"2002","unstructured":"Chawla NV, Bowyer KW, Hall LO, Kegelmeyer WP (2002) Smote synthetic minority over-sampling technique. J Artif Intell Res 16:321\u2013357","journal-title":"J Artif Intell Res"},{"issue":"11","key":"2486_CR59","doi-asserted-by":"publisher","first-page":"12816","DOI":"10.1109\/TPAMI.2022.3200865","volume":"45","author":"DW Zhou","year":"2022","unstructured":"Zhou DW, Ye HJ, Ma L, Xie D, Pu S, Zhan DC (2022) Few-shot class-incremental learning by sampling multi-phase tasks. IEEE Trans Pattern Analy Mach Intell 45(11):12816\u201331","journal-title":"IEEE Trans Pattern Analy Mach Intell"},{"key":"2486_CR60","doi-asserted-by":"crossref","unstructured":"Zhang C, Song N, Lin G, Zheng Y, Pan P, Xu Y (2021) Few-shot incremental learning with continually evolved classifiers. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp. 12455\u201312464","DOI":"10.1109\/CVPR46437.2021.01227"},{"key":"2486_CR61","unstructured":"MITRE ATT &CK Matrix. https:\/\/attack.mitre.org"},{"key":"2486_CR62","doi-asserted-by":"crossref","unstructured":"Bang J, Kim H, Yoo Y, Ha J-W, Choi J (2021) Rainbow memory: Continual learning with a memory of diverse samples. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp. 8218\u20138227","DOI":"10.1109\/CVPR46437.2021.00812"},{"issue":"7","key":"2486_CR63","doi-asserted-by":"publisher","first-page":"8389","DOI":"10.1007\/s10489-022-03928-z","volume":"53","author":"K Zhao","year":"2023","unstructured":"Zhao K, Zhenyong F, Yang J (2023) Continual learning via region-aware memory. Appl Intell 53(7):8389\u20138401","journal-title":"Appl Intell"}],"container-title":["International Journal of Machine Learning and Cybernetics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13042-024-02486-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13042-024-02486-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13042-024-02486-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,7]],"date-time":"2025-06-07T04:32:12Z","timestamp":1749270732000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13042-024-02486-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,25]]},"references-count":63,"journal-issue":{"issue":"5-6","published-print":{"date-parts":[[2025,6]]}},"alternative-id":["2486"],"URL":"https:\/\/doi.org\/10.1007\/s13042-024-02486-9","relation":{},"ISSN":["1868-8071","1868-808X"],"issn-type":[{"value":"1868-8071","type":"print"},{"value":"1868-808X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12,25]]},"assertion":[{"value":"18 May 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 November 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 December 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no potential conflict of interest with respect to the research, authorship, and\/or publication of this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Research involving Human participants and\/or animals."}}]}}