{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T17:40:32Z","timestamp":1760550032404,"version":"build-2065373602"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2025,7,27]],"date-time":"2025-07-27T00:00:00Z","timestamp":1753574400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,7,27]],"date-time":"2025-07-27T00:00:00Z","timestamp":1753574400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Mach. Learn. &amp; Cyber."],"published-print":{"date-parts":[[2025,10]]},"DOI":"10.1007\/s13042-025-02733-7","type":"journal-article","created":{"date-parts":[[2025,7,27]],"date-time":"2025-07-27T05:20:15Z","timestamp":1753593615000},"page":"8441-8471","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Innovative feature extraction and selection for wireless sensor networks: enhancing cybersecurity and data transmission using WKPCA-SVD and RWS-ARO algorithms"],"prefix":"10.1007","volume":"16","author":[{"given":"G.","family":"Shanmugasundaram","sequence":"first","affiliation":[]},{"given":"P.","family":"Iyappan","sequence":"additional","affiliation":[]},{"given":"R.","family":"Ramachandiran","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,27]]},"reference":[{"issue":"14","key":"2733_CR1","doi-asserted-by":"publisher","first-page":"4821","DOI":"10.3390\/s21144821","volume":"21","author":"R Ahmad","year":"2021","unstructured":"Ahmad R, Wazirali R, Bsoul Q, Abu-Ain T, Abu-Ain W (2021) Feature-selection and mutual-clustering approaches to improve DoS detection and maintain WSNs\u2019 lifetime. Sensors 21(14):4821. https:\/\/doi.org\/10.3390\/s21144821","journal-title":"Sensors"},{"key":"2733_CR2","doi-asserted-by":"publisher","unstructured":"Ali S, Ashraf H, Ullah A, Jhanjhi NZ (2024) Systematic literature review of security schemes for data exchange in wireless sensor network. Authorea Preprints. https:\/\/doi.org\/10.36227\/techrxiv.170492367.76189095\/v1","DOI":"10.36227\/techrxiv.170492367.76189095\/v1"},{"key":"2733_CR3","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-024-19516-x","author":"M Anoop","year":"2024","unstructured":"Anoop M, Mary LW, Wilson AJ, Kiran WS (2024) Optimized graph transformer with molecule attention network based multi class attack detection framework for enhancing privacy and security in WSN. Multimed Tools Appl. https:\/\/doi.org\/10.1007\/s11042-024-19516-x","journal-title":"Multimed Tools Appl"},{"key":"2733_CR4","doi-asserted-by":"publisher","first-page":"1419","DOI":"10.1007\/s13042-017-0653-0","volume":"9","author":"SB Chandanapalli","year":"2018","unstructured":"Chandanapalli SB, Reddy ES, Lakshmi DR (2018) DFTDT: distributed functional tangent decision tree for aqua status prediction in wireless sensor networks. Int J Mach Learn Cybern 9:1419\u20131434. https:\/\/doi.org\/10.1007\/s13042-017-0653-0","journal-title":"Int J Mach Learn Cybern"},{"key":"2733_CR5","doi-asserted-by":"publisher","unstructured":"Darbandi M (2017) Proposing new intelligence algorithm for suggesting better services to cloud users based on Kalman filtering. J Comput Sci Appl 5(1):11\u201316. ISSN: 2328-7268. https:\/\/doi.org\/10.12691\/jcsa-5-1-2","DOI":"10.12691\/jcsa-5-1-2"},{"key":"2733_CR6","doi-asserted-by":"crossref","unstructured":"Darbandi M, Abedi M, Fard S, Nakhodchi S (2012) Involving Kalman filter technique for increasing the reliability and efficiency of cloud computing. In: Proceedings of the International Conference on Scientific Computing (CSC) (1).The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp)","DOI":"10.1109\/ICAICT.2012.6398466"},{"key":"2733_CR7","doi-asserted-by":"publisher","unstructured":"Darbandi M, Haghgoo S, Hajiali M, Khabir A (2018) Prediction and estimation of next demands of cloud users based on their comments in CRM and previous usages. In: 2018 International Conference on Communication, Computing and Internet of Things (IC3IoT). IEEE, pp 81\u201386. https:\/\/doi.org\/10.1109\/IC3IoT.2018.8668119","DOI":"10.1109\/IC3IoT.2018.8668119"},{"issue":"1","key":"2733_CR8","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1007\/s10207-023-00737-4","volume":"23","author":"K Dinesh","year":"2024","unstructured":"Dinesh K, Santhosh Kumar SVN (2024) Energy-efficient trust-aware secured neuro-fuzzy clustering with sparrow search optimization in wireless sensor network. Int J Inf Secur 23(1):199\u2013223. https:\/\/doi.org\/10.1007\/s10207-023-00737-4","journal-title":"Int J Inf Secur"},{"issue":"13","key":"2733_CR9","doi-asserted-by":"publisher","first-page":"1539","DOI":"10.3390\/electronics10131539","volume":"10","author":"Q Ding","year":"2021","unstructured":"Ding Q, Zhu R, Liu H, Ma M (2021) An overview of machine learning-based energy-efficient routing algorithms in wireless sensor networks. Electronics 10(13):1539. https:\/\/doi.org\/10.3390\/electronics10131539","journal-title":"Electronics"},{"issue":"1","key":"2733_CR10","doi-asserted-by":"publisher","first-page":"38","DOI":"10.34028\/iajit\/20\/1\/5","volume":"20","author":"E Elbasi","year":"2023","unstructured":"Elbasi E, Zreikat AI (2023) Heart disease classification for early diagnosis based on adaptive hoeffding tree algorithm in IoMT data. Int. Arab J. Inf. Technol 20(1):38\u201348. https:\/\/doi.org\/10.34028\/iajit\/20\/1\/5","journal-title":"Int. Arab J. Inf. Technol"},{"key":"2733_CR11","doi-asserted-by":"publisher","first-page":"184797902311572","DOI":"10.1177\/18479790231157220","volume":"15","author":"M Faris","year":"2023","unstructured":"Faris M, Mahmud MN, Salleh MFM, Alnoor A (2023) Wireless sensor network security: a recent review based on state-of-the-art works. Int J Eng Bus Manag 15:18479790231157220. https:\/\/doi.org\/10.1177\/18479790231157220","journal-title":"Int J Eng Bus Manag"},{"key":"2733_CR12","doi-asserted-by":"publisher","first-page":"120346","DOI":"10.1016\/j.eswa.2023.120346","volume":"227","author":"B G\u00fclmez","year":"2023","unstructured":"G\u00fclmez B (2023) Stock price prediction with optimized deep LSTM network with artificial rabbits optimization algorithm. Expert Syst Appl 227:120346. https:\/\/doi.org\/10.1016\/j.eswa.2023.120346","journal-title":"Expert Syst Appl"},{"issue":"21","key":"2733_CR13","doi-asserted-by":"publisher","first-page":"8839","DOI":"10.3390\/s23218839","volume":"23","author":"D Gupta","year":"2023","unstructured":"Gupta D, Wadhwa S, Rani S, Khan Z, Boulila W (2023) EEDC: an energy efficient data communication scheme based on new routing approach in wireless sensor networks for future IoT applications. Sensors 23(21):8839. https:\/\/doi.org\/10.3390\/s23218839","journal-title":"Sensors"},{"issue":"2","key":"2733_CR14","doi-asserted-by":"publisher","first-page":"1520","DOI":"10.1002\/widm.1520","volume":"14","author":"A Heidari","year":"2024","unstructured":"Heidari A, Jafari Navimipour N, Dag H, Unal M (2024) Deepfake detection using deep learning methods: a systematic and comprehensive review. Wiley Interdiscip Rev Data Min Knowl Discov 14(2):1520. https:\/\/doi.org\/10.1002\/widm.1520","journal-title":"Wiley Interdiscip Rev Data Min Knowl Discov"},{"key":"2733_CR15","doi-asserted-by":"publisher","DOI":"10.1007\/s12559-024-10255-7","author":"A Heidari","year":"2024","unstructured":"Heidari A, Navimipour NJ, Dag H, Talebi S, Unal M (2024) A novel blockchain-based deepfake detection method using federated and deep learning models. Cogn Comput. https:\/\/doi.org\/10.1007\/s12559-024-10255-7","journal-title":"Cogn Comput"},{"key":"2733_CR16","doi-asserted-by":"publisher","unstructured":"Heidari A, Navimipour NJ, Otsuki A (2024) Cloud-based non-destructive characterization. In: Non destructive material characterization methods, pp 727\u2013765. https:\/\/doi.org\/10.1016\/B978-0-323-91150-4.00006-9","DOI":"10.1016\/B978-0-323-91150-4.00006-9"},{"issue":"10","key":"2733_CR17","doi-asserted-by":"publisher","first-page":"8445","DOI":"10.1109\/JIOT.2023.3237661","volume":"10","author":"A Heidari","year":"2023","unstructured":"Heidari A, Navimipour NJ, Unal M (2023) A secure intrusion detection platform using blockchain and radial basis function neural networks for internet of drones. IEEE Internet Things J 10(10):8445\u20138454. https:\/\/doi.org\/10.1109\/JIOT.2023.3237661","journal-title":"IEEE Internet Things J"},{"issue":"6","key":"2733_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10586-024-04351-4","volume":"27","author":"A Heidari","year":"2024","unstructured":"Heidari A, Shishehlou H, Darbandi M, Navimipour NJ, Yalcin S (2024) A reliable method for data aggregation on the industrial internet of things using a hybrid optimization algorithm and density correlation degree. Clust Comput 27(6):1\u201319. https:\/\/doi.org\/10.1007\/s10586-024-04351-4","journal-title":"Clust Comput"},{"issue":"10","key":"2733_CR19","doi-asserted-by":"publisher","first-page":"3337","DOI":"10.1007\/s13042-023-01836-3","volume":"14","author":"J Huang","year":"2023","unstructured":"Huang J, Li J, Oh J, Kang H (2023) LSTM with spatiotemporal attention for IoT-based wireless sensor collected hydrological time-series forecasting. Int J Mach Learn Cybern 14(10):3337\u20133352. https:\/\/doi.org\/10.1007\/s13042-023-01836-3","journal-title":"Int J Mach Learn Cybern"},{"issue":"6","key":"2733_CR20","doi-asserted-by":"publisher","first-page":"200","DOI":"10.3390\/fi15060200","volume":"15","author":"S Ismail","year":"2023","unstructured":"Ismail S, Dawoud DW, Reza H (2023) Securing wireless sensor networks using machine learning and blockchain: a review. Future Internet 15(6):200. https:\/\/doi.org\/10.3390\/fi15060200","journal-title":"Future Internet"},{"key":"2733_CR21","doi-asserted-by":"publisher","first-page":"23290","DOI":"10.1109\/ACCESS.2024.3360488","volume":"12","author":"OA Khashan","year":"2024","unstructured":"Khashan OA, Khafajah NM, Alomoush W, Alshinwan M (2024) Innovative energy-efficient proxy re-encryption for secure data exchange in Wireless sensor networks. IEEE Access 12:23290\u201323304. https:\/\/doi.org\/10.1109\/ACCESS.2024.3360488","journal-title":"IEEE Access"},{"issue":"3","key":"2733_CR22","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1080\/0952813X.2021.1882002","volume":"34","author":"PS Khot","year":"2022","unstructured":"Khot PS, Naik UL (2022) Cellular automata-based optimised routing for secure data transmission in wireless sensor networks. J Exp Theor Artif Intell 34(3):431\u2013449. https:\/\/doi.org\/10.1080\/0952813X.2021.1882002","journal-title":"J Exp Theor Artif Intell"},{"key":"2733_CR23","doi-asserted-by":"publisher","first-page":"123184","DOI":"10.1016\/j.eswa.2024.123184","volume":"246","author":"MS Kumar","year":"2024","unstructured":"Kumar MS, Kumar PG (2024) A public static agreement key based cryptography for secure data transmission in WSN based smart environment application. Expert Syst Appl 246:123184. https:\/\/doi.org\/10.1016\/j.eswa.2024.123184","journal-title":"Expert Syst Appl"},{"key":"2733_CR24","doi-asserted-by":"publisher","first-page":"102760","DOI":"10.1016\/j.sysarc.2022.102760","volume":"133","author":"L Li","year":"2022","unstructured":"Li L, Li S, Peng H, Bi J (2022) An efficient secure data transmission and node authentication scheme for wireless sensing networks. J Syst Architect 133:102760. https:\/\/doi.org\/10.1016\/j.sysarc.2022.102760","journal-title":"J Syst Architect"},{"issue":"1","key":"2733_CR25","doi-asserted-by":"publisher","first-page":"368","DOI":"10.1109\/TITS.2020.3011452","volume":"23","author":"J Liang","year":"2020","unstructured":"Liang J, Ma M (2020) FS-MOEA: a novel feature selection algorithm for IDSs in vehicular networks. IEEE Trans Intell Transp Syst 23(1):368\u2013382. https:\/\/doi.org\/10.1109\/TITS.2020.3011452","journal-title":"IEEE Trans Intell Transp Syst"},{"issue":"10","key":"2733_CR26","doi-asserted-by":"publisher","first-page":"0258326","DOI":"10.1371\/journal.pone.0258326","volume":"16","author":"WB Liu","year":"2021","unstructured":"Liu WB, Liang SN, Qin XW (2021) A novel dimension reduction algorithm based on weighted kernel principal analysis for gene expression data. PLoS ONE 16(10):0258326. https:\/\/doi.org\/10.1371\/journal.pone.0258326","journal-title":"PLoS ONE"},{"issue":"5","key":"2733_CR27","doi-asserted-by":"publisher","first-page":"888","DOI":"10.1049\/iet-com.2019.0172","volume":"14","author":"P Nancy","year":"2020","unstructured":"Nancy P, Muthurajkumar S, Ganapathy S, Santhosh Kumar SVN, Selvi M, Arputharaj K (2020) Intrusion detection using dynamic feature selection and fuzzy temporal decision tree classification for wireless sensor networks. IET Commun 14(5):888\u2013895. https:\/\/doi.org\/10.1049\/iet-com.2019.0172","journal-title":"IET Commun"},{"issue":"2","key":"2733_CR28","doi-asserted-by":"publisher","first-page":"101866","DOI":"10.1016\/j.asej.2022.101866","volume":"14","author":"U Panahi","year":"2023","unstructured":"Panahi U, Bay\u0131lm\u0131\u015f C (2023) Enabling secure data transmission for wireless sensor networks based IoT applications. Ain Shams Eng J 14(2):101866. https:\/\/doi.org\/10.1016\/j.asej.2022.101866","journal-title":"Ain Shams Eng J"},{"issue":"8","key":"2733_CR29","doi-asserted-by":"publisher","first-page":"2284","DOI":"10.3390\/en14082284","volume":"14","author":"K Przystupa","year":"2021","unstructured":"Przystupa K, Beshley M, Hordiichuk-Bublivska O, Kyryk M, Beshley H, Pyrih J, Selech J (2021) Distributed singular value decomposition method for fast data processing in recommendation systems. Energies 14(8):2284. https:\/\/doi.org\/10.3390\/en14082284","journal-title":"Energies"},{"key":"2733_CR30","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-024-03802-5","author":"V Rajaram","year":"2024","unstructured":"Rajaram V, Pandimurugan V, Rajasoundaran S, Rodrigues P, Kumar SS, Selvi M, Loganathan V (2024) Enriched energy optimized LEACH protocol for efficient data transmission in wireless sensor network. Wirel Netw. https:\/\/doi.org\/10.1007\/s11276-024-03802-5","journal-title":"Wirel Netw"},{"issue":"1","key":"2733_CR31","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1186\/s13677-024-00685-x","volume":"13","author":"M Sajid","year":"2024","unstructured":"Sajid M, Malik KR, Almogren A, Malik TS, Khan AH, Tanveer J, Rehman AU (2024) Enhancing intrusion detection: a hybrid machine and deep learning approach. J Cloud Comput 13(1):123. https:\/\/doi.org\/10.1186\/s13677-024-00685-x","journal-title":"J Cloud Comput"},{"key":"2733_CR32","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-021-02946-y","author":"NM Saravana Kumar","year":"2022","unstructured":"Saravana Kumar NM, Suryaprabha E, Hariprasath K (2022) Machine learning based hybrid model for energy efficient secured transmission in wireless sensor networks. J Ambient Intell Humaniz Comput. https:\/\/doi.org\/10.1007\/s12652-021-02946-y","journal-title":"J Ambient Intell Humaniz Comput"},{"issue":"4","key":"2733_CR33","doi-asserted-by":"publisher","first-page":"15711","DOI":"10.48084\/etasr.7633","volume":"14","author":"M Sirajuddin","year":"2024","unstructured":"Sirajuddin M, Ravela C, Krishna SR, Ahamed SK, Basha SK, Basha NMJ (2024) A secure framework based on hybrid cryptographic scheme and trusted routing to enhance the QoS of a WSN. Eng Technol Appl Sci Res 14(4):15711\u201315716. https:\/\/doi.org\/10.48084\/etasr.7633","journal-title":"Eng Technol Appl Sci Res"},{"issue":"9","key":"2733_CR34","doi-asserted-by":"publisher","first-page":"1981","DOI":"10.1007\/s13042-020-01088-5","volume":"11","author":"G Srivastava","year":"2020","unstructured":"Srivastava G, Venkatesh P, Singh A (2020) An evolution strategy based approach for cover scheduling problem in wireless sensor networks. Int J Mach Learn Cybern 11(9):1981\u20132006","journal-title":"Int J Mach Learn Cybern"},{"issue":"4","key":"2733_CR35","doi-asserted-by":"publisher","first-page":"102644","DOI":"10.1016\/j.asej.2024.102644","volume":"15","author":"I Surenther","year":"2024","unstructured":"Surenther I, Sridhar KP, Roberts MK (2024) Enhancing data transmission efficiency in wireless sensor networks through machine learning-enabled energy optimization: a grouping model approach. Ain Shams Eng J 15(4):102644. https:\/\/doi.org\/10.1016\/j.asej.2024.102644","journal-title":"Ain Shams Eng J"},{"issue":"3","key":"2733_CR36","doi-asserted-by":"publisher","first-page":"682","DOI":"10.3390\/math11030682","volume":"11","author":"Y Tian","year":"2023","unstructured":"Tian Y, Zhang Y, Zhang H (2023) Recent advances in stochastic gradient descent in deep learning. Mathematics 11(3):682. https:\/\/doi.org\/10.3390\/math11030682","journal-title":"Mathematics"},{"key":"2733_CR37","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1016\/j.aej.2023.03.061","volume":"72","author":"S Urooj","year":"2023","unstructured":"Urooj S, Lata S, Ahmad S, Mehfuz S, Kalathil S (2023) Cryptographic data security for reliable wireless sensor network. Alex Eng J 72:37\u201350. https:\/\/doi.org\/10.1016\/j.aej.2023.03.061","journal-title":"Alex Eng J"},{"issue":"16","key":"2733_CR38","doi-asserted-by":"publisher","first-page":"8091","DOI":"10.1002\/cpe.8091","volume":"36","author":"A Vakili","year":"2024","unstructured":"Vakili A, Al-Khafaji HMR, Darbandi M, Heidari A, Jafari Navimipour N, Unal M (2024) A new service composition method in the cloud-based internet of things environment using a grey wolf optimization algorithm and mapreduce framework. Concurr Comput Pract Exp 36(16):8091. https:\/\/doi.org\/10.1002\/cpe.8091","journal-title":"Concurr Comput Pract Exp"},{"key":"2733_CR39","doi-asserted-by":"publisher","first-page":"101150","DOI":"10.1016\/j.measen.2024.101150","volume":"33","author":"BP Valluri","year":"2024","unstructured":"Valluri BP, Sharma N (2024) Exceptional key based node validation for secure data transmission using asymmetric cryptography in wireless sensor networks. Meas Sens 33:101150. https:\/\/doi.org\/10.1016\/j.measen.2024.101150","journal-title":"Meas Sens"},{"issue":"01n02","key":"2733_CR40","doi-asserted-by":"publisher","first-page":"2350002","DOI":"10.1142\/S0218843023500028","volume":"32","author":"D Vimala","year":"2023","unstructured":"Vimala D, Manikandan K (2023) PIRAP: intelligent hybrid approach for secure data transmission in wireless sensor networks. Int J Coop Inf Syst 32(01n02):2350002. https:\/\/doi.org\/10.1142\/S0218843023500028","journal-title":"Int J Coop Inf Syst"},{"key":"2733_CR41","doi-asserted-by":"publisher","first-page":"1471","DOI":"10.1007\/s13042-016-0518-y","volume":"8","author":"Z Wang","year":"2017","unstructured":"Wang Z, Wang X, Liu L, Huang M, Zhang Y (2017) Decentralized feedback control for wireless sensor and actuator networks with multiple controllers. Int J Mach Learn Cybern 8:1471\u20131483. https:\/\/doi.org\/10.1007\/s13042-016-0518-y","journal-title":"Int J Mach Learn Cybern"},{"issue":"15","key":"2733_CR42","doi-asserted-by":"publisher","first-page":"5886","DOI":"10.1002\/dac.5886","volume":"37","author":"K Zanbouri","year":"2024","unstructured":"Zanbouri K, Darbandi M, Nassr M, Heidari A, Navimipour NJ, Yalc\u0131n S (2024) A GSO-based multi-objective technique for performance optimization of blockchain-based industrial internet of things. Int J Commun Syst 37(15):5886. https:\/\/doi.org\/10.1002\/dac.5886","journal-title":"Int J Commun Syst"},{"key":"2733_CR43","unstructured":"Zhao Z, Li Z, An T, Wei S (2024) Improved dandelion optimizer based on elite pool and mirror optimization strategy.\u00a0Eng Lett 32(2)"},{"key":"2733_CR44","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1016\/j.future.2022.04.024","volume":"135","author":"L Zhiqiang","year":"2022","unstructured":"Zhiqiang L, Mohiuddin G, Jiangbin Z, Asim M, Sifei W (2022) Intrusion detection in wireless sensor network using enhanced empirical based component analysis. Futur Gener Comput Syst 135:181\u2013193. https:\/\/doi.org\/10.1016\/j.future.2022.04.024","journal-title":"Futur Gener Comput Syst"}],"container-title":["International Journal of Machine Learning and Cybernetics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13042-025-02733-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13042-025-02733-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13042-025-02733-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T17:02:11Z","timestamp":1760547731000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13042-025-02733-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,27]]},"references-count":44,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2025,10]]}},"alternative-id":["2733"],"URL":"https:\/\/doi.org\/10.1007\/s13042-025-02733-7","relation":{},"ISSN":["1868-8071","1868-808X"],"issn-type":[{"type":"print","value":"1868-8071"},{"type":"electronic","value":"1868-808X"}],"subject":[],"published":{"date-parts":[[2025,7,27]]},"assertion":[{"value":"19 October 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 June 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 July 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}