{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T10:58:39Z","timestamp":1774522719746,"version":"3.50.1"},"reference-count":58,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T00:00:00Z","timestamp":1771200000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T00:00:00Z","timestamp":1771200000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Mach. Learn. &amp; Cyber."],"published-print":{"date-parts":[[2026,3]]},"DOI":"10.1007\/s13042-025-02840-5","type":"journal-article","created":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T10:25:35Z","timestamp":1771237535000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Anomaly-aware class-incremental learning (ACIL) framework for network intrusion detection systems"],"prefix":"10.1007","volume":"17","author":[{"given":"A. H. Nasreen","family":"Fathima","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jesher","family":"Joshua","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ansam","family":"Khraisat","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"S. P. Syed","family":"Ibrahim","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2026,2,16]]},"reference":[{"issue":"1","key":"2840_CR1","doi-asserted-by":"publisher","first-page":"686","DOI":"10.1109\/COMST.2018.2847722","volume":"21","author":"P Mishra","year":"2018","unstructured":"Mishra P, Varadharajan V, Tupakula U, Pilli ES (2018) A detailed investigation and analysis of using machine learning techniques for intrusion detection. IEEE Commun Surv Tutor 21(1):686\u2013728","journal-title":"IEEE Commun Surv Tutor"},{"key":"2840_CR2","doi-asserted-by":"publisher","unstructured":"Malaiya RK, Kwon D, Kim J, Suh SC, Kim H, Kim I (2018) An empirical evaluation of deep learning for network anomaly detection. In: 2018 International Conference on Computing, Networking and Communications (ICNC), pp 893\u2013898. https:\/\/doi.org\/10.1109\/ICCNC.2018.8390278","DOI":"10.1109\/ICCNC.2018.8390278"},{"key":"2840_CR3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3458903","author":"A Fathima","year":"2024","unstructured":"Fathima A, Ibrahim S, Khraisat A (2024) Enhancing network traffic anomaly detection: Leveraging temporal correlation index in a hybrid framework. IEEE Access. https:\/\/doi.org\/10.1109\/ACCESS.2024.3458903","journal-title":"IEEE Access"},{"issue":"1","key":"2840_CR4","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1007\/s44196-021-00047-4","volume":"14","author":"M Al-Imran","year":"2021","unstructured":"Al-Imran M, Ripon SH (2021) Network intrusion detection: an analytical assessment using deep learning and state-of-the-art machine learning models. Int J Comput Intell Syst 14(1):200","journal-title":"Int J Comput Intell Syst"},{"issue":"7","key":"2840_CR5","first-page":"3366","volume":"44","author":"M Delange","year":"2021","unstructured":"Delange M, Aljundi R, Masana M, Parisot S, Jia X, Leonardis A, Slabaugh G, Tuytelaars T (2021) A continual learning survey: defying forgetting in classification tasks. IEEE Trans Pattern Anal Mach Intell 44(7):3366\u20133385","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"2840_CR6","doi-asserted-by":"crossref","unstructured":"Shim D, Mai Z, Jeong J, Sanner S, Kim H, Jang J (2021) Online class-incremental continual learning with adversarial shapley value. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 35","DOI":"10.1609\/aaai.v35i11.17159"},{"issue":"8","key":"2840_CR7","doi-asserted-by":"publisher","first-page":"6227","DOI":"10.1007\/s00521-021-06786-x","volume":"34","author":"MM Saeed","year":"2022","unstructured":"Saeed MM (2022) A real-time adaptive network intrusion detection for streaming data: a hybrid approach. Neural Comput Appl 34(8):6227\u20136240","journal-title":"Neural Comput Appl"},{"issue":"10","key":"2840_CR8","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1109\/MCOM.003.2200306","volume":"61","author":"DM Manias","year":"2023","unstructured":"Manias DM, Chouman A, Shami A (2023) Model drift in dynamic networks. IEEE Commun Mag 61(10):78\u201384","journal-title":"IEEE Commun Mag"},{"issue":"15","key":"2840_CR9","doi-asserted-by":"publisher","first-page":"5111","DOI":"10.3390\/s21155111","volume":"21","author":"Y Kim","year":"2021","unstructured":"Kim Y, Kwon L, Park E-C (2021) Ofdma backoff control scheme for improving channel efficiency in the dynamic network environment of ieee 802.11 ax wlans. Sensors 21(15):5111","journal-title":"Sensors"},{"issue":"1","key":"2840_CR10","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1109\/TBC.2020.2983298","volume":"67","author":"I-S Com\u015fa","year":"2020","unstructured":"Com\u015fa I-S, Muntean G-M, Trestian R (2020) An innovative machine-learning-based scheduling solution for improving live uhd video streaming quality in highly dynamic network environments. IEEE Trans Broadcast 67(1):212\u2013224","journal-title":"IEEE Trans Broadcast"},{"issue":"2","key":"2840_CR11","doi-asserted-by":"publisher","first-page":"1787","DOI":"10.1109\/JIOT.2022.3209256","volume":"10","author":"Z Zhang","year":"2022","unstructured":"Zhang Z, Wei X, Lung C-H, Zhao Y (2022) icache: an intelligent caching scheme for dynamic network environments in icn-based iot networks. IEEE Internet Things J 10(2):1787\u20131799","journal-title":"IEEE Internet Things J"},{"issue":"17","key":"2840_CR12","doi-asserted-by":"publisher","first-page":"15761","DOI":"10.1109\/JIOT.2023.3265012","volume":"10","author":"A Pashamokhtari","year":"2023","unstructured":"Pashamokhtari A, Okui N, Nakahara M, Kubota A, Batista G, Gharakheili HH (2023) Dynamic inference from iot traffic flows under concept drifts in residential isp networks. IEEE Internet Things J 10(17):15761\u201315773","journal-title":"IEEE Internet Things J"},{"key":"2840_CR13","first-page":"10758","volume":"36","author":"C Wang","year":"2023","unstructured":"Wang C, Zhuang Z, Qi Q, Wang J, Wang X, Sun H, Liao J (2023) Drift doesn\u2019t matter: dynamic decomposition with diffusion reconstruction for unstable multivariate time series anomaly detection. Adv Neural Inf Process Syst 36:10758\u201310774","journal-title":"Adv Neural Inf Process Syst"},{"key":"2840_CR14","doi-asserted-by":"crossref","unstructured":"Zha C, Wang Z, Fan Y, Bai B, Zhang Y, Shi S, Zhang R (2025) A-nids: adaptive network intrusion detection system based on clustering and stacked ctgan. IEEE Trans Inf Forensics Secur","DOI":"10.1109\/TIFS.2025.3551643"},{"issue":"2","key":"2840_CR15","doi-asserted-by":"publisher","first-page":"2389","DOI":"10.1109\/TNSM.2023.3332284","volume":"21","author":"L Du","year":"2023","unstructured":"Du L, Gu Z, Wang Y, Wang L, Jia Y (2023) A few-shot class-incremental learning method for network intrusion detection. IEEE Trans Netw Serv Manage 21(2):2389\u20132401","journal-title":"IEEE Trans Netw Serv Manage"},{"key":"2840_CR16","doi-asserted-by":"crossref","unstructured":"Ashfahani A, Pratama M (2019) Autonomous deep learning: continual learning approach for dynamic environments. In: Proceedings of the 2019 SIAM International Conference on Data Mining, pp 666\u2013674. SIAM","DOI":"10.1137\/1.9781611975673.75"},{"key":"2840_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102906","volume":"122","author":"A Al-Bakaa","year":"2022","unstructured":"Al-Bakaa A, Al-Musawi B (2022) A new intrusion detection system based on using non-linear statistical analysis and features selection techniques. Comput Secur 122:102906","journal-title":"Comput Secur"},{"issue":"5","key":"2840_CR18","first-page":"4754","volume":"35","author":"Y Chai","year":"2022","unstructured":"Chai Y, Du L, Qiu J, Yin L, Tian Z (2022) Dynamic prototype network based on sample adaptation for few-shot malware detection. IEEE Trans Knowl Data Eng 35(5):4754\u201366","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"2840_CR19","doi-asserted-by":"crossref","unstructured":"Tam C, Capretz LF (2023) Investigating continual learning strategies in neural networks. In: IECON - 49th Annual Conference of the IEEE Industrial Electronics Society","DOI":"10.1109\/IECON51785.2023.10311616"},{"key":"2840_CR20","doi-asserted-by":"publisher","first-page":"42169","DOI":"10.1109\/ACCESS.2020.2977007","volume":"8","author":"Y Yang","year":"2020","unstructured":"Yang Y, Zheng K, Wu B, Yang Y, Wang X (2020) Network intrusion detection based on supervised adversarial variational auto-encoder with regularization. IEEE Access 8:42169\u201342184","journal-title":"IEEE Access"},{"key":"2840_CR21","unstructured":"Thorisson KR, Robertson P (2022) The \"explanation hypothesis\" in general self-supervised learning. In: Proceedings of the Second International Workshop on Self-Supervised Learning. Proceedings of Machine Learning Research"},{"key":"2840_CR22","doi-asserted-by":"crossref","unstructured":"Ji C, Li J, Peng H, Wu J, Fu X, Sun Q, Yu PS (2023) Unbiased and efficient self-supervised incremental contrastive learning. In: Proceedings of the Sixteenth ACM International Conference on Web Search and Data Mining, pp 922\u2013930","DOI":"10.1145\/3539597.3570458"},{"key":"2840_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2024.110476","volume":"248","author":"A Tour\u00e9","year":"2024","unstructured":"Tour\u00e9 A, Imine Y, Semnont A, Delot T, Gallais A (2024) A framework for detecting zero-day exploits in network flows. Comput Netw 248:110476. https:\/\/doi.org\/10.1016\/j.comnet.2024.110476","journal-title":"Comput Netw"},{"key":"2840_CR24","doi-asserted-by":"crossref","unstructured":"Amalapuram SK, Tadwai A, Vinta R, Channappayya SS, Tamma BR (2022) Continual learning for anomaly based network intrusion detection. In: 2022 14th International Conference on COMmunication Systems & NETworkS (COMSNETS)","DOI":"10.1109\/COMSNETS53615.2022.9668482"},{"key":"2840_CR25","doi-asserted-by":"crossref","unstructured":"Davari M, Asadi N, Mudur S, Aljundi R, Belilovsky E (2022) Probing representation forgetting in supervised and unsupervised continual learning. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","DOI":"10.1109\/CVPR52688.2022.01621"},{"issue":"11","key":"2840_CR26","doi-asserted-by":"publisher","first-page":"16428","DOI":"10.1007\/s11227-024-06070-4","volume":"80","author":"P-J Chuang","year":"2024","unstructured":"Chuang P-J, Huang P-Y (2024) Enhancing network intrusion detection by lifelong active online learning. J Supercomput 80(11):16428\u201316451","journal-title":"J Supercomput"},{"key":"2840_CR27","doi-asserted-by":"publisher","unstructured":"Pellegrini L, Graffieti G, Lomonaco V, Maltoni D (2020) Latent replay for real-time continual learning. In: 2020 IEEE\/RSJ International Conference on Intelligent Robots and Systems (IROS), pp 10203\u201310209. https:\/\/doi.org\/10.1109\/IROS45743.2020.9341460","DOI":"10.1109\/IROS45743.2020.9341460"},{"issue":"13","key":"2840_CR28","doi-asserted-by":"publisher","first-page":"3521","DOI":"10.1073\/pnas.1611835114","volume":"114","author":"J Kirkpatrick","year":"2017","unstructured":"Kirkpatrick J, Pascanu R, Rabinowitz N, Veness J, Desjardins G, Rusu AA, Milan K, Quan J, Ramalho T, Grabska-Barwinska A, Hassabis D, Clopath C, Kumaran D, Hadsell R (2017) Overcoming catastrophic forgetting in neural networks. Proc Natl Acad Sci 114(13):3521\u20133526","journal-title":"Proc Natl Acad Sci"},{"issue":"12","key":"2840_CR29","doi-asserted-by":"publisher","first-page":"2935","DOI":"10.1109\/TPAMI.2017.2773081","volume":"40","author":"Z Li","year":"2017","unstructured":"Li Z, Hoiem D (2017) Learning without forgetting. IEEE Trans Pattern Anal Mach Intell 40(12):2935\u20132947","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"2840_CR30","doi-asserted-by":"crossref","unstructured":"Rebuffi S-A, Kolesnikov A, Sperl G, Lampert CH (2017) icarl: incremental classifier and representation learning. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition","DOI":"10.1109\/CVPR.2017.587"},{"key":"2840_CR31","unstructured":"Lopez-Paz D, Ranzato M (2017) Gradient episodic memory for continual learning. Adv Neural Inform Process Syst 30"},{"key":"2840_CR32","unstructured":"Gaurav A, Vernekar S, Lee J, Abdelzad V, Czarnecki K, Sedwards S (2020) Simple continual learning strategies for safer classifiers. SafeAI@ AAAI"},{"key":"2840_CR33","doi-asserted-by":"publisher","first-page":"607","DOI":"10.1016\/j.neunet.2021.07.021","volume":"143","author":"A Cossu","year":"2021","unstructured":"Cossu A, Carta A, Lomonaco V, Bacciu D (2021) Continual learning for recurrent neural networks: an empirical evaluation. Neural Netw 143:607\u2013627","journal-title":"Neural Netw"},{"key":"2840_CR34","doi-asserted-by":"crossref","unstructured":"Th\u00f3risson KR, Bieger J, Li X, Wang P (2019) Cumulative learning. In: International Conference on Artificial General Intelligence, pp 198\u2013208. Springer","DOI":"10.1007\/978-3-030-27005-6_20"},{"key":"2840_CR35","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1007\/978-3-030-27005-6_20","volume-title":"Artif General Intell","author":"KR Th\u00f3risson","year":"2019","unstructured":"Th\u00f3risson KR, Bieger J, Li X, Wang P (2019) Cumulative learning. In: Hammer P, Agrawal P, Goertzel B, Ikl\u00e9 M (eds) Artif General Intell. Springer, Cham, pp 198\u2013208"},{"key":"2840_CR36","unstructured":"Ven GMV, Tolias AS (2019) Three scenarios for continual learning. arXiv preprint arXiv:1904.07734"},{"key":"2840_CR37","doi-asserted-by":"crossref","unstructured":"Meng Z, Zhang J, Yang C, Zhan Z, Zhao P, Wang Y (2024) Diffclass: diffusion-based class incremental learning. In: European Conference on Computer Vision, pp 142\u2013159. Springer","DOI":"10.1007\/978-3-031-73021-4_9"},{"key":"2840_CR38","doi-asserted-by":"crossref","unstructured":"Zhang X, Zhao R, Jiang Z, Chen H, Ding Y, Ngai EC, Yang S-H (2024) Continual learning with strategic selection and forgetting for network intrusion detection. arXiv preprint arXiv:2412.16264","DOI":"10.1109\/INFOCOM55648.2025.11044615"},{"key":"2840_CR39","first-page":"46323","volume":"36","author":"C Lu","year":"2023","unstructured":"Lu C, Ball P, Teh YW, Parker-Holder J (2023) Synthetic experience replay. Adv Neural Inf Process Syst 36:46323\u201346344","journal-title":"Adv Neural Inf Process Syst"},{"issue":"23","key":"2840_CR40","doi-asserted-by":"publisher","first-page":"6777","DOI":"10.3390\/s20236777","volume":"20","author":"J-L Shieh","year":"2020","unstructured":"Shieh J-L, Haq QMU, Haq MA, Karam S, Chondro P, Gao D-Q, Ruan S-J (2020) Continual learning strategy in one-stage object detection framework based on experience replay for autonomous driving vehicle. Sensors 20(23):6777","journal-title":"Sensors"},{"key":"2840_CR41","doi-asserted-by":"crossref","unstructured":"Kozal J, Zwoli\u0144ska J, Klonowski M, Wo\u017aniak M (2023) Defending network ids against adversarial examples with continual learning. In: 2023 IEEE International Conference on Data Mining Workshops (ICDMW), pp 60\u201369. IEEE","DOI":"10.1109\/ICDMW60847.2023.00017"},{"key":"2840_CR42","first-page":"17156","volume":"36","author":"S Channappayya","year":"2023","unstructured":"Channappayya S, Tamma BR et al (2023) Augmented memory replay-based continual learning approaches for network intrusion detection. Adv Neural Inf Process Syst 36:17156\u201317169","journal-title":"Adv Neural Inf Process Syst"},{"key":"2840_CR43","unstructured":"Wang R, Frans K, Abbeel P, Levine S, Efros AA (2024) Prioritized generative replay. arXiv preprint arXiv:2410.18082"},{"key":"2840_CR44","doi-asserted-by":"publisher","DOI":"10.1016\/j.enbuild.2022.112098","volume":"265","author":"Y Zhou","year":"2022","unstructured":"Zhou Y, Tian X, Zhang C, Zhao Y, Li T (2022) Elastic weight consolidation-based adaptive neural networks for dynamic building energy load prediction modeling. Energy Build 265:112098","journal-title":"Energy Build"},{"key":"2840_CR45","unstructured":"Kutalev A, Lapina A (2021) Stabilizing elastic weight consolidation method in practical ml tasks and using weight importances for neural network pruning. arXiv preprint arXiv:2109.10021"},{"key":"2840_CR46","unstructured":"Zenke F, Poole B, Ganguli S (2017) Continual learning through synaptic intelligence. In: International Conference on Machine Learning, pp 3987\u20133995. PMLR"},{"key":"2840_CR47","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1016\/j.neunet.2023.04.005","volume":"163","author":"Y Yang","year":"2023","unstructured":"Yang Y, Huang J, Hu D (2023) Lifelong learning with shared and private latent representations learned through synaptic intelligence. Neural Netw 163:165\u2013177","journal-title":"Neural Netw"},{"key":"2840_CR48","doi-asserted-by":"crossref","unstructured":"Mirzadeh SI, Farajtabar M, Li A, Levine N, Matsukawa A, Ghasemzadeh H (2020) Improved knowledge distillation via teacher assistant. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 34, pp 5191\u20135198","DOI":"10.1609\/aaai.v34i04.5963"},{"key":"2840_CR49","doi-asserted-by":"crossref","unstructured":"Sun S, Ren W, Li J, Wang R, Cao X (2024) Logit standardization in knowledge distillation. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp 15731\u201315740","DOI":"10.1109\/CVPR52733.2024.01489"},{"key":"2840_CR50","doi-asserted-by":"crossref","unstructured":"Chopra P, Kumar H, Yadav S (2025) Pnn: a novel progressive neural network for fault classification in rotating machinery under small dataset constraint. arXiv preprint arXiv:2503.18263","DOI":"10.2139\/ssrn.5243181"},{"key":"2840_CR51","doi-asserted-by":"crossref","unstructured":"Li Y, Wang X, Yang X, Bonsangue M, Zhang J, Li T (2025) Improving open-world continual learning under the constraints of scarce labeled data. arXiv preprint arXiv:2502.20974","DOI":"10.1145\/3711896.3737004"},{"key":"2840_CR52","unstructured":"Woo S, Yun J, Kim G (2025) Meta-continual learning of neural fields. arXiv preprint arXiv:2504.05806"},{"key":"2840_CR53","doi-asserted-by":"crossref","unstructured":"Amalapuram SK, Tamma BR, Channappayya SS (2024) Spider: a semi-supervised continual learning-based network intrusion detection system. In: IEEE INFOCOM 2024-IEEE Conference on Computer Communications, pp 571\u2013580. IEEE","DOI":"10.1109\/INFOCOM52122.2024.10621428"},{"key":"2840_CR54","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2025.104379","volume":"257","author":"Z Yang","year":"2025","unstructured":"Yang Z, Wang G, Guo Y, Bao X, Huang D (2025) Anomaly-aware self-supervised feature learning for weakly supervised video anomaly detection. Comput Vis Image Underst 257:104379. https:\/\/doi.org\/10.1016\/j.cviu.2025.104379","journal-title":"Comput Vis Image Underst"},{"key":"2840_CR55","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2025.128216","volume":"288","author":"H Li","year":"2025","unstructured":"Li H, Fang M, Li X, Wang G, Wang Y (2025) Anomaly-aware superpixel segmentation for sar images via deep feature learning. Expert Syst Appl 288:128216. https:\/\/doi.org\/10.1016\/j.eswa.2025.128216","journal-title":"Expert Syst Appl"},{"key":"2840_CR56","doi-asserted-by":"crossref","unstructured":"Lomonaco V, Pellegrini L, Cossu A, Carta A, Graffieti G, Hayes TL, Lange MD, Masana M, Pomponi J, Ven G, Mundt M, She Q, Cooper K, Forest J, Belouadah E, Calderara S, Parisi GI, Cuzzolin F, Tolias A, Scardapane S, Antiga L, Amhad S, Popescu A, Kanan C, Weijer J, Tuytelaars T, Bacciu D, Maltoni D (2021) Avalanche: an end-to-end library for continual learning. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","DOI":"10.1109\/CVPRW53098.2021.00399"},{"key":"2840_CR57","doi-asserted-by":"publisher","unstructured":"Tavallaee M, Bagheri E, Lu W, Ghorbani AA (2009) A detailed analysis of the kdd cup 99 data set. In: 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, pp 1\u20136. https:\/\/doi.org\/10.1109\/CISDA.2009.5356528","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"2840_CR58","doi-asserted-by":"publisher","unstructured":"Sharafaldin I, Habibi\u00a0Lashkari A, Ghorbani A (2018) Toward generating a new intrusion detection dataset and intrusion traffic characterization, pp 108\u2013116. https:\/\/doi.org\/10.5220\/0006639801080116","DOI":"10.5220\/0006639801080116"}],"container-title":["International Journal of Machine Learning and Cybernetics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13042-025-02840-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13042-025-02840-5","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13042-025-02840-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T10:02:44Z","timestamp":1774519364000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13042-025-02840-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,16]]},"references-count":58,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2026,3]]}},"alternative-id":["2840"],"URL":"https:\/\/doi.org\/10.1007\/s13042-025-02840-5","relation":{},"ISSN":["1868-8071","1868-808X"],"issn-type":[{"value":"1868-8071","type":"print"},{"value":"1868-808X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,16]]},"assertion":[{"value":"27 February 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 December 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 February 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable, as this study does not involve human participants or animal subjects.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval and consent to participate"}},{"value":"Not applicable. All datasets used in this study are publicly available.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}}],"article-number":"104"}}