{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T19:35:57Z","timestamp":1774467357391,"version":"3.50.1"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2024,8,13]],"date-time":"2024-08-13T00:00:00Z","timestamp":1723507200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,8,13]],"date-time":"2024-08-13T00:00:00Z","timestamp":1723507200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61972324"],"award-info":[{"award-number":["61972324"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61972324"],"award-info":[{"award-number":["61972324"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61972324"],"award-info":[{"award-number":["61972324"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61972324"],"award-info":[{"award-number":["61972324"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100012542","name":"Sichuan Province Science and Technology Support Program","doi-asserted-by":"publisher","award":["2023NSFSC1985"],"award-info":[{"award-number":["2023NSFSC1985"]}],"id":[{"id":"10.13039\/100012542","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100012542","name":"Sichuan Province Science and Technology Support Program","doi-asserted-by":"publisher","award":["2023NSFSC1985"],"award-info":[{"award-number":["2023NSFSC1985"]}],"id":[{"id":"10.13039\/100012542","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100012542","name":"Sichuan Province Science and Technology Support Program","doi-asserted-by":"publisher","award":["2023NSFSC1985"],"award-info":[{"award-number":["2023NSFSC1985"]}],"id":[{"id":"10.13039\/100012542","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100012542","name":"Sichuan Province Science and Technology Support Program","doi-asserted-by":"publisher","award":["2023NSFSC1985"],"award-info":[{"award-number":["2023NSFSC1985"]}],"id":[{"id":"10.13039\/100012542","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Research Fund of Chengdu University of Information Technology","award":["KYTD202212"],"award-info":[{"award-number":["KYTD202212"]}]},{"name":"Research Fund of Chengdu University of Information Technology","award":["KYTD202212"],"award-info":[{"award-number":["KYTD202212"]}]},{"name":"Research Fund of Chengdu University of Information Technology","award":["KYTD202212"],"award-info":[{"award-number":["KYTD202212"]}]},{"name":"Research Fund of Chengdu University of Information Technology","award":["KYTD202212"],"award-info":[{"award-number":["KYTD202212"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Membr Comput"],"published-print":{"date-parts":[[2024,12]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Spiking neural P systems are third-generation neural networks that are much more energy efficient than the current ones. In this paper, we investigate for the first time the possibility of using spiking neural P systems to solve cybersecurity-related problems. We proposed a new architecture called cyber spiking neural P systems (Cyber-SN P systems for short), which is designed especially for cybersecurity data and problems. We trained multiple Cyber-SN P systems to detect malware on the Android platform, phishing websites, and spam e-mails. We show through experiments that these networks can efficiently classify cybersecurity-related data with much fewer training epochs than perceptron-based artificial neural networks.<\/jats:p>","DOI":"10.1007\/s41965-024-00166-9","type":"journal-article","created":{"date-parts":[[2024,8,13]],"date-time":"2024-08-13T13:03:55Z","timestamp":1723554235000},"page":"310-317","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Applications of spiking neural P systems in cybersecurity"],"prefix":"10.1007","volume":"6","author":[{"given":"Mihail-Iulian","family":"Ple\u1e63a","sequence":"first","affiliation":[]},{"given":"Marian","family":"Gheorghe","sequence":"additional","affiliation":[]},{"given":"Florentin","family":"Ipate","sequence":"additional","affiliation":[]},{"given":"Gexiang","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,8,13]]},"reference":[{"key":"166_CR1","unstructured":"Agarap, Abien Fred. (2018). Deep learning using rectified linear units (ReLU). arXiv preprint arXiv:1803.08375"},{"key":"166_CR2","doi-asserted-by":"crossref","unstructured":"Arp, Daniel, Spreitzenbarth, Michael, Hubner, Malte, Gascon, Hugo, Rieck, Konrad, & Siemens, CERT. (2014). Drebin: Effective and explainable detection of Android malware in your pocket. In NDSS. (Vol.\u00a014, pp. 23\u201326).","DOI":"10.14722\/ndss.2014.23247"},{"issue":"4","key":"166_CR3","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1007\/s41965-020-00060-0","volume":"2","author":"T Bao","year":"2020","unstructured":"Bao, T., Zhou, N., Lv, Z., Peng, H., & Wang, J. (2020). Sequential dynamic threshold neural P systems. Journal of Membrane Computing, 2(4), 255\u2013268.","journal-title":"Journal of Membrane Computing"},{"key":"166_CR4","doi-asserted-by":"crossref","unstructured":"Bhandari, S., Gupta, R., Laxmi, V., Gaur, M. S., Zemmari, A., & Anikeev, M. (2015). DRACO: DRoid analyst combo an Android malware analysis framework. In Proceedings of the 8th International Conference on Security of Information and Networks (pp. 283\u2013289).","DOI":"10.1145\/2799979.2800003"},{"issue":"3","key":"166_CR5","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/s41965-022-00108-3","volume":"4","author":"YP Ceon","year":"2022","unstructured":"Ceon, Y. P., Anandharaj, H. C., Jebasingh, S., & Chandy, D. A. (2022). Generation of chain code pictures using cell-like spiking neural P system with several types of spikes. Journal of Membrane Computing, 4(3), 243\u2013250.","journal-title":"Journal of Membrane Computing"},{"key":"166_CR6","first-page":"173","volume":"16","author":"Y Chen","year":"2021","unstructured":"Chen, Y., Chen, Y., Zhang, G., Paul, P., Wu, T., Zhang, X., Rong, H., & Ma, X. (2021). A survey of learning spiking neural p systems and a novel instance. International Journal of Unconventional Computing, 16, 173\u2013200.","journal-title":"International Journal of Unconventional Computing"},{"key":"166_CR7","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1016\/j.ins.2019.01.064","volume":"484","author":"Kang Leng Chiew","year":"2019","unstructured":"Chiew, Kang Leng, Tan, Choon Lin, Wong, KokSheik, Yong, Kelvin SC., & Tiong, Wei King. (2019). A new hybrid ensemble feature selection framework for machine learning-based phishing detection system. Information Sciences, 484, 153\u2013166.","journal-title":"Information Sciences"},{"issue":"6","key":"166_CR8","doi-asserted-by":"publisher","first-page":"1080","DOI":"10.1016\/j.heliyon.2019.e01802","volume":"5","author":"EG Dada","year":"2019","unstructured":"Dada, E. G., Bassi, J. S., Chiroma, H., Adetunmbi, A. O., & Ajibuwa, O. E. (2019). Machine learning for email spam filtering: Review, approaches and open research problems. Heliyon, 5(6), 1080.","journal-title":"Heliyon"},{"issue":"6","key":"166_CR9","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1109\/MSP.2012.2211477","volume":"29","author":"L Deng","year":"2012","unstructured":"Deng, L. (2012). The MNIST database of handwritten digit images for machine learning research. IEEE Signal Processing Magazine, 29(6), 141\u2013142.","journal-title":"IEEE Signal Processing Magazine"},{"issue":"1","key":"166_CR10","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1007\/s41965-018-00002-x","volume":"1","author":"D D\u00edaz-Pernil","year":"2019","unstructured":"D\u00edaz-Pernil, D., Guti\u00e9rrez-Naranjo, M. A., & Peng, H. (2019). Membrane computing and image processing: a short survey. Journal of Membrane Computing, 1(1), 58\u201373.","journal-title":"Journal of Membrane Computing"},{"key":"166_CR11","doi-asserted-by":"publisher","first-page":"101941","DOI":"10.1016\/j.cose.2020.101941","volume":"97","author":"M Evangelou","year":"2020","unstructured":"Evangelou, M., & Adams, N. M. (2020). An anomaly detection framework for cyber-security data. Computers & Security, 97, 101941.","journal-title":"Computers & Security"},{"key":"166_CR12","volume-title":"Hands-on machine learning with Scikit-Learn and TensorFlow: Concepts, tools, and techniques to build intelligent systems","author":"A Geron","year":"2017","unstructured":"Geron, A. (2017). Hands-on machine learning with Scikit-Learn and TensorFlow: Concepts, tools, and techniques to build intelligent systems. Sebastopol, CA: O\u2019Reilly Media."},{"key":"166_CR13","volume-title":"Deep learning","author":"I Goodfellow","year":"2016","unstructured":"Goodfellow, I., Bengio, Y., & Courville, A. (2016). Deep learning. MIT press."},{"key":"166_CR14","doi-asserted-by":"publisher","first-page":"19572","DOI":"10.1109\/ACCESS.2022.3151248","volume":"10","author":"A Halbouni","year":"2022","unstructured":"Halbouni, A., Gunawan, T. S., Habaebi, M. H., Halbouni, M., Kartiwi, M., & Ahmad, R. (2022). Machine learning and deep learning approaches for cybersecurity: A review. IEEE Access, 10, 19572\u201319585.","journal-title":"IEEE Access"},{"key":"166_CR15","doi-asserted-by":"crossref","unstructured":"Hou, S., Saas, A., Ye, Y., & Chen, L. (2016). Droiddelver: An Android malware detection system using deep belief network based on API call blocks. In Web-Age Information Management: WAIM 2016 International Workshops, MWDA, SDMMW, and SemiBDMA, Nanchang, China, June 3\u20135, 2016, Revised Selected Papers 17 (pp. 54\u201366). Springer.","DOI":"10.1007\/978-3-319-47121-1_5"},{"issue":"2\u20133","key":"166_CR16","first-page":"279","volume":"71","author":"M Ionescu","year":"2006","unstructured":"Ionescu, M., P\u0103un, G., & Yokomori, T. (2006). Spiking neural P systems. Fundamenta Informaticae, 71(2\u20133), 279\u2013308.","journal-title":"Fundamenta Informaticae"},{"key":"166_CR17","doi-asserted-by":"crossref","unstructured":"Kumar, S., Das, S., Badone, G., & Kumar, A. (2022). A Survey on Efficient Interconnects for Neuromorphic Systems. In Soft Computing: Theories and Applications: Proceedings of SoCTA 2021 (pp. 709\u2013718). Springer.","DOI":"10.1007\/978-981-19-0707-4_64"},{"issue":"6","key":"166_CR18","doi-asserted-by":"publisher","first-page":"1206","DOI":"10.1049\/cje.2018.09.008","volume":"27","author":"J Li","year":"2018","unstructured":"Li, J., Wang, Z., Wang, T., Tang, J., Yang, Y., & Zhou, Y. (2018). An Android malware detection system based on feature fusion. Chinese Journal of Electronics, 27(6), 1206\u20131213.","journal-title":"Chinese Journal of Electronics"},{"issue":"7","key":"166_CR19","doi-asserted-by":"publisher","first-page":"3216","DOI":"10.1109\/TII.2017.2789219","volume":"14","author":"J Li","year":"2018","unstructured":"Li, J., Sun, L., Yan, Q., Li, Z., Srisa-An, W., & Ye, H. (2018). Significant permission identification for machine-learning-based Android malware detection. IEEE Transactions on Industrial Informatics, 14(7), 3216\u20133225.","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"166_CR20","unstructured":"Metsis, V., Androutsopoulos, I., Paliouras, G. (2006). Spam filtering with naive bayes-which naive bayes? In CEAS (Vol.\u00a017, pp. 28\u201369). Mountain View, CA."},{"issue":"4","key":"166_CR21","doi-asserted-by":"publisher","first-page":"284","DOI":"10.1007\/s41965-021-00087-x","volume":"3","author":"S Mi","year":"2021","unstructured":"Mi, S., Zhang, L., Peng, H., & Wang, J. (2021). Medical image fusion based on DTNP systems and Laplacian pyramid. Journal of Membrane Computing, 3(4), 284\u2013295.","journal-title":"Journal of Membrane Computing"},{"key":"166_CR22","doi-asserted-by":"publisher","first-page":"57","DOI":"10.58496\/MJCS\/2023\/010","volume":"2023","author":"M Mijwil","year":"2023","unstructured":"Mijwil, M., Unogwu, O. J., Filali, Y., Bala, I., & Al-Shahwani, H. (2023). Exploring the top five evolving threats in cybersecurity: an in-depth overview. Mesopotamian Journal of Cybersecurity, 2023, 57\u201363.","journal-title":"Mesopotamian Journal of Cybersecurity"},{"key":"166_CR23","doi-asserted-by":"publisher","first-page":"110266","DOI":"10.1016\/j.knosys.2023.110266","volume":"262","author":"L Pan","year":"2023","unstructured":"Pan, L., Song, B., & Zandron, C. (2023). On the computational efficiency of tissue P systems with evolutional symport\/antiport rules. Knowledge-Based Systems, 262, 110266.","journal-title":"Knowledge-Based Systems"},{"key":"166_CR24","doi-asserted-by":"publisher","first-page":"116363","DOI":"10.1109\/ACCESS.2020.3002842","volume":"8","author":"Y Pan","year":"2020","unstructured":"Pan, Y., Ge, X., Fang, C., & Fan, Y. (2020). A systematic literature review of Android malware detection using static analysis. IEEE Access, 8, 116363\u2013116379.","journal-title":"IEEE Access"},{"key":"166_CR25","doi-asserted-by":"crossref","unstructured":"Pennington, J., Socher, R., Manning, C. D. (2014). Glove: Global vectors for word representation. In Proceedings of the 2014 conference on empirical methods in natural language processing (EMNLP) (pp. 1532\u20131543)","DOI":"10.3115\/v1\/D14-1162"},{"issue":"4","key":"166_CR26","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1007\/s41965-022-00110-9","volume":"4","author":"MI Plesa","year":"2022","unstructured":"Plesa, M. I., Gheoghe, M., Ipate, F., & Zhang, G. (2022). A key agreement protocol based on spiking neural P systems with anti-spikes. Journal of Membrane Computing, 4(4), 341\u2013351.","journal-title":"Journal of Membrane Computing"},{"issue":"16","key":"166_CR27","doi-asserted-by":"publisher","first-page":"10237","DOI":"10.1073\/pnas.172399499","volume":"99","author":"ME Raichle","year":"2002","unstructured":"Raichle, M. E., & Gusnard, D. A. (2002). Appraising the brain\u2019s energy budget. Proceedings of the National Academy of Sciences, 99(16), 10237\u201310239.","journal-title":"Proceedings of the National Academy of Sciences"},{"key":"166_CR28","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1016\/j.ins.2011.08.020","volume":"231","author":"I Santos","year":"2013","unstructured":"Santos, I., Brezo, F., Ugarte-Pedrero, X., & Bringas, P. G. (2013). Opcode sequences as representation of executables for data-mining-based unknown malware detection. Information Sciences, 231, 64\u201382.","journal-title":"Information Sciences"},{"key":"166_CR29","doi-asserted-by":"crossref","unstructured":"Singh, L., Hofmann, M. (2017). Dynamic behavior analysis of Android applications for malware detection. In 2017 International Conference on Intelligent Communication and Computational Techniques (ICCT) (pp.\u00a01\u20137). IEEE.","DOI":"10.1109\/INTELCCT.2017.8324010"},{"key":"166_CR30","doi-asserted-by":"publisher","first-page":"104685","DOI":"10.1016\/j.ic.2020.104685","volume":"281","author":"B Song","year":"2021","unstructured":"Song, B., & Pan, L. (2021). Rule synchronization for tissue P systems. Information and Computation, 281, 104685.","journal-title":"Information and Computation"},{"key":"166_CR31","first-page":"2018","volume":"1","author":"CL Tan","year":"2018","unstructured":"Tan, C. L. (2018). Phishing dataset for machine learning: Feature evaluation. Mendeley Data, 1, 2018.","journal-title":"Mendeley Data"},{"issue":"4","key":"166_CR32","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1007\/s41965-020-00050-2","volume":"2","author":"S Verlan","year":"2020","unstructured":"Verlan, S., Freund, R., Alhazov, A., Ivanov, S., & Pan, L. (2020). A formal framework for spiking neural P systems. Journal of Membrane Computing, 2(4), 355\u2013368.","journal-title":"Journal of Membrane Computing"},{"key":"166_CR33","doi-asserted-by":"publisher","first-page":"46717","DOI":"10.1109\/ACCESS.2019.2906934","volume":"7","author":"R Vinayakumar","year":"2019","unstructured":"Vinayakumar, R., Alazab, M., Soman, K. P., Poornachandran, P., & Venkatraman, S. (2019). Robust intelligent malware detection using deep learning. IEEE Access, 7, 46717\u201346738.","journal-title":"IEEE Access"},{"issue":"1","key":"166_CR34","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1109\/72.822509","volume":"11","author":"Z-Q Wang","year":"2000","unstructured":"Wang, Z.-Q., Manry, M. T., & Schiano, J. L. (2000). LMS learning algorithms: misconceptions and new results on convergence. IEEE Transactions on Neural Networks, 11(1), 47\u201356.","journal-title":"IEEE Transactions on Neural Networks"},{"key":"166_CR35","doi-asserted-by":"publisher","first-page":"25591","DOI":"10.1109\/ACCESS.2017.2771470","volume":"5","author":"L Wei","year":"2017","unstructured":"Wei, L., Luo, W., Weng, J., Zhong, Y., Zhang, X., & Yan, Z. (2017). Machine learning-based malicious application detection of Android. IEEE Access, 5, 25591\u201325601.","journal-title":"IEEE Access"},{"issue":"02","key":"166_CR36","doi-asserted-by":"publisher","first-page":"2050064","DOI":"10.1142\/S0129065720500641","volume":"31","author":"T Wu","year":"2021","unstructured":"Wu, T., Lyu, Q., & Pan, L. (2021). Evolution-communication spiking neural P systems. International Journal of Neural Systems, 31(02), 2050064.","journal-title":"International Journal of Neural Systems"},{"key":"166_CR37","doi-asserted-by":"crossref","unstructured":"Yahya, R. I., Shamsuddin, S. M., Yahya, S. I., Hasan, S., Al-Salibi, B., Al-Khafaji, G. (2016). Image segmentation using membrane computing: a literature survey. In International Conference on Bio-Inspired Computing: Theories and Applications (pp. 314\u2013335). Springer.","DOI":"10.1007\/978-981-10-3611-8_26"},{"key":"166_CR38","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2018\/7247095","volume":"2018","author":"J Yan","year":"2018","unstructured":"Yan, J., Qi, Y., & Rao, Q. (2018). Detecting malware with an ensemble method based on deep neural network. Security and Communication Networks, 2018, 1\u201316. https:\/\/doi.org\/10.1155\/2018\/7247095","journal-title":"Security and Communication Networks"},{"key":"166_CR39","doi-asserted-by":"crossref","unstructured":"Yang, T.-J., Chen, Y.-H., Emer, J., Sze, V. (2017). A method to estimate the energy consumption of deep neural networks. In 2017 51st asilomar conference on signals, systems, and computers (pp. 1916\u20131920). IEEE.","DOI":"10.1109\/ACSSC.2017.8335698"},{"key":"166_CR40","doi-asserted-by":"publisher","first-page":"4678746","DOI":"10.1155\/2018\/4678746","volume":"2018","author":"P Yi","year":"2018","unstructured":"Yi, P., Guan, Y., Zou, F., Yao, Y., Wang, W., & Zhu, T. (2018). Web phishing detection using a deep learning framework. Wireless Communications and Mobile Computing, 2018, 4678746.","journal-title":"Wireless Communications and Mobile Computing"},{"issue":"4","key":"166_CR41","doi-asserted-by":"publisher","first-page":"284","DOI":"10.1007\/s41965-022-00113-6","volume":"4","author":"H Zhang","year":"2022","unstructured":"Zhang, H., Liu, X., & Shao, Y. (2022). Chinese dialect tone\u2019s recognition using gated spiking neural P systems. Journal of Membrane Computing, 4(4), 284\u2013292.","journal-title":"Journal of Membrane Computing"},{"issue":"08","key":"166_CR42","doi-asserted-by":"publisher","first-page":"2250023","DOI":"10.1142\/S012906572250023X","volume":"32","author":"G Zhang","year":"2022","unstructured":"Zhang, G., Zhang, X., Rong, H., Paul, P., Zhu, M., Neri, F., & Ong, Y.-S. (2022). A layered spiking neural system for classification problems. International Journal of Neural Systems, 32(08), 2250023.","journal-title":"International Journal of Neural Systems"},{"issue":"4","key":"166_CR43","doi-asserted-by":"publisher","first-page":"568","DOI":"10.3390\/e24040568","volume":"24","author":"X Zhang","year":"2022","unstructured":"Zhang, X., & Liu, X. (2022). Multiview Clustering of Adaptive Sparse Representation Based on Coupled P Systems. Entropy, 24(4), 568.","journal-title":"Entropy"},{"issue":"1","key":"166_CR44","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/s41965-022-00094-6","volume":"4","author":"S Zhao","year":"2022","unstructured":"Zhao, S., Zhang, L., Liu, Z., Peng, H., & Wang, J. (2022). ConvSNP: A deep learning model embedded with SNP-like neurons. Journal of Membrane Computing, 4(1), 87\u201395.","journal-title":"Journal of Membrane Computing"}],"container-title":["Journal of Membrane Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s41965-024-00166-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s41965-024-00166-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s41965-024-00166-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,3]],"date-time":"2024-12-03T09:15:48Z","timestamp":1733217348000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s41965-024-00166-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,13]]},"references-count":44,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,12]]}},"alternative-id":["166"],"URL":"https:\/\/doi.org\/10.1007\/s41965-024-00166-9","relation":{},"ISSN":["2523-8906","2523-8914"],"issn-type":[{"value":"2523-8906","type":"print"},{"value":"2523-8914","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,8,13]]},"assertion":[{"value":"3 April 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 July 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 August 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}