{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T10:13:08Z","timestamp":1775470388712,"version":"3.50.1"},"reference-count":57,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,5,2]],"date-time":"2024-05-02T00:00:00Z","timestamp":1714608000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,5,2]],"date-time":"2024-05-02T00:00:00Z","timestamp":1714608000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001778","name":"Deakin University","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100001778","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Mach. Intell."],"published-print":{"date-parts":[[2024,6]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Identifying and mitigating aberrant activities within the network traffic is important to prevent adverse consequences caused by cyber security incidents, which have been increasing significantly in recent times. Existing research mainly focuses on classical machine learning and deep learning-based approaches for detecting such attacks. However, exploiting the power of quantum deep learning to process complex correlation of features for anomaly detection is not well explored. Hence, in this paper, we investigate quantum machine learning and quantum deep learning-based anomaly detection methodologies to accurately detect network attacks. In particular, we propose three novel quantum auto-encoder-based anomaly detection frameworks. Our primary aim is to create hybrid models that leverage the strengths of both quantum and deep learning methodologies for efficient anomaly recognition. The three frameworks are formed by integrating the quantum autoencoder with a quantum one-class support vector machine, a quantum random forest, and a quantum <jats:italic>k<\/jats:italic>-nearest neighbor approach. The anomaly detection capability of the frameworks is evaluated using benchmark datasets comprising computer and Internet of Things network flows. Our evaluation demonstrates that all three frameworks have a high potential to detect the network traffic anomalies accurately, while the framework that integrates the quantum autoencoder with the quantum <jats:italic>k<\/jats:italic>-nearest neighbor yields the highest accuracy. This demonstrates the promising potential for the development of quantum frameworks for anomaly detection, underscoring their relevance for future advancements in network security.<\/jats:p>","DOI":"10.1007\/s42484-024-00163-2","type":"journal-article","created":{"date-parts":[[2024,5,2]],"date-time":"2024-05-02T10:01:45Z","timestamp":1714644105000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":74,"title":["Quantum deep learning-based anomaly detection for enhanced network security"],"prefix":"10.1007","volume":"6","author":[{"given":"Moe","family":"Hdaib","sequence":"first","affiliation":[]},{"given":"Sutharshan","family":"Rajasegarar","sequence":"additional","affiliation":[]},{"given":"Lei","family":"Pan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,5,2]]},"reference":[{"key":"163_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s42484-021-00056-8","volume":"3","author":"L Alchieri","year":"2021","unstructured":"Alchieri L, Badalotti D, Bonardi P, Bianco S (2021) An introduction to quantum machine learning: from quantum logic to quantum deep learning. Quantum Mach Intell 3:1\u201330","journal-title":"Quantum Mach Intell"},{"issue":"1","key":"163_CR2","first-page":"1","volume":"2","author":"J An","year":"2015","unstructured":"An J, Cho S (2015) Variational autoencoder based anomaly detection using reconstruction probability. Special Lecture on IE 2(1):1\u201318","journal-title":"Special Lecture on IE"},{"issue":"5741","key":"163_CR3","doi-asserted-by":"publisher","first-page":"1704","DOI":"10.1126\/science.1113479","volume":"309","author":"A Aspuru-Guzik","year":"2005","unstructured":"Aspuru-Guzik A, Dutoi AD, Love PJ, Head-Gordon M (2005) Simulated quantum computation of molecular energies. Science 309(5741):1704\u20131707","journal-title":"Science"},{"issue":"1","key":"163_CR4","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/0893-6080(89)90014-2","volume":"2","author":"P Baldi","year":"1989","unstructured":"Baldi P, Hornik K (1989) Neural networks and principal component analysis: learning from examples without local minima. Neural Netw 2(1):53\u201358","journal-title":"Neural Netw"},{"issue":"2","key":"163_CR5","doi-asserted-by":"publisher","first-page":"022325","DOI":"10.1103\/PhysRevA.74.022325","volume":"74","author":"L Bart\u016d\u0161kov\u00e1","year":"2006","unstructured":"Bart\u016d\u0161kov\u00e1 L, \u010cernoch A, Filip R, Fiur\u00e1\u0161ek J, Soubusta J, Du\u0161ek M (2006) Optical implementation of the encoding of two qubits to a single qutrit. Phys Rev A 74(2):022325","journal-title":"Phys Rev A"},{"key":"163_CR6","unstructured":"Basheer A, Afham A, Goyal SK (2020) Quantum $$ k $$-nearest neighbors algorithm. arXiv:2003.09187"},{"issue":"3","key":"163_CR7","first-page":"035028","volume":"2","author":"C Bravo-Prieto","year":"2021","unstructured":"Bravo-Prieto C (2021) Quantum autoencoders with enhanced data encoding. Mach Learn: Sci Technol 2(3):035028","journal-title":"Mach Learn: Sci Technol"},{"issue":"7","key":"163_CR8","doi-asserted-by":"publisher","first-page":"073011","DOI":"10.1088\/1367-2630\/18\/7\/073011","volume":"18","author":"I Cong","year":"2016","unstructured":"Cong I, Duan L (2016) Quantum discriminant analysis for dimensionality reduction and classification. New J Phys 18(7):073011","journal-title":"New J Phys"},{"key":"163_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-018-2004-9","volume":"17","author":"Y Dang","year":"2018","unstructured":"Dang Y, Jiang N, Hu H, Ji Z, Zhang W (2018) Image classification based on quantum K-nearest-neighbor algorithm. Quantum Inf Process 17:1\u201318","journal-title":"Quantum Inf Process"},{"issue":"7\u20138","key":"163_CR10","doi-asserted-by":"publisher","first-page":"1800065","DOI":"10.1002\/qute.201800065","volume":"2","author":"Y Ding","year":"2019","unstructured":"Ding Y, Lamata L, Sanz M, Chen X, Solano E (2019) Experimental implementation of a quantum autoencoder via quantum adders. Adv Quantum Technol 2(7\u20138):1800065","journal-title":"Adv Quantum Technol"},{"key":"163_CR11","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1016\/j.patcog.2016.03.028","volume":"58","author":"SM Erfani","year":"2016","unstructured":"Erfani SM, Rajasegarar S, Karunasekera S, Leckie C (2016) High-dimensional and large-scale anomaly detection using a linear one-class SVM with deep learning. Pattern Recognition 58:121\u2013134","journal-title":"Pattern Recognition"},{"key":"163_CR12","doi-asserted-by":"publisher","unstructured":"Garcia S, Parmisano A, Erquiaga MJ (2020) IoT-23: a labeled dataset with malicious and benign IoT network traffic (Version 1.0.0) [Data set]. Zenodo https:\/\/doi.org\/10.5281\/zenodo.4743746","DOI":"10.5281\/zenodo.4743746"},{"issue":"15","key":"163_CR13","doi-asserted-by":"publisher","first-page":"16876","DOI":"10.1007\/s11227-022-04542-z","volume":"78","author":"C Gong","year":"2022","unstructured":"Gong C, Guan W, Gani A, Qi H (2022) Network attack detection scheme based on variational quantum neural network. J Supercomput 78(15):16876\u201316897","journal-title":"J Supercomput"},{"key":"163_CR14","doi-asserted-by":"crossref","unstructured":"Gouveia A, Correia M (2020) Towards quantum-enhanced machine learning for network intrusion detection. In: 2020 IEEE 19th international symposium on Network Computing and Applications (NCA), pp 1\u20138. IEEE","DOI":"10.1109\/NCA51143.2020.9306691"},{"issue":"3","key":"163_CR15","doi-asserted-by":"publisher","first-page":"1225","DOI":"10.1016\/j.bbe.2020.06.001","volume":"40","author":"R Hashemzehi","year":"2020","unstructured":"Hashemzehi R, Mahdavi SJS, Kheirabadi M, Kamel SR (2020) Detection of brain tumors from MRI images base on deep learning using hybrid model CNN and NADE. Biocybernetics and Biomedical Engineering 40(3):1225\u20131232","journal-title":"Biocybernetics and Biomedical Engineering"},{"issue":"3","key":"163_CR16","doi-asserted-by":"publisher","first-page":"032412","DOI":"10.1103\/PhysRevA.102.032412","volume":"102","author":"CJ Huang","year":"2020","unstructured":"Huang CJ, Ma H, Yin Q, Tang JF, Dong D, Chen C, Xiang GY, Li CF, Guo GC (2020) Realization of a quantum autoencoder for lossless compression of quantum data. Phys Rev A 102(3):032412","journal-title":"Phys Rev A"},{"issue":"4","key":"163_CR17","doi-asserted-by":"publisher","first-page":"043184","DOI":"10.1103\/PhysRevResearch.3.043184","volume":"3","author":"K Kottmann","year":"2021","unstructured":"Kottmann K, Metz F, Fraxanet J, Baldelli N (2021) Variational quantum anomaly detection: unsupervised mapping of phase diagrams on a physical quantum computer. Phys Rev Res 3(4):043184","journal-title":"Phys Rev Res"},{"issue":"2","key":"163_CR18","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1007\/s42484-021-00050-0","volume":"3","author":"V Kulkarni","year":"2021","unstructured":"Kulkarni V, Kulkarni M, Pant A (2021) Quantum computing methods for supervised learning. Quantum Mach Intell 3(2):23","journal-title":"Quantum Mach Intell"},{"key":"163_CR19","unstructured":"Kyriienko O, Magnusson EB (2022) Unsupervised quantum machine learning for fraud detection"},{"issue":"1","key":"163_CR20","doi-asserted-by":"publisher","first-page":"014007","DOI":"10.1088\/2058-9565\/aae22b","volume":"4","author":"L Lamata","year":"2018","unstructured":"Lamata L, Alvarez-Rodriguez U, Mart\u00edn-Guerrero J, Sanz M, Solano E (2018) Quantum autoencoders via quantum adders with genetic algorithms. Quantum Sci Technol 4(1):014007","journal-title":"Quantum Sci Technol"},{"issue":"3","key":"163_CR21","doi-asserted-by":"publisher","first-page":"032420","DOI":"10.1103\/PhysRevA.102.032420","volume":"102","author":"R LaRose","year":"2020","unstructured":"LaRose R, Coyle B (2020) Robust data encodings for quantum classifiers. Phys Rev A 102(3):032420","journal-title":"Phys Rev A"},{"key":"163_CR22","doi-asserted-by":"crossref","unstructured":"Lee W, Stolfo SJ, Mok KW (1999) Mining in a data-flow environment: experience in network intrusion detection. In: Proceedings of the 5th ACM SIGKDD international conference on knowledge discovery and data mining, pp 114\u2013124","DOI":"10.1145\/312129.312212"},{"issue":"3","key":"163_CR23","doi-asserted-by":"publisher","first-page":"032323","DOI":"10.1103\/PhysRevA.101.032323","volume":"101","author":"JM Liang","year":"2020","unstructured":"Liang JM, Shen SQ, Li M, Li L (2020) Variational quantum algorithms for dimensionality reduction and classification. Phys Rev A 101(3):032323","journal-title":"Phys Rev A"},{"issue":"2","key":"163_CR24","doi-asserted-by":"publisher","first-page":"220301","DOI":"10.1007\/s11433-021-1793-6","volume":"65","author":"W Li","year":"2022","unstructured":"Li W, Deng DL (2022) Recent advances for quantum classifiers. Sci China Phys Mech Astron 65(2):220301","journal-title":"Sci China Phys Mech Astron"},{"key":"163_CR25","unstructured":"Lloyd S, Schuld M, Ijaz A, Izaac J, Killoran N (2020) Quantum embeddings for machine learning. arXiv:2001.03622"},{"issue":"8","key":"163_CR26","doi-asserted-by":"publisher","first-page":"080305","DOI":"10.1088\/0256-307X\/36\/8\/080305","volume":"36","author":"LH Lu","year":"2019","unstructured":"Lu LH, Li YQ (2019) Quantum approach to fast protein-folding time. Chin Phys Lett 36(8):080305","journal-title":"Chin Phys Lett"},{"key":"163_CR27","doi-asserted-by":"publisher","first-page":"105753","DOI":"10.1016\/j.knosys.2020.105753","volume":"196","author":"P Lv","year":"2020","unstructured":"Lv P, Yu Y, Fan Y, Tang X, Tong X (2020) Layer-constrained variational autoencoding kernel density estimation model for anomaly detection. Knowl Based Syst 196:105753","journal-title":"Knowl Based Syst"},{"issue":"2","key":"163_CR28","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/s42484-022-00070-4","volume":"4","author":"S Mangini","year":"2022","unstructured":"Mangini S, Marruzzo A, Piantanida M, Gerace D, Bajoni D, Macchiavello C (2022) Quantum neural network autoencoder and classifier applied to an industrial case study. Quantum Mach Intell 4(2):13","journal-title":"Quantum Mach Intell"},{"key":"163_CR29","doi-asserted-by":"crossref","unstructured":"McClelland JL, Rumelhart DE, Research Group PDP et al (1987) Parallel distributed processing, vol 2: explorations in the microstructure of cognition: psychological and biological models vol. 2, MIT press, ???","DOI":"10.7551\/mitpress\/5237.001.0001"},{"key":"163_CR30","unstructured":"Mete B, Gutierrez IL, Mendl C (2021) Hamiltonian simulation using quantum autoencoders"},{"issue":"5","key":"163_CR31","doi-asserted-by":"publisher","first-page":"e4181","DOI":"10.1002\/cpe.4181","volume":"30","author":"Y Miao","year":"2018","unstructured":"Miao Y, Ruan Z, Pan L, Zhang J, Xiang Y (2018) Comprehensive analysis of network traffic data. Concurr Comput Pract Exp 30(5):e4181","journal-title":"Concurr Comput Pract Exp"},{"key":"163_CR32","unstructured":"MIT Lincoln Labs (1998) KDD Cup 1999 Data \u2014 kdd.ics.uci.edu. http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html Accessed 30 Oct 2023"},{"key":"163_CR33","doi-asserted-by":"crossref","unstructured":"Neto ECP, Dadkhah S, Ferreira R, Zohourian A, Lu R, Ghorbani AA (2023) CICIoT2023: a real-time dataset and benchmark for large-scale attacks in IoT environment","DOI":"10.20944\/preprints202305.0443.v1"},{"issue":"13","key":"163_CR34","doi-asserted-by":"publisher","first-page":"5941","DOI":"10.3390\/s23135941","volume":"23","author":"ECP Neto","year":"2023","unstructured":"Neto ECP, Dadkhah S, Ferreira R, Zohourian A, Lu R, Ghorbani AA (2023) CICIoT2023: a real-time dataset and benchmark for large-scale attacks in IoT environment. Sensors 23(13):5941. https:\/\/doi.org\/10.3390\/s23135941","journal-title":"Sensors"},{"key":"163_CR35","volume-title":"Quantum computation and quantum information","author":"MA Nielsen","year":"2010","unstructured":"Nielsen MA, Chuang IL (2010) Quantum computation and quantum information. Cambridge University Press"},{"issue":"2","key":"163_CR36","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3439950","volume":"54","author":"G Pang","year":"2021","unstructured":"Pang G, Shen C, Cao L, Hengel AVD (2021) Deep learning for anomaly detection: a review. ACM Comput Surv 54(2):1\u201338","journal-title":"ACM Comput Surv"},{"issue":"6","key":"163_CR37","doi-asserted-by":"publisher","first-page":"060501","DOI":"10.1103\/PhysRevLett.122.060501","volume":"122","author":"A Pepper","year":"2019","unstructured":"Pepper A, Tischler N, Pryde GJ (2019) Experimental realization of a quantum autoencoder: the compression of qutrits via machine learning. Phys Rev Lett 122(6):060501","journal-title":"Phys Rev Lett"},{"key":"163_CR38","unstructured":"Plaut E (2018) From principal subspaces to principal components with linear autoencoders. arXiv:1804.10253"},{"key":"163_CR39","doi-asserted-by":"crossref","unstructured":"Pol AA, Berger V, Germain C, Cerminara G, Pierini M (2019) Anomaly detection with conditional variational autoencoders. In: Proceedings of the 2019 18th IEEE International Conference on Machine Learning and Applications (ICMLA), pp 1651\u20131657. IEEE","DOI":"10.1109\/ICMLA.2019.00270"},{"key":"163_CR40","unstructured":"Pu Y, Gan Z, Henao R, Yuan X, Li C, Stevens A, Carin L (2016) Variational autoencoder for deep learning of images, labels and captions"},{"issue":"3","key":"163_CR41","doi-asserted-by":"publisher","first-page":"518","DOI":"10.1109\/TIFS.2010.2051543","volume":"5","author":"S Rajasegarar","year":"2010","unstructured":"Rajasegarar S, Leckie C, Bezdek JC, Palaniswami M (2010) Centered hyperspherical and hyperellipsoidal one-class support vector machines for anomaly detection in sensor networks. IEEE Trans Inf Forensics Secur 5(3):518\u2013533","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"163_CR42","doi-asserted-by":"crossref","unstructured":"Ranzato M, Huang FJ, Boureau YL, LeCun Y (2007) Unsupervised learning of invariant feature hierarchies with applications to object recognition. In: IEEE Conf. on Computer Vision and Pattern Recognition, pp 1\u20138. IEEE","DOI":"10.1109\/CVPR.2007.383157"},{"key":"163_CR43","doi-asserted-by":"publisher","first-page":"135989","DOI":"10.1109\/ACCESS.2020.3011590","volume":"8","author":"B Rizvi","year":"2020","unstructured":"Rizvi B, Belatreche A, Bouridane A, Watson I (2020) Detection of stock price manipulation using kernel based principal component analysis and multivariate density estimation. IEEE Access 8:135989\u2013136003","journal-title":"IEEE Access"},{"issue":"4","key":"163_CR44","doi-asserted-by":"publisher","first-page":"045001","DOI":"10.1088\/2058-9565\/aa8072","volume":"2","author":"J Romero","year":"2017","unstructured":"Romero J, Olson JP, Aspuru-Guzik A (2017) Quantum autoencoders for efficient compression of quantum data. Quantum Sci Technol 2(4):045001","journal-title":"Quantum Sci Technol"},{"issue":"4","key":"163_CR45","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1016\/j.dcan.2017.07.004","volume":"3","author":"Z Ruan","year":"2017","unstructured":"Ruan Z, Miao Y, Pan L, Patterson N, Zhang J (2017) Visualization of big data security: a case study on the KDD99 cup data set. Digital Communications and Networks 3(4):250\u2013259","journal-title":"Digital Communications and Networks"},{"key":"163_CR46","unstructured":"Ruff L, Vandermeulen R, Goernitz N, Deecke L, Siddiqui SA, Binder A, M\u00fcller E, Kloft M (2018) Deep one-class classification. In: Proceedings of the 2018 international conference on machine learning, pp 4393\u20134402. PMLR"},{"issue":"1","key":"163_CR47","first-page":"8753","volume":"21","author":"A Shilton","year":"2020","unstructured":"Shilton A, Rajasegarar S, Palaniswami M (2020) Multiclass anomaly detector: the CS++ support vector machine. Journal of Machine Learning Research 21(1):8753\u20138791","journal-title":"Journal of Machine Learning Research"},{"issue":"3","key":"163_CR48","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1016\/j.cose.2011.12.012","volume":"31","author":"A Shiravi","year":"2012","unstructured":"Shiravi A, Shiravi H, Tavallaee M, Ghorbani AA (2012) Toward developing a systematic approach to generate benchmark datasets for intrusion detection. Comput Secur 31(3):357\u2013374","journal-title":"Comput Secur"},{"issue":"1","key":"163_CR49","doi-asserted-by":"publisher","first-page":"015020","DOI":"10.1088\/2058-9565\/ac3c53","volume":"7","author":"M Srikumar","year":"2021","unstructured":"Srikumar M, Hill CD, Hollenberg LCL (2021) Clustering and enhanced classification using a hybrid quantum autoencoder. Quantum Sci Technol 7(1):015020","journal-title":"Quantum Sci Technol"},{"issue":"1","key":"163_CR50","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1038\/s41534-019-0174-7","volume":"5","author":"GR Steinbrecher","year":"2019","unstructured":"Steinbrecher GR, Olson JP, Englund D, Carolan J (2019) Quantum optical neural networks. Npj Quantum Inf 5(1):60","journal-title":"Npj Quantum Inf"},{"key":"163_CR51","doi-asserted-by":"crossref","unstructured":"Tavallaee M, Bagheri E, Lu W, Ghorbani AA (2009) A detailed analysis of the KDD CUP 99 data set. In: Proceedings of the 2009 IEEE symposium on computational intelligence for security and defense applications, pp 1\u20136. IEEE","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"163_CR52","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1023\/B:MACH.0000008084.60811.49","volume":"54","author":"DM Tax","year":"2004","unstructured":"Tax DM, Duin RP (2004) Support vector data description. Mach Learn 54:45\u201366","journal-title":"Mach Learn"},{"key":"163_CR53","doi-asserted-by":"crossref","unstructured":"Trugenberger CA (2002) Quantum pattern recognition. Quantum Inf Process 1:471\u2013493","DOI":"10.1023\/A:1024022632303"},{"key":"163_CR54","unstructured":"Wang MM, Jiang YD (2022) Data reconstruction based on quantum neural networks. arXiv:2209.05711"},{"issue":"4","key":"163_CR55","doi-asserted-by":"publisher","first-page":"L040403","DOI":"10.1103\/PhysRevA.103.L040403","volume":"103","author":"XM Zhang","year":"2021","unstructured":"Zhang XM, Kong W, Farooq MU, Yung MH, Guo G, Wang X (2021) Generic detection-based error mitigation using quantum autoencoders. Phys Rev A 103(4):L040403","journal-title":"Phys Rev A"},{"key":"163_CR56","first-page":"1","volume":"2021","author":"C Zhang","year":"2021","unstructured":"Zhang C, Liu J, Chen W, Shi J, Yao M, Yan X, Xu N, Chen D (2021) Unsupervised anomaly detection based on deep autoencoding and clustering. Secur Commun Netw 2021:1\u20138","journal-title":"Secur Commun Netw"},{"key":"163_CR57","doi-asserted-by":"crossref","unstructured":"Zhang XM, Li T, Yuan X (2022) Quantum state preparation with optimal circuit depth: implementations and applications. Phys Rev Lett 129(23):230504","DOI":"10.1103\/PhysRevLett.129.230504"}],"container-title":["Quantum Machine Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42484-024-00163-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42484-024-00163-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42484-024-00163-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,27]],"date-time":"2024-06-27T18:30:30Z","timestamp":1719513030000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42484-024-00163-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,2]]},"references-count":57,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,6]]}},"alternative-id":["163"],"URL":"https:\/\/doi.org\/10.1007\/s42484-024-00163-2","relation":{},"ISSN":["2524-4906","2524-4914"],"issn-type":[{"value":"2524-4906","type":"print"},{"value":"2524-4914","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,5,2]]},"assertion":[{"value":"30 October 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 April 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 May 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"26"}}