{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T21:16:34Z","timestamp":1774127794801,"version":"3.50.1"},"reference-count":50,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,7,7]],"date-time":"2025-07-07T00:00:00Z","timestamp":1751846400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,7,7]],"date-time":"2025-07-07T00:00:00Z","timestamp":1751846400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Discov Internet Things"],"abstract":"<jats:title>Abstract<\/jats:title>\n          <jats:p>The Internet of Things (IoT) enables transformative applications; however, it faces significant security and privacy challenges. Due to the impracticality of securing individual devices, network-level security is preferred. However, attack diversity, device heterogeneity, and traditional security limitations necessitate advanced data analysis. Researchers increasingly use deep learning, which excels in handling large-scale data, to develop robust intrusion detection systems. This study investigates the security challenges of IoT, reviews existing intrusion detection systems, and explores the application of deep learning for intrusion detection in IoT networks. A total of 21 neural network models, along with an ensemble learning model, were designed and trained using the BoT-IoT dataset. Performance was evaluated using standard classification metrics including accuracy, precision, recall, and F1-score. The ensemble learning model demonstrated the highest performance, achieving 99.985% accuracy, 99.28% precision, 99.80% recall, and 99.54% F1-score. Compared to previous studies, the proposed model improves accuracy, recall, and F1-score by 0.005%, 0.55%, and 0.84%, respectively. These results highlight the effectiveness of deep learning-based approaches in enhancing IoT network security.<\/jats:p>","DOI":"10.1007\/s43926-025-00177-7","type":"journal-article","created":{"date-parts":[[2025,7,7]],"date-time":"2025-07-07T13:58:25Z","timestamp":1751896705000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Development of an intelligent intrusion detection system for IoT networks using deep learning"],"prefix":"10.1007","volume":"5","author":[{"given":"Haozhe","family":"Zhang","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,7]]},"reference":[{"key":"177_CR1","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1007\/978-3-031-11992-7_13","volume-title":"Real-time systems: design principles for distributed embedded applications","author":"H Kopetz","year":"2022","unstructured":"Kopetz H, Steiner W. Internet of things. In: Kopetz H, Steiner W, editors. Real-time systems: design principles for distributed embedded applications. Cham: Springer International Publishing; 2022. p. 325\u201341."},{"key":"177_CR2","unstructured":"Sinha S. State of IoT 2024: Number of connected IoT devices growing 13% to 18.8 billion globally. IoT Analytics (2024)."},{"key":"177_CR3","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/j.comnet.2018.07.017","volume":"144","author":"A \u010colakovi\u0107","year":"2018","unstructured":"\u010colakovi\u0107 A, Had\u017eiali\u0107 M. Internet of things (IoT): a review of enabling technologies, challenges, and open research issues. Comput Netw. 2018;144:17\u201339.","journal-title":"Comput Netw"},{"issue":"21","key":"177_CR4","doi-asserted-by":"publisher","first-page":"8417","DOI":"10.3390\/s22218417","volume":"22","author":"AM Banaamah","year":"2022","unstructured":"Banaamah AM, Ahmad I. Intrusion detection in IoT using deep learning. Sensors. 2022;22(21):8417.","journal-title":"Sensors"},{"issue":"1","key":"177_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/s41598-024-81535-3","volume":"14","author":"V Kantharaju","year":"2024","unstructured":"Kantharaju V, Suresh H, Niranjanamurthy M, Ansarullah SI, Amin F, Alabrah A. Machine learning based intrusion detection framework for detecting security attacks in internet of things. Sci Rep. 2024;14(1):1\u201310.","journal-title":"Sci Rep"},{"key":"177_CR6","doi-asserted-by":"publisher","first-page":"100827","DOI":"10.1016\/j.measen.2023.100827","volume":"28","author":"T Sowmya","year":"2023","unstructured":"Sowmya T, Anita EM. A comprehensive review of AI based intrusion detection system. Meas Sens. 2023;28:100827.","journal-title":"Meas Sens"},{"issue":"1","key":"177_CR7","doi-asserted-by":"publisher","first-page":"21789","DOI":"10.1038\/s41598-024-72049-z","volume":"14","author":"A Qaddos","year":"2024","unstructured":"Qaddos A, Yaseen MU, Al-Shamayleh AS, Imran M, Akhunzada A, Alharthi SZ. A novel intrusion detection framework for optimizing IoT security. Sci Rep. 2024;14(1):21789.","journal-title":"Sci Rep"},{"key":"177_CR8","unstructured":"Antonakakis M, April T, Bailey M, Bernhard M, Bursztein E, Cochran J, et al. Understanding the mirai botnet. In: 26th USENIX security symposium (USENIX Security 17). 2017. pp. 1093\u2013110."},{"issue":"2","key":"177_CR9","first-page":"85","volume":"1","author":"AV Andriu","year":"2019","unstructured":"Andriu AV. DoS and DDos attacks on IoT devices. Roman Cyber Secur J. 2019;1(2):85\u20138.","journal-title":"Roman Cyber Secur J"},{"key":"177_CR10","doi-asserted-by":"crossref","unstructured":"Pradeep M, Kumari S, Tyagi AK, Tiwari S. Smart hospital in smart cities. Digital twin and blockchain for smart cities. 2024. pp. 579\u2013603.","DOI":"10.1002\/9781394303564.ch24"},{"issue":"1","key":"177_CR11","doi-asserted-by":"publisher","first-page":"012020","DOI":"10.1088\/1742-6596\/2020\/1\/012020","volume":"2020","author":"HY Kuo","year":"2021","unstructured":"Kuo HY, Chang H, Cheng YH, Shaw JS, Lee R. Applying cyber physical system architecture concept to the design and manufacturing of blood glucose monitoring systems to provide man\u2013machine interactions and intelligent automation. J Phys Conf Ser. 2021;2020(1):012020.","journal-title":"J Phys Conf Ser"},{"issue":"3","key":"177_CR12","doi-asserted-by":"publisher","first-page":"679","DOI":"10.3390\/math11030679","volume":"11","author":"AS Rajawat","year":"2023","unstructured":"Rajawat AS, Goyal SB, Bedi P, Verma C, Ionete EI, Raboaca MS. 5G-enabled cyber-physical systems for smart transportation using blockchain technology. Mathematics. 2023;11(3):679.","journal-title":"Mathematics"},{"issue":"10","key":"177_CR13","doi-asserted-by":"publisher","first-page":"3349","DOI":"10.3390\/s21103349","volume":"21","author":"A Puliafito","year":"2021","unstructured":"Puliafito A, Tricomi G, Zafeiropoulos A, Papavassiliou S. Smart cities of the future as cyber physical systems: challenges and enabling technologies. Sensors. 2021;21(10):3349.","journal-title":"Sensors"},{"issue":"9","key":"177_CR14","doi-asserted-by":"publisher","first-page":"e5029","DOI":"10.1002\/ett.5029","volume":"35","author":"R Ji","year":"2024","unstructured":"Ji R, Padha D, Singh Y, Sharma S. Review of intrusion detection system in cyber-physical system based networks: characteristics, industrial protocols, attacks, data sets and challenges. Trans Emerg Telecommun Technol. 2024;35(9):e5029.","journal-title":"Trans Emerg Telecommun Technol"},{"key":"177_CR15","doi-asserted-by":"crossref","unstructured":"Aversano L, Bernardi ML, Cimitile M, Montano D, Pecori R, Veltri L. Anomaly detection of medical IoT traffic using machine learning. In: DATA. 2023. pp. 173\u201382.","DOI":"10.5220\/0012132000003541"},{"key":"177_CR16","doi-asserted-by":"crossref","unstructured":"Ge M, Fu X, Syed N, Baig Z, Teo G, Robles-Kelly A. Deep learning-based intrusion detection for IoT networks. In: 2019 IEEE 24th Pacific Rim international symposium on dependable computing (PRDC). IEEE; 2019. pp. 256\u201325609.","DOI":"10.1109\/PRDC47002.2019.00056"},{"key":"177_CR17","doi-asserted-by":"publisher","first-page":"107784","DOI":"10.1016\/j.comnet.2020.107784","volume":"186","author":"M Ge","year":"2021","unstructured":"Ge M, Syed NF, Fu X, Baig Z, Robles-Kelly A. Towards a deep learning-driven intrusion detection approach for Internet of Things. Comput Netw. 2021;186:107784.","journal-title":"Comput Netw"},{"key":"177_CR18","doi-asserted-by":"crossref","unstructured":"Kaur G, Lashkari AH, Rahali A. Intrusion traffic detection and characterization using deep image learning. In: 2020 IEEE international conference on dependable, autonomic and secure computing, international conference on pervasive intelligence and computing, international conference on cloud and big data computing, international conference on cyber science and technology congress (DASC\/PiCom\/CBDCom\/CyberSciTech). IEEE; 2020. pp. 55\u201362.","DOI":"10.1109\/DASC-PICom-CBDCom-CyberSciTech49142.2020.00025"},{"key":"177_CR19","doi-asserted-by":"publisher","first-page":"103906","DOI":"10.1109\/ACCESS.2021.3094024","volume":"9","author":"I Ullah","year":"2021","unstructured":"Ullah I, Mahmoud QH. Design and development of a deep learning-based model for anomaly detection in IoT networks. IEEE Access. 2021;9:103906\u201326.","journal-title":"IEEE Access"},{"key":"177_CR20","doi-asserted-by":"publisher","first-page":"107450","DOI":"10.1016\/j.measurement.2019.107450","volume":"154","author":"Y Li","year":"2020","unstructured":"Li Y, Xu Y, Liu Z, Hou H, Zheng Y, Xin Y, et al. Robust detection for network intrusion of industrial IoT based on multi-CNN fusion. Measurement. 2020;154:107450.","journal-title":"Measurement"},{"key":"177_CR21","doi-asserted-by":"publisher","first-page":"386","DOI":"10.1016\/j.ins.2019.10.069","volume":"513","author":"MM Hassan","year":"2020","unstructured":"Hassan MM, Gumaei A, Alsanad A, Alrubaian M, Fortino G. A hybrid deep learning model for efficient intrusion detection in big data environment. Inf Sci. 2020;513:386\u201396.","journal-title":"Inf Sci"},{"key":"177_CR22","doi-asserted-by":"publisher","first-page":"101752","DOI":"10.1016\/j.cose.2020.101752","volume":"92","author":"SM Kasongo","year":"2020","unstructured":"Kasongo SM, Sun Y. A deep learning method with wrapper based feature extraction for wireless intrusion detection system. Comput Secur. 2020;92:101752.","journal-title":"Comput Secur"},{"key":"177_CR23","first-page":"102419","volume":"50","author":"MA Ferrag","year":"2020","unstructured":"Ferrag MA, Maglaras L, Moschoyiannis S, Janicke H. Deep learning for cyber security intrusion detection: approaches, datasets, and comparative study. J Inf Secur Appl. 2020;50:102419.","journal-title":"J Inf Secur Appl"},{"issue":"18","key":"177_CR24","doi-asserted-by":"publisher","first-page":"8383","DOI":"10.3390\/app11188383","volume":"11","author":"MA Alsoufi","year":"2021","unstructured":"Alsoufi MA, Razak S, Siraj MM, Nafea I, Ghaleb FA, Saeed F, Nasser M. Anomaly-based intrusion detection systems in IoT using deep learning: a systematic literature review. Appl Sci. 2021;11(18):8383.","journal-title":"Appl Sci"},{"key":"177_CR25","doi-asserted-by":"publisher","first-page":"105124","DOI":"10.1016\/j.knosys.2019.105124","volume":"189","author":"A Aldweesh","year":"2020","unstructured":"Aldweesh A, Derhab A, Emam AZ. Deep learning approaches for anomaly-based intrusion detection systems: a survey, taxonomy, and open issues. Knowl-Based Syst. 2020;189:105124.","journal-title":"Knowl-Based Syst"},{"issue":"04","key":"177_CR26","doi-asserted-by":"publisher","first-page":"687","DOI":"10.1142\/S0218001409007326","volume":"23","author":"Y Sun","year":"2009","unstructured":"Sun Y, Wong AK, Kamel MS. Classification of imbalanced data: a review. Int J Pattern Recognit Artif Intell. 2009;23(04):687\u2013719.","journal-title":"Int J Pattern Recognit Artif Intell"},{"issue":"30","key":"177_CR27","doi-asserted-by":"publisher","first-page":"3069","DOI":"10.17485\/IJST\/v17i30.1794","volume":"17","author":"R Ji","year":"2024","unstructured":"Ji R, Kumar N, Padha D. Hybrid enhanced intrusion detection frameworks for cyber-physical systems via optimal features selection. Indian J Sci Technol. 2024;17(30):3069\u201379.","journal-title":"Indian J Sci Technol"},{"issue":"18","key":"177_CR28","doi-asserted-by":"publisher","first-page":"15387","DOI":"10.1007\/s00521-020-04986-5","volume":"34","author":"H Rajadurai","year":"2022","unstructured":"Rajadurai H, Gandhi UD. A stacked ensemble learning model for intrusion detection in wireless network. Neural Comput Appl. 2022;34(18):15387\u201395.","journal-title":"Neural Comput Appl"},{"key":"177_CR29","doi-asserted-by":"publisher","first-page":"33789","DOI":"10.1109\/ACCESS.2018.2841987","volume":"6","author":"I Ahmad","year":"2018","unstructured":"Ahmad I, Basheri M, Iqbal MJ, Rahim A. Performance comparison of support vector machine, random forest, and extreme learning machine for intrusion detection. IEEE Access. 2018;6:33789\u201395.","journal-title":"IEEE Access"},{"key":"177_CR30","unstructured":"Pham NT, Foo E, Suriadi S, Jeffrey H, Lahza HFM, editors. Improving performance of intrusion detection system using ensemble methods and feature selection. In: Proceedings of the Australasian computer science week multiconference."},{"key":"177_CR31","doi-asserted-by":"crossref","unstructured":"Mirza AH. Computer network intrusion detection using various classifiers and ensemble learning. In: 2018 26th signal processing and communications applications conference (SIU). IEEE; 2018. pp. 1\u20134.","DOI":"10.1109\/SIU.2018.8404704"},{"issue":"1","key":"177_CR32","doi-asserted-by":"publisher","first-page":"e497","DOI":"10.1002\/spy2.497","volume":"8","author":"R Ji","year":"2025","unstructured":"Ji R, Selwal A, Kumar N, Padha D. Cascading bagging and boosting ensemble methods for intrusion detection in cyber-physical systems. Secur Privcy. 2025;8(1):e497.","journal-title":"Secur Privcy"},{"key":"177_CR33","doi-asserted-by":"crossref","unstructured":"Ji R, Kumar N, Padha D. CNN-GWO-voting & hybrid: ensemble learning inspired intrusion detection approaches for cyber-physical systems. In: Proceedings of the Indian national science academy. 2024. pp. 1\u201315.","DOI":"10.1007\/s43538-024-00372-0"},{"key":"177_CR34","doi-asserted-by":"publisher","first-page":"82512","DOI":"10.1109\/ACCESS.2019.2923640","volume":"7","author":"X Gao","year":"2019","unstructured":"Gao X, Shan C, Hu C, Niu Z, Liu Z. An adaptive ensemble machine learning model for intrusion detection. IEEE Access. 2019;7:82512\u201321.","journal-title":"IEEE Access"},{"key":"177_CR35","doi-asserted-by":"publisher","first-page":"107247","DOI":"10.1016\/j.comnet.2020.107247","volume":"174","author":"Y Zhou","year":"2020","unstructured":"Zhou Y, Cheng G, Jiang S, Dai M. Building an efficient intrusion detection system based on feature selection and ensemble classifier. Comput Netw. 2020;174:107247.","journal-title":"Comput Netw"},{"key":"177_CR36","doi-asserted-by":"publisher","first-page":"779","DOI":"10.1016\/j.future.2019.05.041","volume":"100","author":"N Koroniotis","year":"2019","unstructured":"Koroniotis N, Moustafa N, Sitnikova E, Turnbull B. Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: bot-IoT dataset. Futur Gener Comput Syst. 2019;100:779\u201396.","journal-title":"Futur Gener Comput Syst"},{"issue":"1","key":"177_CR37","first-page":"6689134","volume":"2020","author":"A Derhab","year":"2020","unstructured":"Derhab A, Aldweesh A, Emam AZ, Khan FA. Intrusion detection system for internet of things based on temporal convolution neural network and efficient feature engineering. Wirel Commun Mob Comput. 2020;2020(1):6689134.","journal-title":"Wirel Commun Mob Comput"},{"issue":"9","key":"177_CR38","doi-asserted-by":"publisher","first-page":"2985","DOI":"10.3390\/s21092985","volume":"21","author":"SI Popoola","year":"2021","unstructured":"Popoola SI, Adebisi B, Ande R, Hammoudeh M, Anoh K, Atayero AA. smote-drnn: A deep learning algorithm for botnet detection in the internet-of-things networks. Sensors. 2021;21(9):2985.","journal-title":"Sensors"},{"issue":"8","key":"177_CR39","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1109\/MC.2016.245","volume":"49","author":"AV Dastjerdi","year":"2016","unstructured":"Dastjerdi AV, Buyya R. Fog computing: helping the Internet of Things realize its potential. Computer. 2016;49(8):112\u20136.","journal-title":"Computer"},{"issue":"5","key":"177_CR40","doi-asserted-by":"publisher","first-page":"3183","DOI":"10.3390\/app13053183","volume":"13","author":"TE Ali","year":"2023","unstructured":"Ali TE, Chong YW, Manickam S. Machine learning techniques to detect a DDoS attack in SDN: a systematic review. Appl Sci. 2023;13(5):3183.","journal-title":"Appl Sci"},{"key":"177_CR41","doi-asserted-by":"publisher","first-page":"304","DOI":"10.1016\/j.cose.2018.04.010","volume":"77","author":"R Vijayanand","year":"2018","unstructured":"Vijayanand R, Devaraj D, Kannapiran B. Intrusion detection system for wireless mesh network using multiple support vector machine classifiers with genetic-algorithm-based feature selection. Comput Secur. 2018;77:304\u201314.","journal-title":"Comput Secur"},{"issue":"3","key":"177_CR42","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1016\/j.cose.2011.12.012","volume":"31","author":"A Shiravi","year":"2012","unstructured":"Shiravi A, Shiravi H, Tavallaee M, Ghorbani AA. Toward developing a systematic approach to generate benchmark datasets for intrusion detection. Comput Secur. 2012;31(3):357\u201374.","journal-title":"Comput Secur"},{"issue":"5","key":"177_CR43","doi-asserted-by":"publisher","first-page":"412","DOI":"10.1007\/s42979-022-01321-8","volume":"3","author":"M Pujari","year":"2022","unstructured":"Pujari M, Pacheco Y, Cherukuri B, Sun W. A comparative study on the impact of adversarial machine learning attacks on contemporary intrusion detection datasets. SN Comput Sci. 2022;3(5):412.","journal-title":"SN Comput Sci"},{"key":"177_CR44","doi-asserted-by":"crossref","unstructured":"Ibitoye O, Shafiq O, Matrawy A. Analyzing adversarial attacks against deep learning for intrusion detection in IoT networks. In: 2019 IEEE global communications conference (GLOBECOM). IEEE; 2019. pp. 1\u20136.","DOI":"10.1109\/GLOBECOM38437.2019.9014337"},{"issue":"4","key":"177_CR45","doi-asserted-by":"publisher","first-page":"1285","DOI":"10.1109\/TEM.2019.2922936","volume":"67","author":"MA Ferrag","year":"2019","unstructured":"Ferrag MA, Maglaras L. DeepCoin: a novel deep learning and blockchain-based energy exchange framework for smart grids. IEEE Trans Eng Manage. 2019;67(4):1285\u201397.","journal-title":"IEEE Trans Eng Manage"},{"issue":"6","key":"177_CR46","doi-asserted-by":"publisher","first-page":"1909","DOI":"10.3390\/app10061909","volume":"10","author":"S Aldhaheri","year":"2020","unstructured":"Aldhaheri S, Alghazzawi D, Cheng L, Alzahrani B, Al-Barakati A. Deepdca: novel network-based detection of IoT attacks using artificial immune system. Appl Sci. 2020;10(6):1909.","journal-title":"Appl Sci"},{"issue":"12","key":"177_CR47","doi-asserted-by":"publisher","first-page":"9463","DOI":"10.1109\/JIOT.2020.2996590","volume":"8","author":"O Alkadi","year":"2020","unstructured":"Alkadi O, Moustafa N, Turnbull B, Choo KKR. A deep blockchain framework-enabled collaborative intrusion detection for protecting IoT and cloud networks. IEEE Internet Things J. 2020;8(12):9463\u201372.","journal-title":"IEEE Internet Things J"},{"key":"177_CR48","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1016\/j.future.2020.07.020","volume":"113","author":"BA Ng","year":"2020","unstructured":"Ng BA, Selvakumar S. Anomaly detection framework for Internet of things traffic using vector convolutional deep learning approach in fog environment. Fut Gener Comput Syst. 2020;113:255\u201365.","journal-title":"Fut Gener Comput Syst"},{"issue":"9","key":"177_CR49","doi-asserted-by":"publisher","first-page":"1104","DOI":"10.3390\/electronics10091104","volume":"10","author":"SI Popoola","year":"2021","unstructured":"Popoola SI, Adebisi B, Ande R, Hammoudeh M, Atayero AA. Memory-efficient deep learning for botnet attack detection in IoT networks. Electronics. 2021;10(9):1104.","journal-title":"Electronics"},{"issue":"11","key":"177_CR50","doi-asserted-by":"publisher","first-page":"1210","DOI":"10.3390\/electronics8111210","volume":"8","author":"A Khraisat","year":"2019","unstructured":"Khraisat A, Gondal I, Vamplew P, Kamruzzaman J, Alazab A. A novel ensemble of hybrid intrusion detection system for detecting internet of things attacks. Electronics. 2019;8(11):1210.","journal-title":"Electronics"}],"container-title":["Discover Internet of Things"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-025-00177-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s43926-025-00177-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-025-00177-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,8]],"date-time":"2025-07-08T02:02:31Z","timestamp":1751940151000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s43926-025-00177-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,7]]},"references-count":50,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["177"],"URL":"https:\/\/doi.org\/10.1007\/s43926-025-00177-7","relation":{},"ISSN":["2730-7239"],"issn-type":[{"value":"2730-7239","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,7,7]]},"assertion":[{"value":"24 March 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 June 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 July 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics and consent to participate"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"Not applicable.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Clinical trial number"}}],"article-number":"74"}}