{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T20:46:07Z","timestamp":1757623567185,"version":"3.44.0"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,8,19]],"date-time":"2025-08-19T00:00:00Z","timestamp":1755561600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,8,19]],"date-time":"2025-08-19T00:00:00Z","timestamp":1755561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"Manipal University Jaipur"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Discov Internet Things"],"abstract":"<jats:title>Abstract<\/jats:title>\n          <jats:p>The growth in intelligent services with fewer resources and advanced communication technologies has positioned the Internet of Things (IoT) as the leading framework for less power lossy networks. However, IoT systems face significant risks from cyberattacks due to drawbacks in storage and computation. In this work, a novel approach is introduced that combines deep learning (DL) and machine learning (ML) to improve cyber-attack detection in IoT networks, which solves cybersecurity issues. The proposed IoT system includes four steps: pre-processing, augmentation, feature selection, and classification. In the initial phase, data are collected from the ToN-IoT dataset and the BoT-IoT dataset. Then, pre-processing is employed using Z-score normalization and missing value imputation to improve the quality of data. Next, to solve the data imbalance problem, Conditional Generative Adversarial Networks (CGAN) are employed. After that, the Binary Genetic Dung Beetle Optimization (B-GDBO) method is utilized for optimal feature selection and also reduces the risk of overfitting. Ultimately, a one-dimensional Gated Recurrent Unit with attention based deep residual network combined with Support Vector Machine (1D GRU-AtDRN-SVM) is proposed for accurate attack detection and classification, and improves accuracy in classification. This hybrid model supports improved detection accuracy and resilience for protecting IoT networks from cyber threats. The experimental results attain an accuracy of 99.5%, a precision of 98.72%, and an F1-score of 98.26% for the ToN-IoT dataset. Also, the BoT-IoT dataset achieves an accuracy of 99.3%, a precision of 99.01%, and an F1-score of 98.89%.<\/jats:p>","DOI":"10.1007\/s43926-025-00190-w","type":"journal-article","created":{"date-parts":[[2025,8,19]],"date-time":"2025-08-19T13:50:19Z","timestamp":1755611419000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Hybrid IoT-CAD system: optimized feature selection based gated recurrent residual deep learning for cyber attack detection in IoT networks"],"prefix":"10.1007","volume":"5","author":[{"given":"Susheela","family":"Vishnoi","sequence":"first","affiliation":[]},{"given":"Sunil","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Saikat","family":"Samanta","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,8,19]]},"reference":[{"issue":"1","key":"190_CR1","doi-asserted-by":"publisher","first-page":"907","DOI":"10.32604\/cmc.2022.024488","volume":"72","author":"AA Albraikan","year":"2022","unstructured":"Albraikan AA, Haj Hassine SB, Fati SM, Al-Wesabi FN, Mustafa Hilal A, Motwakel A, Hamza MA, Al Duhayyim M. Optimal deep learningbased cyberattack detection and classification technique on social networks. Comput Mater Continua. 2022;72(1):907\u201323.","journal-title":"Comput Mater Continua"},{"key":"190_CR2","doi-asserted-by":"publisher","DOI":"10.32604\/csse.2023.026526","author":"A Alshehri","year":"2023","unstructured":"Alshehri A, Khan N, Alowayr A, Alghamdi MY. Cyberattack detection framework using machine learning and user behavior analytics. Comput Syst Sci Eng. 2023. https:\/\/doi.org\/10.32604\/csse.2023.026526.","journal-title":"Comput Syst Sci Eng"},{"key":"190_CR3","doi-asserted-by":"crossref","unstructured":"Devi DP, Allur NS, Dondapati K, Chetlapalli H, Kodadi S, Kurunthachalam A. Blockchain-assisted federated learning for cybersecurity: combining isolation forest, variational autoencoders, and differential privacy. J Sci Tech. 2025:95\u2013107","DOI":"10.46243\/jst.2025.v10.i02.pp95-107"},{"issue":"2","key":"190_CR4","first-page":"119","volume":"8","author":"KS Suprabhath","year":"2023","unstructured":"Suprabhath KS, Machina VSP, Sreedhar M, Mishra S. A deep learning based cyber attack detection scheme in DC microgrid systems. CPSS Trans Power Electron Appl. 2023;8(2):119\u201327.","journal-title":"CPSS Trans Power Electron Appl"},{"key":"190_CR5","doi-asserted-by":"crossref","unstructured":"Chethana, C., Pareek PK, de Albuquerque VHC, Khanna A, Gupta D. Improved domain generation algorithm to detect cyber-attack with deep learning techniques. In\u00a02022 IEEE 2nd Mysore Sub Section International Conference (MysuruCon). IEEE; 2022. pp. 1\u20138.","DOI":"10.1109\/MysuruCon55714.2022.9972526"},{"key":"190_CR6","doi-asserted-by":"crossref","unstructured":"Alrefaei A, Ilyas M. Ensemble deep learning model based on multi-class classification technique to detect cyber attacks in IoT environment. In 2024 International conference on smart computing, IoT and Machine learning (SIML). IEEE; 2024. pp. 174\u2013179","DOI":"10.1109\/SIML61815.2024.10578143"},{"key":"190_CR7","doi-asserted-by":"publisher","first-page":"23186","DOI":"10.1109\/ACCESS.2022.3153471","volume":"10","author":"M-Q Tran","year":"2022","unstructured":"Tran M-Q, Elsisi M, Liu M-K, Vu VQ, Mahmoud K, Darwish MMF, Abdelaziz AY, Lehtonen M. Reliable deep learning and IoT-based monitoring system for secure computer numerical control machines against cyber-attacks with experimental verification. IEEE Access. 2022;10:23186\u201397.","journal-title":"IEEE Access"},{"issue":"1","key":"190_CR8","doi-asserted-by":"publisher","DOI":"10.1186\/s13677-022-00356-9","volume":"12","author":"S Dalal","year":"2023","unstructured":"Dalal S, Manoharan P, Lilhore UK, Seth B, alsekait DM, Simaiya S, Hamdi M, Raahemifar K. Extremely boosted neural network for more accurate multi-stage cyber attack prediction in cloud computing environment. J Cloud Comput. 2023;12(1): 14.","journal-title":"J Cloud Comput"},{"issue":"8","key":"190_CR9","doi-asserted-by":"publisher","first-page":"328","DOI":"10.3390\/info12080328","volume":"12","author":"R Qi","year":"2021","unstructured":"Qi R, Rasband C, Zheng J, Longoria R. Detecting cyber attacks in smart grids using semi-supervised anomaly detection and deep representation learning. Information. 2021;12(8):328.","journal-title":"Information"},{"issue":"14","key":"190_CR10","doi-asserted-by":"publisher","first-page":"2180","DOI":"10.3390\/electronics11142180","volume":"11","author":"H-C Lin","year":"2022","unstructured":"Lin H-C, Wang P, Chao K-M, Lin W-H, Chen J-H. Using deep learning networks to identify cyber attacks on intrusion detection for in-vehicle networks. Electronics. 2022;11(14):2180.","journal-title":"Electronics"},{"key":"190_CR11","doi-asserted-by":"publisher","DOI":"10.1109\/OJPEL.2023.3309897","author":"J Zhang","year":"2023","unstructured":"Zhang J, Guo L, Ye J, Giani A, Elasser A, Song W, Liu J, Chen Bo, Mantooth HA. Machine learning-based cyber-attack detection in photovoltaic farms. IEEE Open J Power Electron. 2023. https:\/\/doi.org\/10.1109\/OJPEL.2023.3309897.","journal-title":"IEEE Open J Power Electron"},{"key":"190_CR12","doi-asserted-by":"publisher","DOI":"10.12700\/APH.19.7.2022.7.12","author":"AN Ozalp","year":"2022","unstructured":"Ozalp AN, Albayrak Z. Detecting cyber attacks with high-frequency features using machine learning algorithms. Acta Polytech Hung. 2022. https:\/\/doi.org\/10.12700\/APH.19.7.2022.7.12.","journal-title":"Acta Polytech Hung"},{"issue":"3","key":"190_CR13","doi-asserted-by":"publisher","first-page":"261","DOI":"10.21533\/pen.v10.i3.661","volume":"10","author":"R Almajed","year":"2022","unstructured":"Almajed R, Ibrahim A, Abualkishik AZ, Mourad N, Almansour FA. Using machine learning algorithm for detection of cyber-attacks in cyber physical systems. Period Eng Nat Sci (PEN). 2022;10(3):261\u201375.","journal-title":"Period Eng Nat Sci (PEN)"},{"key":"190_CR14","doi-asserted-by":"crossref","unstructured":"Saheed YK, Chukwuere JE. CPS-IIoT-P2Attention: Explainable privacy-preserving with scaled dot-product attention in cyber physical system-industrial IoT network. IEEE Access. 2025;;13:81118\u201381142","DOI":"10.1109\/ACCESS.2025.3566980"},{"key":"190_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/j.sintl.2024.100297","volume":"6","author":"YK Saheed","year":"2025","unstructured":"Saheed YK, Omole AI, Sabit MO. GA-mADAM-IIoT: a new lightweight threats detection in the industrial IoT via genetic algorithm with attention mechanism and LSTM on multivariate time series sensor data. Sensors Int. 2025;6: 100297.","journal-title":"Sensors Int"},{"key":"190_CR16","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2024.115939","volume":"191","author":"YK Saheed","year":"2025","unstructured":"Saheed YK, Misra S. CPS-IoT-PPDNN: a new explainable privacy preserving DNN for resilient anomaly detection in cyber-physical systems-enabled IoT networks. Chaos Solitons Fractals. 2025;191: 115939.","journal-title":"Chaos Solitons Fractals"},{"key":"190_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.rineng.2024.103171","volume":"24","author":"YK Saheed","year":"2024","unstructured":"Saheed YK, Chukwuere JE. Xaiensembletl-iov: a new explainable artificial intelligence ensemble transfer learning for zero-day botnet attack detection in the internet of vehicles. Results Eng. 2024;24: 103171.","journal-title":"Results Eng"},{"key":"190_CR18","doi-asserted-by":"crossref","unstructured":"Saheed YK, Misra S, Chockalingam S. Autoencoder via DCNN and LSTM models for intrusion detection in industrial control systems of critical infrastructures. In\u00a02023 IEEE\/ACM 4th International Workshop on Engineering and Cybersecurity of Critical Systems (EnCyCriS). IEEE; 2023. pp. 9\u201316.","DOI":"10.1109\/EnCyCriS59249.2023.00006"},{"key":"190_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2024.111434","volume":"155","author":"YK Saheed","year":"2024","unstructured":"Saheed YK, Harazeem Abdulganiyu O, Ait Tchakoucht T. Modified genetic algorithm and fine-tuned long short-term memory network for intrusion detection in the internet of things networks with edge capabilities. Appl Soft Comput. 2024;155: 111434.","journal-title":"Appl Soft Comput"},{"key":"190_CR20","doi-asserted-by":"crossref","unstructured":"Dovbysh A, Liubchak V, Shelehov I, Simonovskiy J, Tenytska A. Information-extreme machine learning of a cyber attack detection system. 2022;3:121\u2013131","DOI":"10.32620\/reks.2022.3.09"},{"key":"190_CR21","doi-asserted-by":"publisher","first-page":"459","DOI":"10.1007\/s11063-022-10892-9","volume":"55","author":"S Karthic","year":"2023","unstructured":"Karthic S, Kumar SM. Hybrid optimized deep neural network with enhanced conditional random field based intrusion detection on wireless sensor network. Neural Process Lett. 2023;55:459\u201379. https:\/\/doi.org\/10.1007\/s11063-022-10892-9.","journal-title":"Neural Process Lett"},{"key":"190_CR22","doi-asserted-by":"publisher","first-page":"3719","DOI":"10.1007\/s41870-022-01015-7","volume":"14","author":"S Karthic","year":"2022","unstructured":"Karthic S, Manoj Kumar S, Senthil Prakash PN. Grey wolf based feature reduction for intrusion detection in WSN using LSTM. Int J Inf Tecnol. 2022;14:3719\u201324. https:\/\/doi.org\/10.1007\/s41870-022-01015-7.","journal-title":"Int J Inf Tecnol."},{"issue":"1","key":"190_CR23","first-page":"5522431","volume":"2024","author":"K Sundaram","year":"2024","unstructured":"Sundaram K, Natarajan Y, Perumalsamy A, Ali AAY. A Novel hybrid feature selection with cascaded LSTM: enhancing security in IoT networks. Wirel Commun Mob Comput. 2024;2024(1):5522431.","journal-title":"Wirel Commun Mob Comput"},{"issue":"6","key":"190_CR24","doi-asserted-by":"publisher","first-page":"809","DOI":"10.1007\/s42979-023-02311-0","volume":"4","author":"K Sundaram","year":"2023","unstructured":"Sundaram K, Subramanian S, Natarajan Y, Thirumalaisamy S. Improving performance of intrusion detection using ALO selected features and GRU network. SN Comput Sci. 2023;4(6):809.","journal-title":"SN Comput Sci"},{"key":"190_CR25","doi-asserted-by":"crossref","unstructured":"Suhana S, Karthic S, Yuvaraj N. Ensemble based dimensionality reduction for intrusion detection using random forest in wireless networks. In\u00a02023 5th International Conference on Smart Systems and Inventive Technology (ICSSIT). IEEE; 2023. pp. 704\u2013708.","DOI":"10.1109\/ICSSIT55814.2023.10060929"},{"key":"190_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2022.108034","volume":"101","author":"O Yousuf","year":"2022","unstructured":"Yousuf O, Mir RN. DDoS attack detection in Internet of Things using recurrent neural network. Comput Electr Eng. 2022;101: 108034.","journal-title":"Comput Electr Eng"},{"issue":"2","key":"190_CR27","doi-asserted-by":"publisher","first-page":"298","DOI":"10.3390\/electronics12020298","volume":"12","author":"G Bhandari","year":"2023","unstructured":"Bhandari G, Lyth A, Shalaginov A, Gr\u00f8nli T-M. Distributed deep neural-network-based middleware for cyber-attacks detection in smart IoT ecosystem: a novel framework and performance evaluation approach. Electronics. 2023;12(2):298.","journal-title":"Electronics"},{"issue":"4","key":"190_CR28","doi-asserted-by":"publisher","first-page":"1072","DOI":"10.3390\/pr11041072","volume":"11","author":"KP Vijayakumar","year":"2023","unstructured":"Vijayakumar KP, Krishnadoss P, Ananthakrishnan B, Prusty MR. Enhanced cyber attack detection process for internet of health things (IoHT) devices using deep neural network. Processes. 2023;11(4):1072.","journal-title":"Processes"},{"issue":"2","key":"190_CR29","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/s10922-023-09722-7","volume":"31","author":"O Jullian","year":"2023","unstructured":"Jullian O, Otero B, Rodriguez E, Gutierrez N, Antona H, Canal R. Deep-learning based detection for cyber-attacks in IoT networks: a distributed attack detection framework. J Netw Syst Manage. 2023;31(2):33.","journal-title":"J Netw Syst Manage"},{"issue":"5","key":"190_CR30","doi-asserted-by":"publisher","first-page":"2017","DOI":"10.1007\/s00170-022-10259-3","volume":"123","author":"M Shahin","year":"2022","unstructured":"Shahin M, Chen FF, Bouzary H, Hosseinzadeh A, Rashidifar R. A novel fully convolutional neural network approach for detection and classification of attacks on industrial IoT devices in smart manufacturing systems. Int J Adv Manuf Technol. 2022;123(5):2017\u201329.","journal-title":"Int J Adv Manuf Technol"},{"issue":"2","key":"190_CR31","first-page":"15","volume":"2","author":"P Kaushik","year":"2023","unstructured":"Kaushik P. Unleashing the power of multi-agent deep learning: cyber-attack detection in IoT. Int J Glob Acad Sci Res. 2023;2(2):15\u201329.","journal-title":"Int J Glob Acad Sci Res"},{"key":"190_CR32","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102783","volume":"120","author":"MM Rashid","year":"2022","unstructured":"Rashid MM, Joarder K, Hassan MM, Imam T, Wibowo S, Gordon S, Fortino G. Adversarial training for deep learning-based cyberattack detection in IoT-based smart city applications. Computers Security. 2022;120: 102783.","journal-title":"Computers Security"},{"issue":"1","key":"190_CR33","volume":"2","author":"I Permana","year":"2022","unstructured":"Permana I, Salisah FN. Pengaruh Normalisasi Data Terhadap Performa Hasil Klasifikasi Algoritma Backpropagation: the effect of data normalization on the performance of the classification results of the backpropagation algorithm. Indones J Inform Res Softw Eng (IJIRSE). 2022;2(1): 485639.","journal-title":"Indones J Inform Res Softw Eng (IJIRSE)"},{"key":"190_CR34","doi-asserted-by":"publisher","first-page":"21562","DOI":"10.1109\/ACCESS.2023.3251919","volume":"11","author":"K Psychogyios","year":"2023","unstructured":"Psychogyios K, Ilias L, Ntanos C, Askounis D. Missing value imputation methods for electronic health records. IEEE Access. 2023;11:21562\u201374.","journal-title":"IEEE Access"},{"key":"190_CR35","doi-asserted-by":"crossref","unstructured":"Seibold M, Hoch A, Farshad M, Navab N, F\u00fcrnstahl P. Conditional generative data augmentation for clinical audio datasets. In\u00a0International conference on medical image computing and computer-assisted intervention, Cham: Springer Nature Switzerland; 2022. pp. 345\u2013354.","DOI":"10.1007\/978-3-031-16449-1_33"},{"issue":"3","key":"190_CR36","doi-asserted-by":"publisher","first-page":"1245","DOI":"10.1007\/s12065-023-00822-6","volume":"17","author":"B Alhijawi","year":"2024","unstructured":"Alhijawi B, Awajan A. Genetic algorithms: theory, genetic operators, solutions, and applications. Evol Intell. 2024;17(3):1245\u201356.","journal-title":"Evol Intell"},{"issue":"19","key":"190_CR37","doi-asserted-by":"publisher","first-page":"26942","DOI":"10.1007\/s11227-024-06409-x","volume":"80","author":"AG Ayad","year":"2024","unstructured":"Ayad AG, Sakr NA, Hikal NA. A hybrid approach for efficient feature selection in anomaly intrusion detection for IoT networks. J Supercomput. 2024;80(19):26942\u201384.","journal-title":"J Supercomput"},{"issue":"19","key":"190_CR38","doi-asserted-by":"publisher","first-page":"9572","DOI":"10.3390\/app12199572","volume":"12","author":"I Tareq","year":"2022","unstructured":"Tareq I, Elbagoury BM, El-Regaily S, El-Horbaty E-S. Analysis of ton-iot, unw-nb15, and edge-iiot datasets using dl in cybersecurity for iot. Appl Sci. 2022;12(19):9572.","journal-title":"Appl Sci"},{"key":"190_CR39","doi-asserted-by":"crossref","unstructured":"Manan I, Rehman F, Sharif H, Ali CN, Ali RR, Liaqat A. Cyber security intrusion detection using deep learning approaches, datasets, Bot-IOT dataset. In\u00a02023 4th International conference on advancements in computational sciences (ICACS). IEEE; 2023. pp. 1\u20135","DOI":"10.1109\/ICACS55311.2023.10089688"},{"issue":"10","key":"190_CR40","doi-asserted-by":"publisher","DOI":"10.1016\/j.asej.2023.102211","volume":"14","author":"RA Elsayed","year":"2023","unstructured":"Elsayed RA, Hamada RA, Abdalla MI, Elsaid SA. Securing IoT and SDN systems using deep-learning based automatic intrusion detection. Ain Shams Eng J. 2023;14(10): 102211.","journal-title":"Ain Shams Eng J"},{"issue":"10","key":"190_CR41","doi-asserted-by":"publisher","DOI":"10.3390\/info14100550","volume":"14","author":"OA Alkhudaydi","year":"2023","unstructured":"Alkhudaydi OA, Krichen M, Alghamdi AD. A deep learning methodology for predicting cybersecurity attacks on the internet of things. Information. 2023;14(10): 550.","journal-title":"Information"},{"key":"190_CR42","doi-asserted-by":"publisher","first-page":"10031","DOI":"10.1109\/ACCESS.2022.3142859","volume":"10","author":"TM Shami","year":"2022","unstructured":"Shami TM, El-Saleh AA, Alswaitti M, Al-Tashi Q, Summakieh MA, Mirjalili S. Particle swarm optimization: a comprehensive survey. IEEE Access. 2022;10:10031\u201361.","journal-title":"IEEE Access"},{"key":"190_CR43","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-67380-2","volume-title":"Ant colony optimization","author":"S Fidanova","year":"2021","unstructured":"Fidanova S, Fidanova S. Ant colony optimization. Cham: Springer International Publishing; 2021."},{"issue":"5","key":"190_CR44","doi-asserted-by":"publisher","first-page":"4007","DOI":"10.1109\/TSG.2023.3237011","volume":"14","author":"A Presekal","year":"2023","unstructured":"Presekal A, \u015etefanov A, Rajkumar VS, Palensky P. Attack graph model for cyber-physical power systems using hybrid deep learning. IEEE Trans Smart Grid. 2023;14(5):4007\u201320.","journal-title":"IEEE Trans Smart Grid"}],"container-title":["Discover Internet of Things"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-025-00190-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s43926-025-00190-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-025-00190-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T08:14:55Z","timestamp":1757405695000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s43926-025-00190-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,19]]},"references-count":44,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["190"],"URL":"https:\/\/doi.org\/10.1007\/s43926-025-00190-w","relation":{},"ISSN":["2730-7239"],"issn-type":[{"type":"electronic","value":"2730-7239"}],"subject":[],"published":{"date-parts":[[2025,8,19]]},"assertion":[{"value":"13 April 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 July 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 August 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"88"}}