{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T00:04:50Z","timestamp":1761782690736,"version":"build-2065373602"},"reference-count":53,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T00:00:00Z","timestamp":1761696000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T00:00:00Z","timestamp":1761696000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Discov Internet Things"],"DOI":"10.1007\/s43926-025-00211-8","type":"journal-article","created":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T12:43:57Z","timestamp":1761741837000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["AQU-IMF-RFE: an extended feature selection method for intrusion detection in IoMT data using aquila optimization-based mutual information and recursive feature elimination"],"prefix":"10.1007","volume":"5","author":[{"given":"Shaik Johny","family":"Basha","sequence":"first","affiliation":[]},{"given":"D.","family":"Veeraiah","sequence":"additional","affiliation":[]},{"given":"Sumalatha","family":"Lingamgunta","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,29]]},"reference":[{"key":"211_CR1","first-page":"1","volume":"80","author":"K Rose","year":"2015","unstructured":"Rose K, Eldridge S, Chapin L. The internet of things: an overview. Internet Soc (ISOC). 2015;80:1\u201350.","journal-title":"Internet Soc (ISOC)"},{"key":"211_CR2","first-page":"9","volume":"4","author":"NF Haq","year":"2015","unstructured":"Haq NF, Onik AR, Hridoy MAK, Rafni M, Shah FM, Farid DM. Application of machine learning approaches in intrusion detection system: A survey. IJARAI-Int J Adv Res Artif Intell. 2015;4:9\u201318.","journal-title":"IJARAI-Int J Adv Res Artif Intell"},{"key":"211_CR3","doi-asserted-by":"publisher","unstructured":"Wang T, Zhang X, Qu G, Li N. End-to-End secure communication for constrained devices in IoT-enabled industrial systems using physical unclonable functions. IEEE Trans Industr Inf. June 2020;16(6):4060\u20139. https:\/\/doi.org\/10.1109\/TII.2019.2943409.","DOI":"10.1109\/TII.2019.2943409"},{"key":"211_CR4","doi-asserted-by":"publisher","first-page":"1134","DOI":"10.11591\/ijece.v13i1.pp1134-1141","volume":"13","author":"J Jose","year":"2023","unstructured":"Jose J, Jose D. Deep learning algorithms for intrusion detection systems in internet of things using CIC-IDS 2017 dataset. Int J Electr Comput Eng (IJECE). 2023;13:1134. https:\/\/doi.org\/10.11591\/ijece.v13i1.pp1134-1141.","journal-title":"Int J Electr Comput Eng (IJECE)"},{"key":"211_CR5","doi-asserted-by":"publisher","first-page":"103770","DOI":"10.1016\/j.engappai.2020.103770","volume":"94","author":"A Shahraki","year":"2020","unstructured":"Shahraki A, Abbasi M, Haugen \u00d8. Boosting algorithms for network intrusion detection: A comparative evaluation of real adaboost, gentle adaboost and modest adaboost. Eng Appl Artif Intell. 2020;94:103770. [CrossRef].","journal-title":"Eng Appl Artif Intell"},{"key":"211_CR6","doi-asserted-by":"publisher","first-page":"1397","DOI":"10.1007\/s10586-019-03008-x","volume":"23","author":"V Kumar","year":"2019","unstructured":"Kumar V, et al. An integrated rule based intrusion detection system: analysis on UNSW-NB15 data set and the real time online dataset. Cluster Comput. 2019;23:1397\u2013418.","journal-title":"Cluster Comput"},{"key":"211_CR7","doi-asserted-by":"crossref","unstructured":"Al-Zewairi M, Almajali S, Awajan A. Experimental evaluation of a multi-layer feed-forward artificial neural network classifier for network intrusion detection system. In Proceedings of the 2017 International Conference on New Trends in Computing Sciences (ICTCS), Amman, Jordan, 11\u201313 October 2017; IEEE: New York, NY, USA, 2017; pp. 167\u2013172.","DOI":"10.1109\/ICTCS.2017.29"},{"key":"211_CR8","doi-asserted-by":"publisher","first-page":"100388","DOI":"10.1016\/j.iot.2021.100388","volume":"15","author":"AK Sahu","year":"2022","unstructured":"Sahu AK, Singh PK. A survey on IoMT security and privacy. Internet Things. 2022;15:100388. https:\/\/doi.org\/10.1016\/j.iot.2021.100388.","journal-title":"Internet Things"},{"key":"211_CR9","doi-asserted-by":"publisher","unstructured":"Liu J, Yang D, Lian M, Li M. Research on intrusion detection based on particle swarm optimization in IoT. IEEE Access PP. 2021;1\u20131. https:\/\/doi.org\/10.1109\/ACCESS.2021.3063671.","DOI":"10.1109\/ACCESS.2021.3063671"},{"key":"211_CR10","doi-asserted-by":"publisher","unstructured":"Khammassi C, Krichen S. A GA-LR wrapper approach for feature selection in network intrusion detection. Computers Secur. 2017;70. https:\/\/doi.org\/10.1016\/j.cose.2017.06.005.","DOI":"10.1016\/j.cose.2017.06.005"},{"key":"211_CR11","doi-asserted-by":"crossref","unstructured":"Zhang H, Wu CQ, Gao S, Wang Z, Xu Y, Liu Y. An Effective Deep Learning Based Scheme for Network Intrusion Detection. In Proceedings of the 2018 24th International Conference on Pattern Recognition (ICPR), Beijing, China, 20\u201324 August 2018; pp. 682\u2013687. [CrossRef].","DOI":"10.1109\/ICPR.2018.8546162"},{"key":"211_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40537-023-00694-8","volume":"10","author":"Y Yin","year":"2023","unstructured":"Yin Y, Jang-Jaccard J, Xu W, Singh A, Zhu J, Sabrina F, Kwak J. IGRF-RFE: A hybrid feature selection method for MLP-based network intrusion detection on UNSW-NB15 dataset. J Big Data. 2023;10:1\u201326. [CrossRef].","journal-title":"J Big Data"},{"key":"211_CR13","doi-asserted-by":"crossref","unstructured":"Alissa K, Alyas T, Zafar K, Abbas Q, Tabassum N, Sakib S. Botnet Attack Detection in IoT Using Machine Learning. Comput. Intell. Neurosci. 2022, 2022, 4515642. [CrossRef] [PubMed].","DOI":"10.1155\/2022\/4515642"},{"key":"211_CR14","doi-asserted-by":"publisher","first-page":"5427","DOI":"10.3390\/app13095427","volume":"13","author":"S Alosaimi","year":"2023","unstructured":"Alosaimi S, Almutairi SM. An intrusion detection system using BoT-IoT. Appl Sci. 2023;13:5427. https:\/\/doi.org\/10.3390\/app13095427.","journal-title":"Appl Sci"},{"key":"211_CR15","doi-asserted-by":"publisher","first-page":"e437","DOI":"10.7717\/peerj-cs.437","volume":"7","author":"A Agarwal","year":"2021","unstructured":"Agarwal A, Sharma P, Alshehri M, Mohamed AA, Alfarraj O. Classification model for accuracy and intrusion detection using machine learning approach. PeerJ Comput Sci. 2021;7:e437. https:\/\/doi.org\/10.7717\/peerj-cs.437. PMID: 33954233; PMCID: PMC8049129.","journal-title":"PeerJ Comput Sci"},{"key":"211_CR16","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1016\/j.inffus.2022.09.026","volume":"90","author":"A Thakkar","year":"2023","unstructured":"Thakkar A, Lohiya R. Fusion of statistical importance for feature selection in deep neural Network-based intrusion detection system. Inf Fusion. 2023;90:353\u201363. [CrossRef].","journal-title":"Inf Fusion"},{"key":"211_CR17","doi-asserted-by":"crossref","unstructured":"Eunice AD, Gao Q, Zhu MY, Chen Z, LV N. Network Anomaly Detection Technology Based on Deep Learning. In Proceedings of the 2021 IEEE 3rd International Conference on Frontiers Technology of Information and Computer (ICFTIC), Virtual, 12\u201314 November 2021; pp. 6\u20139. [CrossRef].","DOI":"10.1109\/ICFTIC54370.2021.9647222"},{"key":"211_CR18","first-page":"241","volume":"7","author":"AS Barkah","year":"2023","unstructured":"Barkah AS, Selamat SR, Abidin ZZ, Wahyudi R. Impact of data balancing and feature selection on machine Learning-based network intrusion detection. Int J Inf Vis. 2023;7:241\u20138. [CrossRef].","journal-title":"Int J Inf Vis"},{"key":"211_CR19","doi-asserted-by":"publisher","unstructured":"Nasir MH, Khan SA, Khan MM, Fatima M. Swarm intelligence inspired intrusion detection Systems \u2014 A systematic literature review. Comput Netw. 2022;205. https:\/\/doi.org\/10.1016\/j.comnet.2021.108708. 108708, ISSN 1389\u2009\u2013\u20091286.","DOI":"10.1016\/j.comnet.2021.108708"},{"key":"211_CR20","doi-asserted-by":"publisher","unstructured":"Eesa AS, Orman Z. Adnan Mohsin Abdulazeez Brifcani, A novel feature-selection approach based on the cuttlefish optimization algorithm for intrusion detection systems, Expert Systems with Applications, Volume 42, Issue 5, 2015, Pages 2670\u20132679, ISSN 0957\u20134174. https:\/\/doi.org\/10.1016\/j.eswa.2014.11.009","DOI":"10.1016\/j.eswa.2014.11.009"},{"key":"211_CR21","doi-asserted-by":"publisher","first-page":"531","DOI":"10.1007\/s42452-024-06209-1","volume":"6","author":"SA Elsaid","year":"2024","unstructured":"Elsaid SA, Shehab E, Mattar AM, et al. Hybrid intrusion detection models based on GWO optimized deep learning. Discov Appl Sci. 2024;6:531. https:\/\/doi.org\/10.1007\/s42452-024-06209-1.","journal-title":"Discov Appl Sci"},{"key":"211_CR22","doi-asserted-by":"publisher","first-page":"0141","DOI":"10.1016\/j.micpro.2020.103261","volume":"79","author":"S Manimurugan","year":"2020","unstructured":"Manimurugan S, Majdi Al-qdah, Mohmmed M, Narmatha C, Varatharajan R. Intrusion detection in networks using crow search optimization algorithm with adaptive neuro-fuzzy inference system. Microprocess Microsyst. 2020;79:0141\u20139331. https:\/\/doi.org\/10.1016\/j.micpro.2020.103261.","journal-title":"Microprocess Microsyst"},{"key":"211_CR23","doi-asserted-by":"publisher","unstructured":"Jain V, Agrawal M. Applying Genetic Algorithm in Intrusion Detection System of IoT Applications, 2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184), Tirunelveli, India, 2020, pp. 284\u2013287. https:\/\/doi.org\/10.1109\/ICOEI48184.2020.9143019","DOI":"10.1109\/ICOEI48184.2020.9143019"},{"key":"211_CR24","doi-asserted-by":"publisher","unstructured":"Abualhaj MM, Al-Khatib SN, Al-Allawee A, Munther A, Anbar M. Enhancing Intrusion Detection Systems: A Comparative Study using Whale Optimization Algorithm and Hawks Optimization Algorithm, 2024 11th International Conference on Electrical and Electronics Engineering (ICEEE), Marmaris, Turkiye, 2024, pp. 404\u2013409. https:\/\/doi.org\/10.1109\/ICEEE62185.2024.10779238","DOI":"10.1109\/ICEEE62185.2024.10779238"},{"key":"211_CR25","doi-asserted-by":"publisher","unstructured":"Udoh GE, Ibrahim NM, Boukar MM. Network Intrusion Detection using a Hybridized Harmony Search and Random Forest, 2023 2nd International Conference on Multidisciplinary Engineering and Applied Science (ICMEAS), Abuja, Nigeria, 2023, pp. 1\u20135. https:\/\/doi.org\/10.1109\/ICMEAS58693.2023.10429865","DOI":"10.1109\/ICMEAS58693.2023.10429865"},{"key":"211_CR26","doi-asserted-by":"publisher","first-page":"113249","DOI":"10.1016\/j.eswa.2020.113249","volume":"148","author":"H Alazzam","year":"2020","unstructured":"Alazzam H, Sharieh A, Sabri KE. A feature selection algorithm for intrusion detection system based on pigeon inspired optimizer. Expert Syst Appl. 2020;148:113249. [CrossRef].","journal-title":"Expert Syst Appl"},{"key":"211_CR27","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2015.1125974","author":"N Moustafa","year":"2016","unstructured":"Moustafa N, Slay J. Inform Secur Journal: Global Perspective. 2016;25(1\u20133):18\u201331. https:\/\/doi.org\/10.1080\/19393555.2015.1125974. The evaluation of Network Anomaly Detection Systems: Statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set."},{"key":"211_CR28","unstructured":"The Critical Risk of DDoS Attacks in Healthcare: Proactive Mitigation with HARPP DDoS Mitigator. Labris, Networks. May, https:\/\/labrisnetworks.com\/the-critical-risk-of-ddos-attacks-in-healthcare-proactive-mitigation-with-harpp-ddos-mitigator\/. Accessed 16 2025."},{"key":"211_CR29","doi-asserted-by":"crossref","unstructured":"Sarhan M, Layeghy S, Portmann M. Feature Analysis for Machine Learning-based IoT Intrusion Detection. arXiv 2021, arXiv:2108.12732.","DOI":"10.21203\/rs.3.rs-2035633\/v1"},{"key":"211_CR30","doi-asserted-by":"publisher","unstructured":"Jabez J, Muthukumar B, Intrusion Detection System (IDS). : Anomaly Detection Using Outlier Detection Approach, Procedia Computer Science, Volume 48, 2015, Pages 338\u2013346, ISSN 1877\u2009\u2013\u20090509. https:\/\/doi.org\/10.1016\/j.procs.2015.04.191","DOI":"10.1016\/j.procs.2015.04.191"},{"key":"211_CR31","doi-asserted-by":"publisher","unstructured":"Mambwe Sydney K, Sun Y. Performance analysis of intrusion detection systems using a feature selection method on the UNSW-NB15 dataset. J Big Data. 2020;7. https:\/\/doi.org\/10.1186\/s40537-020-00379-6.","DOI":"10.1186\/s40537-020-00379-6"},{"key":"211_CR32","doi-asserted-by":"crossref","unstructured":"Ustebay S, Turgut Z, Aydin MA. Intrusion detection system with recursive feature elimination by using random forest and deep learning classifier. In Proceedings of the 2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT), Ankara, Turkey, 3\u20134 December 2018; IEEE: New York, NY, USA, 2018; pp. 71\u201376.","DOI":"10.1109\/IBIGDELFT.2018.8625318"},{"key":"211_CR33","doi-asserted-by":"publisher","first-page":"104293","DOI":"10.1016\/j.micpro.2021.104293","volume":"85","author":"NV Sharma","year":"2021","unstructured":"Sharma NV, Yadav NS. An optimal intrusion detection system using recursive feature elimination and ensemble of classifiers. Microprocess Microsyst. 2021;85:104293.","journal-title":"Microprocess Microsyst"},{"key":"211_CR34","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1186\/s40537-023-00694-8","volume":"10","author":"Y Yin","year":"2023","unstructured":"Yin Y, Jang-Jaccard J, Xu W, et al. IGRF-RFE: a hybrid feature selection method for MLP-based network intrusion detection on UNSW-NB15 dataset. J Big Data. 2023;10:15. https:\/\/doi.org\/10.1186\/s40537-023-00694-8.","journal-title":"J Big Data"},{"key":"211_CR35","doi-asserted-by":"crossref","unstructured":"Tonni ZA, Mazumder RA, Novel Feature. Selection Technique for Intrusion Detection System Using RF-RFE and Bio-inspired Optimization. In Proceedings of the 2023 57th Annual Conference on Information Sciences and Systems (CISS), Baltimore, MD, USA, 22\u201324 March 2023; pp. 1\u20136. [CrossRef].","DOI":"10.1109\/CISS56502.2023.10089745"},{"key":"211_CR36","doi-asserted-by":"crossref","unstructured":"Batra M, Agrawal R. Comparative analysis of decision tree algorithms. In Nature Inspired Computing: Proceedings of CSI 2015; Springer: Berlin\/Heidelberg, Germany, 2018; pp. 31\u201336.","DOI":"10.1007\/978-981-10-6747-1_4"},{"key":"211_CR37","doi-asserted-by":"publisher","first-page":"165","DOI":"10.37256\/aie.4220233337","volume":"4","author":"MA Hossain","year":"2023","unstructured":"Hossain MA. Enhanced ensemble-based distributed denial-of-service (DDoS) attack detection with novel feature selection: A robust cybersecurity approach. Artif Intell Evol. 2023;4:165\u201386.","journal-title":"Artif Intell Evol"},{"key":"211_CR38","doi-asserted-by":"publisher","unstructured":"Moualla S, Khorzom K, Jafar A. (2021). Improving the Performance of Machine Learning-Based Network Intrusion Detection Systems on the UNSW-NB15 Dataset. Computational Intelligence and Neuroscience. 2021. 1\u201313. https:\/\/doi.org\/10.1155\/2021\/5557577","DOI":"10.1155\/2021\/5557577"},{"key":"211_CR39","doi-asserted-by":"publisher","unstructured":"Hossain MA, Islam MS. Ensuring network security with a robust intrusion detection system using ensemble-based machine learning. Array https:\/\/doi.org\/10.1016\/j.array.2023.100306 (2023).","DOI":"10.1016\/j.array.2023.100306"},{"key":"211_CR40","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1016\/j.comnet.2018.02.028","volume":"136","author":"V Hajisalem","year":"2018","unstructured":"Hajisalem V, Babaie S. A hybrid intrusion detection system based on ABC-AFS algorithm for misuse and anomaly detection. Comput Netw. 2018;136:37\u201350.","journal-title":"Comput Netw"},{"key":"211_CR41","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1811.00701","author":"N Koroniotis","year":"2018","unstructured":"Koroniotis N, Moustafa N, Sitnikova E, Turnbull B. Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-IoT dataset. Future Gener. 2018. https:\/\/doi.org\/10.48550\/ARXIV.1811.00701.","journal-title":"Future Gener"},{"issue":"23","key":"211_CR42","doi-asserted-by":"publisher","first-page":"7835","DOI":"10.3390\/s21237835","volume":"21","author":"K Kotecha","year":"2021","unstructured":"Kotecha K, Verma R, Rao PV, Prasad P, Mishra VK, Badal T, Jain D, Garg D, Sharma S. Enhanced network intrusion detection system. Sens (Basel). 2021;21(23):7835. https:\/\/doi.org\/10.3390\/s21237835. PMID: 34883839; PMCID: PMC8659770.","journal-title":"Sens (Basel)"},{"key":"211_CR43","doi-asserted-by":"publisher","first-page":"650","DOI":"10.3390\/eng4010039","volume":"4","author":"S Afrifa","year":"2023","unstructured":"Afrifa S, Varadarajan V, Appiahene P, Zhang T, Domfeh EA. Ensemble machine learning techniques for accurate and efcient detection of botnet attacks in connected computers. Engineering. 2023;4:650\u201364.","journal-title":"Engineering"},{"key":"211_CR44","doi-asserted-by":"crossref","unstructured":"Hezam AA, Mostafa SA, Ramli AA, Mahdin H, Khalaf BA et al. Deep learning approach for detecting botnet attacks in IoT environment of multiple and heterogeneous sensors. In Advances in Cyber Security Vol. 1487 (eds Abdullah, N. Springer, 317\u2013328 (2021).","DOI":"10.1007\/978-981-16-8059-5_19"},{"key":"211_CR45","doi-asserted-by":"publisher","unstructured":"Joshi C, Bharti V, Ranjan RK et al. Botnet detection using machine learning algorithms. In Proceedings of the International Conference on Paradigms of Computing, Communication and Data Sciences (eds Dave, M. Springer, 717\u2013727 (2021). https:\/\/doi.org\/10.1007\/978-981-15-7533-4_56","DOI":"10.1007\/978-981-15-7533-4_56"},{"key":"211_CR46","unstructured":"Kim J, Sim A, Kim J, Wu K, Hahm J. Improving botnet detection with recurrent neural network and transfer learning. Preprint at http:\/\/arxiv.org\/abs\/2104.12602 (2021)."},{"key":"211_CR47","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1613\/jair.953","volume":"16","author":"NV Chawla","year":"2002","unstructured":"Chawla NV, Bowyer KW, Hall LO, Kegelmeyer WP. SMOTE: synthetic minority over sampling technique. J Artif Intell Res. 2002;16:321\u201357.","journal-title":"J Artif Intell Res"},{"key":"211_CR48","doi-asserted-by":"crossref","unstructured":"Potluri S, Ahmed S, Diedrich C. Convolutional neural networks for multi-class intrusion detection system, in Proceedings of the International Conference on Mining Intelligence and Knowledge Exploration, Springer, Goa, India, December 2018.","DOI":"10.1007\/978-3-030-05918-7_20"},{"key":"211_CR49","doi-asserted-by":"publisher","first-page":"41525","DOI":"10.1109\/ACCESS.2019.2895334","volume":"7","author":"R Vinayakumar","year":"2019","unstructured":"Vinayakumar R, Alazab M, Soman KP, Poornachandran P, Al-Nemrat A, Venkatraman S. Deep learning approach for intelligent intrusion detection system. IEEE Access. 2019;7:41525\u201350.","journal-title":"IEEE Access"},{"key":"211_CR50","doi-asserted-by":"crossref","unstructured":"Moukhafi M. Artificial neural network optimized by genetic algorithm for intrusion detection system, in Advanced Intelligent Systems for Sustainable DevelopmentSpringer, Berlin, Germany, 2018.","DOI":"10.1007\/978-3-030-11928-7_35"},{"key":"211_CR51","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/s00521-013-1368-0","volume":"24","author":"JR Vergara","year":"2014","unstructured":"Vergara JR, Est\u00e9vez PA. A review of feature selection methods based on mutual information. Neural Comput Appl. 2014;24:175\u201386.","journal-title":"Neural Comput Appl"},{"key":"211_CR52","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3026578","author":"AM Alazab","year":"2020","unstructured":"Alazab AM, Alomar DA, Alenezi MA, Alzahrani I. IEEE Access. 2020;8:183061\u201372. https:\/\/doi.org\/10.1109\/ACCESS.2020.3026578. A Novel Hybrid Deep Learning Model for Intrusion Detection Systems Using the UNSW-NB15 Dataset,."},{"key":"211_CR53","doi-asserted-by":"crossref","unstructured":"Yin, Yuhua & Jang-Jaccard, Julian & Xu, Wen & Singh, Amardeep & Zhu, Jinting & Sabrina,Fariza & Kwak, Jin. (2022). IGRF-RFE: A Hybrid Feature Selection Method for MLP-based Network Intrusion Detection on UNSW-NB15 Dataset","DOI":"10.1186\/s40537-023-00694-8"}],"container-title":["Discover Internet of Things"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-025-00211-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s43926-025-00211-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-025-00211-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T00:03:13Z","timestamp":1761782593000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s43926-025-00211-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,29]]},"references-count":53,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["211"],"URL":"https:\/\/doi.org\/10.1007\/s43926-025-00211-8","relation":{"references":[{"id-type":"doi","id":"10.1080\/19393555.2015.1125974","asserted-by":"subject"},{"id-type":"doi","id":"10.1109\/ACCESS.2020.3026578","asserted-by":"subject"}]},"ISSN":["2730-7239"],"issn-type":[{"type":"electronic","value":"2730-7239"}],"subject":[],"published":{"date-parts":[[2025,10,29]]},"assertion":[{"value":"9 November 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 September 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 October 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"All authors have given their consent and agreed to this publication.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"121"}}