{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,18]],"date-time":"2026-02-18T13:02:55Z","timestamp":1771419775557,"version":"3.50.1"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T00:00:00Z","timestamp":1770940800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2026,2,18]],"date-time":"2026-02-18T00:00:00Z","timestamp":1771372800000},"content-version":"vor","delay-in-days":5,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Comput Intell Syst"],"DOI":"10.1007\/s44196-026-01181-7","type":"journal-article","created":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T04:15:06Z","timestamp":1770956106000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Modified Chaos-Driven Enhanced Cryptographic Framework for Lightweight and Robust IoT Security in Resource-Constrained Devices"],"prefix":"10.1007","volume":"19","author":[{"given":"M.","family":"Vamsikrishna","sequence":"first","affiliation":[]},{"given":"Yagyesh","family":"Godiyal","sequence":"additional","affiliation":[]},{"given":"Abhishek Kumar","family":"Pandey","sequence":"additional","affiliation":[]},{"given":"Umesh Kumar","family":"Lilhore","sequence":"additional","affiliation":[]},{"given":"Sarita","family":"Simaiya","sequence":"additional","affiliation":[]},{"given":"Sultan Mesfer A.","family":"Aldossary","sequence":"additional","affiliation":[]},{"given":"Shimaa A.","family":"Hussien","sequence":"additional","affiliation":[]},{"given":"Ehab Seif","family":"Ghith","sequence":"additional","affiliation":[]},{"given":"Lidia Gosy","family":"Tekeste","sequence":"additional","affiliation":[]},{"given":"Yogesh Kumar","family":"Sharma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,13]]},"reference":[{"issue":"1","key":"1181_CR1","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/s11416-025-00559-z","volume":"21","author":"B Yogi","year":"2025","unstructured":"Yogi, B., Ajoy Kumar, K.: Hybrid chaotic and cellular automata-based image encryption for IoT and resource-constrained devices: B. Yogi. Et Al J. Comput. Virol. Hacking Techniques. 21(1), 15 (2025)","journal-title":"Et Al J. Comput. Virol. Hacking Techniques"},{"issue":"5","key":"1181_CR2","doi-asserted-by":"publisher","first-page":"e70097","DOI":"10.1002\/spy2.70097","volume":"8","author":"M Bokhari","year":"2025","unstructured":"Bokhari, M., Ubaidullah, S.R., Ahmad, S., Afzal, B., Hanafi, Zeyauddin, M.: A novel lightweight cryptographic framework based on hybrid chaotic maps and DNA encoding. Secur. Priv. 8(5), e70097 (2025)","journal-title":"Secur. Priv."},{"key":"1181_CR3","doi-asserted-by":"publisher","first-page":"10641","DOI":"10.3390\/app151910641","volume":"15","author":"G. \u00d6zt\u00fcrk","year":"2025","unstructured":"\u00d6zt\u00fcrk, G., \u00c7avu\u015fo\u011flu, M.E, Osman E, Durmu\u015f K. Secure and Efficient Data Encryption for Internet of Robotic Things via Chaos-Based Ascon. Applied Sciences 15, no. 19 : 10641. (2025)","journal-title":"Appl. Sci."},{"issue":"1","key":"1181_CR4","doi-asserted-by":"publisher","first-page":"39951","DOI":"10.1038\/s41598-025-23592-w","volume":"15","author":"H Zhiqiang","year":"2025","unstructured":"Zhiqiang, H., Rauf, A., Nazir, A., Tchier, F., Aslam, A., Keneni Abera Tola: Design and analysis of a secure image encryption algorithm using proposed non-linear RN chaotic system and ECC\/HKDF key derivation with authentication support. Sci. Rep. 15(1), 39951 (2025)","journal-title":"Sci. Rep."},{"key":"1181_CR5","doi-asserted-by":"crossref","unstructured":"Sharmila, S., Bhuvaneswaran, R.S., Vaithiyanathan, D.: Secure image encryption using rubik\u2019s cube-based scrambling with chaos-driven diffusion and circular shifts. Optik : 172533. (2025)","DOI":"10.1016\/j.ijleo.2025.172533"},{"issue":"6","key":"1181_CR6","doi-asserted-by":"publisher","first-page":"e70123","DOI":"10.1002\/spy2.70123","volume":"8","author":"D Dey","year":"2025","unstructured":"Dey, D., Bhunia, P., Jana, D.K., Diyasi, S., Maity, S.: Lightweight hybrid chaotic image encryption with spiral shuffling and S-Box diffusion. Secur. Priv. 8(6), e70123 (2025)","journal-title":"Secur. Priv."},{"key":"1181_CR7","doi-asserted-by":"crossref","unstructured":"Sharma, H.: and Simran Kaur. Quantum-Inspired hyperchaotic Bio-DNA image encryption for real time medical security. IEEE Access. (2025)","DOI":"10.1109\/ACCESS.2025.3625765"},{"key":"1181_CR8","doi-asserted-by":"crossref","unstructured":"Man, Z., Yu, Z., Yu, J., Gao, C., Meng, X.: Edge computing in the internet of things: Lattice-Based and split encryption for Post-Quantum data security. IEEE Internet Things J. (2025)","DOI":"10.1109\/JIOT.2025.3591521"},{"key":"1181_CR9","doi-asserted-by":"crossref","unstructured":"Sambandham, T., Srivastava, H.M., Thangamani, S., Yousif, M.A.: Abdelhamid Mohammed Djaouti, and Pshtiwan Othman Mohammed. A novel cryptographic framework and mathematical modeling for secure transmission of parkinson\u2019s disease data using RSA and block-based secret sharing. Sci. Rep. (2025)","DOI":"10.1038\/s41598-025-32227-z"},{"key":"1181_CR10","doi-asserted-by":"publisher","first-page":"63976","DOI":"10.1109\/ACCESS.2024.3396452","volume":"12","author":"P-P Duong","year":"2024","unstructured":"Duong, P.-P., Nguyen, H.M., Dao, B.-A., Tran, B.K.-D.-N.T.-H.: Trong-Thuc Hoang, and Cong-Kha Pham. Construction of robust lightweight s-boxes using enhanced logistic and enhanced sine maps. IEEE Access. 12, 63976\u201363994 (2024)","journal-title":"IEEE Access."},{"issue":"6","key":"1181_CR11","doi-asserted-by":"publisher","first-page":"4977","DOI":"10.1007\/s11071-024-09306-3","volume":"112","author":"H. Mohamadi","year":"2024","unstructured":"Mohamadi, H., Eddine, L., Lahlou, N., Kara, Leivadeas, A.: A versatile chaotic cryptosystem with a novel substitution-permutation scheme for internet-of-drones photography. Nonlinear Dyn. 112 6, 4977\u20135012 (2024)","journal-title":"Nonlinear Dyn."},{"issue":"6","key":"1181_CR12","doi-asserted-by":"publisher","first-page":"e0326202","DOI":"10.1371\/journal.pone.0326202","volume":"20","author":"N. Zulfiqar","year":"2025","unstructured":"Zulfiqar, N., Ahmad, T., Ghazal, T.M., Ikram, A., Gazzawe, F., Albahar, M.A., Abdelrahman, H.: Hussein, and Ahmad Salman Khan. Securing digital images: A chaos-driven scrambling algorithm using the R\u00f6ssler system. PloS one. 20(6), e0326202 (2025)","journal-title":"PloS one"},{"issue":"8","key":"1181_CR13","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1007\/s44443-025-00284-z","volume":"37","author":"W Lu","year":"2025","unstructured":"Lu, W., Jin, C., Wang, J., Liu, X., Liu, J., Zhai, Z.: A novel image encryption scheme using 3D chaotic maps with Josephus permutation and dynamic diffusion. J. King Saud Univ. Comput. Inform. Sci. 37(8), 254 (2025)","journal-title":"J. King Saud Univ. Comput. Inform. Sci."},{"issue":"1","key":"1181_CR14","doi-asserted-by":"publisher","first-page":"41918","DOI":"10.1038\/s41598-025-25929-x","volume":"15","author":"H Alshehri","year":"2025","unstructured":"Alshehri, H.: Secure image encryption using a 4D chaotic system and langton\u2019s ant cellular automaton. Sci. Rep. 15(1), 41918 (2025)","journal-title":"Sci. Rep."},{"key":"1181_CR15","doi-asserted-by":"crossref","unstructured":"Lilhore, U., Kumar, S., Simaiya, S., Dalal, A., Alshuhail, Almusharraf, A.: A Post-Quantum hybrid encryption framework for Securing biometric data in consumer electronics. IEEE Trans. Consum. Electron. (2025)","DOI":"10.1109\/TCE.2025.3581408"},{"key":"1181_CR16","doi-asserted-by":"crossref","unstructured":"Singh, P., Acharya, B., Rahul Kumar, C.: Lightweight cryptographic algorithms for resource-constrained IoT devices and sensor networks. In: Security and Privacy Issues in IoT Devices and Sensor Networks, pp. 153\u2013185. Academic (2021)","DOI":"10.1016\/B978-0-12-821255-4.00008-0"},{"key":"1181_CR17","doi-asserted-by":"crossref","unstructured":"Wu, W.: and Shiyu Wang. Cryptanalysis and Improvement of a Medical Image-Encryption Algorithm Based on 2D Logistic-Gaussian Hyperchaotic Map. Electronics 14, no. 21 : 4283. (2025)","DOI":"10.3390\/electronics14214283"},{"key":"1181_CR18","first-page":"5","volume":"17","author":"E Qassime","year":"2024","unstructured":"Qassime, E.: Enhancing the security and efficiency of biomedical image encryption through a novel Hyper-Chaotic logistic map. Int. J. Intell. Eng. Syst. 17, 5 (2024)","journal-title":"Int. J. Intell. Eng. Syst."},{"key":"1181_CR19","doi-asserted-by":"crossref","unstructured":"Sumit, R.S., Chhillar, S., Dalal, S., Dalal, U.K., Lilhore, Samiya, S.: A dynamic and optimized routing approach for VANET communication in smart cities to secure intelligent transportation system via a chaotic multi-verse optimization algorithm. Cluster Computing 27, no. 5 : 7023\u20137048. (2024)","DOI":"10.1007\/s10586-024-04322-9"},{"key":"1181_CR20","doi-asserted-by":"publisher","first-page":"35589","DOI":"10.1109\/ACCESS.2022.3160000","volume":"10","author":"S Ullah","year":"2022","unstructured":"Ullah, S., Radzi, R.Z., Yazdani, T.M., Alshehri, A., Khan, I., : IEEE Access. 10, 35589\u201335604 (2022)","journal-title":"IEEE Access."},{"issue":"1","key":"1181_CR21","doi-asserted-by":"publisher","first-page":"34112","DOI":"10.1038\/s41598-025-20019-4","volume":"15","author":"SH Tolpa","year":"2025","unstructured":"Tolpa, S.H., Mohamed, A., Abdelhamed, El-Sayed Soliman, A.: Said, and Mohamed Yasin I. Afi. A novel chaos-based approach for constructing lightweight S-Boxes. Sci. Rep. 15(1), 34112 (2025)","journal-title":"Sci. Rep."},{"issue":"33","key":"1181_CR22","doi-asserted-by":"publisher","first-page":"79047","DOI":"10.1007\/s11042-024-18628-8","volume":"83","author":"A Abba","year":"2024","unstructured":"Abba, A., Teh, J.S., Moatsum Alawida: Towards accurate keyspace analysis of chaos-based image ciphers. Multimedia Tools Appl. 83(33), 79047\u201379066 (2024)","journal-title":"Multimedia Tools Appl."},{"issue":"4","key":"1181_CR23","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/s10462-024-10719-0","volume":"57","author":"S Kumar","year":"2024","unstructured":"Kumar, S., Sharma, D.: A chaotic based image encryption scheme using elliptic curve cryptography and genetic algorithm. Artif. Intell. Rev. 57(4), 87 (2024)","journal-title":"Artif. Intell. Rev."},{"key":"1181_CR24","doi-asserted-by":"crossref","unstructured":"Lilhore, U.K., Simaiya, S., Dalal, S., Sharma, Y.K., Tomar, S., Hashmi, A.: Secure WSN architecture utilizing hybrid encryption with DKM to ensure consistent IoV communication. Wireless Pers. Commun., 1\u201329. (2024)","DOI":"10.1007\/s11277-024-10859-0"},{"key":"1181_CR25","doi-asserted-by":"crossref","unstructured":"Zheng, J., Qian, Y., Wang, C.: Design and cryptographic implementation of an evolutionary digital chaotic model. IEEE Trans. Circuits Syst. Video Technol. (2024)","DOI":"10.1109\/TCSVT.2024.3429641"},{"issue":"1","key":"1181_CR26","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1109\/JIOT.2021.3098859","volume":"9","author":"G Kuldeep","year":"2021","unstructured":"Kuldeep, G., Zhang, Q.: Design prototype and security analysis of a lightweight joint compression and encryption scheme for resource-constrained IoT devices. IEEE Internet Things J. 9(1), 165\u2013181 (2021)","journal-title":"IEEE Internet Things J."},{"key":"1181_CR27","doi-asserted-by":"crossref","unstructured":"Rathore, M.S., Poongodi, M., Saurabh, P., Lilhore, U.K., Bourouis, S., Alhakami, W., Osamor, J., Hamdi, M.: A novel trust-based security and privacy model for internet of vehicles using encryption and steganography. Computers and Electrical Engineering, 102, p.108205. (2022)","DOI":"10.1016\/j.compeleceng.2022.108205"},{"key":"1181_CR28","doi-asserted-by":"publisher","first-page":"103560","DOI":"10.1016\/j.cose.2023.103560","volume":"136","author":"U Lilhore","year":"2024","unstructured":"Lilhore, U., Kumar, S., Dalal, Simaiya, S.: A cognitive security framework for detecting intrusions in IoT and 5G utilizing deep learning. Computers Secur. 136, 103560 (2024)","journal-title":"Computers Secur."},{"key":"1181_CR29","doi-asserted-by":"crossref","unstructured":"Arias-C\u00e1rdenas, M.: Deicy Alvarado-Nieto, and Isabel Amaya-Barrera. Steganographic Cryptosystem Based on the Use of Chaos Theory and Cellular Automata. TecnoL\u00f3gicas 27, no. 61 (2024)","DOI":"10.22430\/22565337.3132"},{"issue":"1","key":"1181_CR30","doi-asserted-by":"publisher","first-page":"17381","DOI":"10.1038\/s41598-023-44701-7","volume":"13","author":"S. Pradeep","year":"2023","unstructured":"Pradeep, S., Sharma, Y.K., Lilhore, U.K., Simaiya, S., Kumar, A., Ahuja, S., Margala, M., Chakrabarti, P., Chakrabarti, T.: Developing an SDN security model (EnsureS) based on lightweight service path validation with batch hashing and tag verification. Sci. Rep. 13(1), 17381 (2023)","journal-title":"Sci. Rep."},{"issue":"3","key":"1181_CR31","doi-asserted-by":"publisher","first-page":"263","DOI":"10.3390\/sym16030263","volume":"16","author":"C. Zhang","year":"2024","unstructured":"Zhang, C., Liang, Y., Tavares, A., Wang, L., Gomes, T.: Sandro Pinto:. An improved public key cryptographic algorithm based on chebyshev polynomialsRSA. Symmetry. 16(3), 263 (2024)","journal-title":"Symmetry"},{"key":"1181_CR32","doi-asserted-by":"publisher","first-page":"82926","DOI":"10.1109\/ACCESS.2024.3410668","volume":"12","author":"B Alabduallah","year":"2024","unstructured":"Alabduallah, B., Banga, A., Iqbal, N., Ikram, A., Hossam Diab: Advancing cryptographic security with a new delannoy-derived chaotic S-box. IEEE Access. 12, 82926\u201382937 (2024)","journal-title":"IEEE Access."},{"issue":"6","key":"1181_CR33","doi-asserted-by":"publisher","first-page":"e4771","DOI":"10.1002\/ett.4771","volume":"34","author":"M Dalal, Surjeet","year":"2023","unstructured":"Dalal, Surjeet, M., Poongodi, U.K., Lilhore, F., Dahan, T., Vaiyapuri, I., Keshta, S.M., Aldossary: Amena Mahmoud, and Sarita Simaiya. Optimized LightGBM model for security and privacy issues in cyber-physical systems. Trans. Emerg. Telecommunications Technol. 34(6), e4771 (2023)","journal-title":"Trans. Emerg. Telecommunications Technol."},{"issue":"2","key":"1181_CR34","doi-asserted-by":"publisher","first-page":"1625","DOI":"10.1007\/s12652-017-0494-4","volume":"15","author":"S Singh","year":"2024","unstructured":"Singh, S., Sharma, P.K., Moon, S.Y., Jong Hyuk Park: Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions. J. Ambient Intell. Humaniz. Comput. 15(2), 1625\u20131642 (2024)","journal-title":"J. Ambient Intell. Humaniz. Comput."},{"issue":"1","key":"1181_CR35","doi-asserted-by":"publisher","first-page":"21","DOI":"10.2478\/cait-2024-0002","volume":"24","author":"PS Suryateja","year":"2024","unstructured":"Suryateja, P.S., Venkata Rao, K.: A survey on lightweight cryptographic algorithms in IoT. Cybernetics Inform. Technol. 24(1), 21\u201334 (2024)","journal-title":"Cybernetics Inform. Technol."},{"issue":"12","key":"1181_CR36","doi-asserted-by":"publisher","first-page":"4008","DOI":"10.3390\/s24124008","volume":"24","author":"I Radhakrishnan","year":"2024","unstructured":"Radhakrishnan, I., Jadon, S., Prasad, Honnavalli, B.: Efficiency and security evaluation of lightweight cryptographic algorithms for resource-constrained IoT devices. Sensors. 24(12), 4008 (2024)","journal-title":"Sensors"},{"key":"1181_CR37","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1016\/j.procs.2024.03.213","volume":"233","author":"C Ramakrishna","year":"2024","unstructured":"Ramakrishna, C., Jnana, D., Bharath Kalyan Reddy, B.K., Priya, P.P., Amritha: Lakshmy. Analysis of lightweight cryptographic algorithms for IoT gateways. Procedia Comput. Sci. 233, 235\u2013242 (2024)","journal-title":"Procedia Comput. Sci."},{"issue":"3","key":"1181_CR38","doi-asserted-by":"publisher","first-page":"1722","DOI":"10.1080\/03772063.2019.1670103","volume":"68","author":"T Goyal","year":"2022","unstructured":"Goyal, T., Kumar, V., Sahula, Deepak Kumawat: Energy efficient lightweight cryptography algorithms for IoT devices. IETE J. Res. 68(3), 1722\u20131735 (2022)","journal-title":"IETE J. Res."},{"issue":"1","key":"1181_CR39","first-page":"8837671","volume":"2020","author":"B Aslan","year":"2020","unstructured":"Aslan, B., Aslan, F.Y., Tolga, M., Sakall\u0131: Energy consumption analysis of lightweight cryptographic algorithms that can be used in the security of internet of things applications. Secur. Communication Networks. 2020(1), 8837671 (2020)","journal-title":"Secur. Communication Networks"},{"issue":"10","key":"1181_CR40","doi-asserted-by":"publisher","first-page":"8279","DOI":"10.1109\/JIOT.2020.3044526","volume":"8","author":"A Fotovvat","year":"2020","unstructured":"Fotovvat, A., Gazi, M.E., Rahman, S.S., Vedaei, Khan, A.: Wahid. Comparative performance analysis of lightweight cryptography algorithms for IoT sensor nodes. IEEE Internet Things J. 8(10), 8279\u20138290 (2020)","journal-title":"IEEE Internet Things J."},{"issue":"2","key":"1181_CR41","doi-asserted-by":"publisher","first-page":"54","DOI":"10.3390\/fi15020054","volume":"15","author":"M El-Hajj","year":"2023","unstructured":"El-Hajj, M., Mousawi, H., Fadlallah, A.: Analysis of lightweight cryptographic algorithms on Iot hardware platform. Future Internet. 15(2), 54 (2023)","journal-title":"Future Internet"},{"key":"1181_CR42","doi-asserted-by":"publisher","first-page":"28177","DOI":"10.1109\/ACCESS.2021.3052867","volume":"9","author":"VA Thakor","year":"2021","unstructured":"Thakor, V.A., Razzaque, M.A., Muhammad, R.A.K.: Lightweight cryptography algorithms for resource-constrained IoT devices: A review, comparison and research opportunities. IEEE access. 9, 28177\u201328193 (2021)","journal-title":"IEEE access."},{"key":"1181_CR43","doi-asserted-by":"crossref","unstructured":"Tajudeen, K., Odunayo: Ahmed Oloduowo Ameen, and abidemi Emmanuel Adeniyi. A systematic review on advanced encryption standard cryptography to enhance message security. Multimedia Tools Appl. : 1\u201326. (2025)","DOI":"10.1007\/s11042-025-21041-4"},{"issue":"2","key":"1181_CR44","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3584919","volume":"23","author":"R Elkhatib","year":"2024","unstructured":"Elkhatib, R., Koziel, B., Azarderakhsh, R., Mehran Mozaffari Kermani: Cryptographic engineering a fast and efficient SIKE in FPGA. ACM Trans. Embedded Comput. Syst. 23(2), 1\u201325 (2024)","journal-title":"ACM Trans. Embedded Comput. Syst."},{"key":"1181_CR45","doi-asserted-by":"crossref","unstructured":"Bisheh-Niasar, M., Azarderakhsh, R.: and Mehran Mozaffari-Kermani. High-speed NTT-based polynomial multiplication accelerator for post-quantum cryptography. In 2021 IEEE 28th symposium on computer arithmetic (ARITH), pp. 94\u2013101. IEEE, (2021)","DOI":"10.1109\/ARITH51176.2021.00028"},{"issue":"7","key":"1181_CR46","doi-asserted-by":"publisher","first-page":"1297","DOI":"10.1109\/TVLSI.2021.3077885","volume":"29","author":"M Bisheh-Niasar","year":"2021","unstructured":"Bisheh-Niasar, M., Azarderakhsh, R., Mozaffari-Kermani, M.: Cryptographic accelerators for digital signature based on Ed25519. IEEE Trans. Very Large Scale Integr. VLSI Syst. 29(7), 1297\u20131305 (2021)","journal-title":"IEEE Trans. Very Large Scale Integr. VLSI Syst."},{"issue":"10","key":"1181_CR47","doi-asserted-by":"publisher","first-page":"1750","DOI":"10.1109\/TCAD.2017.2661811","volume":"36","author":"S Subramanian","year":"2017","unstructured":"Subramanian, S., Mozaffari-Kermani, M., Azarderakhsh, R., Mehrdad Nojoumian: Reliable hardware architectures for cryptographic block ciphers LED and HIGHT. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 36(10), 1750\u20131758 (2017)","journal-title":"IEEE Trans. Comput. Aided Des. Integr. Circuits Syst."},{"key":"1181_CR48","doi-asserted-by":"publisher","first-page":"734","DOI":"10.1186\/s12967-024-05558-0","volume":"16","author":"L Bai","year":"2024","unstructured":"Bai, L., Qu, W., Cheng, X., Yang, H., Huang, Y.-P., Wang, Z., Han, C., et al.: Multispecies transcriptomics identifies SIKE as a MAPK repressor that prevents NASH progression. Sci. Transl. Med. 16, 734 (2024)","journal-title":"Sci. Transl. Med."}],"container-title":["International Journal of Computational Intelligence Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s44196-026-01181-7","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44196-026-01181-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44196-026-01181-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,18]],"date-time":"2026-02-18T12:07:24Z","timestamp":1771416444000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s44196-026-01181-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,13]]},"references-count":48,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2026,12]]}},"alternative-id":["1181"],"URL":"https:\/\/doi.org\/10.1007\/s44196-026-01181-7","relation":{},"ISSN":["1875-6883"],"issn-type":[{"value":"1875-6883","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,13]]},"assertion":[{"value":"12 September 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 December 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 January 2026","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 February 2026","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The author declares no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"71"}}