{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T17:59:18Z","timestamp":1772301558373,"version":"3.50.1"},"reference-count":53,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,7,11]],"date-time":"2025-07-11T00:00:00Z","timestamp":1752192000000},"content-version":"vor","delay-in-days":10,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J. King Saud Univ. Comput. Inf. Sci."],"published-print":{"date-parts":[[2025,7]]},"DOI":"10.1007\/s44443-025-00014-5","type":"journal-article","created":{"date-parts":[[2025,7,11]],"date-time":"2025-07-11T10:03:11Z","timestamp":1752228191000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Securing SDN controller placement with MuZero and blockchain-based smart contracts"],"prefix":"10.1007","volume":"37","author":[{"given":"Ouafae","family":"Benoudifa","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9215-6309","authenticated-orcid":false,"given":"Abderrahim","family":"Ait Wakrime","sequence":"additional","affiliation":[]},{"given":"Redouane","family":"Benaini","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,11]]},"reference":[{"key":"14_CR1","doi-asserted-by":"crossref","unstructured":"Abbasi AG, Khan Z (2017) Veidblock: verifiable identity using blockchain and ledger in a software defined network. In: Companion proceedings of the 10th international conference on utility and cloud computing, pp 173\u2013179","DOI":"10.1145\/3147234.3148088"},{"key":"14_CR2","doi-asserted-by":"crossref","unstructured":"Abdel-Rahman MJ, Mazied EDA, Teague K, MacKenzie AB, Midkiff SF (2017) Robust controller placement and assignment in software-defined cellular networks. In: 2017 26th International Conference on Computer Communication and Networks (ICCCN). IEEE, pp 1\u20139","DOI":"10.1109\/ICCCN.2017.8038439"},{"key":"14_CR3","doi-asserted-by":"crossref","unstructured":"Abdi AH, Audah L, Salh A, Alhartomi MA, Rasheed H, Ahmed S, Tahir A (2024) Security control and data planes of sdn: a comprehensive review of traditional, ai and mtd approaches to security solutions. IEEE Access","DOI":"10.1109\/ACCESS.2024.3393548"},{"key":"14_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107364","volume":"179","author":"IH Abdulqadder","year":"2020","unstructured":"Abdulqadder IH, Zhou S, Zou D, Aziz IT, Akber SMA (2020) Multi-layered intrusion detection and prevention in the sdn\/nfv enabled cloud of 5g networks using ai-based defense mechanisms. Comput Netw 179:107364","journal-title":"Comput Netw"},{"issue":"4","key":"14_CR5","doi-asserted-by":"publisher","first-page":"2317","DOI":"10.1109\/COMST.2015.2474118","volume":"17","author":"I Ahmad","year":"2015","unstructured":"Ahmad I, Namal S, Ylianttila M, Gurtov A (2015) Security in software defined networks: a survey. IEEE Commun Surv Tutor 17(4):2317\u20132346","journal-title":"IEEE Commun Surv Tutor"},{"key":"14_CR6","doi-asserted-by":"crossref","unstructured":"Alshamrani A, Guha S, Pisharody S, Chowdhary A, Huang D (2018) Fault tolerant controller placement in distributed sdn environments. In: 2018 IEEE International Conference on Communications (ICC). IEEE, pp 1\u20137","DOI":"10.1109\/ICC.2018.8422593"},{"key":"14_CR7","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1016\/j.comnet.2018.03.021","volume":"137","author":"N Anand","year":"2018","unstructured":"Anand N, Babu S, Manoj BS (2018) On detecting compromised controller in software defined networks. Comput Netw 137:107\u2013118","journal-title":"Comput Netw"},{"issue":"10","key":"14_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2023.101842","volume":"35","author":"O Benoudifa","year":"2023","unstructured":"Benoudifa O, Wakrime AA, Benaini R (2023) Autonomous solution for controller placement problem of software-defined networking using muzero based intelligent agents. J King Saud Univ - Comput Inf Sci 35(10):101842","journal-title":"J King Saud Univ - Comput Inf Sci"},{"issue":"3","key":"14_CR9","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1145\/2656877.2656890","volume":"44","author":"P Bosshart","year":"2014","unstructured":"Bosshart P, Daly D, Gibb G, Izzard M, McKeown N, Rexford J, Schlesinger C, Talayco D, Vahdat A, Varghese G et al (2014) P4: programming protocol-independent packet processors. ACM SIGCOMM Comp Com Rev 44(3):87\u201395","journal-title":"ACM SIGCOMM Comp Com Rev"},{"key":"14_CR10","doi-asserted-by":"crossref","unstructured":"Bo H, Youke W, Chuan\u2019an W, Ying W (2016) The controller placement problem for software-defined networks. In: 2016 2nd IEEE International Conference on Computer and Communications (ICCC). IEEE, pp 2435\u20132439","DOI":"10.1109\/CompComm.2016.7925136"},{"key":"14_CR11","doi-asserted-by":"crossref","unstructured":"Campbell RG, Eirinaki M, Park Y (2024) Scalable and autonomous network defense using reinforcement learning. IEEE Access","DOI":"10.1109\/ACCESS.2024.3418931"},{"issue":"3","key":"14_CR12","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1109\/TNSM.2016.2585759","volume":"13","author":"M Caria","year":"2016","unstructured":"Caria M, Jukan A, Hoffmann M (2016) Sdn partitioning: a centralized control plane for distributed routing protocols. IEEE Trans Netw Serv Manage 13(3):381\u2013393","journal-title":"IEEE Trans Netw Serv Manage"},{"issue":"10","key":"14_CR13","doi-asserted-by":"publisher","first-page":"105","DOI":"10.4236\/jcc.2019.710010","volume":"7","author":"D Chang","year":"2019","unstructured":"Chang D, Sun W, Yang Y, Wang T (2019) A dynamic access control method for sdn. J Comput Commun 7(10):105\u2013115","journal-title":"J Comput Commun"},{"issue":"3","key":"14_CR14","doi-asserted-by":"publisher","first-page":"44","DOI":"10.3390\/technologies9030044","volume":"9","author":"DK Dake","year":"2021","unstructured":"Dake DK, Gadze JD, Klogo GS, Nunoo-Mensah H (2021) Multi-agent reinforcement learning framework in sdn-iot for transient load detection and prevention. Technologies 9(3):44","journal-title":"Technologies"},{"issue":"4","key":"14_CR15","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1016\/j.ifacol.2021.10.026","volume":"54","author":"L Desgeorges","year":"2021","unstructured":"Desgeorges L, Georges J-P, Divoux T (2021) Detection of security and safety threats related to the control of a sdn architecture. IFAC-PapersOnLine 54(4):153\u2013158","journal-title":"IFAC-PapersOnLine"},{"key":"14_CR16","doi-asserted-by":"crossref","unstructured":"Desgeorges L, Georges J-P, Divoux T (2021b) A technique to monitor threats in sdn data plane computation. In: 2021 IEEE 22nd international conference on High Performance Switching and Routing (HPSR). IEEE, pp 1\u20136","DOI":"10.1109\/HPSR52026.2021.9481824"},{"key":"14_CR17","volume":"64","author":"PT Duy","year":"2022","unstructured":"Duy PT, Do Hoang H, Nguyen AG-T, Pham V-H et al (2022) B-dac: a decentralized access control framework on northbound interface for securing sdn using blockchain. J Inf Secur Appl 64:103080","journal-title":"J Inf Secur Appl"},{"key":"14_CR18","doi-asserted-by":"publisher","first-page":"98893","DOI":"10.1109\/ACCESS.2019.2930715","volume":"7","author":"ZA El Houda","year":"2019","unstructured":"El Houda ZA, Hafid AS, Khoukhi L (2019) Cochain-sc: an intra-and inter-domain ddos mitigation scheme based on blockchain using sdn and smart contract. IEEE Access 7:98893\u201398907","journal-title":"IEEE Access"},{"issue":"4","key":"14_CR19","doi-asserted-by":"publisher","first-page":"473","DOI":"10.1145\/2377677.2377767","volume":"42","author":"B Heller","year":"2012","unstructured":"Heller B, Sherwood R, McKeown N (2012) The controller placement problem. ACM SIGCOMM Comput Commun Rev 42(4):473\u2013478","journal-title":"ACM SIGCOMM Comput Commun Rev"},{"issue":"4","key":"14_CR20","doi-asserted-by":"publisher","first-page":"2102","DOI":"10.1109\/JIOT.2020.3017354","volume":"8","author":"J Hu","year":"2020","unstructured":"Hu J, Reed M, Thomos N, MF AI-Naday, K Yang, (2020) Securing sdn-controlled iot networks through edge blockchain. IEEE Internet Things J 8(4):2102\u20132115","journal-title":"IEEE Internet Things J"},{"key":"14_CR21","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1016\/j.future.2021.05.022","volume":"124","author":"T Hu","year":"2021","unstructured":"Hu T, Ren Q, Yi P, Li Z, Lan J, Hu Y, Li Q (2021) An efficient approach to robust controller placement for link failures in software-defined networks. Futur Gener Comput Syst 124:187\u2013205","journal-title":"Futur Gener Comput Syst"},{"key":"14_CR22","doi-asserted-by":"crossref","unstructured":"Hu J, Reed M, Al-Naday M, Thomos N (2020a) Blockchain-aided flow insertion and verification in software defined networks. In: 2020 Global Internet of Things Summit (GIoTS). IEEE, pp 1\u20136","DOI":"10.1109\/GIOTS49054.2020.9119638"},{"key":"14_CR23","first-page":"302","volume":"50","author":"M Janssen","year":"2020","unstructured":"Janssen M, Weerakkody V, Ismagilova E, Sivarajah U, Irani Z (2020) A framework for analysing blockchain technology adoption: integrating institutional, market and technical factors. Int J Inf Manage 50:302\u2013309","journal-title":"Int J Inf Manage"},{"key":"14_CR24","doi-asserted-by":"crossref","unstructured":"Kanwal A, Nizamuddin M, Iqbal W, Aman W, Abbas Y, Mussiraliyeva S (2024) Exploring security dynamics in sdn controller architectures: threat landscape and implications. IEEE Access","DOI":"10.1109\/ACCESS.2024.3390968"},{"key":"14_CR25","doi-asserted-by":"crossref","unstructured":"Kovacs R, Buzura S, Iancu B, Dadarlat V, Peculea A, Cebuc E (2024) Practical implementation of ablockchain-enabled sdn for large-scale infrastructure networks. Appl Sci 14(5):1914","DOI":"10.3390\/app14051914"},{"issue":"1","key":"14_CR26","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/JPROC.2014.2371999","volume":"103","author":"D Kreutz","year":"2014","unstructured":"Kreutz D, Ramos FMV, Verissimo PE, Rothenberg CE, Azodolmolky S, Uhlig S (2014) Software-defined networking: a comprehensive survey. Proc IEEE 103(1):14\u201376","journal-title":"Proc IEEE"},{"issue":"1","key":"14_CR27","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/TNSM.2015.2402432","volume":"12","author":"S Lange","year":"2015","unstructured":"Lange S, Gebert S, Zinner T, Tran-Gia P, Hock D, Jarschel M, Hoffmann M (2015) Heuristic approaches to the controller placement problem in large scale sdn networks. IEEE Trans Netw Serv Manage 12(1):4\u201317","journal-title":"IEEE Trans Netw Serv Manage"},{"key":"14_CR28","doi-asserted-by":"publisher","first-page":"274","DOI":"10.1016\/j.comcom.2021.09.029","volume":"181","author":"SA Latif","year":"2022","unstructured":"Latif SA, Wen FBX, Iwendi C, Li-Li FW, Mohsin SM, Han Z, Band SS (2022) Ai-empowered, blockchain and sdn integrated security architecture for iot network of cyber physical systems. Comput Commun 181:274\u2013283","journal-title":"Comput Commun"},{"key":"14_CR29","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1016\/j.jnca.2016.04.011","volume":"68","author":"W Li","year":"2016","unstructured":"Li W, Meng W, Kwok LF (2016) A survey on openflow-based software defined networks: security challenges and countermeasures. J Netw Comput Appl 68:126\u2013139","journal-title":"J Netw Comput Appl"},{"issue":"4","key":"14_CR30","doi-asserted-by":"publisher","first-page":"1715","DOI":"10.1109\/TNET.2018.2853593","volume":"26","author":"Q Li","year":"2018","unstructured":"Li Q, Chen Y, Lee PPC, Xu M, Ren K (2018) Security policy violations in sdn data plane. IEEE\/ACM Trans Networking 26(4):1715\u20131727","journal-title":"IEEE\/ACM Trans Networking"},{"issue":"6","key":"14_CR31","doi-asserted-by":"publisher","first-page":"915","DOI":"10.1109\/TDSC.2018.2810880","volume":"16","author":"Q Li","year":"2018","unstructured":"Li Q, Zou X, Huang Q, Zheng J, Lee PPC (2018) Dynamic packet forwarding verification in sdn. IEEE Trans Dependable Secure Comput 16(6):915\u2013929","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"14_CR32","first-page":"7294638","volume":"1","author":"P Li","year":"2022","unstructured":"Li P, Guo S, Wu J (2022) Zhao Q (2022) Blockrev: blockchain-enabled multi-controller rule enforcement verification in sdn. Secur Commun Netw 1:7294638","journal-title":"Secur Commun Netw"},{"key":"14_CR33","doi-asserted-by":"publisher","first-page":"607","DOI":"10.1007\/s12243-016-0505-z","volume":"71","author":"DMF Mattos","year":"2016","unstructured":"Mattos DMF, Duarte OCMB (2016) Authflow: authentication and access control mechanism for software defined networking. Ann Telecommun 71:607\u2013615","journal-title":"Ann Telecommun"},{"key":"14_CR34","doi-asserted-by":"crossref","unstructured":"Mendiboure L, Chalouf MA, Krief F (2020) A scalable blockchain-based approach for authentication and access control in software defined vehicular networks. In: 2020 29th International Conference on Computer Communications and Networks (ICCCN). IEEE, pp 1\u201311","DOI":"10.1109\/ICCCN49398.2020.9209661"},{"issue":"1","key":"14_CR35","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3183367","volume":"9","author":"J Mendling","year":"2018","unstructured":"Mendling J, Weber I, Van Der Aalst W, Vom Brocke J, Cabanillas C, Daniel F, Debois S, Di Ciccio C, Dumas M, Dustdar S et al (2018) Blockchains for business process management-challenges and opportunities. ACM Trans Manag Inf Syst 9(1):1\u201316","journal-title":"ACM Trans Manag Inf Syst"},{"issue":"4","key":"14_CR36","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1145\/3134434.3136559","volume":"15","author":"A Narayanan","year":"2017","unstructured":"Narayanan A, Clark J (2017) Bitcoin\u2019s academic pedigree: the concept of cryptocurrencies is built from forgotten ideas in research literature. Queue 15(4):20\u201349","journal-title":"Queue"},{"issue":"3","key":"14_CR37","doi-asserted-by":"publisher","first-page":"1617","DOI":"10.1109\/SURV.2014.012214.00180","volume":"16","author":"BAA Nunes","year":"2014","unstructured":"Nunes BAA, Mendonca M, Nguyen X-N, Obraczka K, Turletti T (2014) A survey of software-defined networking: past, present, and future of programmable networks. IEEE Commun Surv Tutor 16(3):1617\u20131634","journal-title":"IEEE Commun Surv Tutor"},{"issue":"7839","key":"14_CR38","doi-asserted-by":"publisher","first-page":"604","DOI":"10.1038\/s41586-020-03051-4","volume":"588","author":"J Schrittwieser","year":"2020","unstructured":"Schrittwieser J, Antonoglou I, Hubert T, Simonyan K, Sifre L, Schmitt S, Guez A, Lockhart E, Hassabis D, Graepel T et al (2020) Mastering atari, go, chess and shogi by planning with a learned model. Nature 588(7839):604\u2013609","journal-title":"Nature"},{"issue":"1","key":"14_CR39","doi-asserted-by":"publisher","first-page":"464","DOI":"10.51519\/journalisi.v6i1.682","volume":"6","author":"R Sebopelo","year":"2024","unstructured":"Sebopelo R, Isong B (2024) An integrated framework for controllers placement and security in software-defined networks ecosystem. J Inf Syst Informatics 6(1):464\u2013494","journal-title":"J Inf Syst Informatics"},{"key":"14_CR40","doi-asserted-by":"publisher","first-page":"650","DOI":"10.1016\/j.future.2018.04.060","volume":"86","author":"PK Sharma","year":"2018","unstructured":"Sharma PK, Park JH (2018) Blockchain based hybrid network architecture for the smart city. Futur Gener Comput Syst 86:650\u2013655","journal-title":"Futur Gener Comput Syst"},{"issue":"9","key":"14_CR41","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1109\/MCOM.2017.1700041","volume":"55","author":"PK Sharma","year":"2017","unstructured":"Sharma PK, Singh S, Jeong Y-S, Park JH (2017) Distblocknet: a distributed blockchains-based secure sdn architecture for iot networks. IEEE Commun Mag 55(9):78\u201385","journal-title":"IEEE Commun Mag"},{"key":"14_CR42","doi-asserted-by":"crossref","unstructured":"Shin S, Song Y, Lee T, Lee S, Chung J, Porras P, Yegneswaran V, Noh J, Kang BB (2014) Rosemary: a robust, secure, and high-performance network operating system. In: Proceedings of the 2014 ACM SIGSAC conference on computer and communications security, pp 78\u201389","DOI":"10.1145\/2660267.2660353"},{"key":"14_CR43","doi-asserted-by":"crossref","unstructured":"Shin S, Yegneswaran V, Porras P, Gu G (2013) Avant-guard: Scalable and vigilant switch flow management in software-defined networks. In: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, pp 413\u2013424","DOI":"10.1145\/2508859.2516684"},{"key":"14_CR44","unstructured":"St\u00a0John MM (2020) World models and predictive methods in deep reinforcement learning: a survey"},{"key":"14_CR45","doi-asserted-by":"crossref","unstructured":"Szabo N (1997) Formalizing and securing relationships on public networks. First monday","DOI":"10.5210\/fm.v2i9.548"},{"key":"14_CR46","doi-asserted-by":"crossref","unstructured":"Tselios C, Politis I, Kotsopoulos S (2017) Enhancing sdn security for iot-related deployments through blockchain. In: 2017 IEEE conference on Network Function Virtualization and Software Defined Networks (NFV-SDN). IEEE, pp 303\u2013308","DOI":"10.1109\/NFV-SDN.2017.8169860"},{"issue":"7","key":"14_CR47","doi-asserted-by":"publisher","first-page":"620","DOI":"10.1631\/FITEE.1500350","volume":"17","author":"P Xiao","year":"2016","unstructured":"Xiao P, Li Z-Y, Guo S, Qi H, Qu W-Y, Yu H-S (2016) Ak self-adaptive sdn controller placement for wide area networks. Front Inf Technol Electron Eng 17(7):620\u2013633","journal-title":"Front Inf Technol Electron Eng"},{"issue":"3","key":"14_CR48","doi-asserted-by":"publisher","first-page":"1669","DOI":"10.1109\/TNSM.2020.2994837","volume":"17","author":"S Yang","year":"2020","unstructured":"Yang S, Cui L, Chen Z, Xiao W (2020) An efficient approach to robust sdn controller placement for security. IEEE Trans Netw Serv Manage 17(3):1669\u20131682","journal-title":"IEEE Trans Netw Serv Manage"},{"key":"14_CR49","doi-asserted-by":"publisher","first-page":"24","DOI":"10.37934\/araset.55.1.2443","volume":"100","author":"Z Zainal","year":"2024","unstructured":"Zainal Z, Abdullah A, Hakim F, Abdullah MDH (2024) Sbac-sdn: a scalable blockchain-based access control in northbound interface for multi-controller sdn with load balancing mechanism. J Adv Res Appl Sci Eng Technol 100:24\u201343","journal-title":"J Adv Res Appl Sci Eng Technol"},{"key":"14_CR50","doi-asserted-by":"crossref","unstructured":"Zeng Z, Zhang X, Xia Z (2022) Intelligent blockchain-based secure routing for multidomain sdn-enabled iot networks. Wirel Commun Mob Comput 2022(1):5693962","DOI":"10.1155\/2022\/5693962"},{"key":"14_CR51","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1016\/j.comcom.2018.04.008","volume":"123","author":"B Zhang","year":"2018","unstructured":"Zhang B, Wang X, Huang M (2018) Multi-objective optimization controller placement problem in internet-oriented software defined network. Comput Commun 123:24\u201335","journal-title":"Comput Commun"},{"issue":"7","key":"14_CR52","doi-asserted-by":"publisher","first-page":"1838","DOI":"10.1109\/TIFS.2018.2805600","volume":"13","author":"J Zheng","year":"2018","unstructured":"Zheng J, Li Q, Gu G, Cao J, Yau DKY, Wu J (2018) Realtime ddos defense using cots sdn switches via adaptive correlation analysis. IEEE Trans Inf Forensics Secur 13(7):1838\u20131853","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"1","key":"14_CR53","doi-asserted-by":"publisher","first-page":"167","DOI":"10.3390\/electronics11010167","volume":"11","author":"Y Zhu","year":"2022","unstructured":"Zhu Y, Wu X, Hu Z (2022) Fine grained access control based on smart contract for edge computing. Electronics 11(1):167","journal-title":"Electronics"}],"container-title":["Journal of King Saud University Computer and Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44443-025-00014-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s44443-025-00014-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44443-025-00014-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,7]],"date-time":"2025-09-07T05:16:15Z","timestamp":1757222175000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s44443-025-00014-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7]]},"references-count":53,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2025,7]]}},"alternative-id":["14"],"URL":"https:\/\/doi.org\/10.1007\/s44443-025-00014-5","relation":{},"ISSN":["1319-1578","2213-1248"],"issn-type":[{"value":"1319-1578","type":"print"},{"value":"2213-1248","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,7]]},"assertion":[{"value":"20 September 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 January 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 July 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"105"}}