{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T17:10:36Z","timestamp":1774631436591,"version":"3.50.1"},"reference-count":54,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2025,6,23]],"date-time":"2025-06-23T00:00:00Z","timestamp":1750636800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,6,23]],"date-time":"2025-06-23T00:00:00Z","timestamp":1750636800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"name":"National Key Research and Development Plan of China","award":["2022YFB2902204"],"award-info":[{"award-number":["2022YFB2902204"]}]},{"DOI":"10.13039\/501100019091","name":"Key Research and Development Program of Hunan Province of China","doi-asserted-by":"publisher","award":["231111211000"],"award-info":[{"award-number":["231111211000"]}],"id":[{"id":"10.13039\/501100019091","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Top Talent Training Project of Henan Province","award":["244500510012"],"award-info":[{"award-number":["244500510012"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J. King Saud Univ. Comput. Inf. Sci."],"published-print":{"date-parts":[[2025,7]]},"DOI":"10.1007\/s44443-025-00103-5","type":"journal-article","created":{"date-parts":[[2025,6,23]],"date-time":"2025-06-23T04:18:59Z","timestamp":1750652339000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Resilient service function chain initial deployment and dynamic replacement towards 6G networks"],"prefix":"10.1007","volume":"37","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-0326-0513","authenticated-orcid":false,"given":"Deqiang","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Xinsheng","family":"Ji","sequence":"additional","affiliation":[]},{"given":"Wei","family":"You","sequence":"additional","affiliation":[]},{"given":"Yu","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Hang","family":"Qiu","sequence":"additional","affiliation":[]},{"given":"Mingyan","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,23]]},"reference":[{"issue":"3","key":"103_CR1","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1007\/s10922-023-09734-3","volume":"31","author":"Z Alomari","year":"2023","unstructured":"Alomari Z, Zhani MF, Aloqaily M, Bouachir O (2023) On ensuring full yet cost-efficient survivability of service function chains in nfv environments. J Netw Syst Manage 31(3):45","journal-title":"J Netw Syst Manage"},{"key":"103_CR2","doi-asserted-by":"crossref","unstructured":"Bagheri A, Shameli-Sendi A (2023) Automating the translation of cloud users\u2019 high-level security needs to an optimal placement model in the cloud infrastructure. IEEE Trans Serv Comput","DOI":"10.1109\/TSC.2023.3327632"},{"key":"103_CR3","doi-asserted-by":"crossref","unstructured":"Bouillet E, Ellinas G, Labourdette J-F, Ramamurthy R (2007) Path routing in mesh optical networks. John Wiley & Sons, 2007","DOI":"10.1002\/9780470032985"},{"issue":"5","key":"103_CR4","doi-asserted-by":"publisher","first-page":"2674","DOI":"10.1109\/TNSE.2022.3189546","volume":"10","author":"H Cao","year":"2022","unstructured":"Cao H, Jindal A, Hu H, Piran MJ, Yang L (2022) Secure and intelligent service function chain for sustainable services in healthcare cyber physical systems. IEEE Trans Netw Sci Eng 10(5):2674\u20132684","journal-title":"IEEE Trans Netw Sci Eng"},{"key":"103_CR5","unstructured":"Cormen TH, Leiserson CE, Rivest RL, Stein C (2022) Introduction to algorithms. MIT press"},{"issue":"4","key":"103_CR6","doi-asserted-by":"publisher","first-page":"2008","DOI":"10.1109\/TNET.2017.2668470","volume":"25","author":"V Eramo","year":"2017","unstructured":"Eramo V, Miucci E, Ammar M, Lavacca FG (2017) An approach for service function chain routing and virtual function network instance migration in network function virtualization architectures. IEEE\/ACM Trans Netw 25(4):2008\u20132025","journal-title":"IEEE\/ACM Trans Netw"},{"key":"103_CR7","doi-asserted-by":"publisher","first-page":"109832","DOI":"10.1016\/j.compeleceng.2024.109832","volume":"120","author":"M Ghorbian","year":"2024","unstructured":"Ghorbian M, Ghobaei-Arani M (2024) Function offloading approaches in serverless computing: a survey. Comput Electr Eng 120:109832","journal-title":"Comput Electr Eng"},{"key":"103_CR8","doi-asserted-by":"crossref","unstructured":"Ghorbian M, Ghobaei-Arani M, Asadolahpour-Karimi R (2024) Function placement approaches in serverless computing: a survey. J Syst Archit 103291","DOI":"10.1016\/j.sysarc.2024.103291"},{"key":"103_CR9","unstructured":"Haeffner W, Napper J, Stiemerling M, Lopez D, Uttaro J (2015) Service function chaining use cases in mobile networks. IETF"},{"key":"103_CR10","doi-asserted-by":"crossref","unstructured":"Hasneen J, Sadique KM (2022) A survey on 5g architecture and security scopes in sdn and nfv. In: Applied information processing systems: proceedings of ICCET 2021. Springer, pp 447\u2013460","DOI":"10.1007\/978-981-16-2008-9_43"},{"key":"103_CR11","doi-asserted-by":"crossref","unstructured":"He G, Liao X, Liu C (2023) A security survey of nfv: From causes to practices. In: 2023 3rd International Conference on Consumer Electronics and Computer Engineering (ICCECE), pp 624\u2013628","DOI":"10.1109\/ICCECE58074.2023.10135454"},{"issue":"3","key":"103_CR12","doi-asserted-by":"publisher","first-page":"518","DOI":"10.1109\/TNSM.2016.2598420","volume":"13","author":"JG Herrera","year":"2016","unstructured":"Herrera JG, Botero JF (2016) Resource allocation in nfv: a comprehensive survey. IEEE Trans Netw Serv Manage 13(3):518\u2013532","journal-title":"IEEE Trans Netw Serv Manage"},{"key":"103_CR13","doi-asserted-by":"crossref","unstructured":"Hong J, Park S, Yoo J-H, Hong JW-K (2020) A machine learning based sla-aware vnf anomaly detection method in virtual networks. In: 2020 International Conference on Information and Communication Technology Convergence (ICTC). IEEE, pp 1051\u20131056","DOI":"10.1109\/ICTC49870.2020.9289547"},{"key":"103_CR14","doi-asserted-by":"crossref","unstructured":"Hu Y, Guo Y (2021) Survivable service function chain mapping in nfv-enabled 5g networks. In: 2021 IEEE 7th International Conference on Network Softwarization (NetSoft). IEEE, pp 375\u2013380","DOI":"10.1109\/NetSoft51509.2021.9492596"},{"key":"103_CR15","unstructured":"ITU (2023) Framework and overall objectives of the future development of IMT for 2030 and beyond. Online. [Online]. Available: https:\/\/www.itu.int\/md\/R19-WP5D\/new\/en"},{"issue":"02","key":"103_CR16","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1360\/SSI-2021-0272","volume":"52","author":"W Jiangxing","year":"2022","unstructured":"Jiangxing W (2022) Development paradigms of cyberspace endogenous safety and security [j]. Sci Sin Inf 52(02):189\u2013204","journal-title":"Sci Sin Inf"},{"issue":"5","key":"103_CR17","first-page":"816","volume":"24","author":"H Kikuchi","year":"2016","unstructured":"Kikuchi H, Takahashi K (2016) Zipf distribution model for quantifying risk of re-identification from trajectory data. J Inf Process 24(5):816\u2013823","journal-title":"J Inf Process"},{"key":"103_CR18","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/s11265-019-01473-6","volume":"93","author":"G Li","year":"2021","unstructured":"Li G, Wang W, Gai K, Tang Y, Yang B, Si X (2021) A framework for mimic defense system in cyberspace. J Signal Process Syst 93:169\u2013185","journal-title":"J Signal Process Syst"},{"issue":"7","key":"103_CR19","first-page":"188","volume":"39","author":"Q Liu","year":"2018","unstructured":"Liu Q, Lin S, Gu Z (2018) Heterogeneous redundancies scheduling algorithm for mimic security defense. J Commun 39(7):188\u2013198","journal-title":"J Commun"},{"issue":"2","key":"103_CR20","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/s40860-022-00171-8","volume":"9","author":"Y Maleh","year":"2023","unstructured":"Maleh Y, Qasmaoui Y, El Gholami K, Sadqi Y, Mounir S (2023) A comprehensive survey on sdn security: threats, mitigations, and future directions. J Reliab Intell Environ 9(2):201\u2013239","journal-title":"J Reliab Intell Environ"},{"issue":"3","key":"103_CR21","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1109\/TNSM.2016.2598068","volume":"13","author":"M Mechtri","year":"2016","unstructured":"Mechtri M, Ghribi C, Zeghlache D (2016) A scalable algorithm for the placement of service function chains. IEEE Trans Netw Serv Manage 13(3):533\u2013546","journal-title":"IEEE Trans Netw Serv Manage"},{"issue":"3","key":"103_CR22","doi-asserted-by":"publisher","first-page":"2453","DOI":"10.1109\/TNSM.2022.3193241","volume":"19","author":"F Mogyor\u00f3si","year":"2022","unstructured":"Mogyor\u00f3si F, Babarczi P, Zerwas J, Blenk A, Pa\u0161i\u0107 A (2022) Resilient control plane design for virtualized 6g core networks. IEEE Trans Netw Serv Manage 19(3):2453\u20132467","journal-title":"IEEE Trans Netw Serv Manage"},{"key":"103_CR23","doi-asserted-by":"crossref","unstructured":"Nguyen DH, Lin CC, Nguyen TN, Chu SI, Liu B-H (2024) Service recovery in nfv-enabled networks: Algorithm design and analysis. IEEE Trans Cloud Comput","DOI":"10.1109\/TCC.2024.3402185"},{"key":"103_CR24","doi-asserted-by":"crossref","unstructured":"Orlowski S, Wess\u00e4ly R, Pi\u00f3ro M, Tomaszewski A (2010) Sndlib 1.0-survivable network design library. Netw An Int J 55(3):276\u2013286","DOI":"10.1002\/net.20371"},{"issue":"3","key":"103_CR25","doi-asserted-by":"publisher","first-page":"3140","DOI":"10.1109\/TNSM.2021.3081014","volume":"18","author":"M Pattaranantakul","year":"2021","unstructured":"Pattaranantakul M, Song Q, Tian Y, Wang L, Zhang Z, Meddahi A, Vorakulpipat C (2021) On achieving trustworthy service function chaining. IEEE Trans Netw Serv Manage 18(3):3140\u20133153","journal-title":"IEEE Trans Netw Serv Manage"},{"key":"103_CR26","doi-asserted-by":"publisher","first-page":"109484","DOI":"10.1016\/j.comnet.2022.109484","volume":"221","author":"M Pattaranantakul","year":"2023","unstructured":"Pattaranantakul M, Vorakulpipat C, Takahashi T (2023) Service function chaining security survey: addressing security challenges and threats. Comput Netw 221:109484","journal-title":"Comput Netw"},{"key":"103_CR27","doi-asserted-by":"crossref","unstructured":"Pattaranantakul M, Song Q, Tian Y, Wang L, Zhang Z, Meddahi A (2019) Footprints: ensuring trusted service function chaining in the world of sdn and nfv. In: Security and privacy in communication networks: 15th EAI International Conference, SecureComm 2019, Orlando, FL, USA, October 23\u201325, 2019, Proceedings, Part II 15. Springer, pp 287\u2013301","DOI":"10.1007\/978-3-030-37231-6_16"},{"issue":"3","key":"103_CR28","doi-asserted-by":"publisher","first-page":"2545","DOI":"10.1109\/TNSM.2021.3096477","volume":"18","author":"C Peng","year":"2021","unstructured":"Peng C, Zheng D, Philip S, Cao X (2021) Latency-bounded off-site virtual node protection in nfv. IEEE Trans Netw Serv Manage 18(3):2545\u20132556","journal-title":"IEEE Trans Netw Serv Manage"},{"key":"103_CR29","doi-asserted-by":"crossref","unstructured":"Peretz R, Shenzis S, Hay D (2020) Moving target defense for virtual network functions. In: NOMS 2020-2020 IEEE\/IFIP Network operations and management symposium. IEEE, pp 1\u20139","DOI":"10.1109\/NOMS47738.2020.9110334"},{"issue":"1","key":"103_CR30","first-page":"101","volume":"7","author":"L Pu","year":"2021","unstructured":"Pu L, Wei H, Li X (2021) Mimic cloud service architecture for cloud applications. Chin J Netw Inf Secur 7(1):101\u2013112","journal-title":"Chin J Netw Inf Secur"},{"key":"103_CR31","doi-asserted-by":"crossref","unstructured":"Quinn P, Nadeau T (2015) Problem statement for service function chaining. Tech Rep","DOI":"10.17487\/rfc7498"},{"key":"103_CR32","doi-asserted-by":"crossref","unstructured":"Ren Q, Guo Z, Wu J, Hu T, Jie L, Hu Y, He L (2022) Sdn-esrc: A secure and resilient control plane for software-defined networks. IEEE Trans Netw Serv Manage 19(3):2366\u20132381","DOI":"10.1109\/TNSM.2022.3163198"},{"key":"103_CR33","doi-asserted-by":"crossref","unstructured":"Sarkar S, Vittal S et\u00a0al (2022) Locomotive 5g core for 6g ready resilient and highly available network slices and sfcs. In: 2022 18th International Conference on Network and Service Management (CNSM). IEEE, pp 367\u2013373","DOI":"10.23919\/CNSM55787.2022.9964553"},{"issue":"3","key":"103_CR34","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1016\/0377-2217(93)90219-D","volume":"66","author":"R Sridharan","year":"1993","unstructured":"Sridharan R (1993) A lagrangian heuristic for the capacitated plant location problem with single source constraints. Eur J Oper Res 66(3):305\u2013312","journal-title":"Eur J Oper Res"},{"key":"103_CR35","doi-asserted-by":"crossref","unstructured":"Tang L, Xue C, Zhao Y, Chen Q (2023) Anomaly detection of service function chain based on distributed knowledge distillation framework in cloud-edge industrial internet of things scenarios. IEEE Internet Things J","DOI":"10.1109\/JIOT.2023.3327795"},{"key":"103_CR36","doi-asserted-by":"publisher","first-page":"100650","DOI":"10.1016\/j.cosrev.2024.100650","volume":"53","author":"M Tari","year":"2024","unstructured":"Tari M, Ghobaei-Arani M, Pouramini J, Ghorbian M (2024) Auto-scaling mechanisms in serverless computing: a comprehensive review. Comput Sci Rev 53:100650","journal-title":"Comput Sci Rev"},{"key":"103_CR37","unstructured":"The Internet Topology Zoo (2025) Online. [Online]. Available: http:\/\/www.topology-zoo.org\/dataset.html"},{"issue":"1","key":"103_CR38","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1109\/TNSM.2021.3051903","volume":"18","author":"M Wang","year":"2021","unstructured":"Wang M, Cheng B, Wang S, Chen J (2021) Availability-and traffic-aware placement of parallelized sfc in data center networks. IEEE Trans Netw Serv Manage 18(1):182\u2013194","journal-title":"IEEE Trans Netw Serv Manage"},{"issue":"11","key":"103_CR39","doi-asserted-by":"publisher","first-page":"12235","DOI":"10.1109\/TVT.2022.3193074","volume":"71","author":"W Wang","year":"2022","unstructured":"Wang W, Liang C, Chen Q, Tang L, Yanikomeroglu H, Liu T (2022) Distributed online anomaly detection for virtualized network slicing environment. IEEE Trans Veh Technol 71(11):12235\u201312249","journal-title":"IEEE Trans Veh Technol"},{"issue":"11","key":"103_CR40","first-page":"6445","volume":"22","author":"W Wang","year":"2022","unstructured":"Wang W, Liang C, Tang L, Yanikomeroglu H, Chen Q (2022) Federated multi-discriminator biwgan-gp based collaborative anomaly detection for virtualized network slicing. IEEE Trans Mob Comput 22(11):6445\u20136459","journal-title":"IEEE Trans Mob Comput"},{"key":"103_CR41","doi-asserted-by":"crossref","unstructured":"Wang W, Zhou H, Li M, Yan J (2023) An autonomous deployment mechanism for ai security services. IEEE Access","DOI":"10.1109\/ACCESS.2023.3346187"},{"key":"103_CR42","doi-asserted-by":"crossref","unstructured":"Wei D, Xiao L, Shi L, Yu L (2022) Mimic web application security technology based on dhr architecture. In: International Conference on Artificial Intelligence and Intelligent Information Processing (AIIIP 2022), vol 12456. SPIE, pp 118\u2013124","DOI":"10.1117\/12.2660317"},{"issue":"11","key":"103_CR43","doi-asserted-by":"publisher","first-page":"712","DOI":"10.1287\/mnsc.17.11.712","volume":"17","author":"JY Yen","year":"1971","unstructured":"Yen JY (1971) Finding the k shortest loopless paths in a network. Manag Sci 17(11):712\u2013716","journal-title":"Manag Sci"},{"key":"103_CR44","doi-asserted-by":"crossref","unstructured":"Zhang Y, Wu W, Banerjee S, Kang J-M, Sanchez MA (2017) Sla-verifier: Stateful and quantitative verification for service chaining. In: IEEE INFOCOM 2017-IEEE Conference on Computer Communications. IEEE, pp 1\u20139","DOI":"10.1109\/INFOCOM.2017.8057041"},{"issue":"1","key":"103_CR45","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1109\/TNET.2020.3028846","volume":"29","author":"X Zhang","year":"2020","unstructured":"Zhang X, Li Q, Zhang Z, Wu J, Yang J (2020) vsfc: Generic and agile verification of service function chains in the cloud. IEEE\/ACM Trans Netw 29(1):78\u201391","journal-title":"IEEE\/ACM Trans Netw"},{"issue":"03","key":"103_CR46","first-page":"40","volume":"37","author":"F Zhang","year":"2021","unstructured":"Zhang F, Xie G, Guo W, Hu H, Zhang R, Liu W (2021) Key technologies and implementation methods of endogenous safety and security cloud data center based on mimic architecture. Telecommun Sci 37(03):40\u201348","journal-title":"Telecommun Sci"},{"issue":"1","key":"103_CR47","first-page":"46","volume":"7","author":"Q Zhang","year":"2021","unstructured":"Zhang Q, Tang H, You W, Li Y (2021) Network function heterogeneous redundancy deployment method based on immune algorithm. Chin J Netw Inf Secur 7(1):46\u201356","journal-title":"Chin J Netw Inf Secur"},{"key":"103_CR48","doi-asserted-by":"crossref","unstructured":"Zhang Y, He F, Oki E (2022a) Availability-aware service provisioning with backup sub-chain-enabled sharing. In: GLOBECOM 2022-2022 IEEE Global Communications Conference. IEEE, pp 135\u2013140","DOI":"10.1109\/GLOBECOM48099.2022.10001366"},{"key":"103_CR49","doi-asserted-by":"crossref","unstructured":"Zhang D, Zhang J, Bu Y (2022b) Performance analysis of mimic defense based sdn security policy. In: Proceedings of the 2022 2nd International conference on control and intelligent robotics, pp 7\u201312","DOI":"10.1145\/3548608.3561128"},{"issue":"6","key":"103_CR50","doi-asserted-by":"publisher","first-page":"4913","DOI":"10.1109\/TDSC.2023.3237604","volume":"20","author":"T Zhang","year":"2023","unstructured":"Zhang T, Xu C, Zhang B, Li X, Kuang X, Grieco LA (2023) Towards attack-resistant service function chain migration: A model-based adaptive proximal policy optimization approach. IEEE Trans Dependable Secure Comput 20(6):4913\u20134927","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"103_CR51","doi-asserted-by":"crossref","unstructured":"Zhang Y, Jiang C, Zhang P (2023b) Security-aware resource allocation scheme based on drl in cloud-edge-terminal cooperative vehicular network. IEEE Internet Things J","DOI":"10.1109\/JIOT.2023.3293497"},{"key":"103_CR52","doi-asserted-by":"publisher","first-page":"110843","DOI":"10.1016\/j.comnet.2024.110843","volume":"254","author":"D Zheng","year":"2024","unstructured":"Zheng D, Xing H, Feng L, Cao X (2024) Provably efficient security-aware service function tree composing and embedding in multi-vendor networks. Comput Netw 254:110843","journal-title":"Comput Netw"},{"key":"103_CR53","doi-asserted-by":"publisher","first-page":"110748","DOI":"10.1016\/j.comnet.2024.110748","volume":"254","author":"D Zhou","year":"2024","unstructured":"Zhou D, Ji X, You W, Qiu H, Zhao Y, Xu M (2024) Ddqn-sfcag: A service function chain recovery method against network attacks in 6g networks. Comput Netw 254:110748","journal-title":"Comput Netw"},{"key":"103_CR54","doi-asserted-by":"crossref","unstructured":"Zhou D, Ji X, You W, Zhao Y, Qiu H, Yang J (2024b) Tcpn-based resilience evaluation of sfc with dynamic heterogeneous\u00a0redundant structure towards 6g networks. In: Proceedings of the 2024 10th international conference on computer and communication, pp 2253\u20132259","DOI":"10.1109\/ICCC62609.2024.10942119"}],"container-title":["Journal of King Saud University Computer and Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44443-025-00103-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s44443-025-00103-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44443-025-00103-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,6]],"date-time":"2025-09-06T22:00:12Z","timestamp":1757196012000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s44443-025-00103-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,23]]},"references-count":54,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2025,7]]}},"alternative-id":["103"],"URL":"https:\/\/doi.org\/10.1007\/s44443-025-00103-5","relation":{},"ISSN":["1319-1578","2213-1248"],"issn-type":[{"value":"1319-1578","type":"print"},{"value":"2213-1248","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6,23]]},"assertion":[{"value":"10 February 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 June 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 June 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no relevant financial or non-financial interests to disclose.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interests"}},{"value":"The authors declare that they have no conflict of interest.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}}],"article-number":"84"}}