{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,9]],"date-time":"2026-05-09T17:16:10Z","timestamp":1778346970873,"version":"3.51.4"},"reference-count":47,"publisher":"Springer Science and Business Media LLC","issue":"7-8","license":[{"start":{"date-parts":[[2023,3,11]],"date-time":"2023-03-11T00:00:00Z","timestamp":1678492800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,3,11]],"date-time":"2023-03-11T00:00:00Z","timestamp":1678492800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","award":["UIDB\/00760\/2020"],"award-info":[{"award-number":["UIDB\/00760\/2020"]}]},{"name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","award":["UIDP\/00760\/2020"],"award-info":[{"award-number":["UIDP\/00760\/2020"]}]},{"DOI":"10.13039\/501100007157","name":"Instituto Polit\u00e9cnico do Porto","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100007157","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ann. Telecommun."],"published-print":{"date-parts":[[2023,8]]},"abstract":"<jats:title>Abstract\n<\/jats:title><jats:p>The internet of things (IoT) faces tremendous security challenges. Machine learning models can be used to tackle the growing number of cyber-attack variations targeting IoT systems, but the increasing threat posed by adversarial attacks restates the need for reliable defense strategies. This work describes the types of constraints required for a realistic adversarial cyber-attack example and proposes a methodology for a trustworthy adversarial robustness analysis with a realistic adversarial evasion attack vector. The proposed methodology was used to evaluate three supervised algorithms, random forest (RF), extreme gradient boosting (XGB), and light gradient boosting machine (LGBM), and one unsupervised algorithm, isolation forest (IFOR). Constrained adversarial examples were generated with the adaptative perturbation pattern method (A2PM), and evasion attacks were performed against models created with regular and adversarial training. Even though RF was the least affected in binary classification, XGB consistently achieved the highest accuracy in multi-class classification. The obtained results evidence the inherent susceptibility of tree-based algorithms and ensembles to adversarial evasion attacks and demonstrate the benefits of adversarial training and a security-by-design approach for a more robust IoT network intrusion detection and cyber-attack classification.<\/jats:p>","DOI":"10.1007\/s12243-023-00953-y","type":"journal-article","created":{"date-parts":[[2023,3,11]],"date-time":"2023-03-11T04:35:08Z","timestamp":1678509308000},"page":"401-412","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":33,"title":["Towards adversarial realism and robust learning for IoT intrusion detection and classification"],"prefix":"10.1007","volume":"78","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4968-3653","authenticated-orcid":false,"given":"Jo\u00e3o","family":"Vitorino","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2519-9859","authenticated-orcid":false,"given":"Isabel","family":"Pra\u00e7a","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8075-531X","authenticated-orcid":false,"given":"Eva","family":"Maia","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,3,11]]},"reference":[{"issue":"1","key":"953_CR1","doi-asserted-by":"publisher","first-page":"616","DOI":"10.1109\/COMST.2019.2953364","volume":"22","author":"I Butun","year":"2020","unstructured":"Butun I, Osterberg P, Song H (2020) Security of the internet of things: vulnerabilities, attacks, and countermeasures. IEEE Commun Surv Tutorials 22(1):616\u2013644. https:\/\/doi.org\/10.1109\/COMST.2019.2953364","journal-title":"IEEE Commun Surv Tutorials"},{"issue":"11","key":"953_CR2","doi-asserted-by":"publisher","first-page":"4724","DOI":"10.1109\/TII.2018.2852491","volume":"14","author":"E Sisinni","year":"2018","unstructured":"Sisinni E, Saifullah A, Han S, Jennehag U, Gidlund M (2018) Industrial internet of things: challenges, opportunities, and directions. IEEE Trans Ind Informatics 14(11):4724\u20134734. https:\/\/doi.org\/10.1109\/TII.2018.2852491","journal-title":"IEEE Trans Ind Informatics"},{"issue":"3","key":"953_CR3","doi-asserted-by":"publisher","first-page":"2702","DOI":"10.1109\/COMST.2019.2910750","volume":"21","author":"N Neshenko","year":"2019","unstructured":"Neshenko N, Bou-Harb E, Crichigno J, Kaddoum G, Ghani N (2019) Demystifying IoT security: an exhaustive survey on IoT vulnerabilities and a first empirical look on internet-scale iot exploitations. IEEE Commun Surv Tutorials 21(3):2702\u20132733. https:\/\/doi.org\/10.1109\/COMST.2019.2910750","journal-title":"IEEE Commun Surv Tutorials"},{"key":"953_CR4","doi-asserted-by":"publisher","unstructured":"Srivastava A, Gupta S, Quamara M, Chaudhary P, Aski VJ (2020) Future IoT-enabled threats and vulnerabilities: state of the art, challenges, and future prospects. Int J Commun Syst 33:12. https:\/\/doi.org\/10.1002\/dac.4443","DOI":"10.1002\/dac.4443"},{"key":"953_CR5","doi-asserted-by":"publisher","unstructured":"Anand S, and Routray SK (2017) \u201cIssues and challenges in healthcare narrowband IoT,\u201d in 2017 Int. Conf. on Inventive Communication and Computational Technologies (ICICCT) pp.486\u2013489https:\/\/doi.org\/10.1109\/ICICCT.2017.7975247","DOI":"10.1109\/ICICCT.2017.7975247"},{"key":"953_CR6","doi-asserted-by":"publisher","unstructured":"Andrade R, Vitorino J, Wannous S, Maia E, Pra\u00e7a I (2022) LEMMAS: a secured and trusted local energy market simulation system, in 2022 18thInt. Conf. on the European Energy Market (EEM) pp. 1\u20135.\u00a0https:\/\/doi.org\/10.1109\/EEM54602.2022.9921159","DOI":"10.1109\/EEM54602.2022.9921159"},{"key":"953_CR7","doi-asserted-by":"publisher","unstructured":"Tuptuk N, Hazell P,ll Watson J, and Hailes S, (2021) \u201cA systematic review of the state of cyber-security in water systems,\u201d Water 13:1 https:\/\/doi.org\/10.3390\/w13010081","DOI":"10.3390\/w13010081"},{"key":"953_CR8","doi-asserted-by":"publisher","unstructured":"European Union Agency for Cybersecurity, A. Malatras, and G. Dede (2020) \u201cAI cybersecurity challenges: threat landscape for artificial intelligence,\u201d https:\/\/doi.org\/10.2824\/238222","DOI":"10.2824\/238222"},{"issue":"11","key":"953_CR9","doi-asserted-by":"publisher","first-page":"673","DOI":"10.1007\/s12243-020-00770-7","volume":"75","author":"O Salman","year":"2020","unstructured":"Salman O, Elhajj IH, Kayssi A, Chehab A (2020) A review on machine learning\u2013based approaches for Internet traffic classification. Ann Telecommun 75(11):673\u2013710. https:\/\/doi.org\/10.1007\/s12243-020-00770-7","journal-title":"Ann Telecommun"},{"key":"953_CR10","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1016\/j.procs.2016.06.016","volume":"89","author":"MC Belavagi","year":"2016","unstructured":"Belavagi MC, Muniyal B (2016) Performance evaluation of supervised machine learning algorithms for intrusion detection. Procedia Comput Sci 89:117\u2013123. https:\/\/doi.org\/10.1016\/j.procs.2016.06.016","journal-title":"Procedia Comput Sci"},{"key":"953_CR11","doi-asserted-by":"publisher","unstructured":"European Union Agency for Cybersecurity, A. Malatras, I. Agrafiotis, and M. Adamczyk, (2022) \u201cSecuring machine learning algorithms,\u201d https:\/\/doi.org\/10.2824\/874249","DOI":"10.2824\/874249"},{"issue":"2","key":"953_CR12","doi-asserted-by":"publisher","first-page":"252","DOI":"10.3390\/jcp1020014","volume":"1","author":"P Papadopoulos","year":"2021","unstructured":"Papadopoulos P, Thornewill von Essen O, Pitropakis N, Chrysoulas C, Mylonas A, Buchanan WJ (2021) Launching adversarial attacks against network intrusion detection systems for IoT. J Cybersecurity Priv 1(2):252\u2013273. https:\/\/doi.org\/10.3390\/jcp1020014","journal-title":"J Cybersecurity Priv"},{"issue":"4","key":"953_CR13","doi-asserted-by":"publisher","first-page":"984","DOI":"10.1109\/TKDE.2013.57","volume":"26","author":"B Biggio","year":"2014","unstructured":"Biggio B, Fumera G, Roli F (2014) Security evaluation of pattern classifiers under attack. IEEE Trans Knowl Data Eng 26(4):984\u2013996. https:\/\/doi.org\/10.1109\/TKDE.2013.57","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"953_CR14","doi-asserted-by":"publisher","first-page":"35403","DOI":"10.1109\/ACCESS.2020.2974752","volume":"8","author":"N Martins","year":"2020","unstructured":"Martins N, Cruz JM, Cruz T, Henriques Abreu P (2020) Adversarial machine learning applied to intrusion and malware scenarios: a systematic review. IEEE Access. 8:35403\u201335419. https:\/\/doi.org\/10.1109\/ACCESS.2020.2974752","journal-title":"IEEE Access."},{"key":"953_CR15","doi-asserted-by":"publisher","unstructured":"G. Apruzzese, M. Andreolini, L. Ferretti, M. Marchetti, and M. Colajanni, (2021) \u201cModeling realistic adversarial attacks against network intrusion detection systems,\u201d Digit. Threat. Res. Prac. 1 1 https:\/\/doi.org\/10.1145\/3469659","DOI":"10.1145\/3469659"},{"key":"953_CR16","doi-asserted-by":"publisher","unstructured":"Vitorino J, Andrade R, Pra\u00e7a I, Sousa O, Maia E (2022) A comparative analysis of machine learning techniques for IoT intrusion detection, in Foundations and Practice of Security 191\u2013207.\u00a0https:\/\/doi.org\/10.1007\/978-3-031-08147-7_13","DOI":"10.1007\/978-3-031-08147-7_13"},{"key":"953_CR17","doi-asserted-by":"publisher","unstructured":"Anthi E, Williams L, Rhode M, Burnap P, Wedgbury A (2021) Adversarial attacks on machine learning cybersecurity defences in industrial control systems. J Inf Secur Appl 58, no. February, p. 102717.\u00a0https:\/\/doi.org\/10.1016\/j.jisa.2020.102717","DOI":"10.1016\/j.jisa.2020.102717"},{"issue":"4","key":"953_CR18","doi-asserted-by":"publisher","first-page":"427","DOI":"10.1109\/TETCI.2019.2961157","volume":"4","author":"G Apruzzese","year":"2020","unstructured":"Apruzzese G, Andreolini M, Colajanni M, Marchetti M (2020) Hardening random forest cyber detectors against adversarial attacks. IEEE Trans Emerg Top Comput Intell 4(4):427\u2013439. https:\/\/doi.org\/10.1109\/TETCI.2019.2961157","journal-title":"IEEE Trans Emerg Top Comput Intell"},{"key":"953_CR19","unstructured":"Kantchelian A, Tygar JD, Joseph AD (2016) Evasion and hardening of tree ensemble classifiers, 33rd Int. Conf Mach Learn 5:3562\u20133573"},{"key":"953_CR20","unstructured":"Chen Y, Wan S, Jiang W, Cidon A, and Jana S. (2021) \u201cCost-aware robust tree ensembles for security applications,\u201d Proc. 30th USENIX Secur. Symp 2291\u20132308"},{"key":"953_CR21","doi-asserted-by":"publisher","unstructured":"Chen H, Zhang H, Boning D, and Hsieh CJ (2019) \u201cRobust decision trees against adversarial examples,\u201d https:\/\/doi.org\/10.48550\/ARXIV.1902.10660","DOI":"10.48550\/ARXIV.1902.10660"},{"key":"953_CR22","unstructured":"Vos D, Verwer S (2021) Efficient training of robust decision trees against adversarial examples, in 38th Int Conf Mach Learn 139:10586\u201310595"},{"key":"953_CR23","unstructured":"Shafahi A et al (2019) \u201cAdversarial training for free!\u201d in Advances in Neural Information Processing Systems, vol. 32, available: https:\/\/proceedings.neurips.cc\/paper\/ 2019\/file\/7503cfacd12053d309b6bed5c89de212-Paper.pdf"},{"key":"953_CR24","first-page":"16048","volume":"33","author":"M Andriushchenko","year":"2020","unstructured":"Andriushchenko M, Flammarion N (2020) Understanding and improving fast adversarial training. Adv. Neural Inf. Proces. Syst. 33:16048\u201316059","journal-title":"Adv. Neural Inf. Proces. Syst."},{"key":"953_CR25","doi-asserted-by":"publisher","first-page":"6969","DOI":"10.1109\/CVPR.2019.00714","volume":"2019","author":"D Stutz","year":"2019","unstructured":"Stutz D, Hein M, Schiele B (2019) \u201cDisentangling adversarial robustness and generalization\u201d, in. IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR) 2019:6969\u20136980. https:\/\/doi.org\/10.1109\/CVPR.2019.00714","journal-title":"IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR)"},{"key":"953_CR26","doi-asserted-by":"publisher","unstructured":"Li Y, Jiang Y, Li Z, and Xia S.-T, (2022) \u201cBackdoor learning: a survey,\u201d IEEE Trans. Neural Networks Learn. Syst. pp. 1\u201318 https:\/\/doi.org\/10.1109\/TNNLS.2022.3182979","DOI":"10.1109\/TNNLS.2022.3182979"},{"issue":"9","key":"953_CR27","doi-asserted-by":"publisher","first-page":"2805","DOI":"10.1109\/TNNLS.2018.2886017","volume":"30","author":"X Yuan","year":"2019","unstructured":"Yuan X, He P, Zhu Q, Li X (2019) Adversarial examples: attacks and defenses for deep learning. IEEE Trans neural networks Learn Syst 30(9):2805\u20132824. https:\/\/doi.org\/10.1109\/TNNLS.2018.2886017","journal-title":"IEEE Trans neural networks Learn Syst"},{"key":"953_CR28","doi-asserted-by":"publisher","first-page":"100199","DOI":"10.1016\/j.cosrev.2019.100199","volume":"34","author":"N Pitropakis","year":"2019","unstructured":"Pitropakis N, Panaousis E, Giannetsos T, Anastasiadis E, Loukas G (2019) A taxonomy and survey of attacks against machine learning. Comput. Sci. Rev 34:100199. https:\/\/doi.org\/10.1016\/j.cosrev.2019.100199","journal-title":"Comput. Sci. Rev"},{"key":"953_CR29","doi-asserted-by":"publisher","first-page":"372","DOI":"10.1109\/EuroSP.2016.36","volume":"2016","author":"N Papernot","year":"2016","unstructured":"Papernot N, McDaniel P, Jha S, Fredrikson M, Celik ZB, Swami A (2016) \u201cThe limitations of deep learning in adversarial settings\u201d, in. IEEE European Symposium on Security and Privacy 2016:372\u2013387. https:\/\/doi.org\/10.1109\/EuroSP.2016.36","journal-title":"IEEE European Symposium on Security and Privacy"},{"issue":"5","key":"953_CR30","doi-asserted-by":"publisher","first-page":"828","DOI":"10.1109\/TEVC.2019.2890858","volume":"23","author":"J Su","year":"2019","unstructured":"Su J, Vargas DV, Sakurai K (2019) One pixel attack for fooling deep neural networks. IEEE Trans Evol Comput 23(5):828\u2013841. https:\/\/doi.org\/10.1109\/TEVC.2019.2890858","journal-title":"IEEE Trans Evol Comput"},{"key":"953_CR31","doi-asserted-by":"publisher","DOI":"10.1007\/s12243-022-00910-1","author":"MA Merzouk","year":"2022","unstructured":"Merzouk MA, Cuppens F, Boulahia-Cuppens N, Yaich R (2022) Investigating the practicality of adversarial evasion attacks on network intrusion detection. Ann Telecommun. https:\/\/doi.org\/10.1007\/s12243-022-00910-1","journal-title":"Ann Telecommun"},{"key":"953_CR32","doi-asserted-by":"publisher","unstructured":"Vitorino J, Oliveira N, and Pra\u00e7a I (2022) Adaptative perturbation patterns: realistic adversarial learning for robust intrusion detection. Future Internet 14(4).\u00a0https:\/\/doi.org\/10.3390\/fi14040108","DOI":"10.3390\/fi14040108"},{"issue":"3","key":"953_CR33","doi-asserted-by":"publisher","first-page":"2671","DOI":"10.1109\/COMST.2019.2896380","volume":"21","author":"N Chaabouni","year":"2019","unstructured":"Chaabouni N, Mosbah M, Zemmari A, Sauvignac C, Faruki P (2019) Network intrusion detection for IoT security based on learning techniques. IEEE Commun Surv Tutorials 21(3):2671\u20132701. https:\/\/doi.org\/10.1109\/COMST.2019.2896380","journal-title":"IEEE Commun Surv Tutorials"},{"issue":"4","key":"953_CR34","doi-asserted-by":"publisher","first-page":"6822","DOI":"10.1109\/JIOT.2019.2912022","volume":"6","author":"M Zolanvari","year":"2019","unstructured":"Zolanvari M, Teixeira MA, Gupta L, Khan KM, Jain R (2019) Machine learning-based network vulnerability analysis of industrial internet of things. IEEE Internet Things J 6(4):6822\u20136834. https:\/\/doi.org\/10.1109\/JIOT.2019.2912022","journal-title":"IEEE Internet Things J"},{"issue":"4","key":"953_CR35","doi-asserted-by":"publisher","first-page":"2287","DOI":"10.1007\/s11277-019-06986-8","volume":"111","author":"A Verma","year":"2020","unstructured":"Verma A, Ranga V (2020) Machine learning based intrusion detection systems for IoT applications. Wirel Pers Commun 111(4):2287\u20132310. https:\/\/doi.org\/10.1007\/s11277-019-06986-8","journal-title":"Wirel Pers Commun"},{"issue":"5","key":"953_CR36","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1109\/MNET.001.1800479","volume":"33","author":"H Yao","year":"2019","unstructured":"Yao H, Gao P, Zhang P, Wang J, Jiang C, Lu L (2019) Hybrid intrusion detection system for edge-based IIoT relying on machine-learning-aided detection. IEEE Netw 33(5):75\u201381. https:\/\/doi.org\/10.1109\/MNET.001.1800479","journal-title":"IEEE Netw"},{"issue":"8","key":"953_CR37","doi-asserted-by":"publisher","first-page":"6882","DOI":"10.1109\/JIOT.2020.2970501","volume":"7","author":"M Eskandari","year":"2020","unstructured":"Eskandari M, Janjua ZH, Vecchio M, Antonelli F (2020) Passban IDS: an intelligent anomaly-based intrusion detection system for IoT edge devices. IEEE Internet Things J 7(8):6882\u20136897. https:\/\/doi.org\/10.1109\/JIOT.2020.2970501","journal-title":"IEEE Internet Things J"},{"key":"953_CR38","doi-asserted-by":"publisher","unstructured":"Shorey T, Subbaiah D, Goyal A, Sakxena A, and Mishra AK (2018) \u201cPerformance comparison and analysis of slowloris, goldeneye and Xerxes DDoS attack tools,\u201d 2018 Int. Conf. Adv. Comput. Commun. Informatics, ICACCI 2018, pp. 318\u2013322 https:\/\/doi.org\/10.1109\/ICACCI.2018.8554590","DOI":"10.1109\/ICACCI.2018.8554590"},{"key":"953_CR39","doi-asserted-by":"publisher","unstructured":"Rosenberg I, ShabtaA, Elovic Y, and Rokach L (202) Adversarial machine learning attacks and defense methods in the cyber security domain, ACM Comput Surv 54(5).\u00a0https:\/\/doi.org\/10.1145\/3453158","DOI":"10.1145\/3453158"},{"key":"953_CR40","doi-asserted-by":"publisher","DOI":"10.5281\/zenodo.4743746","author":"S Garcia","year":"2020","unstructured":"Garcia S, Parmisano A, Erquiaga MJ (Jan.2020) IoT-23: a labeled dataset with malicious and benign IoT network traffic. Zenodo. https:\/\/doi.org\/10.5281\/zenodo.4743746"},{"key":"953_CR41","doi-asserted-by":"publisher","first-page":"779","DOI":"10.1016\/j.future.2019.05.041","volume":"100","author":"N Koroniotis","year":"2019","unstructured":"Koroniotis N, Moustafa N, Sitnikova E, Turnbull B (2019) Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-IoT dataset. Futur Gener Comput Syst 100:779\u2013796. https:\/\/doi.org\/10.1016\/j.future.2019.05.041","journal-title":"Futur Gener Comput Syst"},{"issue":"1","key":"953_CR42","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman L (2001) Random forests. Mach Learn 45(1):5\u201332. https:\/\/doi.org\/10.1023\/A:1010933404324","journal-title":"Mach Learn"},{"key":"953_CR43","doi-asserted-by":"publisher","unstructured":"Chen T,and Guestrin C (2016) XGBoost: a scalable tree boosting system. Proc ACM SIGKDD Int Conf Knowl Discov Data Min, vol. 13\u201317-Augu, pp. 785\u2013794.\u00a0https:\/\/doi.org\/10.1145\/2939672.2939785","DOI":"10.1145\/2939672.2939785"},{"key":"953_CR44","unstructured":"Ke G et al (2017) \u201cLightGBM: a highly efficient gradient boosting decision tree,\u201d in Advances in Neural Information Processing Systems, 2017, pp. 3147\u20133155"},{"key":"953_CR45","doi-asserted-by":"publisher","unstructured":"Liu FT, Ting KM, and Zhou ZH (2008) Isolation forest, Proc. - IEEE Int. Conf. Data Mining, ICDM, pp. 413\u2013422.\u00a0https:\/\/doi.org\/10.1109\/ICDM.2008.17","DOI":"10.1109\/ICDM.2008.17"},{"issue":"2","key":"953_CR46","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5121\/ijdkp.2015.5201","volume":"5","author":"M Hossin","year":"2015","unstructured":"Hossin M, Sulaiman MN (2015) A review on evaluation metrics for data classification evaluations. Int J Data Min Knowl Manag Process 5(2):1. https:\/\/doi.org\/10.5121\/ijdkp.2015.5201","journal-title":"Int J Data Min Knowl Manag Process"},{"key":"953_CR47","doi-asserted-by":"publisher","unstructured":"Khraisat A, Gondal I, Vamplew P, and Kamruzzaman J (2019) Survey of intrusion detection systems: techniques, datasets and challenges. Cybersecurity 2(1).\u00a0https:\/\/doi.org\/10.1186\/s42400-019-0038-7","DOI":"10.1186\/s42400-019-0038-7"}],"container-title":["Annals of Telecommunications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12243-023-00953-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12243-023-00953-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12243-023-00953-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,5]],"date-time":"2023-09-05T02:05:25Z","timestamp":1693879525000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12243-023-00953-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,11]]},"references-count":47,"journal-issue":{"issue":"7-8","published-print":{"date-parts":[[2023,8]]}},"alternative-id":["953"],"URL":"https:\/\/doi.org\/10.1007\/s12243-023-00953-y","relation":{"references":[{"id-type":"uri","id":"","asserted-by":"subject"}]},"ISSN":["0003-4347","1958-9395"],"issn-type":[{"value":"0003-4347","type":"print"},{"value":"1958-9395","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,3,11]]},"assertion":[{"value":"19 May 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 February 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 March 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}