{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,11]],"date-time":"2026-05-11T11:08:05Z","timestamp":1778497685478,"version":"3.51.4"},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"3-4","license":[{"start":{"date-parts":[[2024,6,7]],"date-time":"2024-06-07T00:00:00Z","timestamp":1717718400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,6,7]],"date-time":"2024-06-07T00:00:00Z","timestamp":1717718400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001871","name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","doi-asserted-by":"publisher","award":["UIDB\/00760\/2020 UIDP\/00760\/2020"],"award-info":[{"award-number":["UIDB\/00760\/2020 UIDP\/00760\/2020"]}],"id":[{"id":"10.13039\/501100001871","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001871","name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","doi-asserted-by":"publisher","award":["UIDB\/00760\/2020 UIDP\/00760\/2020"],"award-info":[{"award-number":["UIDB\/00760\/2020 UIDP\/00760\/2020"]}],"id":[{"id":"10.13039\/501100001871","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001871","name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","doi-asserted-by":"publisher","award":["UIDB\/00760\/2020 UIDP\/00760\/2020"],"award-info":[{"award-number":["UIDB\/00760\/2020 UIDP\/00760\/2020"]}],"id":[{"id":"10.13039\/501100001871","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001871","name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","doi-asserted-by":"publisher","award":["UIDB\/00760\/2020 UIDP\/00760\/2020"],"award-info":[{"award-number":["UIDB\/00760\/2020 UIDP\/00760\/2020"]}],"id":[{"id":"10.13039\/501100001871","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007157","name":"Instituto Polit\u00e9cnico do Porto","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100007157","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ann. Telecommun."],"published-print":{"date-parts":[[2025,4]]},"abstract":"<jats:title>Abstract<\/jats:title>\n          <jats:p>The growing cybersecurity threats make it essential to use high-quality data to train machine learning (ML) models for network traffic analysis, without noisy or missing data. By selecting the most relevant features for cyber-attack detection, it is possible to improve both the robustness and computational efficiency of the models used in a cybersecurity system. This work presents a feature selection and consensus process that combines multiple methods and applies them to several network datasets. Two different feature sets were selected and were used to train multiple ML models with regular and adversarial training. Finally, an adversarial evasion robustness benchmark was performed to analyze the reliability of the different feature sets and their impact on the susceptibility of the models to adversarial examples. By using an improved dataset with more data diversity, selecting the best time-related features and a more specific feature set, and performing adversarial training, the ML models were able to achieve a better adversarially robust generalization. The robustness of the models was significantly improved without their generalization to regular traffic flows being affected, without increases of false alarms, and without requiring too many computational resources, which enables a reliable detection of suspicious activity and perturbed traffic flows in enterprise computer networks.<\/jats:p>","DOI":"10.1007\/s12243-024-01047-z","type":"journal-article","created":{"date-parts":[[2024,6,7]],"date-time":"2024-06-07T04:01:49Z","timestamp":1717732909000},"page":"341-355","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Reliable feature selection for adversarially robust cyber-attack detection"],"prefix":"10.1007","volume":"80","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4968-3653","authenticated-orcid":false,"given":"Jo\u00e3o","family":"Vitorino","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0008-6630-9939","authenticated-orcid":false,"given":"Miguel","family":"Silva","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8075-531X","authenticated-orcid":false,"given":"Eva","family":"Maia","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2519-9859","authenticated-orcid":false,"given":"Isabel","family":"Pra\u00e7a","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,6,7]]},"reference":[{"key":"1047_CR1","doi-asserted-by":"publisher","unstructured":"European Union Agency for Cybersecurity et al (2022) Cyber Europe 2022: After Action Report. https:\/\/doi.org\/10.2824\/397622","DOI":"10.2824\/397622"},{"key":"1047_CR2","doi-asserted-by":"publisher","unstructured":"European Union Agency for Cybersecurity et al (2022) ENISA Threat Landscape 2022. https:\/\/doi.org\/10.2824\/764318","DOI":"10.2824\/764318"},{"key":"1047_CR3","doi-asserted-by":"publisher","unstructured":"Aouedi O et al (2022) Network traffic analysis using machine learning: an unsupervised approach to understand and slice your network. Ann Telecommun 77(5). https:\/\/doi.org\/10.1007\/s12243-021-00889-1","DOI":"10.1007\/s12243-021-00889-1"},{"key":"1047_CR4","doi-asserted-by":"publisher","unstructured":"Vitorino J, Andrade R, Pra\u00e7a I, Sousa O, Maia E (2022) A comparative analysis of machine learning techniques for IoT intrusion detection. In Found Pract Secur 191\u2013207. https:\/\/doi.org\/10.1007\/978-3-031-08147-7_13","DOI":"10.1007\/978-3-031-08147-7_13"},{"key":"1047_CR5","doi-asserted-by":"publisher","unstructured":"Beyer C, B\u00fcttner M, Unnikrishnan V, Schleicher M, Ntoutsi E, Spiliopoulou M (2020) Active feature acquisition on data streams under feature drift. Ann Telecommun 75(9). https:\/\/doi.org\/10.1007\/s12243-020-00775-2","DOI":"10.1007\/s12243-020-00775-2"},{"key":"1047_CR6","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-021-10037-9","author":"A Thakkar","year":"2022","unstructured":"Thakkar A, Lohiya R (2022) A survey on intrusion detection system: feature selection, model, performance measures, application perspective, challenges, and future research directions. Artif Intell Rev. https:\/\/doi.org\/10.1007\/s10462-021-10037-9","journal-title":"Artif Intell Rev"},{"issue":"12","key":"1047_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5120\/ijca2016910764","volume":"150","author":"K Kumar","year":"2016","unstructured":"Kumar K, Singh J (2016) Network intrusion detection with feature selection techniques using machine-learning algorithms. Int J Comput Appl 150(12):1\u201313. https:\/\/doi.org\/10.5120\/ijca2016910764","journal-title":"Int J Comput Appl"},{"key":"1047_CR8","doi-asserted-by":"publisher","unstructured":"Kasongo SM, Sun Y (2020) Performance analysis of intrusion detection systems using a feature selection method on the UNSW-NB15 dataset. J Big Data 7(1). https:\/\/doi.org\/10.1186\/s40537-020-00379-6","DOI":"10.1186\/s40537-020-00379-6"},{"issue":"2","key":"1047_CR9","doi-asserted-by":"publisher","first-page":"62","DOI":"10.3390\/fi15020062","volume":"15","author":"A Alotaibi","year":"2023","unstructured":"Alotaibi A, Rassam MA (2023) Adversarial machine learning attacks against intrusion detection systems: a survey on strategies and defense. Future Internet 15(2):62. https:\/\/doi.org\/10.3390\/fi15020062","journal-title":"Future Internet"},{"key":"1047_CR10","doi-asserted-by":"publisher","unstructured":"Rosenberg I, Shabtai A, Elovici Y, Rokach L (2021) Adversarial machine learning attacks and defense methods in the cyber security domain. ACM Comput Surv 54(5). https:\/\/doi.org\/10.1145\/3453158","DOI":"10.1145\/3453158"},{"key":"1047_CR11","doi-asserted-by":"publisher","unstructured":"Martins N, Cruz JM, Cruz T, Henriques Abreu P (2020) Adversarial machine learning applied to intrusion and malware scenarios: a systematic review. IEEE Access 8. https:\/\/doi.org\/10.1109\/ACCESS.2020.2974752","DOI":"10.1109\/ACCESS.2020.2974752"},{"key":"1047_CR12","doi-asserted-by":"publisher","unstructured":"Vitorino J, Dias T, Fonseca T, Maia E, Pra\u00e7a I (2023) Constrained adversarial learning and its applicability to automated software testing: a systematic review. ArXiv https:\/\/doi.org\/10.48550\/arXiv.2303.07546","DOI":"10.48550\/arXiv.2303.07546"},{"key":"1047_CR13","doi-asserted-by":"publisher","unstructured":"Vitorino J, Silva M, Maia E, Pra\u00e7a I (2024) An adversarial robustness benchmark for enterprise network intrusion detection. In Found Pract Secur 3\u201317. https:\/\/doi.org\/10.1007\/978-3-031-57537-2_1","DOI":"10.1007\/978-3-031-57537-2_1"},{"key":"1047_CR14","doi-asserted-by":"publisher","DOI":"10.1007\/s12243-022-00910-1","author":"MA Merzouk","year":"2022","unstructured":"Merzouk MA, Cuppens F, Boulahia-Cuppens N, Yaich R (2022) Investigating the practicality of adversarial evasion attacks on network intrusion detection. Ann Telecommun. https:\/\/doi.org\/10.1007\/s12243-022-00910-1","journal-title":"Ann Telecommun"},{"issue":"11","key":"1047_CR15","doi-asserted-by":"publisher","first-page":"673","DOI":"10.1007\/s12243-020-00770-7","volume":"75","author":"O Salman","year":"2020","unstructured":"Salman O, Elhajj IH, Kayssi A, Chehab A (2020) A review on machine learning\u2013based approaches for Internet traffic classification. Ann Telecommun 75(11):673\u2013710. https:\/\/doi.org\/10.1007\/s12243-020-00770-7","journal-title":"Ann Telecommun"},{"key":"1047_CR16","doi-asserted-by":"publisher","unstructured":"Ahmadi S et al (2019) Efficient feature selection for intrusion detection systems. 2019 IEEE 10th Ann Ubiquit Comput Electron Mobile Commun Conf (UEMCON). https:\/\/doi.org\/10.1109\/UEMCON47517.2019.8992960","DOI":"10.1109\/UEMCON47517.2019.8992960"},{"key":"1047_CR17","doi-asserted-by":"publisher","unstructured":"Guo G (2021) A machine learning framework for intrusion detection system in IoT networks using an ensemble feature selection method. In 2021 IEEE 12th Ann Inf Technol Electron Mobile Commun Conf 593\u2013599.\u00a0https:\/\/doi.org\/10.1109\/IEMCON53756.2021.9623082","DOI":"10.1109\/IEMCON53756.2021.9623082"},{"key":"1047_CR18","doi-asserted-by":"publisher","DOI":"10.1109\/CCWC57344.2023.10099144","author":"G Guo","year":"2023","unstructured":"Guo G et al (2023) An IoT intrusion detection system based on TON IoT network dataset. In 2023 IEEE 13th Ann Comput Commun Workshop Conf. https:\/\/doi.org\/10.1109\/CCWC57344.2023.10099144","journal-title":"In 2023 IEEE 13th Ann Comput Commun Workshop Conf"},{"key":"1047_CR19","unstructured":"Habeeb MS, Ranga BT (2024) A two-phase feature selection technique using information gain and XGBoost-RFE for NIDS. Int J Intell Syst Appl Eng 12. https:\/\/ijisae.org\/index.php\/IJISAE\/article\/view\/4595"},{"key":"1047_CR20","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2019.8851756","author":"Y Zhang","year":"2019","unstructured":"Zhang Y, Ren X, Zhang J (2019) Intrusion detection method based on information gain and ReliefF feature selection. In 2019 Int Joint Conf Neural Netw (IJCNN). https:\/\/doi.org\/10.1109\/IJCNN.2019.8851756","journal-title":"In 2019 Int Joint Conf Neural Netw (IJCNN)"},{"key":"1047_CR21","doi-asserted-by":"publisher","DOI":"10.1109\/IBIGDELFT.2018.8625318","author":"S Ustebay","year":"2018","unstructured":"Ustebay S, Turgut Z, Aydin MA (2018) Intrusion detection system with recursive feature elimination by using random forest and deep learning classifier. In 2018 Int Congr Big Data Deep Learn Fighting Cyber Terrorism. https:\/\/doi.org\/10.1109\/IBIGDELFT.2018.8625318","journal-title":"In 2018 Int Congr Big Data Deep Learn Fighting Cyber Terrorism"},{"key":"1047_CR22","doi-asserted-by":"publisher","unstructured":"Yadav NS, Sharma VP, Reddy DSD, Mishra S (2023) An effective network intrusion detection system using recursive feature elimination technique. Eng Proc 59(1). https:\/\/doi.org\/10.3390\/engproc2023059099","DOI":"10.3390\/engproc2023059099"},{"key":"1047_CR23","doi-asserted-by":"publisher","unstructured":"Awad M, Fraihat S (2023) Recursive feature elimination with cross-validation with decision tree: feature selection method for machine learning-based intrusion detection systems. J Sensor Actuator Netw 12(5). https:\/\/doi.org\/10.3390\/jsan12050067","DOI":"10.3390\/jsan12050067"},{"key":"1047_CR24","doi-asserted-by":"publisher","first-page":"132911","DOI":"10.1109\/ACCESS.2020.3009843","volume":"8","author":"Kurniabudi","year":"2020","unstructured":"Kurniabudi et al (2020) CICIDS-2017 dataset feature analysis with information gain for anomaly detection. IEEE Access 8:132911\u2013132921. https:\/\/doi.org\/10.1109\/ACCESS.2020.3009843","journal-title":"IEEE Access"},{"key":"1047_CR25","doi-asserted-by":"publisher","DOI":"10.3390\/jcp2010010","author":"A McCarthy","year":"2022","unstructured":"McCarthy A et al (2022) Functionality-preserving adversarial machine learning for robust classification in cybersecurity and intrusion detection domains: a survey. J Cybersecurity Priv. https:\/\/doi.org\/10.3390\/jcp2010010","journal-title":"J Cybersecurity Priv"},{"key":"1047_CR26","doi-asserted-by":"publisher","unstructured":"Sharafaldin I, Lashkari AH, Ghorbani AA (2018) Toward generating a new intrusion detection dataset and intrusion traffic characterization. In Proc 4th Int Conf Inf Syst Secur Priv 108\u2013116. https:\/\/doi.org\/10.5220\/0006639801080116","DOI":"10.5220\/0006639801080116"},{"key":"1047_CR27","unstructured":"CICFlowMeter Canadian Institute for Cybersecurity. https:\/\/www.unb.ca\/cic\/research\/applications.html#CICFlowMeter. Accessed 2024-01-02"},{"key":"1047_CR28","doi-asserted-by":"publisher","unstructured":"Lanvin M et al (2023) Errors in the CICIDS2017 dataset and the significant differences in detection performances it makes. In Risks Secur Internet Syst. https:\/\/doi.org\/10.1007\/978-3-031-31108-6_2","DOI":"10.1007\/978-3-031-31108-6_2"},{"key":"1047_CR29","doi-asserted-by":"publisher","DOI":"10.1109\/CNS56114.2022.9947235","author":"L Liu","year":"2022","unstructured":"Liu L et al (2022) Error prevalence in NIDS datasets: a case study on CIC-IDS-2017 and CSE-CIC-IDS-2018. In 2022 IEEE Conf Commun Netw Secur (CNS). https:\/\/doi.org\/10.1109\/CNS56114.2022.9947235","journal-title":"In 2022 IEEE Conf Commun Netw Secur (CNS)"},{"key":"1047_CR30","doi-asserted-by":"publisher","unstructured":"Ferriyan A, Thamrin AH, Takeda K, Murai J (2021) Generating network intrusion detection dataset based on real and encrypted synthetic attack traffic. Appl Sci 11(17). https:\/\/doi.org\/10.3390\/app11177868","DOI":"10.3390\/app11177868"},{"key":"1047_CR31","doi-asserted-by":"publisher","unstructured":"Ferriyan A, Thamrin AH, Takeda K, Murai J AllFlowMeter HIKARI2022. https:\/\/doi.org\/10.5281\/zenodo.6463389","DOI":"10.5281\/zenodo.6463389"},{"key":"1047_CR32","doi-asserted-by":"publisher","unstructured":"Quinlan JR (1986) Induction of decision trees. https:\/\/doi.org\/10.1007\/BF00116251","DOI":"10.1007\/BF00116251"},{"key":"1047_CR33","doi-asserted-by":"publisher","DOI":"10.5120\/13478-1164","author":"Z Karimi","year":"2013","unstructured":"Karimi Z, Riahi Kashani M, Harounabadi A (2013) Feature ranking in intrusion detection dataset using combination of filtering methods. Int J Comput Appl Technol. https:\/\/doi.org\/10.5120\/13478-1164","journal-title":"Int J Comput Appl Technol"},{"key":"1047_CR34","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2014\/717092","volume":"2014","author":"S Dey Sarkar","year":"2014","unstructured":"Dey Sarkar S, Goswami S, Agarwal A, Aktar J (2014) A novel feature selection technique for text classification using Na\u00efve bayes. Int Sch Res Notices 2014:1\u201310. https:\/\/doi.org\/10.1155\/2014\/717092","journal-title":"Int Sch Res Notices"},{"key":"1047_CR35","doi-asserted-by":"publisher","unstructured":"Guyon I, Weston J, Barnhill S (2002) Gene selection for cancer classification using support vector machines. https:\/\/doi.org\/10.1023\/A:1012487302797","DOI":"10.1023\/A:1012487302797"},{"key":"1047_CR36","doi-asserted-by":"crossref","unstructured":"Elsayed KMF (2015) Mean absolute deviation: analysis and applications. Int J Bus 02:63\u201374. https:\/\/api.semanticscholar.org\/CorpusID:124936289","DOI":"10.12785\/ijbsa\/020201"},{"key":"1047_CR37","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.eswa.2018.08.039","volume":"116","author":"S Roy","year":"2019","unstructured":"Roy S, Mondal S, Ekbal A, Desarkar MS (2019) Dispersion ratio based decision tree model for classification. Expert Syst Appl 116:1\u20139. https:\/\/doi.org\/10.1016\/j.eswa.2018.08.039","journal-title":"Expert Syst Appl"},{"issue":"7\u20138","key":"1047_CR38","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1007\/s12243-023-00953-y","volume":"78","author":"J Vitorino","year":"2023","unstructured":"Vitorino J, Pra\u00e7a I, Maia E (2023) Towards adversarial realism and robust Learning for IoT intrusion detection and classification. Ann Telecommun 78(7\u20138):401\u2013412. https:\/\/doi.org\/10.1007\/s12243-023-00953-y","journal-title":"Ann Telecommun"},{"issue":"4","key":"1047_CR39","doi-asserted-by":"publisher","first-page":"108","DOI":"10.3390\/fi14040108","volume":"14","author":"J Vitorino","year":"2022","unstructured":"Vitorino J, Oliveira N, Pra\u00e7a I (2022) Adaptative perturbation patterns: realistic adversarial learning for robust intrusion detection. Future Internet 14(4):108. https:\/\/doi.org\/10.3390\/fi14040108","journal-title":"Future Internet"},{"key":"1047_CR40","doi-asserted-by":"publisher","first-page":"103433","DOI":"10.1016\/j.cose.2023.103433","volume":"134","author":"J Vitorino","year":"2023","unstructured":"Vitorino J, Pra\u00e7a I, Maia E (2023) SoK: realistic adversarial attacks and defenses for intelligent network intrusion detection. Comput Secur 134:103433. https:\/\/doi.org\/10.1016\/j.cose.2023.103433","journal-title":"Comput Secur"},{"issue":"1","key":"1047_CR41","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman L (2001) Random forests. Mach Learn 45(1):5\u201332. https:\/\/doi.org\/10.1023\/A:1010933404324","journal-title":"Mach Learn"},{"key":"1047_CR42","doi-asserted-by":"publisher","unstructured":"Chen T, Guestrin C (2016) XGBoost: a scalable tree boosting system. In Proc ACM SIGKDD Int Conf Knowl Discov Data Mining 785\u2013794. https:\/\/doi.org\/10.1145\/2939672.2939785","DOI":"10.1145\/2939672.2939785"},{"key":"1047_CR43","unstructured":"Ke G et al (2017) LightGBM: a highly efficient gradient boosting decision tree. In Adv Neural Inf Process Syst 3147\u20133155"},{"key":"1047_CR44","doi-asserted-by":"publisher","DOI":"10.1145\/2339530.2339556","author":"Y Lou","year":"2012","unstructured":"Lou Y, Caruana R, Gehrke J (2012) Intelligible models for classification and regression. In Proc 18th ACM SIGKDD Int Conf Knowl Discov Data Mining. https:\/\/doi.org\/10.1145\/2339530.2339556","journal-title":"In Proc 18th ACM SIGKDD Int Conf Knowl Discov Data Mining"},{"key":"1047_CR45","doi-asserted-by":"publisher","unstructured":"Nori H, Jenkins S, Koch P, Caruana R (2019) InterpretML: a unified framework for machine learning interpretability. https:\/\/doi.org\/10.48550\/arXiv.1909.09223","DOI":"10.48550\/arXiv.1909.09223"}],"container-title":["Annals of Telecommunications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12243-024-01047-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12243-024-01047-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12243-024-01047-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,11]],"date-time":"2025-03-11T06:59:00Z","timestamp":1741676340000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12243-024-01047-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,7]]},"references-count":45,"journal-issue":{"issue":"3-4","published-print":{"date-parts":[[2025,4]]}},"alternative-id":["1047"],"URL":"https:\/\/doi.org\/10.1007\/s12243-024-01047-z","relation":{},"ISSN":["0003-4347","1958-9395"],"issn-type":[{"value":"0003-4347","type":"print"},{"value":"1958-9395","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,6,7]]},"assertion":[{"value":"29 February 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 May 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 June 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}