{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T16:49:09Z","timestamp":1776876549714,"version":"3.51.2"},"reference-count":62,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Applied Soft Computing"],"published-print":{"date-parts":[[2026,7]]},"DOI":"10.1016\/j.asoc.2026.115175","type":"journal-article","created":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T15:27:43Z","timestamp":1775575663000},"page":"115175","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Hybrid deep learning framework with ensemble feature selection and engineering for network intrusion detection"],"prefix":"10.1016","volume":"197","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9437-223X","authenticated-orcid":false,"given":"Osama S.","family":"Younes","sequence":"first","affiliation":[]}],"member":"78","reference":[{"issue":"23","key":"10.1016\/j.asoc.2026.115175_bib1","article-title":"Evaluation of machine learning techniques for traffic flow-based intrusion detection","volume":"22","author":"Rodr\u00edguez","year":"2022","journal-title":"Sens. (Basel)"},{"key":"10.1016\/j.asoc.2026.115175_bib2","doi-asserted-by":"crossref","DOI":"10.2478\/kbo-2023-0072","article-title":"A review of enhancing intrusion detection systems for cybersecurity using Artificial Intelligence (AI)","author":"Markevych","year":"2023","journal-title":"Int. Conf. Knowl.-BASED Organ."},{"issue":"13","key":"10.1016\/j.asoc.2026.115175_bib3","doi-asserted-by":"crossref","first-page":"7507","DOI":"10.3390\/app13137507","article-title":"Overview on intrusion detection systems design exploiting machine learning for networking cybersecurity","volume":"13","author":"Dini","year":"2023","journal-title":"Appl. Sci."},{"key":"10.1016\/j.asoc.2026.115175_bib4","doi-asserted-by":"crossref","DOI":"10.1016\/j.knosys.2019.105124","article-title":"Deep learning approaches for anomaly-based intrusion detection systems: a survey, taxonomy, and open issues","volume":"189","author":"Aldweesh","year":"2020","journal-title":"Knowl. -Based Syst."},{"key":"10.1016\/j.asoc.2026.115175_bib5","doi-asserted-by":"crossref","first-page":"29575","DOI":"10.1109\/ACCESS.2020.2972627","article-title":"BAT: deep learning methods on network intrusion detection using NSL-KDD Dataset","volume":"8","author":"Su","year":"2020","journal-title":"IEEE Access"},{"issue":"5","key":"10.1016\/j.asoc.2026.115175_bib6","doi-asserted-by":"crossref","first-page":"602","DOI":"10.1016\/j.neunet.2005.06.042","article-title":"Framewise phoneme classification with bidirectional LSTM and other neural network architectures","volume":"18","author":"Graves","year":"2005","journal-title":"Neural Netw."},{"key":"10.1016\/j.asoc.2026.115175_bib7","first-page":"866","article-title":"Multi-way, multilingual neural machine translation with a shared attention mechanism","author":"Firat","year":"2016","journal-title":"Proc. Conf. North Am. Chapter Assoc. for Comput. Linguist."},{"issue":"3","key":"10.1016\/j.asoc.2026.115175_bib8","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1016\/j.icte.2016.08.003","article-title":"FCAAIS: Anomaly based network intrusion detection through feature correlation analysis and association impact scale","volume":"2","author":"Jyothsna","year":"2016","journal-title":"ICT Express"},{"key":"10.1016\/j.asoc.2026.115175_bib9","first-page":"31","article-title":"A flow-based detection method for stealthy dictionary attacks against Secure Shell","volume":"21","author":"Satoh","year":"2015","journal-title":"J. Inf. Secur. Appl."},{"key":"10.1016\/j.asoc.2026.115175_bib10","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1016\/j.ins.2014.07.044","article-title":"Detecting anomalies from big network traffic data using an adaptive detection approach","volume":"318","author":"Zhang","year":"2015","journal-title":"Inf. Sci."},{"key":"10.1016\/j.asoc.2026.115175_bib11","first-page":"1","article-title":"An efficient network log anomaly detection system using random projection dimensionality reduction","volume":"5","author":"Juvonen","year":"2014","journal-title":"2014 6th Int. Conf. N. Technol. Mobil. Secur. (NTMS)"},{"issue":"1","key":"10.1016\/j.asoc.2026.115175_bib12","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1016\/j.compeleceng.2013.11.024","article-title":"A survey on feature selection methods","volume":"40","author":"Chandrashekar","year":"2014","journal-title":"Comput. & Electr. Eng."},{"key":"10.1016\/j.asoc.2026.115175_bib13","doi-asserted-by":"crossref","first-page":"726","DOI":"10.1016\/j.procs.2025.07.087","article-title":"SEADETEC: advanced service for early detection of cybersecurity events","volume":"263","author":"Dom\u00ednguez-Jim\u00e9nez","year":"2025","journal-title":"Procedia Comput. Sci."},{"issue":"5","key":"10.1016\/j.asoc.2026.115175_bib14","doi-asserted-by":"crossref","first-page":"2670","DOI":"10.1016\/j.eswa.2014.11.009","article-title":"A novel feature-selection approach based on the cuttlefish optimization algorithm for intrusion detection systems","volume":"42","author":"Eesa","year":"2015","journal-title":"Expert Syst. Appl."},{"key":"10.1016\/j.asoc.2026.115175_bib15","first-page":"108","article-title":"Toward generating a new intrusion detection dataset and intrusion traffic characterization","author":"Sharafaldin","year":"2018","journal-title":"Int. Conf. Inf. Syst. Secur. Priv."},{"key":"10.1016\/j.asoc.2026.115175_bib16","doi-asserted-by":"crossref","unstructured":"Moustafa, N., Slay, J. UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set), Military Communications and Information Systems Conference 1\u20136.","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"10.1016\/j.asoc.2026.115175_bib17","article-title":"A detailed analysis of the KDD CUP 99 data set","volume":"2","author":"Tavallaee","year":"2009","journal-title":"IEEE Symp Comput. Intell. Secur. Def. Appl. CISDA"},{"key":"10.1016\/j.asoc.2026.115175_bib18","series-title":"FLNET2023: Realistic Network Intrusion Detection Dataset for Federated Learning","first-page":"345","author":"Kumar","year":"2023"},{"key":"10.1016\/j.asoc.2026.115175_bib19","first-page":"223","article-title":"Efficient Deep CNN-BiLSTM Model for Network Intrusion Detection","author":"Sinha","year":"2020","journal-title":"Proc. 3rd Int. Conf. Artif. Intell. Pattern Recognit. Xiamen China"},{"issue":"3","key":"10.1016\/j.asoc.2026.115175_bib20","doi-asserted-by":"crossref","first-page":"322","DOI":"10.3390\/electronics8030322","article-title":"Features Dimensionality Reduction Approaches for Machine Learning Based Network Intrusion Detection","volume":"8","author":"Abdulhammed","year":"2019","journal-title":"Electronics"},{"key":"10.1016\/j.asoc.2026.115175_bib21","doi-asserted-by":"crossref","first-page":"132911","DOI":"10.1109\/ACCESS.2020.3009843","article-title":"CICIDS-2017 Dataset Feature Analysis With Information Gain for Anomaly Detection","volume":"8","author":"Kurniabudi","year":"2020","journal-title":"IEEE Access"},{"key":"10.1016\/j.asoc.2026.115175_bib22","doi-asserted-by":"crossref","DOI":"10.1088\/1742-6596\/1993\/1\/012029","article-title":"Analysis on Network Traffic Features for Designing Machine Learning based IDS","volume":"1993","author":"Meemongkolkiat","year":"2021","journal-title":"J. Phys. Conf. Ser."},{"key":"10.1016\/j.asoc.2026.115175_bib23","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1016\/j.neucom.2019.11.016","article-title":"A novel statistical analysis and autoencoder driven intelligent intrusion detection approach","volume":"387","author":"Ieracitano","year":"2020","journal-title":"Neurocomputing"},{"key":"10.1016\/j.asoc.2026.115175_bib24","article-title":"Network Intrusion Detection: A Comprehensive Analysis of CIC-IDS2017","author":"Rosay","year":"2022","journal-title":"Int. Conf. Inf. Syst. Secur. Priv."},{"issue":"3","key":"10.1016\/j.asoc.2026.115175_bib25","doi-asserted-by":"crossref","first-page":"43","DOI":"10.4018\/IJISMD.2017070103","article-title":"Evaluation of Recurrent Neural Network and its Variants for Intrusion Detection System IDS","volume":"8","author":"Vinayakumar","year":"2017","journal-title":"Int. J. Inf. Syst. Model. Des."},{"issue":"5","key":"10.1016\/j.asoc.2026.115175_bib26","doi-asserted-by":"crossref","first-page":"7206","DOI":"10.1007\/s11227-021-04169-6","article-title":"A deep learning approach in predicting products' sentiment ratings: a comparative analysis","volume":"78","author":"Balakrishnan","year":"2022","journal-title":"J. Supercomput."},{"key":"10.1016\/j.asoc.2026.115175_bib27","first-page":"1","article-title":"A scalable purchase intention prediction system using extreme gradient boosting machines with browsing content entropy","author":"Zheng","year":"2018","journal-title":"2018 IEEE Int. Conf. Consum. Electron. (ICCE)"},{"key":"10.1016\/j.asoc.2026.115175_bib28","doi-asserted-by":"crossref","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","article-title":"Long Short-term Memory","volume":"9","author":"Hochreiter","year":"1997","journal-title":"Neural Comput."},{"key":"10.1016\/j.asoc.2026.115175_bib29","first-page":"759","article-title":"Statistical Analysis Driven Optimized Deep Learning System for Intrusion Detection","author":"Ieracitano","year":"2018","journal-title":"9th Int. Conf. Xi' China"},{"key":"10.1016\/j.asoc.2026.115175_bib30","first-page":"74","article-title":"An Improved Convolutional Neural Network Model for Intrusion Detection in Networks","author":"Khan","year":"2019","journal-title":"Cybersecur. Cyber Conf. (CCC)"},{"key":"10.1016\/j.asoc.2026.115175_bib31","doi-asserted-by":"crossref","first-page":"1792","DOI":"10.1109\/ACCESS.2017.2780250","article-title":"HAST-IDS: Learning Hierarchical Spatial-Temporal Features Using Deep Neural Networks to Improve Intrusion Detection","volume":"6","author":"Wang","year":"2018","journal-title":"IEEE Access"},{"key":"10.1016\/j.asoc.2026.115175_bib32","first-page":"798","article-title":"Research on Network Behavior Anomaly Analysis Based on Bidirectional LSTM","author":"Yang","year":"2019","journal-title":"IEEE 3rd Inf. Technol. Netw. Electron. Autom. Control Conf. (ITNEC)"},{"key":"10.1016\/j.asoc.2026.115175_bib33","doi-asserted-by":"crossref","DOI":"10.1186\/s40537-023-00834-0","article-title":"Network intrusion detection using feature fusion with deep learning","volume":"10","author":"Ayantayo","year":"2023","journal-title":"J. Big Data"},{"key":"10.1016\/j.asoc.2026.115175_bib34","first-page":"218","article-title":"1D CNN based network intrusion detection with normalization on imbalanced data","author":"Azizjon","year":"2020","journal-title":"Int. Conf. Artif. Intell. Inf. Commun. (ICAIIC)"},{"issue":"3","key":"10.1016\/j.asoc.2026.115175_bib35","doi-asserted-by":"crossref","first-page":"3353","DOI":"10.1007\/s40747-023-01313-y","article-title":"CNN-GRU-FF: a double-layer feature fusion-based network intrusion detection system using convolutional neural network and gated recurrent units","volume":"10","author":"Imrana","year":"2024","journal-title":"Complex & Intell. Syst."},{"issue":"3","key":"10.1016\/j.asoc.2026.115175_bib36","doi-asserted-by":"crossref","first-page":"79","DOI":"10.3390\/systems12030079","article-title":"Enhancing Intrusion Detection Systems Using a Deep Learning and Data Augmentation Approach","volume":"12","author":"Mohammad","year":"2024","journal-title":"Systems"},{"key":"10.1016\/j.asoc.2026.115175_bib37","article-title":"An Intrusion Detection Model Based on Feature Reduction and Convolutional Neural Networks","volume":"7","author":"Xiao","year":"2019","journal-title":"IEEE Access"},{"key":"10.1016\/j.asoc.2026.115175_bib38","first-page":"1602","article-title":"Malicious Domain Name Detection Model Based on CNN-GRU-Attention","author":"Jiang","year":"2021","journal-title":"33rd Chin. Control Decis. Conf. (CCDC)"},{"issue":"9","key":"10.1016\/j.asoc.2026.115175_bib39","doi-asserted-by":"crossref","first-page":"4184","DOI":"10.3390\/app12094184","article-title":"Network intrusion detection model based on CNN and GRU","volume":"12","author":"Cao","year":"2022","journal-title":"Appl. Sci."},{"key":"10.1016\/j.asoc.2026.115175_bib40","doi-asserted-by":"crossref","first-page":"37131","DOI":"10.1109\/ACCESS.2023.3266979","article-title":"\u201cA Novel Two-Stage Deep Learning Model for Network Intrusion Detection: LSTM-AE,\u201d","volume":"11","author":"Hnamte","year":"2023","journal-title":"IEEE Access"},{"issue":"1","key":"10.1016\/j.asoc.2026.115175_bib41","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1186\/s13677-024-00685-x","article-title":"Enhancing intrusion detection: a hybrid machine and deep learning approach","volume":"13","author":"Sajid","year":"2024","journal-title":"J. Cloud Comput."},{"key":"10.1016\/j.asoc.2026.115175_bib42","doi-asserted-by":"crossref","first-page":"107431","DOI":"10.1109\/ACCESS.2024.3438619","article-title":"A novel intrusion detection model for enhancing security in smart city","volume":"12","author":"Aborokbah","year":"2024","journal-title":"IEEE Access"},{"issue":"1","key":"10.1016\/j.asoc.2026.115175_bib43","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1186\/s40537-020-00379-6","article-title":"Performance analysis of intrusion detection systems using a feature selection method on the UNSW-NB15 dataset","volume":"7","author":"Kasongo","year":"2020","journal-title":"J. Big Data"},{"key":"10.1016\/j.asoc.2026.115175_bib44","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1089\/big.2020.0263","article-title":"A convolutional neural network for improved anomaly-based network intrusion detection","volume":"9","author":"Al-Turaiki","year":"2021","journal-title":"Big Data"},{"issue":"8","key":"10.1016\/j.asoc.2026.115175_bib45","first-page":"4141","article-title":"A lightweight intelligent network intrusion detection system using one-class autoencoder and ensemble learning for IoT, Sensors","volume":"23","author":"Yao","year":"2023"},{"key":"10.1016\/j.asoc.2026.115175_bib46","unstructured":"W.B.W. Bank. \"Intrusion detection evaluation dataset (CIS-DS2017),\" April, 2024; \u3008https:\/\/www.unb.ca\/cic\/datasets\/ids-2017.html\u3009."},{"key":"10.1016\/j.asoc.2026.115175_bib47","first-page":"20","article-title":"Analysis of KDD '99 intrusion detection dataset for selection of relevance features","volume":"1","author":"Adetunmbi","year":"2010","journal-title":"Proc. World Congr. Eng. Comput. Sci."},{"key":"10.1016\/j.asoc.2026.115175_bib48","doi-asserted-by":"crossref","DOI":"10.1016\/j.engappai.2024.107865","article-title":"A new filter feature selection algorithm for classification task by ensembling pearson correlation coefficient and mutual information","volume":"131","author":"Gong","year":"2024","journal-title":"Eng. Appl. Artif. Intell."},{"key":"10.1016\/j.asoc.2026.115175_bib49","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1016\/j.ins.2018.10.029","article-title":"Under-sampling class imbalanced datasets by combining clustering analysis and instance selection","volume":"477","author":"Tsai","year":"2019","journal-title":"Inf. Sci."},{"key":"10.1016\/j.asoc.2026.115175_bib50","first-page":"48","article-title":"\u201cCombinatorial Intrusion Detection Model Based on Deep Recurrent Neural Network and Improved SMOTE Algorithm,\u201d","volume":"4","author":"He","year":"2018","journal-title":"Chin. J. Netw. Inf. Secur"},{"key":"10.1016\/j.asoc.2026.115175_bib51","doi-asserted-by":"crossref","unstructured":"Satopaa, V., Albrecht, J., Irwin, D., Raghavan, B. Finding a Kneedle in a Haystack: Detecting Knee Points in System Behavior, Distributed Computing Systems Workshops, (2011).","DOI":"10.1109\/ICDCSW.2011.20"},{"key":"10.1016\/j.asoc.2026.115175_bib52","doi-asserted-by":"crossref","unstructured":"Fernandes, P., Ciardhu\u00e1in, S.\u00d3. Antunes, M. \u201cUnveiling malicious network flows using benford\u2019s law,\u201d vol. 12, no. 15, pp. 2299, 2024.","DOI":"10.3390\/math12152299"},{"key":"10.1016\/j.asoc.2026.115175_bib53","doi-asserted-by":"crossref","first-page":"434","DOI":"10.28925\/2663-4023.2024.25.434448","article-title":"Application of metric methods of histogram comparison for detecting changes in encrypted network traffic","volume":"1","author":"Subach","year":"2024","journal-title":"Cybersecurity Education Science Technique"},{"key":"10.1016\/j.asoc.2026.115175_bib54","article-title":"Multivariate correlation analysis technique for DoS attack detection","volume":"3","author":"Neela","year":"2018","journal-title":"Int. J. Eng, Res. Technol."},{"key":"10.1016\/j.asoc.2026.115175_bib55","doi-asserted-by":"crossref","unstructured":"M.A. Ahmed, and Y.A. Mohamed, \"Enhancing Intrusion Detection Using Statistical Functions.\" pp. 1-6.","DOI":"10.1109\/ICCCEEE.2018.8515882"},{"key":"10.1016\/j.asoc.2026.115175_bib56","doi-asserted-by":"crossref","unstructured":"Ansah, P., Tetarave, S.K., Kalaimannan, E.,Dash, B.B., and John, C., \u201cEnhancing Network Security Through Proactive Anomaly Detection: A Comparative Study of Auto-Encoder Models and K-Nearest Neighbours Algorithm,\u201d pp. 119-126, 2023.","DOI":"10.1109\/ICSC60084.2023.10349990"},{"issue":"1","key":"10.1016\/j.asoc.2026.115175_bib57","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1111\/insr.12466","article-title":"Bayesian models applied to cyber security anomaly detection problems","volume":"90","author":"Perusqu\u00eda","year":"2022","journal-title":"Int. Stat. Rev."},{"issue":"2","key":"10.1016\/j.asoc.2026.115175_bib58","doi-asserted-by":"crossref","first-page":"1435","DOI":"10.1007\/s10586-020-03203-1","article-title":"Detecting network cyber-attacks using an integrated statistical approach","volume":"24","author":"Bouyeddou","year":"2021","journal-title":"Clust. Comput."},{"key":"10.1016\/j.asoc.2026.115175_bib59","first-page":"85","article-title":"Statistical approach for detecting distributed denial of service attacks","author":"Gauravdeep","year":"2017","journal-title":"Asian J. Comput. Sci. Inf. Technol."},{"key":"10.1016\/j.asoc.2026.115175_bib60","article-title":"A deep learning based DDoS detection system in software-defined networking (SDN)","volume":"4","author":"Niyaz","year":"2016","journal-title":"EAI Endorsed Trans. Secur. Saf."},{"key":"10.1016\/j.asoc.2026.115175_bib61","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1016\/j.procs.2015.04.007","article-title":"DDoS attack detection using fast entropy approach on flow- based network traffic","volume":"50","author":"David","year":"2015","journal-title":"Procedia Comput. Sci."},{"issue":"1","key":"10.1016\/j.asoc.2026.115175_bib62","first-page":"101","article-title":"A multi-DL fuzzy approach to image recognition for a real-time traffic alert system","volume":"17","author":"Mu\u00f1oz","year":"2025"}],"container-title":["Applied Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S156849462600623X?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S156849462600623X?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T16:08:15Z","timestamp":1776874095000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S156849462600623X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,7]]},"references-count":62,"alternative-id":["S156849462600623X"],"URL":"https:\/\/doi.org\/10.1016\/j.asoc.2026.115175","relation":{},"ISSN":["1568-4946"],"issn-type":[{"value":"1568-4946","type":"print"}],"subject":[],"published":{"date-parts":[[2026,7]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Hybrid deep learning framework with ensemble feature selection and engineering for network intrusion detection","name":"articletitle","label":"Article Title"},{"value":"Applied Soft Computing","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.asoc.2026.115175","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier B.V. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"115175"}}