{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T17:06:55Z","timestamp":1772125615753,"version":"3.50.1"},"reference-count":149,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"DSIT, UK"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/access.2025.3580176","type":"journal-article","created":{"date-parts":[[2025,6,16]],"date-time":"2025-06-16T19:00:12Z","timestamp":1750100412000},"page":"105911-105951","source":"Crossref","is-referenced-by-count":5,"title":["Future Open Networks Cross-Domain Cognitive Orchestration: A Novel Design Paradigm"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-0835-0902","authenticated-orcid":false,"given":"Saptarshi","family":"Ghosh","sequence":"first","affiliation":[{"name":"Digital Catapult, London, U.K."}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9317-7045","authenticated-orcid":false,"given":"Hamid","family":"Asgari","sequence":"additional","affiliation":[{"name":"Thales Research, Technology, Solution, and Innovation (RTSI), Reading, U.K."}]},{"given":"Darryl","family":"Hond","sequence":"additional","affiliation":[{"name":"Thales Research, Technology, Solution, and Innovation (RTSI), Reading, U.K."}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2703-8864","authenticated-orcid":false,"given":"Konstantinos","family":"Antonakoglou","sequence":"additional","affiliation":[{"name":"Digital Catapult, London, U.K."}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3309-132X","authenticated-orcid":false,"given":"Ioannis","family":"Mavromatis","sequence":"additional","affiliation":[{"name":"Digital Catapult, London, U.K."}]},{"given":"Noel","family":"Butler","sequence":"additional","affiliation":[{"name":"Thales Research, Technology, Solution, and Innovation (RTSI), Reading, U.K."}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3771-7537","authenticated-orcid":false,"given":"Rasheed","family":"Hussain","sequence":"additional","affiliation":[{"name":"Faculty of Engineering, University of Bristol, Bristol, U.K."}]},{"given":"Shah","family":"Zeb","sequence":"additional","affiliation":[{"name":"Thales Research, Technology, Solution, and Innovation (RTSI), Reading, U.K."}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5372-7201","authenticated-orcid":false,"given":"Kostas","family":"Katsaros","sequence":"additional","affiliation":[{"name":"Digital Catapult, London, U.K."}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2149-0235","authenticated-orcid":false,"given":"Shadi","family":"Moazzeni","sequence":"additional","affiliation":[{"name":"Faculty of Engineering, University of Bristol, Bristol, U.K."}]},{"given":"David","family":"Tee","sequence":"additional","affiliation":[{"name":"Thales Research, Technology, Solution, and Innovation (RTSI), Reading, U.K."}]},{"given":"Gabriele","family":"Incorvaia","sequence":"additional","affiliation":[{"name":"Thales Research, Technology, Solution, and Innovation (RTSI), Reading, U.K."}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7046-544X","authenticated-orcid":false,"given":"Dimitra","family":"Simeonidou","sequence":"additional","affiliation":[{"name":"Faculty of Engineering, University of Bristol, Bristol, U.K."}]}],"member":"263","reference":[{"key":"ref1","volume-title":"Telecoms Diversification Taskforce Findings and Report","year":"2021"},{"key":"ref2","volume-title":"The Potential of the Future Connectivity Systems for Vertical Industries","year":"2024"},{"key":"ref3","volume-title":"Framework and Overall Objectives of the Future Development of IMT for 2030 and Beyond","year":"2023"},{"key":"ref4","volume-title":"The 6G Architecture Landscape\u2014European Perspective","author":"Bahare","year":"2023"},{"key":"ref5","volume-title":"Networks in 2030: Why an Open Future is Essential","year":"2024"},{"key":"ref6","volume-title":"An Introduction to Data-Driven Network Architecture","year":"2020"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.3390\/s24061888"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3390\/s21196563"},{"key":"ref9","volume-title":"Generic Network Slice Template","year":"2023"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM48880.2022.9796918"},{"key":"ref11","volume-title":"A Holistic Flagship Towards the 6G Network Platform and System, to Inspire Digital Transformation, for the World to Act Together in Meeting Needs in Society and Ecosystems With Novel 6G Services | Hexa-X-II Project | Results | HORIZON | CORDIS | European Commission\u2014Cordis.europa.eu","year":"2024"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3507186"},{"key":"ref13","volume-title":"Management and Orchestration Provisioning","year":"2025"},{"key":"ref14","volume-title":"Technical Specification: Management and Orchestration, Architecture Framework (Rel 19), Version 19.0.0","year":"2025"},{"key":"ref15","volume-title":"ETSI GS ZSM 008 V1.1.1 (2022-07): Zero-Touch Network and Service Management (ZSM); Cross-Domain E2E Service Lifecycle Management","year":"2022"},{"key":"ref16","volume-title":"Management and Orchestration; 5G Network Resource Model (NRM); Stage 2 and Stage 3","author":"Meredith","year":"2025"},{"key":"ref17","volume-title":"Zero-Touch Network and Service Management (ZSM); End-to-End Network Slicing Management and Orchestration Aspects","year":"2021"},{"key":"ref18","volume-title":"Zero-Touch Network and Service Management (ZSM); Enablers for Artificial Intelligence-Based Automation","year":"2022"},{"key":"ref19","volume-title":"Experiential Networked Intelligence (ENI); System Architecture","year":"2021"},{"key":"ref20","volume-title":"3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Telecommunication Management; Study on a Restful HTTP-Based Solution Set (release 14)","year":"2017"},{"key":"ref21","volume-title":"System Architecture for the 5G System (5GS)","author":"Pope","year":"2025"},{"key":"ref22","volume-title":"3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Management and Orchestration; Security Assurance Specification for the 5G Management System (release 16)","year":"2020"},{"key":"ref23","volume-title":"Zero-Touch Network and Service Management (ZSM); Security Aspects, Including Trust and Policy Management","year":"2021"},{"key":"ref24","volume-title":"3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Policy and Charging Control Framework (Release 16)","year":"2020"},{"key":"ref25","volume-title":"Final Design and Evaluation of the Innovations of the 5G End-to-End Service Platform","author":"Mangues-Bafalluy","year":"2021"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3100120"},{"key":"ref27","volume-title":"5G-Victori Infrastructure Operating System-Final Design Specification","author":"Katsaros","year":"2022"},{"key":"ref28","volume-title":"5G-Victori End-to-End Reference Architecture","author":"Tzanakaki","year":"2022"},{"key":"ref29","volume-title":"Final Design of Zero Touch Service Management With Security and Trust Solutions","author":"P\u00e9rez","year":"2022"},{"key":"ref30","volume-title":"Final Report on Enablers and Mechanisms for Liability-Aware Trustable Smart 5G Security Management Framework","author":"Palma","year":"2022"},{"key":"ref31","volume-title":"Trust Management in Multi-Tenant\/Multi-Party\/Multi-Domain 5G Environment","author":"F\u00e9lix","year":"2022"},{"key":"ref32","volume-title":"White Paper: Intelligent Security Architecture for 5G and Beyond Networks","author":"Benzaid","year":"2020"},{"key":"ref33","volume-title":"Evaluation of E2E 5G Infrastructure and Service Slices, and of the Developed Self-Learning ML Algorithms","author":"McNamara","year":"2022"},{"key":"ref34","volume-title":"Foundation of Overall 6G System Design and Preliminary Evaluation Results","author":"Porambage","year":"2023"},{"key":"ref35","volume-title":"Foundation of Overall 6G System Design and Preliminary Evaluation Results","author":"Ericson","year":"2023"},{"key":"ref36","volume-title":"Analysis of 6G Architectural Enablers\u2019 Applicability and Initial Technological Solutions","author":"Ericson","year":"2022"},{"key":"ref37","volume-title":"Final Design of Real-Time Control and VNF Intelligence Mechanisms","author":"Gramaglia","year":"2023"},{"key":"ref38","volume-title":"Final Daemon Network Intelligence Framework and Toolsets","author":"Camelo","year":"2023"},{"key":"ref39","volume-title":"Horse Architectural Design (It-1)","author":"Granelli","year":"2023"},{"key":"ref40","volume-title":"Requirements, Use Cases and System Architecture\u2014Initial","author":"Jarvet","year":"2023"},{"key":"ref41","volume-title":"Initial Report on the Intelligent and Secure Management, Orchestration, and Control Platform","author":"Lefebvre","year":"2023"},{"key":"ref42","volume-title":"Design Plan of the Multi-Domain Automated Security Orchestration, Trust-Management, and Deployment","year":"2024"},{"key":"ref43","volume-title":"Design Plan of the AI-Driven Anomaly Detection, Decision and Mitigation","year":"2023"},{"key":"ref44","volume-title":"PREDICT-6G Framework Architecture and Initial Specification","year":"2024"},{"key":"ref45","volume-title":"D3.2 Implementation of Selected Release 1 AI-Driven Inter-Domain Network Control, Management and Orchestration Innovations","year":"2024"},{"key":"ref46","volume-title":"D3.1 Release 1 of AI-Driven Inter-Domain Network Control, Management, and Orchestration Innovations","author":"Consortium","year":"2023"},{"key":"ref47","volume-title":"Across Platform Architecture and Technical Specifications","author":"Grammatikis","year":"2024"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.2000730"},{"key":"ref49","volume-title":"About 5G-VICTORI\u20135G-VICTORI\u20145G-victoriproject.eu","year":"2023"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2024.110202"},{"key":"ref51","volume-title":"Zero-Touch Security and Trust for Ubiquitous Computing and Connectivity in 5G Networks. | 5GZORRO Project | Results | H2020 | CORDIS | European Commission\u2014Cordis.europa.eu","year":"2022"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/s10922-021-09623-7"},{"key":"ref53","article-title":"Zero-touch AIOps in multi-operator 5G networks","volume-title":"Proc. Joint EuCNC 6G Summit","author":"Barabash"},{"key":"ref54","volume-title":"INtelligent Security and PervasIve TRust for 5G and Beyond | INSPIRE-5Gplus Project | Results | H2020 | CORDIS | European Commission\u2014Cordis.europa.eu","year":"2024"},{"key":"ref55","volume-title":"Beyond 5G Multi-Tenant Private Networks Integrating Cellular, WiFi, and LiFi, Powered by Artificial Intelligence and Intent Based PolicY | 5G-CLARITY Project | Results | H2020 | CORDIS | European Commission\u2014Cordis.europa.eu","year":"2024"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.2100615"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3265894"},{"key":"ref58","volume-title":"Final System Architecture and Its Evaluation","author":"Tzanakaki","year":"2022"},{"key":"ref59","volume-title":"Network Intelligence for Adaptive and Self-Learning Mobile Networks | DAEMON Project | Results | H2020 | CORDIS | European Commission\u2014Cordis.europa.eu","year":"2024"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.2200529"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2022.06.036"},{"key":"ref62","volume-title":"Holistic, Omnipresent, Resilient Services for Future 6G Wireless and Computing Ecosystems","year":"2023"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/JLT.2020.2990066"},{"key":"ref64","volume-title":"ADROIT6G Project Home\u2014Adroit6g.eu","year":"2024"},{"key":"ref65","volume-title":"DESIRE-6G: Deep Programmability and Secure Distributed Intelligence for Real-time End-to-End 6G Networks","year":"2024"},{"key":"ref66","volume-title":"RIGOROUS-6G: Project Home","year":"2025"},{"key":"ref67","volume-title":"PREDICT-6G: Towards a Deterministic 6G Network: Reliable, Time Sensitive and Predictable\u2014Predict-6g.eu","year":"2024"},{"key":"ref68","volume-title":"Automated Zero-Touch Cross-Layer Provisioning Framework for 5G and Beyond Vertical Services (Across)","year":"2023"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/ECOC.2018.8535288"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/NETSOFT.2019.8806705"},{"key":"ref71","first-page":"1","article-title":"VNF chaining across multi-PoPs in OSM using transport API","volume-title":"Proc. Opt. Fiber Commun. Conf. Exhib. (OFC)","author":"Bravalheri"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/IEEECloudSummit48914.2020.00010"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2020.2988486"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107433"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.3044707"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2024.3352821"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2021.09.001"},{"key":"ref78","doi-asserted-by":"crossref","DOI":"10.17487\/rfc1930","volume-title":"Guidelines for Creation, Selection, and Registration of an Autonomous System (AS)","author":"Hawkinson","year":"1996"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.107930"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2977402"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3231039"},{"key":"ref82","volume-title":"Network Functions Virtualisation (NFV) Release 2; Management and Orchestration; Architectural Framework Specification","year":"2021"},{"key":"ref83","volume-title":"Attributes of a Service Level Specification (SLS) Template","author":"Goderis","year":"2003"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.3390\/su11030574"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.3390\/fi14030095"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-24963-1_1"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.23919\/ETR.2022.9904673"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30193-6_37"},{"key":"ref89","volume-title":"Initial specification of protocols and algorithms for inter-domain SLS","author":"Morand","year":"2003"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1007\/BF02283186"},{"key":"ref91","volume-title":"Policy-Based Network Management: Solutions for the Next Generation","author":"Strassner","year":"2004"},{"key":"ref92","doi-asserted-by":"crossref","DOI":"10.17487\/rfc1104","volume-title":"Models of Policy Based Routing","author":"Braun","year":"1989"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.23919\/IFIPNetworking62109.2024.10619742"},{"key":"ref94","volume-title":"Security Architecture for Systems Providing End-to-End Communications","author":"Union (ITU)","year":"2003"},{"key":"ref95","volume-title":"Hexa-X Architecture for B5G\/6G Networks\u2013Final Release","author":"Khorsan","year":"2023"},{"key":"ref96","volume-title":"Zero-Touch Network and Service Management (ZSM); Enablers for Artificial Intelligence-Based Network and Service Automation","year":"2024"},{"key":"ref97","volume-title":"The NIST Cybersecurity Framework (CSF) 2.0","year":"2024"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1145\/3018981.3018986"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2004.1355030"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2024.3355335"},{"key":"ref101","volume-title":"Ethical Concerns Mount as AI Takes Bigger Decision-Making Role\u2014News.harvard.edu","author":"Parsons","year":"2020"},{"key":"ref102","volume-title":"Algorithmic Bias Detection and Mitigation: Best Practices and Policies to Reduce Consumer Harms\u2014Brookings.edu","author":"Lee","year":"2019"},{"key":"ref103","article-title":"Explainable AI in 6G O-RAN: A tutorial and survey on architecture, use cases, challenges, and future research","author":"Brik","year":"2023","journal-title":"arXiv:2307.00319"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-91431-8_52"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2023.3273121"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2828102"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-023-32814-y"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3058573"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/ICECCT.2015.7226093"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1587\/transcom.2020EBP3061"},{"key":"ref111","first-page":"671","article-title":"Packet routing in dynamically changing networks: A reinforcement learning approach","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"6","author":"Boyan"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC55385.2023.10118680"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCWorkshops55477.2022.9896702"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1145\/3209582.3209606"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3236261"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2021.01.021"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3074618"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSN57992.2023.10297328"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM42002.2020.9322238"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.3390\/fi9040072"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2961997"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.109358"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12224604"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.3011561"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1109\/ICC40277.2020.9148767"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3327335"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.3390\/s23042325"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1145\/3408292"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2022.3192978"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2020.3020313"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3369181"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1016\/j.bdr.2022.100359"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11040602"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3302065"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM42981.2021.9488690"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2017.2765178"},{"key":"ref137","volume-title":"Kubernetes","author":"Found","year":"2025"},{"key":"ref138","volume-title":"Helm: The Package Manager for Kubernetes","year":"2025"},{"key":"ref139","volume-title":"Istio: Open Source Service Mesh for Cloud-Native Applications","year":"2025"},{"key":"ref140","volume-title":"Nephio: Cloud Native Network Automation","year":"2025"},{"key":"ref141","volume-title":"Dynamic Multipoint VPN (DMVPN)","year":"2025"},{"key":"ref142","volume-title":"Generic Routing Encapsulation (GRE)","author":"Task Force","year":"2000"},{"key":"ref143","volume-title":"Security Architecture for the Internet Protocol","author":"Kent","year":"4301"},{"key":"ref144","volume-title":"PostgreSQL: The World\u2019s Most Advanced Open Source Relational Database","author":"Group","year":"2025"},{"key":"ref145","volume-title":"OAUTH 2.0 Authorization Framework","author":"Group","year":"2025"},{"key":"ref146","volume-title":"Grafana: The Open and Composable Observability Platform","year":"2025"},{"key":"ref147","volume-title":"Influxdb: Time Series Data Platform","year":"2025"},{"key":"ref148","volume-title":"FastAPI: Modern, Fast (High-Performance) Web Framework for Building APIs With Python","author":"Ram\u00edrez","year":"2025"},{"key":"ref149","volume-title":"NetworkX: Python Package for the Creation, Manipulation, and Study of the Structure, Dynamics, and Functions of Complex Networks","year":"2025"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10820123\/11037413.pdf?arnumber=11037413","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T05:24:28Z","timestamp":1750829068000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11037413\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":149,"URL":"https:\/\/doi.org\/10.1109\/access.2025.3580176","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}