{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T14:47:51Z","timestamp":1774018071263,"version":"3.50.1"},"reference-count":164,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"SICI SICRG Grant through the Project Artificial Intelligence Enabled Security Provisioning and Vehicular Vision Innovations for Autonomous Vehicles"},{"DOI":"10.13039\/501100000038","name":"Government of Canada\u2019s National Crime Prevention Strategy and Natural Sciences and Engineering Research Council of Canada (NSERC) CREATE Program for Building Trust in Connected and Autonomous Vehicles","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Commun. Surv. Tutorials"],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/comst.2021.3097916","type":"journal-article","created":{"date-parts":[[2021,8,24]],"date-time":"2021-08-24T21:47:48Z","timestamp":1629841668000},"page":"2802-2832","source":"Crossref","is-referenced-by-count":232,"title":["Fast, Reliable, and Secure Drone Communication: A Comprehensive Survey"],"prefix":"10.1109","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3199-8753","authenticated-orcid":false,"given":"Vikas","family":"Hassija","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6730-3060","authenticated-orcid":false,"given":"Vinay","family":"Chamola","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3092-5982","authenticated-orcid":false,"given":"Adhar","family":"Agrawal","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6283-1112","authenticated-orcid":false,"given":"Adit","family":"Goyal","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4299-3456","authenticated-orcid":false,"given":"Nguyen Cong","family":"Luong","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7442-7416","authenticated-orcid":false,"given":"Dusit","family":"Niyato","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1006-7594","authenticated-orcid":false,"given":"Fei Richard","family":"Yu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8972-8094","authenticated-orcid":false,"given":"Mohsen","family":"Guizani","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"crossref","first-page":"138669","DOI":"10.1109\/ACCESS.2019.2942944","article-title":"Machine learning-based drone detection and classification: State-of-the-art in research","volume":"7","author":"taha","year":"2019","journal-title":"IEEE Access"},{"key":"ref38","author":"rer nat","year":"2020","journal-title":"Detection of Small Drones With Millimeter Wave Radar"},{"key":"ref33","year":"2020","journal-title":"Man-in-the-Middle Attack&#x2014;Wikipedia the Free Encyclopedia"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2016.7502939"},{"key":"ref31","author":"kamkar","year":"2019","journal-title":"Skyjack"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/UVS.2019.8658279"},{"key":"ref37","year":"2019","journal-title":"IranU S RQ-170 Incident"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/GWS.2018.8686727"},{"key":"ref35","author":"pauli","year":"2020","journal-title":"Hacker Reveals 40 Attack That Steals Police Drones From 2km Away"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2019.2953740"},{"key":"ref28","first-page":"127","article-title":"The impact of DoS attacks on the AR.DRONE 2.0","author":"miani","year":"2016","journal-title":"Proc 13th Latin Amer Robot Symp 4th Brazil Robot Symp (LARS\/SBR)"},{"key":"ref27","first-page":"1222","article-title":"A container-based DoS attack-resilient control framework for real-time UAV systems","author":"chen","year":"2018","journal-title":"Proc Design Autom Test Eur Conf Exhibition (DATE)"},{"key":"ref29","author":"bellardo","year":"2020","journal-title":"802 11 Denial-of-service Attacks Real Vulnerabilities and Practical Solutions"},{"key":"ref20","author":"bartels","year":"2019","journal-title":"Drone Scare Near Vegas Strip Prompts FAA Investigation Into Likely Safety Violations"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/SECONWorkshops50264.2020.9149780"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2919613"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2016.7577060"},{"key":"ref23","author":"dukowitz","year":"2019","journal-title":"Drone Controllers A Look at How They Work Important Terminology and Why They&#x2019;re Unique in the RC Aircraft World"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.03.007"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxx002"},{"key":"ref25","year":"2020","journal-title":"How Safe Is Surfing on 4G vs WiFi?"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.3390\/s18051469"},{"key":"ref50","year":"2019","journal-title":"Countries That Are Dependent on Agriculture and Natural Food"},{"key":"ref51","author":"pepitone","year":"2019","journal-title":"Global Drones Market by Type"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1700452"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2017.2680898"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1145\/242896.242897"},{"key":"ref155","author":"choudhary","year":"2018","journal-title":"Internet of drones (iod) Threats vulnerability and security perspectives"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700916"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.3390\/jsan8010016"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2018.10.125"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2018.12.007"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1109\/SECURWARE.2009.20"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1109\/ICTC.2016.7763512"},{"key":"ref149","year":"2020","journal-title":"Shamir&#x2019;s Secret Sharing&#x2014;Wikipedia The Free Encyclopedia"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.3390\/s19235170"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2887086"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/ICUAS.2019.8797834"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2924045"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2992341"},{"key":"ref54","author":"turner","year":"2020","journal-title":"Frameworks for Approaching the Machine Learning Process"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2020.100218"},{"key":"ref52","year":"2019","journal-title":"Amazon Makes First Drone Delivery"},{"key":"ref40","author":"beyerer","year":"2020","journal-title":"Defense Against Drones&#x2014;The Danger on The Radar Screen"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2018.2880874"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8761932"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1007\/s10915-016-0318-2"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1109\/FMEC.2017.7946406"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.2982172"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2905347"},{"key":"ref3","year":"2019","journal-title":"History of Unmanned Aerial Vehicles"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2018.2879940"},{"key":"ref5","article-title":"Disaster and pandemic management using machine learning: A survey","author":"chamola","year":"2020","journal-title":"IEEE Internet of Things Journal"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIT.2008.179"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.3020605"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/s40789-019-00264-5"},{"key":"ref7","first-page":"169","author":"siddappaji","year":"2020","journal-title":"Role of Cyber Security in Drone Technology"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2017.37"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2002.1046644"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.2976960"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ICTC46691.2019.8939885"},{"key":"ref45","author":"mccarthy","year":"2020","journal-title":"HK$1 million in damage caused by GPS jamming that caused 46 drones to plummet during Hong Kong show"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/DASC43569.2019.9081613"},{"key":"ref47","year":"2020","journal-title":"Wormhole attack"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/CITS.2019.8862148"},{"key":"ref41","year":"2019","journal-title":"Radio Jamming"},{"key":"ref44","doi-asserted-by":"crossref","first-page":"3133","DOI":"10.1109\/COMST.2019.2916583","article-title":"Applications of deep reinforcement learning in communications and networking: A survey","volume":"21","author":"nguyen","year":"2019","journal-title":"IEEE Commun Surveys Tuts"},{"key":"ref43","author":"nott","year":"2020","journal-title":"Drone Hacking Tool Launches in Australia"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1109\/MLSP.2015.7324337"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2002.806626"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1109\/IRC.2019.00103"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1109\/SAS.2018.8336719"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/NAS.2010.41"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1145\/2517968.2517976"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1109\/AVSS.2017.8078539"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.3390\/s19224862"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2019.8766732"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.2968494"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2018.2883629"},{"key":"ref130","author":"challita","year":"2018","journal-title":"Artificial intelligence for wireless connectivity and security of cellular-connected uavs"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/SOLI.2018.8476785"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2020.100249"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2922039"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0225092"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.23919\/EUSIPCO.2017.8081531"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1109\/ICCUBEA.2018.8697702"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1145\/3274895.3274914"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1109\/SAMI.2019.8782758"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/ICUAS.2018.8453307"},{"key":"ref136","first-page":"1912","article-title":"Predicting application layer DDoS attacks using machine learning algorithms","volume":"8","author":"umarani","year":"2015","journal-title":"World Acad Sci Eng Technol Int J Comput Elect Autom Control Inf Eng"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2007.206"},{"key":"ref138","first-page":"40","article-title":"Feature selection using a multilayer perceptron","volume":"2","author":"ruck","year":"1990","journal-title":"J Neural Netw Comput"},{"key":"ref137","first-page":"18","article-title":"Classification and regression by RandomForest","volume":"2","author":"liaw","year":"2002","journal-title":"R News"},{"key":"ref60","author":"waheed","year":"2020","journal-title":"1 Security and Privacy in IoT Using Machine Learning and Blockchain Threats and Countermeasures"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2017.2681698"},{"key":"ref62","author":"stroud","year":"2019","journal-title":"Fog computing"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-30619-9_10"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/7497924"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2017.8170858"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1109\/AERO.2019.8741970"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1700456"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.75"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2019.2935576"},{"key":"ref142","author":"meidan","year":"2017","journal-title":"Detection of Unauthorized IoT Devices Using Machine Learning Techiniques"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2964073"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2819189"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1002\/spe.2786"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.3390\/rs11182144"},{"key":"ref2","author":"crilly","year":"2019","journal-title":"Drones First Used in 1848"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.2967052"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1109\/MFI.2016.7849521"},{"key":"ref1","year":"2019","journal-title":"Global Drones Market by Type (VTOL\/Rotary Fixed Wing etc) by Segment (Consumer Commercial & Military) by Application (Aerial Photography Agriculture Industrial Inspection etc) by Payload by Region Competition Forecast & Opportunities 2023"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2007.914506"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2930774"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1016\/0169-7552(89)90019-6"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/JCN.2019.000050"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2779180"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/SMC.2017.8123011"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.05.099"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2019.8766440"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2831284"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8761372"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1145\/1851182.1851214"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2019.09.021"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/JLT.2015.2388585"},{"key":"ref102","first-page":"1","author":"puri","year":"2005","journal-title":"A Survey of Unmanned Aerial Vehicles (UAV) for Traffic Surveillance"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1145\/75247.75248"},{"key":"ref112","first-page":"309","article-title":"A feasible method to combat against DDoS attack in SDN network","author":"dao","year":"2015","journal-title":"Proc Int Conf Inf Netw (ICOIN)"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1145\/1402946.1402981"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2019.1800722"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-013-1025-z"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2018.11.010"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/RED-UAS.2017.8101648"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2018.8422374"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2016.2627552"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2495297"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3001836"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2560343"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2902862"},{"key":"ref118","first-page":"1","article-title":"CloudWatcher: Network security monitoring using openflow in dynamic cloud networks (or: How to provide security monitoring as a service in clouds?)","author":"shin","year":"2012","journal-title":"Proc 20th IEEE Int Conf Netw Protocols (ICNP)"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700666"},{"key":"ref82","year":"2020","journal-title":"Memory Bound Function"},{"key":"ref117","first-page":"169","article-title":"An SDN-based secure mobility model for UAV-ground communications","author":"kumar","year":"2017","journal-title":"Proc Int Symp Mobile Internet Security"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2906228"},{"key":"ref81","author":"laukien","year":"2020","journal-title":"Exponential Memory"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2934998"},{"key":"ref84","year":"2020","journal-title":"Fly SafeGEO Zone Map"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.3390\/a12120248"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-018-1193-x"},{"key":"ref83","year":"2020","journal-title":"Geo-Fence&#x2014;Wikipedia the Free Encyclopedia"},{"key":"ref114","author":"bhandari","year":"1999","journal-title":"Survivable Networks Algorithms for Diverse Routing"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-019-01991-y"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2018.8599848"},{"key":"ref80","first-page":"1","article-title":"Efficient memory-bounded search methods","author":"russell","year":"1992","journal-title":"Proc 10th Eur Conf Artif Intell"},{"key":"ref115","article-title":"Software-driven and virtualized architectures for scalable 5G networks","author":"moradi","year":"2018"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486022"},{"key":"ref89","author":"siriwardena","year":"2020","journal-title":"The Mystery Behind Block Time"},{"key":"ref121","year":"2020","journal-title":"Machine Learning&#x2014;Wikipedia the Free Encyclopedia"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM38437.2019.9013238"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/ICC40277.2020.9148776"},{"key":"ref85","year":"2020","journal-title":"Flying Near Airports"},{"key":"ref86","author":"baird","year":"2020","journal-title":"Hedera A Governing Council & Public Hashgraph Network"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1700390"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/SP.1980.10006"}],"container-title":["IEEE Communications Surveys &amp; Tutorials"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9739\/9621320\/09488323.pdf?arnumber=9488323","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T14:52:25Z","timestamp":1652194345000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9488323\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":164,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/comst.2021.3097916","relation":{},"ISSN":["1553-877X","2373-745X"],"issn-type":[{"value":"1553-877X","type":"electronic"},{"value":"2373-745X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]}}}