{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T21:36:40Z","timestamp":1775079400456,"version":"3.50.1"},"reference-count":166,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:00:00Z","timestamp":1654041600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:00:00Z","timestamp":1654041600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:00:00Z","timestamp":1654041600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100004735","name":"Natural Science Foundation of Hunan Province, China","doi-asserted-by":"publisher","award":["2021JJ30735"],"award-info":[{"award-number":["2021JJ30735"]}],"id":[{"id":"10.13039\/501100004735","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100010083","name":"Hunan Provincial Innovation Foundation for Postgraduate","doi-asserted-by":"publisher","award":["QL20210206"],"award-info":[{"award-number":["QL20210206"]}],"id":[{"id":"10.13039\/501100010083","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072056"],"award-info":[{"award-number":["62072056"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Serv. Manage."],"published-print":{"date-parts":[[2022,6]]},"DOI":"10.1109\/tnsm.2021.3122147","type":"journal-article","created":{"date-parts":[[2021,10,25]],"date-time":"2021-10-25T19:44:22Z","timestamp":1635191062000},"page":"1159-1175","source":"Crossref","is-referenced-by-count":89,"title":["Blockchain on Security and Forensics Management in Edge Computing for IoT: A Comprehensive Survey"],"prefix":"10.1109","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0151-7963","authenticated-orcid":false,"given":"Zhuofan","family":"Liao","sequence":"first","affiliation":[{"name":"Department of Computer and Communication Engineering, Changsha University of Science and Technology, Changsha, China"}]},{"given":"Xiang","family":"Pang","sequence":"additional","affiliation":[{"name":"Department of Computer and Communication Engineering, Changsha University of Science and Technology, Changsha, China"}]},{"given":"Jingyu","family":"Zhang","sequence":"additional","affiliation":[{"name":"Department of Computer and Communication Engineering, Changsha University of Science and Technology, Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3006-7295","authenticated-orcid":false,"given":"Bing","family":"Xiong","sequence":"additional","affiliation":[{"name":"Department of Computer and Communication Engineering, Changsha University of Science and Technology, Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5473-8738","authenticated-orcid":false,"given":"Jin","family":"Wang","sequence":"additional","affiliation":[{"name":"Department of Computer and Communication Engineering, Changsha University of Science and Technology, Changsha, China"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.05.046"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/I4CT.2014.6914202"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(11)70024-1"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2010.03.002"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1701095"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3017742"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04155-6_2"},{"key":"ref36","first-page":"257","article-title":"The advanced data acquisition model (ADAM): A process model for digital forensic practice","volume":"8","author":"adams","year":"2012","journal-title":"Journal of Digital Forensics Security and Law"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(03)00405-X"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/IoTDI.2018.00023"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-016-0456-1"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.11.026"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.5815\/ijisa.2018.06.05"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2020.2966970"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.1600492CM"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2020.2999721"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1504\/IJWGS.2018.095647"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-95037-2_5"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2020.3013892"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2924045"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2019.2956519"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2886932"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.3390\/s20092464"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354203"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-018-9611-3"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-658-19287-7_11"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1016\/j.fsidi.2019.200895"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1109\/DASC\/PiCom\/CBDCom\/CyberSciTech.2019.00070"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2946978"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1109\/Cybermatics_2018.2018.00210"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1109\/I2MTC.2018.8409668"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1145\/3219788.3219792"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2019.2927431"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2016.1600051NM"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1109\/ICIOT.2018.00012"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM42002.2020.9348271"},{"key":"ref58","author":"nakamoto","year":"2008","journal-title":"Bitcoin A Peer-to-Peer Electronic Cash System (Presentation)"},{"key":"ref57","first-page":"77","volume":"20","author":"noveck","year":"2011","journal-title":"Single Point of Failure"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/3368235.3368876"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45748-8_24"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2344013"},{"key":"ref53","first-page":"3","article-title":"The double auction market institution: A survey","volume":"14","author":"friedman","year":"1993","journal-title":"The Double Auction Market Institutions Theories and Evidence"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2020.2963840"},{"key":"ref40","first-page":"2","article-title":"Blockchain in IoT security: A survey","author":"alkurdi","year":"2019","journal-title":"Proc 28th Int Telecommun Netw Appl Conf (ITNAC)"},{"key":"ref166","article-title":"LiteZKP: Lightening zero-knowledge proof-based blockchains for IoT and edge platforms","author":"boo","year":"2021","journal-title":"IEEE Syst J"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1109\/ICC40277.2020.9149366"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2964751"},{"key":"ref163","article-title":"Data trusts: Ethics, architecture and governance for trustworthy data stewardship","author":"o\u2019hara","year":"2019"},{"key":"ref162","article-title":"Privacy threat and defense for federated learning with non-IID data in AIoT","author":"xiong","year":"2021","journal-title":"IEEE Trans Ind Informat"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2019.8888037"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1145\/3170521.3170527"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2020.2998791"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2993601"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3036168"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2899617"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1109\/ICTC.2018.8539664"},{"key":"ref8","year":"2019","journal-title":"The Mobile Economy 2020"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3033298"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2018.2824903"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.12720\/jait.10.2.41-47"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2020.2997008"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM42002.2020.9322481"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2579198"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/NETSOFT.2019.8806675"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3015432"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2750180"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2962586"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.11.022"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2812239"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.07.060"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2018.8422547"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3003700"},{"key":"ref125","article-title":"CREAT: Blockchain-assisted compression algorithm of federated learning for content caching in edge computing","author":"cui","year":"2020","journal-title":"IEEE Internet of Things Journal"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2951007"},{"key":"ref73","first-page":"1","article-title":"Blockchain-based systems and applications: A survey","volume":"21","author":"zhang","year":"2020","journal-title":"J Internet Technol"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2922538"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2960526"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/IEMCON.2019.8936242"},{"key":"ref128","author":"ramachandran","year":"2017","journal-title":"Using blockchain and smart contracts for secure data provenance management"},{"key":"ref70","article-title":"Blockchain consensus protocols in the wild","author":"cachin","year":"2017","journal-title":"arXiv 1707 01873"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1007\/BF02351717"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2961707"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46766-1_35"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/DSC.2019.00100"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2017.10.006"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2018.8328748"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1145\/3309074.3309075"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1109\/ICCW.2018.8403711"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48184-2_32"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.2478\/fcds-2019-0018"},{"key":"ref79","author":"szabo","year":"2018","journal-title":"The idea of smart contracts nick szabo&#x2019;s papers and concise tutorials"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2018.8406875"},{"key":"ref135","first-page":"21","article-title":"Forensic-chain: Ethereum blockchain based digital forensics chain of custody","volume":"1","author":"lone","year":"2017","journal-title":"Sci Pract Cyber Security J"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-019-02779-9"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2930345"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48071-4_10"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.04.011"},{"key":"ref62","year":"0","journal-title":"Delegated Proof-of-Stake (DPOS)"},{"key":"ref61","first-page":"1","author":"wood","year":"2014","journal-title":"Ethereum A Secure Decentralised Generalised Transaction Ledger"},{"key":"ref63","author":"barinov","year":"2018","journal-title":"POA Network White Paper"},{"key":"ref64","first-page":"173","article-title":"Practical Byzantine fault tolerance Miguel","author":"castro","year":"1999","journal-title":"Proc OSDI"},{"key":"ref140","first-page":"2372","article-title":"BIFF: A blockchain-based IoT forensics framework with identity privacy","author":"le","year":"2019","journal-title":"Proc IEEE Region 10 Annu Conf TENCON"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS47363.2019.00023"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1800137"},{"key":"ref66","author":"lerner","year":"2015","journal-title":"DagCoin draft"},{"key":"ref142","author":"oham","year":"2018","journal-title":"A Blockchain Based Liability Attribution Framework for Autonomous Vehicles"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-91458-9_41"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2020.2970113"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2018.2871449"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2969565"},{"key":"ref2","first-page":"3100","article-title":"Blockchain evolution: From bitcoin to forensic in smart grids","author":"kotsiuba","year":"2019","journal-title":"Proc IEEE Int Conf Big Data"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.2963906"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1109\/Blockchain.2019.00012"},{"key":"ref1","article-title":"Enterprise Networks&#x2014;2021 Global Networking Trends Report: Business Resilience Special Edition.","year":"0"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS47924.2020.00074"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2020.3003454"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2977196"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2018.1700344"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3002969"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2951619"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2903342"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1700041"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.1800526"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2958077"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2020.2995371"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2944400"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2987843"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3015772"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8761791"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0531(92)90091-U"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.3390\/computers8030058"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2616861"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2878154"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.02.002"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2904303"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.02.001"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2805263"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.1203"},{"key":"ref13","first-page":"271","volume":"39","author":"cook","year":"2018","journal-title":"Internet of Cloud Security and Privacy Issues"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600363CM"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2745201"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2980298"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICC40277.2020.9149217"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2989392"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3007869"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2767608"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2969706"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/IEEE.EDGE.2017.32"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2016.101"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.2973651"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/IOTM.2019.1800024"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/ICICICT46008.2019.8993124"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC49053.2021.9417421"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1145\/357172.357176"},{"key":"ref116","article-title":"Blockchain security: A survey of techniques and research directions","author":"leng","year":"2020","journal-title":"IEEE Trans Services Comput"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2847705"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.3390\/fi11050117"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2894944"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2960027"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2875542"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3021457"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1177\/1550147719844159"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2975911"},{"key":"ref86","article-title":"BCPPA: A blockchain-based conditional privacy-preserving authentication protocol for vehicular ad hoc networks","author":"lin","year":"2020","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-95450-9_8"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2020.2964537"}],"container-title":["IEEE Transactions on Network and Service Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4275028\/9792219\/09585025.pdf?arnumber=9585025","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T20:31:32Z","timestamp":1656361892000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9585025\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6]]},"references-count":166,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tnsm.2021.3122147","relation":{},"ISSN":["1932-4537","2373-7379"],"issn-type":[{"value":"1932-4537","type":"electronic"},{"value":"2373-7379","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,6]]}}}