{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T15:16:59Z","timestamp":1772723819552,"version":"3.50.1"},"reference-count":158,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"FCT\/MCTES","award":["Centro-01-0145-FEDER-000019 - C4"],"award-info":[{"award-number":["Centro-01-0145-FEDER-000019 - C4"]}]},{"name":"FCT\/MCTES","award":["POCI-01-0145-FEDER-030657"],"award-info":[{"award-number":["POCI-01-0145-FEDER-030657"]}]},{"name":"FCT\/MCTES","award":["Project UIDB\/50008\/2020"],"award-info":[{"award-number":["Project UIDB\/50008\/2020"]}]},{"DOI":"10.13039\/501100002322","name":"Coordena??o de Aperfei?oamento de Pessoal de N?vel Superior","doi-asserted-by":"publisher","award":["Project 9090-13-4\/2013"],"award-info":[{"award-number":["Project 9090-13-4\/2013"]}],"id":[{"id":"10.13039\/501100002322","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2022]]},"DOI":"10.1109\/access.2022.3227073","type":"journal-article","created":{"date-parts":[[2022,12,7]],"date-time":"2022-12-07T03:07:25Z","timestamp":1670382445000},"page":"128433-128455","source":"Crossref","is-referenced-by-count":11,"title":["A Complete Review on the Application of Statistical Methods for Evaluating Internet Traffic Usage"],"prefix":"10.1109","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0986-3374","authenticated-orcid":false,"given":"Vanice Canuto","family":"Cunha","sequence":"first","affiliation":[{"name":"Instituto de Computa&#x00E7;&#x00E3;o (IC), Universidade Federal de Mato Grosso, Cuiab&#x00E1;, Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8057-6135","authenticated-orcid":false,"given":"Arturo Zavala","family":"Zavala","sequence":"additional","affiliation":[{"name":"Faculdade de Economia (FE), Universidade Federal de Mato Grosso, Cuiab&#x00E1;, Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2578-1803","authenticated-orcid":false,"given":"Damien","family":"Magoni","sequence":"additional","affiliation":[{"name":"LaBRI-CNRS, Universit&#x00E9; de Bordeaux, Talence, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8221-0666","authenticated-orcid":false,"given":"Pedro R. M.","family":"Inacio","sequence":"additional","affiliation":[{"name":"Instituto de Telecomunica&#x00E7;&#x00F5;es, Universidade da Beira Interior, Covilh&#x00E3;, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9017-5001","authenticated-orcid":false,"given":"Mario M.","family":"Freire","sequence":"additional","affiliation":[{"name":"Instituto de Telecomunica&#x00E7;&#x00F5;es, Universidade da Beira Interior, Covilh&#x00E3;, Portugal"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2020.105754"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2912896"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3280989"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.12.020"},{"key":"ref31","first-page":"65","article-title":"Survey of traffic classification using machine learning","volume":"4","author":"jamuna","year":"2013","journal-title":"Int J Adv Res Comput Sci"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2012.6135854"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102538"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.011.1900366"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.3390\/app9204396"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2812641"},{"key":"ref28","first-page":"318","article-title":"A survey of p2p traffic management approaches: Best practices and future directions","volume":"5","author":"dunaytsev","year":"2012","journal-title":"Internet Eng"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1951.10500769"},{"key":"ref29","first-page":"82","article-title":"Support vector machine&#x2014;A survey","volume":"2","author":"pradhan","year":"2012","journal-title":"Int J Emerg Technol Adv Eng"},{"key":"ref20","first-page":"1","article-title":"Parametric distance metric learning with label information","volume":"1450","author":"zhang","year":"2003","journal-title":"Proc IJCAI"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/S0016-0032(96)00063-4"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2783320"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1017\/S0266466608080341"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1967.1089532"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/SIBGRAPI.2014.36"},{"key":"ref26","first-page":"1501","article-title":"Analysis of spontaneous meg activity in mild cognitive impairment and alzheimer&#x2019;s disease using Jensen&#x2019;s divergence","author":"poza","year":"2014","journal-title":"Proc 36th Annu Int Conf IEEE Eng Med Biol Soc"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSN.2018.8488219"},{"key":"ref25","author":"dodge","year":"2006","journal-title":"The Oxford dictionary of statistical terms"},{"key":"ref50","first-page":"368","article-title":"A survey on recent traffic classification techniques using machine learning methods","volume":"3","author":"tamilkili","year":"2013","journal-title":"Int J Adv Res Comput Sci Softw Eng"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2478741"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1109\/NAS.2011.18"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2911156"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.4218\/etrij.2019-0190"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.316"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.3837\/tiis.2012.06.009"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1109\/LANMAN.2013.6528276"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2014.2320577"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.14257\/ijsia.2016.10.2.21"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34471-8_11"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2015.138"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.98"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2015.04.041"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0194889"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1038\/nmeth.4642"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/ICBDACI.2017.8070809"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2017.03.011"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2018.07.091"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/1198255.1198257"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-018-2263-3"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/CICN.2015.267"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2883147"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2021.02.009"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3444370.3444564"},{"key":"ref5","article-title":"A federated semi-supervised learning approach for network traffic classification","author":"peng","year":"2021","journal-title":"arXiv 2107 03933"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.100613.00161"},{"key":"ref49","year":"2014","journal-title":"2014 global Internet phenomena report"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36784-7_6"},{"key":"ref157","first-page":"52","article-title":"Analysis of NetFlow features&#x2019; importance in malicious network traffic detection","author":"campazas-vega","year":"2021","journal-title":"Proc Comput Intell Secur Inf Syst Conf"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2019.2893863"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICMTMA.2014.159"},{"key":"ref46","article-title":"Guidelines for performing systematic literature reviews in software engineering, version 2.3","author":"kitchenham","year":"2007"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/s12243-020-00770-7"},{"key":"ref48","first-page":"1","article-title":"The PRISMA 2020 statement: An updated guideline for reporting systematic reviews","volume":"10","author":"page","year":"2021","journal-title":"A Systematic Review"},{"key":"ref47","first-page":"790","article-title":"The PRISMA 2020 statement: An updated guideline for reporting systematic reviews","volume":"74","author":"yepes-nu\u00f1ez","year":"2021","journal-title":"Revista Espanola De Cardiologia"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2020.03.111"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/HOTICN.2018.8606038"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/EIT.2018.8500182"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-017-9611-1"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1155\/2016\/6180527"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2020.11.001"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1145\/3442520.3442529"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2019.2939371"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1016\/S0375-9601(03)00491-2"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2012.09.003"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1016\/j.jag.2018.11.002"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1016\/S0375-9601(03)00491-2"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2016.01.035"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1948.tb01338.x"},{"key":"ref76","author":"tan","year":"2019","journal-title":"Introduction to Data Mining"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-44041-1_77"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.3390\/e22020221"},{"key":"ref74","first-page":"183","article-title":"Recent statistical methods based on distances","volume":"2","author":"sol\u00e0","year":"2002","journal-title":"Contrib Sci"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.3389\/fevo.2019.00447"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1109\/ISWCS.2017.8108090"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1002\/nem.1962"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1109\/ComManTel.2015.7394298"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.3390\/e21050485"},{"key":"ref132","first-page":"102","article-title":"Improved SVM method for internet traffic classification based on feature weight learning","author":"hao","year":"2015","journal-title":"Proc Int Conf Control Autom Inf Sci (ICCAIS)"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1016\/S0019-9958(67)90610-9"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.4181"},{"key":"ref135","first-page":"168","article-title":"A new hybrid approach for network traffic classification using SVM and na&#x00EF;ve Bayes algorithm","volume":"6","author":"aggarwal","year":"2017","journal-title":"Int J Comput Sci Mobile Comput"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2949238"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-018-0999-x"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-015-1892-1"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2019.03.007"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2015.30"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2013.022713.120250"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.12928\/telkomnika.v14i4.3956"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/79.526899"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2019.02.003"},{"key":"ref65","author":"corder","year":"2014","journal-title":"A Step-By-Step Nonparametric Approach"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1007\/s11063-019-09994-8"},{"key":"ref66","first-page":"1347","article-title":"Parametric and nonparametric linkage analysis: A unified multipoint approach","volume":"58","author":"kruglyak","year":"1996","journal-title":"Amer J Hum Genet"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2018.10.060"},{"key":"ref67","author":"boslaugh","year":"2012","journal-title":"Statistics in a Nutshell a Desktop Quick Reference"},{"key":"ref143","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1007\/s12065-018-0167-z","article-title":"Performance evaluation of support vector machine and convolutional neural network algorithms in real-time vehicle type and color classification","volume":"13","author":"?enta?","year":"2020","journal-title":"Evol Intell"},{"key":"ref68","author":"glen","year":"2021","journal-title":"Correlation coefficient simple definition formula easy steps"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.114885"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2019.1800819"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1016\/j.ajodo.2016.08.009"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-7998-7705-9.ch047"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIS49240.2020.9257715"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/IranianMVIP.2015.7397494"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2005.11.053"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1145\/2462326.2462337"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.3390\/e13061055"},{"key":"ref107","first-page":"1","article-title":"The reasonable effectiveness of data in ATM","author":"zanin","year":"2013","journal-title":"Proc SESAR Innov Days"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1038\/nature12176"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/ITNEC.2019.8729208"},{"key":"ref92","first-page":"1385","article-title":"A Kullback&#x2013;Leibler divergence based kernel for SVM classification in multimedia applications","author":"moreno","year":"2003","journal-title":"Proc Adv Neural Inf Process Syst (NIPS)"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2017.01.016"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.17713\/ajs.v48i5.772"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/ACCT.2015.54"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.3390\/axioms6020008"},{"key":"ref103","article-title":"ITCM: A real time internet traffic classifier monitor","author":"pereira","year":"2015","journal-title":"arXiv 1501 01321"},{"key":"ref102","first-page":"1","article-title":"Robust statistics-based support vector machine and its variants: A survey","volume":"32","author":"singla","year":"2019","journal-title":"Neural Comput Appl"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/6431519"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/ICACSIS.2017.8355071"},{"key":"ref110","first-page":"137","article-title":"Distributed-graph-based statistical approach for intrusion detection in cyber-physical systems","volume":"4","author":"sadreazami","year":"2017","journal-title":"IEEE Trans Signal Inf Process Netw"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1142\/9789813271234_0006"},{"key":"ref99","author":"su\u00e1rez","year":"2016","journal-title":"Tutorial sobre M&#x00E1;quinas de Vectores Soporte (SVM)"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.01.006"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1007\/BF00994018"},{"key":"ref10","first-page":"24","article-title":"A survey of network based traffic classification methods","volume":"7","author":"mehta","year":"2017","journal-title":"Database Syst"},{"key":"ref11","first-page":"1","author":"cotton","year":"2011","journal-title":"Internet Assigned Numbers Authority (IANA) Procedures for the Management of the Service Name and Transport Protocol Port Number Registry"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.04.004"},{"key":"ref13","year":"2008","journal-title":"WAN and Application Optimization Solution Guide Cisco Validated Design"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2014.11.001"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-019-04030-2"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2758754"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2480741.2480747"},{"key":"ref82","doi-asserted-by":"crossref","first-page":"5609","DOI":"10.1007\/s11042-017-4476-5","article-title":"Adaptive, robust and blind digital watermarking using Bhattacharyya distance and bit manipulation","volume":"77","author":"vaidya","year":"2018","journal-title":"Multimedia Tools Appl"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2015.7351412"},{"key":"ref17","first-page":"1","article-title":"A survey of machine learning based packet classification","author":"liu","year":"2009","journal-title":"Proc Symp Comput Intell Secur Defence Appl (CISDA)"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2336610"},{"key":"ref18","first-page":"43","article-title":"Analysis of parametric & non parametric classifiers for classification technique using weka","volume":"4","author":"sahoo","year":"2012","journal-title":"Int J Inf Technol Comput Sci"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1016\/j.jmva.2012.01.007"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/CSNT.2017.8418525"},{"key":"ref19","first-page":"1","article-title":"Parameter selection in SVM with RBF kernel function","author":"han","year":"2012","journal-title":"Proc World Automat Congr"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1140\/epjd\/e2005-00005-1"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2019.2957924"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/RADAR.2017.7944381"},{"key":"ref116","first-page":"373","article-title":"Application of artificial intelligence on classification of attacks in IP telephony","volume":"2","author":"safarik","year":"2014","journal-title":"Adv Inf Sci Appl"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1016\/j.ymssp.2018.08.017"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2014.141122"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.10.018"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1016\/j.ymssp.2017.01.045"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/5527076"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1145\/3229543.3229548"},{"key":"ref123","first-page":"303","article-title":"Advance DDoS detection and mitigation technique for securing cloud","volume":"16","author":"zareapoor","year":"2018","journal-title":"Int J Comput Sci Eng"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-018-1314-z"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2012.05.028"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-011-0222-1"},{"key":"ref88","author":"cover","year":"2006","journal-title":"Elements of Information Theory"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9668973\/09970716.pdf?arnumber=9970716","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,9]],"date-time":"2023-01-09T21:27:14Z","timestamp":1673299634000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9970716\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"references-count":158,"URL":"https:\/\/doi.org\/10.1109\/access.2022.3227073","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]}}}