{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T19:38:27Z","timestamp":1770233907568,"version":"3.49.0"},"reference-count":120,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2023,5,16]],"date-time":"2023-05-16T00:00:00Z","timestamp":1684195200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Taif University, Taif, Saudi Arabia","award":["TURSP-2020\/228"],"award-info":[{"award-number":["TURSP-2020\/228"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Sen. Netw."],"published-print":{"date-parts":[[2023,8,31]]},"abstract":"<jats:p>The number of affirmed COVID-19 cases showed an enormous increase in the recent past throughout the globe. Keeping in view the catastrophic destruction of this devastating virus, there is a must-need situation to maximize the use of existing healthcare technologies such as the healthcare Internet of Things (H-IoT). In healthcare, patient wearable devices are widely recognized as a dormant technology with enormous capabilities to assess and combat various diseases, e.g., cough, seizure, temperature, heartbeat, and so on. As we know, in the H-IoT, patient-wearable devices are dispersed in an infrastructure-free environment that exposes them to several private and public coercion while accumulating and transmitting high sensitive data over the wireless communication channel. Therefore, security is the main concern of these applications, and thus, the primary focus of this article to outline the limitations and challenges in the present literature from 2019 to 2021, to identify the requirements of H-IoT applications used in the context of COVID-19. Following this, we will move one step ahead to explore the current security techniques adopted in these applications. Consequently, we will identify the network architectural, cryptographic, protocols, and operational security challenges during our study to recommend viable research directions and opportunities, which could be helpful and capable to minimize the network architecture, deployment, and maintenance cost with more productive outcomes.<\/jats:p>","DOI":"10.1145\/3558519","type":"journal-article","created":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T12:01:08Z","timestamp":1680350468000},"page":"1-25","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":18,"title":["COVID-19: Secure Healthcare Internet of Things Networks, Current Trends and Challenges with Future Research Directions"],"prefix":"10.1145","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4494-8576","authenticated-orcid":false,"given":"Muhammad","family":"Adil","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering University at Buffalo, Buffalo, New York, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0589-7924","authenticated-orcid":false,"given":"Jehad","family":"Ali","sequence":"additional","affiliation":[{"name":"Department of AI Convergence Network, Ajou University Sejong University, Suwon, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8242-4581","authenticated-orcid":false,"given":"Muhammad Mohsin","family":"Jadoon","sequence":"additional","affiliation":[{"name":"Sino-Pak center of Artificial Intelligence PAF-IAST, Haripur, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7747-4701","authenticated-orcid":false,"given":"Sattam Rabia","family":"Alotaibi","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering Taif University, Taif, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3020-3947","authenticated-orcid":false,"given":"Neeraj","family":"Kumar","sequence":"additional","affiliation":[{"name":"Thapar University, Patiala Punjab, Department of Electrical and Computer Engineering, Lebanese American University, Beirut, Lebanon, Faculty of Computing and IT, King Abdulaziz University, Jeddah, Saudi Arabia, School of Computer Science, University of Petroleum and Energy Studies, Dehradun, Uttarakhand"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8702-7342","authenticated-orcid":false,"given":"Ahmed","family":"Farouk","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Faculty of Computers and Artificial Intelligence South Valley University, Hurghada, Egypt"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2631-9223","authenticated-orcid":false,"given":"Houbing","family":"Song","sequence":"additional","affiliation":[{"name":"Department of Information Systems, University of Maryland, Baltimore County, Baltimore, MD, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,5,16]]},"reference":[{"issue":"10","key":"e_1_3_1_2_2","first-page":"3432","article-title":"Applicability of blockchain towards mitigation of distributed denial of service attack in IoT","volume":"7","author":"Abadar Khaled","year":"2021","unstructured":"Khaled Abadar, Mrutyunjaya Kumar Beuria, Prashant Kumar Sharma, Jitendra Dangra, and Chittaranjan Bulla. 2021. Applicability of blockchain towards mitigation of distributed denial of service attack in IoT. Eur. J. Molec. Clinic. Med. 7, 10 (2021), 3432\u20133442.","journal-title":"Eur. J. Molec. Clinic. Med."},{"key":"e_1_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.3390\/s20082311"},{"key":"e_1_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2988564"},{"key":"e_1_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1080\/09540091.2020.1823484"},{"key":"e_1_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2803759"},{"key":"e_1_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1619"},{"key":"e_1_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/ATNAC.2016.7878739"},{"key":"e_1_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2017.1600215"},{"key":"e_1_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2021.102873"},{"key":"e_1_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3002769"},{"key":"e_1_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.23919\/ICACT.2018.8323850"},{"key":"e_1_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.03.011"},{"key":"e_1_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102886"},{"key":"e_1_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-8339-6_3"},{"key":"e_1_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2020.103301"},{"key":"e_1_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/CCCI51479.2021.9376383"},{"key":"e_1_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-019-00480-7"},{"key":"e_1_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-8423-3_20"},{"key":"e_1_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3051946"},{"key":"e_1_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2017.02.013"},{"key":"e_1_3_1_22_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-021-01780-9"},{"key":"e_1_3_1_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3054737"},{"key":"e_1_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3078823"},{"key":"e_1_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2015.7140369"},{"key":"e_1_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-019-01477-5"},{"key":"e_1_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/IOTM.0000.0000000"},{"key":"e_1_3_1_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICERECT.2015.7411184"},{"key":"e_1_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.promfg.2019.02.142"},{"key":"e_1_3_1_30_2","doi-asserted-by":"publisher","DOI":"10.1007\/s40860-018-0066-y"},{"key":"e_1_3_1_31_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2922781"},{"key":"e_1_3_1_32_2","doi-asserted-by":"publisher","DOI":"10.1109\/CSNET.2018.8588428"},{"issue":"9","key":"e_1_3_1_33_2","article-title":"Internet of Things security: Layered classification of attacks and possible countermeasures","author":"Mouaatamid Omar El","year":"2016","unstructured":"Omar El Mouaatamid, Moulay Lahmer, and Mohamed Belkasmi. 2016. Internet of Things security: Layered classification of attacks and possible countermeasures. Electron. J. Inf. Technol.9 (2016).","journal-title":"Electron. J. Inf. Technol."},{"key":"e_1_3_1_34_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3086381"},{"key":"e_1_3_1_35_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3072505"},{"key":"e_1_3_1_36_2","doi-asserted-by":"publisher","DOI":"10.3390\/smartcities2020012"},{"key":"e_1_3_1_37_2","article-title":"Blockchain technologies for the Internet of Things: Research issues and challenges","author":"Ferrag Mohamed Amine","year":"2018","unstructured":"Mohamed Amine Ferrag, Makhlouf Derdour, Mithun Mukherjee, Abdelouahid Derhab, Leandros Maglaras, and Helge Janicke. 2018. Blockchain technologies for the Internet of Things: Research issues and challenges. arXiv e-prints (2018). arXiv:arXiv-1806https:\/\/arxiv.org\/abs\/1806.","journal-title":"arXiv e-prints"},{"key":"e_1_3_1_38_2","doi-asserted-by":"publisher","DOI":"10.1109\/JAS.2021.1004138"},{"key":"e_1_3_1_39_2","doi-asserted-by":"publisher","DOI":"10.3346\/jkms.2021.36.e98"},{"key":"e_1_3_1_40_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107333"},{"key":"e_1_3_1_41_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107333"},{"key":"e_1_3_1_42_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2869554"},{"key":"e_1_3_1_43_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2021.102798"},{"key":"e_1_3_1_44_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICECA49639.2020.9358143"},{"key":"e_1_3_1_45_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICICICT.2019.8889789"},{"key":"e_1_3_1_46_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2020.100342"},{"key":"e_1_3_1_47_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.04.006"},{"key":"e_1_3_1_48_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-05051-0"},{"key":"e_1_3_1_49_2","doi-asserted-by":"publisher","DOI":"10.33969\/AIS.2019.01009"},{"key":"e_1_3_1_50_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2972238"},{"key":"e_1_3_1_51_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3011191"},{"key":"e_1_3_1_52_2","doi-asserted-by":"publisher","DOI":"10.1109\/TGCN.2021.3077318"},{"key":"e_1_3_1_53_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jobcr.2021.02.006"},{"key":"e_1_3_1_54_2","doi-asserted-by":"publisher","DOI":"10.1109\/MACS46928.2019.9020785"},{"key":"e_1_3_1_55_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICC42927.2021.9500868"},{"key":"e_1_3_1_56_2","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10070790"},{"key":"e_1_3_1_57_2","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMWKSHPS50562.2020.9163087"},{"key":"e_1_3_1_58_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3070965"},{"key":"e_1_3_1_59_2","doi-asserted-by":"publisher","DOI":"10.2196\/20477"},{"key":"e_1_3_1_60_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2739818"},{"key":"e_1_3_1_61_2","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2016.723"},{"key":"e_1_3_1_62_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-47617-9_2"},{"key":"e_1_3_1_63_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3057228"},{"key":"e_1_3_1_64_2","doi-asserted-by":"publisher","DOI":"10.1049\/trit.2019.1002"},{"key":"e_1_3_1_65_2","doi-asserted-by":"publisher","DOI":"10.1109\/CCWC51732.2021.9374306"},{"key":"e_1_3_1_66_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.09.016"},{"key":"e_1_3_1_67_2","doi-asserted-by":"publisher","DOI":"10.3390\/s19091978"},{"key":"e_1_3_1_68_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2994076"},{"key":"e_1_3_1_69_2","doi-asserted-by":"publisher","DOI":"10.1109\/I2CT.2018.8466955"},{"key":"e_1_3_1_70_2","doi-asserted-by":"publisher","DOI":"10.3390\/s20133625"},{"key":"e_1_3_1_71_2","doi-asserted-by":"publisher","DOI":"10.1007\/s41666-020-00093-6"},{"key":"e_1_3_1_72_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-7456-1_1"},{"key":"e_1_3_1_73_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3033847"},{"key":"e_1_3_1_74_2","doi-asserted-by":"publisher","DOI":"10.1109\/VTCFall.2019.8891338"},{"key":"e_1_3_1_75_2","doi-asserted-by":"publisher","DOI":"10.23919\/TMA.2019.8784633"},{"key":"e_1_3_1_76_2","doi-asserted-by":"publisher","DOI":"10.3390\/s18061691"},{"key":"e_1_3_1_77_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCMC51554.2021.9422088"},{"key":"e_1_3_1_78_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-3891-4_15"},{"key":"e_1_3_1_79_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2999699"},{"key":"e_1_3_1_80_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3000003"},{"key":"e_1_3_1_81_2","doi-asserted-by":"publisher","DOI":"10.1002\/itl2.247"},{"key":"e_1_3_1_82_2","doi-asserted-by":"publisher","DOI":"10.1109\/FiCloud.2017.25"},{"key":"e_1_3_1_83_2","article-title":"Digitalization of COVID-19 pandemic management and cyber risk from connected systems","author":"Radanliev Petar","year":"2020","unstructured":"Petar Radanliev, David De Roure, and Max Van Kleek. 2020. Digitalization of COVID-19 pandemic management and cyber risk from connected systems. arXiv preprint arXiv:2005.12409 (2020).","journal-title":"arXiv preprint arXiv:2005.12409"},{"key":"e_1_3_1_84_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3015744"},{"key":"e_1_3_1_85_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2803484"},{"key":"e_1_3_1_86_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2021.02.001"},{"key":"e_1_3_1_87_2","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2017.080647"},{"key":"e_1_3_1_88_2","doi-asserted-by":"publisher","DOI":"10.1109\/CSNDSP49049.2020.9249758"},{"key":"e_1_3_1_89_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2013.05.004"},{"key":"e_1_3_1_90_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3086801"},{"key":"e_1_3_1_91_2","volume-title":"Network and Distributed System Security Symposium (NDSS\u201914)","author":"Ryan Michael D.","year":"2014","unstructured":"Michael D. Ryan. 2014. Enhanced certificate transparency and end-to-end encrypted mail. In Network and Distributed System Security Symposium (NDSS\u201914). Retrieved from https:\/\/www.ndss-symposium.org\/ndss2014\/ndss-2014-programme\/enhanced-certificate-transparency-and-end-to-end-encrypted-mail\/."},{"key":"e_1_3_1_92_2","doi-asserted-by":"publisher","DOI":"10.3390\/s20247136"},{"key":"e_1_3_1_93_2","article-title":"When wireless communication faces COVID-19: Combating the pandemic and saving the economy","author":"Saeed Nida","year":"2020","unstructured":"Nida Saeed, Ahmad Bader, Tareq Y. Al-Naffouri, and Mohamed-Slim Alouini. 2020. When wireless communication faces COVID-19: Combating the pandemic and saving the economy. arXiv preprint arXiv:2005.06637 (2020).","journal-title":"arXiv preprint arXiv:2005.06637"},{"key":"e_1_3_1_94_2","doi-asserted-by":"publisher","DOI":"10.1145\/3231053.3231087"},{"key":"e_1_3_1_95_2","doi-asserted-by":"publisher","DOI":"10.1007\/s40998-018-0111-2"},{"issue":"3","key":"e_1_3_1_96_2","article-title":"Internet of Things (IOT) medical security: Taxonomy and perception","volume":"21","author":"Shepherd Andrew","year":"2020","unstructured":"Andrew Shepherd, Chansa Kesa, and Jonathan Cooper. 2020. Internet of Things (IOT) medical security: Taxonomy and perception. Issues Inf. Syst. 21, 3 (2020). Retrieved from https:\/\/www.iacis.org\/iis\/2020_iis\/pdf\/SHEPHERD_KESA_COOPER.pdf.","journal-title":"Issues Inf. Syst."},{"key":"e_1_3_1_97_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICC42927.2021.9500772"},{"key":"e_1_3_1_98_2","doi-asserted-by":"publisher","DOI":"10.1109\/EMR.2020.3015013"},{"key":"e_1_3_1_99_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.icte.2020.07.006"},{"key":"e_1_3_1_100_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC2T48297.2020.9074578"},{"key":"e_1_3_1_101_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2021.102761"},{"issue":"12","key":"e_1_3_1_102_2","first-page":"19358","article-title":"Deist: Dynamic detection of sinkhole attack for Internet of Things","volume":"5","author":"Stephen R.","year":"2016","unstructured":"R. Stephen and D. vinoth Kumar. 2016. Deist: Dynamic detection of sinkhole attack for Internet of Things. Internat. J. Adv. Trends Comput. Sci. Eng. 5, 12 (2016), 19358\u201319362.","journal-title":"Internat. J. Adv. Trends Comput. Sci. Eng."},{"key":"e_1_3_1_103_2","doi-asserted-by":"publisher","DOI":"10.26761\/pej.v58i2.2008"},{"key":"e_1_3_1_104_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsx.2020.10.017"},{"key":"e_1_3_1_105_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2020.09.102"},{"key":"e_1_3_1_106_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICC42927.2021.9500827"},{"key":"e_1_3_1_107_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3057299"},{"key":"e_1_3_1_108_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICOEI.2018.8553839"},{"key":"e_1_3_1_109_2","doi-asserted-by":"publisher","DOI":"10.3390\/fi10120121"},{"key":"e_1_3_1_110_2","doi-asserted-by":"publisher","DOI":"10.3934\/ElectrEng.2021011"},{"key":"e_1_3_1_111_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2923384"},{"key":"e_1_3_1_112_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.12.008"},{"key":"e_1_3_1_113_2","first-page":"397","volume-title":"23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID\u201920)","author":"Wu Jun","year":"2020","unstructured":"Jun Wu, Yuanyuan Nan, Vikram Kumar, Mathias Payer, and Dongyan Xu. 2020. BlueShield: Detecting spoofing attacks in Bluetooth low energy networks. In 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID\u201920). 397\u2013411."},{"key":"e_1_3_1_114_2","doi-asserted-by":"publisher","DOI":"10.1109\/ASPDAC.2016.7428064"},{"key":"e_1_3_1_115_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2932727"},{"key":"e_1_3_1_116_2","doi-asserted-by":"publisher","DOI":"10.1145\/3386901.3389246"},{"key":"e_1_3_1_117_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3070803"},{"key":"e_1_3_1_118_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2698340"},{"key":"e_1_3_1_119_2","doi-asserted-by":"publisher","DOI":"10.3390\/fi13050105"},{"key":"e_1_3_1_120_2","doi-asserted-by":"publisher","DOI":"10.14445\/23918306\/IJISR-V5I4P106"},{"key":"e_1_3_1_121_2","doi-asserted-by":"publisher","DOI":"10.1049\/htl2.12029"}],"container-title":["ACM Transactions on Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3558519","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3558519","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:47:08Z","timestamp":1750178828000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3558519"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,16]]},"references-count":120,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2023,8,31]]}},"alternative-id":["10.1145\/3558519"],"URL":"https:\/\/doi.org\/10.1145\/3558519","relation":{},"ISSN":["1550-4859","1550-4867"],"issn-type":[{"value":"1550-4859","type":"print"},{"value":"1550-4867","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,5,16]]},"assertion":[{"value":"2021-06-26","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-08-15","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-05-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}