{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T07:35:04Z","timestamp":1769153704009,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":65,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T00:00:00Z","timestamp":1667779200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"European Union's Horizon 2020 research and innovation program","award":["830927"],"award-info":[{"award-number":["830927"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,11,7]]},"DOI":"10.1145\/3560810.3564266","type":"proceedings-article","created":{"date-parts":[[2022,11,4]],"date-time":"2022-11-04T10:14:35Z","timestamp":1667556875000},"page":"9-21","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["Contextualizing System Calls in Containers for Anomaly-Based Intrusion Detection"],"prefix":"10.1145","author":[{"given":"Asbat","family":"El Khairi","sequence":"first","affiliation":[{"name":"Siemens AG &amp; University of Twente, Munich, Germany"}]},{"given":"Marco","family":"Caselli","sequence":"additional","affiliation":[{"name":"Siemens AG, Munich, Germany"}]},{"given":"Christian","family":"Knierim","sequence":"additional","affiliation":[{"name":"Siemens AG, Munich, Germany"}]},{"given":"Andreas","family":"Peter","sequence":"additional","affiliation":[{"name":"University of Oldenburg, Oldenburg, Germany"}]},{"given":"Andrea","family":"Continella","sequence":"additional","affiliation":[{"name":"University of Twente, Enschede, Netherlands"}]}],"member":"320","published-online":{"date-parts":[[2022,11,7]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"Mart\u00edn Abadi et al. 2015. TensorFlow: Large-Scale Machine Learning on Heterogeneous Systems. https:\/\/www.tensorflow.org\/  Mart\u00edn Abadi et al. 2015. TensorFlow: Large-Scale Machine Learning on Heterogeneous Systems. https:\/\/www.tensorflow.org\/"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24858-5_8"},{"key":"e_1_3_2_2_3_1","unstructured":"Rancher Admin. 2020. Runtime Security in Rancher with Falco.  Rancher Admin. 2020. Runtime Security in Rancher with Falco."},{"key":"e_1_3_2_2_4_1","unstructured":"Aqua. 2021. Cloud Native Threat Report: Evolution of Attacks in the Wild on Container Infrastructure.  Aqua. 2021. Cloud Native Threat Report: Evolution of Attacks in the Wild on Container Infrastructure."},{"key":"e_1_3_2_2_5_1","unstructured":"Jason Avery. 2018. CVE-2022-0847: \"Dirty Pipe\" Linux Local Privilege Escalation.  Jason Avery. 2018. CVE-2022-0847: \"Dirty Pipe\" Linux Local Privilege Escalation."},{"key":"e_1_3_2_2_6_1","volume-title":"Centrality and network flow. Social networks","author":"Borgatti Stephen P","year":"2005","unstructured":"Stephen P Borgatti . 2005. Centrality and network flow. Social networks ( 2005 ). Stephen P Borgatti. 2005. Centrality and network flow. Social networks (2005)."},{"key":"e_1_3_2_2_7_1","volume-title":"A graph-theoretic perspective on centrality. Social networks","author":"Borgatti Stephen P","year":"2006","unstructured":"Stephen P Borgatti and Martin G Everett . 2006. A graph-theoretic perspective on centrality. Social networks , Vol. 28 , 4 ( 2006 ), 466--484. Stephen P Borgatti and Martin G Everett. 2006. A graph-theoretic perspective on centrality. Social networks, Vol. 28, 4 (2006), 466--484."},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2806777.2809955"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3474123.3486762"},{"key":"e_1_3_2_2_10_1","unstructured":"Eric Carter Ferenc H\u00e1mori Steven J Vaughan-Nichols Kalyan Ramanathan Diego Ongaro John Ousterhout Abhishek Verma Luis Pedrosa Madhukar R Korupolu David Oppenheimer etal 2019. Sysdig 2019 container usage report: New kubernetes and security insights.  Eric Carter Ferenc H\u00e1mori Steven J Vaughan-Nichols Kalyan Ramanathan Diego Ongaro John Ousterhout Abhishek Verma Luis Pedrosa Madhukar R Korupolu David Oppenheimer et al. 2019. Sysdig 2019 container usage report: New kubernetes and security insights."},{"key":"e_1_3_2_2_11_1","unstructured":"Stefano Chierici. 2019. How to detect the containers' escape capabilities with Falco.  Stefano Chierici. 2019. How to detect the containers' escape capabilities with Falco."},{"key":"e_1_3_2_2_12_1","unstructured":"Stefano Chierici. 2022. CVE-2022-0492: Privilege escalation vulnerability causing container escape.  Stefano Chierici. 2022. CVE-2022-0492: Privilege escalation vulnerability causing container escape."},{"key":"e_1_3_2_2_13_1","unstructured":"Francois Chollet et al. 2015. Keras. https:\/\/github.com\/fchollet\/keras  Francois Chollet et al. 2015. Keras. https:\/\/github.com\/fchollet\/keras"},{"key":"e_1_3_2_2_14_1","volume-title":"CNCF SURVEY 2020","author":"CNCF.","year":"2020","unstructured":"CNCF. 2020 . CNCF SURVEY 2020 . https:\/\/www.cncf.io\/wp-content\/uploads\/2020\/11\/CNCF_Survey_Report_2020.pdf. CNCF. 2020. CNCF SURVEY 2020. https:\/\/www.cncf.io\/wp-content\/uploads\/2020\/11\/CNCF_Survey_Report_2020.pdf."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2016.100"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2013.13"},{"key":"e_1_3_2_2_17_1","unstructured":"National Vulnerability Database. 2012. CVE-2012--2122 Detail.  National Vulnerability Database. 2012. CVE-2012--2122 Detail."},{"key":"e_1_3_2_2_18_1","unstructured":"National Vulnerability Database. 2018. CVE-2018--3760 Detail.  National Vulnerability Database. 2018. CVE-2018--3760 Detail."},{"key":"e_1_3_2_2_19_1","unstructured":"Loris Degioanni. 2014. Interpreting Sysdig Output.  Loris Degioanni. 2014. Interpreting Sysdig Output."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663716.2663755"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1996.502675"},{"key":"e_1_3_2_2_22_1","unstructured":"Geeksforgeeks. 2019. Introduction of syscall.  Geeksforgeeks. 2019. Introduction of syscall."},{"key":"e_1_3_2_2_23_1","volume-title":"23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID","author":"Ghavamnia Seyedhamed","year":"2020","unstructured":"Seyedhamed Ghavamnia , Tapti Palit , Azzedine Benameur , and Michalis Polychronakis . 2020 . Confine: Automated system call policy generation for container attack surface reduction . In 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020). 443--458. Seyedhamed Ghavamnia, Tapti Palit, Azzedine Benameur, and Michalis Polychronakis. 2020. Confine: Automated system call policy generation for container attack surface reduction. In 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020). 443--458."},{"key":"e_1_3_2_2_24_1","volume-title":"D Kreusel, and Simon Ganz.","author":"Grimmer Martin","year":"2019","unstructured":"Martin Grimmer , Martin Max R\u00f6hling , D Kreusel, and Simon Ganz. 2019 . A modern and sophisticated host based intrusion detection data set. IT-Sicherheit als Voraussetzung f\u00fcr eine erfolgreiche Digitalisierung ( 2019), 135--145. Martin Grimmer, Martin Max R\u00f6hling, D Kreusel, and Simon Ganz. 2019. A modern and sophisticated host based intrusion detection data set. IT-Sicherheit als Voraussetzung f\u00fcr eine erfolgreiche Digitalisierung (2019), 135--145."},{"key":"e_1_3_2_2_25_1","unstructured":"Andreas Gruenbacher and Seth Arnold. 2007. AppArmor technical documentation.  Andreas Gruenbacher and Seth Arnold. 2007. AppArmor technical documentation."},{"key":"e_1_3_2_2_26_1","unstructured":"Carlos Polop HackTricks. 2022. Docker Breakout \/ Privilege Escalation.  Carlos Polop HackTricks. 2022. Docker Breakout \/ Privilege Escalation."},{"key":"e_1_3_2_2_27_1","unstructured":"Serge E Hallyn and Andrew G Morgan. 2008. Linux capabilities: making them work. (2008).  Serge E Hallyn and Andrew G Morgan. 2008. Linux capabilities: making them work. (2008)."},{"key":"e_1_3_2_2_28_1","volume-title":"Proc. 11th IEEE Int'l. Conf. Citeseer.","author":"Hoang Xuan Dau","year":"2003","unstructured":"Xuan Dau Hoang , Jiankun Hu , and Peter Bertok . 2003 . A multi-layer model for anomaly intrusion detection using program sequences of system calls . In Proc. 11th IEEE Int'l. Conf. Citeseer. Xuan Dau Hoang, Jiankun Hu, and Peter Bertok. 2003. A multi-layer model for anomaly intrusion detection using program sequences of system calls. In Proc. 11th IEEE Int'l. Conf. Citeseer."},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/1298081.1298084"},{"key":"e_1_3_2_2_30_1","unstructured":"Joab Jackson. 2016. Q&A James Turnbull: The Art of Monitoring in the Age of Microservices.  Joab Jackson. 2016. Q&A James Turnbull: The Art of Monitoring in the Age of Microservices."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3379310.3379323"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.5120\/3399-4730"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/IAW.2005.1495942"},{"key":"e_1_3_2_2_35_1","unstructured":"Max Kellermann. 2022. The Dirty Pipe Vulnerability.  Max Kellermann. 2022. The Dirty Pipe Vulnerability."},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39650-5_19"},{"key":"e_1_3_2_2_37_1","first-page":"35","article-title":"Signature based intrusion detection system using SNORT","volume":"1","author":"Kumar Vinod","year":"2012","unstructured":"Vinod Kumar and Om Prakash Sangwan . 2012 . Signature based intrusion detection system using SNORT . International Journal of Computer Applications & Information Technology , Vol. 1 , 3 (2012), 35 -- 41 . Vinod Kumar and Om Prakash Sangwan. 2012. Signature based intrusion detection system using SNORT. International Journal of Computer Applications & Information Technology, Vol. 1, 3 (2012), 35--41.","journal-title":"International Journal of Computer Applications & Information Technology"},{"key":"e_1_3_2_2_38_1","unstructured":"Wenke Lee and Salvatore Stolfo. 1998. Data mining approaches for intrusion detection. (1998).  Wenke Lee and Salvatore Stolfo. 1998. Data mining approaches for intrusion detection. (1998)."},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3427228.3427236"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3186727"},{"key":"e_1_3_2_2_41_1","unstructured":"Mairi MacLeod. 2021. Escaping from a Virtualised Environment: An Evaluation of Container Breakout Techniques. (2021).  Mairi MacLeod. 2021. Escaping from a Virtualised Environment: An Evaluation of Container Breakout Techniques. (2021)."},{"key":"e_1_3_2_2_42_1","unstructured":"Massimiliano Mattetti Alexandra Shulman-Peleg Yair Allouche Antonio Corradi Shlomi Dolev and Luca Foschini. 2015. Security hardening of Linux containers and their workloads. (2015).  Massimiliano Mattetti Alexandra Shulman-Peleg Yair Allouche Antonio Corradi Shlomi Dolev and Luca Foschini. 2015. Security hardening of Linux containers and their workloads. (2015)."},{"key":"e_1_3_2_2_43_1","unstructured":"HD Moore. 2012. CVE-2012--2122: A Tragically Comedic Security Flaw in MySQL.  HD Moore. 2012. CVE-2012--2122: A Tragically Comedic Security Flaw in MySQL."},{"key":"e_1_3_2_2_44_1","volume-title":"Malicious Software Detection and Classification utilizing Temporal-Graphs of System-call Group Relations. arXiv preprint arXiv:1812.10748","author":"Mpanti Anna","year":"2018","unstructured":"Anna Mpanti , Stavros D Nikolopoulos , and Iosif Polenakis . 2018. Malicious Software Detection and Classification utilizing Temporal-Graphs of System-call Group Relations. arXiv preprint arXiv:1812.10748 ( 2018 ). Anna Mpanti, Stavros D Nikolopoulos, and Iosif Polenakis. 2018. Malicious Software Detection and Classification utilizing Temporal-Graphs of System-call Group Relations. arXiv preprint arXiv:1812.10748 (2018)."},{"key":"e_1_3_2_2_45_1","first-page":"220","article-title":"Understanding auc-roc curve","volume":"26","author":"Narkhede Sarang","year":"2018","unstructured":"Sarang Narkhede . 2018 . Understanding auc-roc curve . Towards Data Science , Vol. 26 , 1 (2018), 220 -- 227 . Sarang Narkhede. 2018. Understanding auc-roc curve. Towards Data Science, Vol. 26, 1 (2018), 220--227.","journal-title":"Towards Data Science"},{"key":"e_1_3_2_2_46_1","unstructured":"NetworkX. 2022. Graph.size.  NetworkX. 2022. Graph.size."},{"key":"e_1_3_2_2_47_1","unstructured":"Marcus Pendleton. 2017. System Call Anomaly Detection in Multi-threaded Programs. Ph. D. Dissertation. UNIVERSITY OF TEXAS AT SAN ANTONIO.  Marcus Pendleton. 2017. System Call Anomaly Detection in Multi-threaded Programs. Ph. D. Dissertation. UNIVERSITY OF TEXAS AT SAN ANTONIO."},{"key":"e_1_3_2_2_48_1","volume-title":"A librarian's guide to graphs, data and the semantic web","author":"Powell James","unstructured":"James Powell . 2015. A librarian's guide to graphs, data and the semantic web . Elsevier . James Powell. 2015. A librarian's guide to graphs, data and the semantic web. Elsevier."},{"key":"e_1_3_2_2_49_1","volume-title":"Defense and Attack Techniques against File-based TOCTOU Vulnerabilities: a Systematic Review","author":"Raducu Razvan","year":"2022","unstructured":"Razvan Raducu , Ricardo J Rodr'iguez , and Pedro \u00c1lvarez . 2022. Defense and Attack Techniques against File-based TOCTOU Vulnerabilities: a Systematic Review . IEEE Access ( 2022 ). Razvan Raducu, Ricardo J Rodr'iguez, and Pedro \u00c1lvarez. 2022. Defense and Attack Techniques against File-based TOCTOU Vulnerabilities: a Systematic Review. IEEE Access (2022)."},{"key":"e_1_3_2_2_50_1","volume-title":"INVESTIGATING ESCAPE VULNERABILITIES IN CONTAINER RUNTIMES. Ph.,D. Dissertation","author":"Reeves Michael J","unstructured":"Michael J Reeves . 2021. INVESTIGATING ESCAPE VULNERABILITIES IN CONTAINER RUNTIMES. Ph.,D. Dissertation . Purdue University Graduate School . Michael J Reeves. 2021. INVESTIGATING ESCAPE VULNERABILITIES IN CONTAINER RUNTIMES. Ph.,D. Dissertation. Purdue University Graduate School."},{"key":"e_1_3_2_2_51_1","unstructured":"Elsa Riachi and Frank Rudzicz. 2020. Understanding Adversarial Attacks on Autoencoders. (2020).  Elsa Riachi and Frank Rudzicz. 2020. Understanding Adversarial Attacks on Autoencoders. (2020)."},{"key":"e_1_3_2_2_52_1","volume-title":"Seville","author":"Rosen Rami","year":"2016","unstructured":"Rami Rosen . 2016 . Namespaces and cgroups, the basis of Linux containers . Seville , Spain , Feb (2016). Rami Rosen. 2016. Namespaces and cgroups, the basis of Linux containers. Seville, Spain, Feb (2016)."},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9010064"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICEECCOT.2017.8284655"},{"key":"e_1_3_2_2_55_1","volume-title":"International Conference on Applications and Techniques in Cyber Security and Intelligence. Springer, 338--350","author":"Shetty Rushank","year":"2017","unstructured":"Rushank Shetty , Kim-Kwang Raymond Choo , and Robert Kaufman . 2017 . Shellshock vulnerability exploitation and mitigation: a demonstration . In International Conference on Applications and Techniques in Cyber Security and Intelligence. Springer, 338--350 . Rushank Shetty, Kim-Kwang Raymond Choo, and Robert Kaufman. 2017. Shellshock vulnerability exploitation and mitigation: a demonstration. In International Conference on Applications and Techniques in Cyber Security and Intelligence. Springer, 338--350."},{"key":"e_1_3_2_2_56_1","first-page":"139","article-title":"Implementing SELinux as a Linux security module","volume":"1","author":"Smalley Stephen","year":"2001","unstructured":"Stephen Smalley , Chris Vance , and Wayne Salamon . 2001 . Implementing SELinux as a Linux security module . NAI Labs Report , Vol. 1 , 43 (2001), 139 . Stephen Smalley, Chris Vance, and Wayne Salamon. 2001. Implementing SELinux as a Linux security module. NAI Labs Report, Vol. 1, 43 (2001), 139.","journal-title":"NAI Labs Report"},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.6835"},{"key":"e_1_3_2_2_58_1","unstructured":"Sysdig. 2017. Secure DevOps Platform. https:\/\/github.com\/draios\/sysdig.  Sysdig. 2017. Secure DevOps Platform. https:\/\/github.com\/draios\/sysdig."},{"key":"e_1_3_2_2_59_1","unstructured":"Sysdig. 2021. Sysdig 2021 Container Security and Usage Report.  Sysdig. 2021. Sysdig 2021 Container Security and Usage Report."},{"key":"e_1_3_2_2_60_1","volume-title":"Falco: Open Source Security Tool for containers, Kubernetes and Cloud.","year":"2022","unstructured":"Sysdig. 2022 . Falco: Open Source Security Tool for containers, Kubernetes and Cloud. Sysdig. 2022. Falco: Open Source Security Tool for containers, Kubernetes and Cloud."},{"key":"e_1_3_2_2_61_1","volume-title":"Kubanomaly: anomaly detection for the docker orchestration platform with neural network approaches. Engineering reports","author":"Tien Chin-Wei","year":"2019","unstructured":"Chin-Wei Tien , Tse-Yung Huang , Chia-Wei Tien , Ting-Chun Huang , and Sy-Yen Kuo . 2019. Kubanomaly: anomaly detection for the docker orchestration platform with neural network approaches. Engineering reports , Vol. 1 , 5 ( 2019 ), e12080. Chin-Wei Tien, Tse-Yung Huang, Chia-Wei Tien, Ting-Chun Huang, and Sy-Yen Kuo. 2019. Kubanomaly: anomaly detection for the docker orchestration platform with neural network approaches. Engineering reports, Vol. 1, 5 (2019), e12080."},{"key":"e_1_3_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2014.79"},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1999.766910"},{"key":"e_1_3_2_2_64_1","volume-title":"International Workshop on Structured Object-Oriented Formal Language and Method. Springer, 3--12","author":"Wen Yanjun","year":"2019","unstructured":"Yanjun Wen and Ji Wang . 2019 . Analysis and Remodeling of the DirtyCOW Vulnerability by Debugging and Abstraction . In International Workshop on Structured Object-Oriented Formal Language and Method. Springer, 3--12 . Yanjun Wen and Ji Wang. 2019. Analysis and Remodeling of the DirtyCOW Vulnerability by Debugging and Abstraction. In International Workshop on Structured Object-Oriented Formal Language and Method. Springer, 3--12."},{"key":"e_1_3_2_2_65_1","volume-title":"2005 IEEE International Conference on Industrial Technology. IEEE, 63--68","author":"Yu Fei","year":"2005","unstructured":"Fei Yu , Cheng Xu , Yue Shen , Ji-yao An, and Lin-feng Zhang. 2005 . Intrusion detection based on system call finite-state automation machine . In 2005 IEEE International Conference on Industrial Technology. IEEE, 63--68 . Fei Yu, Cheng Xu, Yue Shen, Ji-yao An, and Lin-feng Zhang. 2005. Intrusion detection based on system call finite-state automation machine. In 2005 IEEE International Conference on Industrial Technology. IEEE, 63--68."},{"key":"e_1_3_2_2_66_1","volume-title":"A docker container anomaly monitoring system based on optimized isolation forest","author":"Zou Zhuping","year":"2019","unstructured":"Zhuping Zou , Yulai Xie , Kai Huang , Gongming Xu , Dan Feng , and Darrell Long . 2019. A docker container anomaly monitoring system based on optimized isolation forest . IEEE Transactions on Cloud Computing ( 2019 ). Zhuping Zou, Yulai Xie, Kai Huang, Gongming Xu, Dan Feng, and Darrell Long. 2019. A docker container anomaly monitoring system based on optimized isolation forest. IEEE Transactions on Cloud Computing (2019)."}],"event":{"name":"CCS '22: 2022 ACM SIGSAC Conference on Computer and Communications Security","location":"Los Angeles CA USA","acronym":"CCS '22","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2022 on Cloud Computing Security Workshop"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3560810.3564266","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3560810.3564266","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:00:34Z","timestamp":1750186834000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3560810.3564266"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,7]]},"references-count":65,"alternative-id":["10.1145\/3560810.3564266","10.1145\/3560810"],"URL":"https:\/\/doi.org\/10.1145\/3560810.3564266","relation":{},"subject":[],"published":{"date-parts":[[2022,11,7]]},"assertion":[{"value":"2022-11-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}