{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T04:27:39Z","timestamp":1776400059064,"version":"3.51.2"},"reference-count":47,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,9,29]],"date-time":"2023-09-29T00:00:00Z","timestamp":1695945600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,9,29]],"date-time":"2023-09-29T00:00:00Z","timestamp":1695945600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cloud Comp"],"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Billions of gadgets are already online, making the IoT an essential aspect of daily life. However, the interconnected nature of IoT devices also leaves them open to cyber threats. The quantity and sophistication of cyber assaults aimed against Internet of Things (IoT) systems have skyrocketed in recent years. This paper proposes a next-generation cyber attack prediction framework for IoT systems. The framework uses the multi-class support vector machine (SVM) and the improved CHAID decision tree machine learning methods. IoT traffic is classified using a multi-class support vector machine to identify various types of attacks. The SVM model is then optimized with the help of the CHAID decision tree, which prioritizes the attributes most relevant to the categorization of attacks. The proposed framework was evaluated on a real-world dataset of IoT traffic. The findings demonstrate the framework's ability to categorize attacks accurately. The framework may determine which attributes are most crucial for attack categorization to enhance the SVM model's precision. The proposed technique focuses on network traffic characteristics that can be signs of cybersecurity threats on IoT networks and affected Network nodes. Selected feature vectors were also created utilizing the elements acquired on every IoT console. The evaluation results on the Multistep Cyber-Attack Dataset (MSCAD) show that the proposed CHAID decision tree can significantly predict the multi-stage cyber attack with 99.72% accuracy. Such accurate prediction is essential in managing cyber attacks in real-time communication. Because of its efficiency and scalability, the model may be used to forecast cyber attacks in real time, even in massive IoT installations. Because of its computing efficiency, it can make accurate predictions rapidly, allowing for prompt detection and action. By locating possible entry points for attacks and mitigating them, the framework helps strengthen the safety of IoT systems.<\/jats:p>","DOI":"10.1186\/s13677-023-00517-4","type":"journal-article","created":{"date-parts":[[2023,9,29]],"date-time":"2023-09-29T15:02:14Z","timestamp":1695999734000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":43,"title":["Next-generation cyber attack prediction for IoT systems: leveraging multi-class SVM and optimized CHAID decision tree"],"prefix":"10.1186","volume":"12","author":[{"given":"Surjeet","family":"Dalal","sequence":"first","affiliation":[]},{"given":"Umesh Kumar","family":"Lilhore","sequence":"additional","affiliation":[]},{"given":"Neetu","family":"Faujdar","sequence":"additional","affiliation":[]},{"given":"Sarita","family":"Simaiya","sequence":"additional","affiliation":[]},{"given":"Manel","family":"Ayadi","sequence":"additional","affiliation":[]},{"given":"Nouf A.","family":"Almujally","sequence":"additional","affiliation":[]},{"given":"Amel","family":"Ksibi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,9,29]]},"reference":[{"issue":"2","key":"517_CR1","doi-asserted-by":"publisher","first-page":"198","DOI":"10.3390\/electronics11020198","volume":"11","author":"M Abdullahi","year":"2022","unstructured":"Abdullahi M, Baashar Y, Alhussian H, Alwadain A, Aziz N, Capretz LF, Abdulkadir SJ (2022) Detecting cybersecurity attacks in internet of things using artificial intelligence methods: a systematic literature review. Electronics 11(2):198","journal-title":"Electronics"},{"issue":"4","key":"517_CR2","doi-asserted-by":"publisher","first-page":"45","DOI":"10.11648\/j.awcn.20170304.13","volume":"3","author":"AE Chukwudi","year":"2017","unstructured":"Chukwudi AE, Udoka E, Charles E (2017) Game theory basics and its application in cyber security. Adv Wireless Commun Net 3(4):45\u201349","journal-title":"Adv Wireless Commun Net"},{"issue":"4","key":"517_CR3","doi-asserted-by":"publisher","first-page":"556","DOI":"10.3390\/electronics11040556","volume":"11","author":"Q Abu Al-Haija","year":"2022","unstructured":"Abu Al-Haija Q, Krichen M, Abu Elhaija W (2022) Machine-learning-based darknet traffic detection system for IoT applications. Electronics 11(4):556","journal-title":"Electronics"},{"issue":"3","key":"517_CR4","doi-asserted-by":"publisher","first-page":"031105","DOI":"10.1115\/1.4052823","volume":"8","author":"M Lombardi","year":"2022","unstructured":"Lombardi M, Pascale F, Santaniello D (2022) Two-step algorithm to detect cyber-attack over the can-bus: a preliminary case study in connected vehicles. ASCE-ASME J Risk and Uncert in Engrg Sys Part B Mech Engrg 8(3):031105","journal-title":"ASCE-ASME J Risk and Uncert in Engrg Sys Part B Mech Engrg"},{"key":"517_CR5","doi-asserted-by":"crossref","unstructured":"Rawat R, Mahor V, Garg B, Chouhan M, Pachlasiya K, Telang S (2022) Modeling of cyber threat analysis and vulnerability in IoT-based healthcare systems during COVID. In Lessons from COVID-19.\u00a0Academic Press, pp. 405\u2013425","DOI":"10.1016\/B978-0-323-99878-9.00016-9"},{"key":"517_CR6","doi-asserted-by":"crossref","unstructured":"Wang X, Gong X, Yu L, Liu J (2021) MAAC: Novel alert correlation method to detect multi-step attack. In 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, pp. 726\u2013733","DOI":"10.1109\/TrustCom53373.2021.00106"},{"key":"517_CR7","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1016\/j.ijcip.2019.01.001","volume":"25","author":"K Kimani","year":"2019","unstructured":"Kimani K, Oduol V, Langat K (2019) Cyber security challenges for IoT-based smart grid networks. Int J Crit Infrastruct Prot 25:36\u201349","journal-title":"Int J Crit Infrastruct Prot"},{"key":"517_CR8","doi-asserted-by":"crossref","unstructured":"Pacheco J, Hariri S (2016) IoT security framework for smart cyber infrastructures. In 2016 IEEE 1st International workshops on Foundations and Applications of self* systems (fas* w). IEEE, pp. 242\u2013247","DOI":"10.1109\/FAS-W.2016.58"},{"issue":"1","key":"517_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13677-022-00356-9","volume":"12","author":"S Dalal","year":"2023","unstructured":"Dalal S, Manoharan P, Lilhore UK, Seth B, Simaiya S, Hamdi M, Raahemifar K (2023) Extremely boosted neural network for more accurate multi-stage Cyber attack prediction in cloud computing environment. J Cloud Computing 12(1):1\u201322","journal-title":"J Cloud Computing"},{"key":"517_CR10","doi-asserted-by":"crossref","unstructured":"Sontowski S, Gupta M, Chukkapalli SSL, Abdelsalam M, Mittal S, Joshi A, Sandhu R (2020) Cyber attacks on smart farming infrastructure. In 2020 IEEE 6th International Conference on Collaboration and Internet Computing (CIC). IEEE, pp. 135-143","DOI":"10.1109\/CIC50333.2020.00025"},{"key":"517_CR11","doi-asserted-by":"publisher","first-page":"e4771","DOI":"10.1002\/ett.4771","volume":"25","author":"S Dalal","year":"2023","unstructured":"Dalal S, Poongodi M, Lilhore UK, Dahan F, Vaiyapuri T, Keshta I, Aldossary SM, Mahmoud A, Simaiya S (2023) Optimized LightGBM model for security and privacy issues in cyber-physical systems. Trans Emerging Telecommun Technol 25:e4771","journal-title":"Trans Emerging Telecommun Technol"},{"key":"517_CR12","doi-asserted-by":"publisher","first-page":"23186","DOI":"10.1109\/ACCESS.2022.3153471","volume":"10","author":"MQ Tran","year":"2022","unstructured":"Tran MQ, Elsisi M, Liu MK, Vu VQ, Mahmoud K, Darwish MM, Abdelaziz AY, Lehtonen M (2022) Reliable deep learning and iot-based monitoring system for secure computer numerical control machines against cyber-attacks with experimental verification. IEEE Access 10:23186\u201323197","journal-title":"IEEE Access"},{"key":"517_CR13","doi-asserted-by":"crossref","unstructured":"\u00d6ZALP AN, ALBAYRAK Z, \u00c7AKMAK M, \u00d6ZDO\u011eAN E (2022) Layer-based examination of cyber-attacks in IoT. In 2022 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA). IEEE, pp. 1\u201310","DOI":"10.1109\/HORA55278.2022.9800047"},{"issue":"5","key":"517_CR14","doi-asserted-by":"publisher","first-page":"1973","DOI":"10.1007\/s00170-022-10329-6","volume":"123","author":"M Shahin","year":"2022","unstructured":"Shahin M, Chen FF, Hosseinzadeh A, Bouzary H, Rashidifar R (2022) A deep hybrid learning model for detecting cyber attacks in industrial IoT devices. The Int J Adv Manuf Technol 123(5):1973\u20131983","journal-title":"The Int J Adv Manuf Technol"},{"key":"517_CR15","doi-asserted-by":"crossref","unstructured":"Yazdinejad A, Kazemi M, Parizi RM, Dehghantanha A, Karimipour H (2023) An ensemble deep learning model for cyber threat hunting in industrial internet of things.\u00a0Digit Commun Networks\u00a09(1):101\u2013110","DOI":"10.1016\/j.dcan.2022.09.008"},{"key":"517_CR16","doi-asserted-by":"crossref","unstructured":"Ismail S, Reza H (2022) Evaluation of Na\u00efve Bayesian Algorithms for Cyber-Attacks Detection in Wireless Sensor Networks. In 2022 IEEE World AI IoT Congress (AIIoT). IEEE, pp. 283\u2013289","DOI":"10.1109\/AIIoT54504.2022.9817298"},{"key":"517_CR17","doi-asserted-by":"publisher","first-page":"102783","DOI":"10.1016\/j.scs.2021.102783","volume":"68","author":"T Ahmad","year":"2021","unstructured":"Ahmad T, Zhang D (2021) Using the Internet of things in smart energy systems and networks. Sustain Cities Soc 68:102783","journal-title":"Sustain Cities Soc"},{"issue":"4","key":"517_CR18","doi-asserted-by":"publisher","first-page":"524","DOI":"10.3390\/electronics11040524","volume":"11","author":"K-H Le","year":"2022","unstructured":"Le K-H, Nguyen M-H, Tran T-D, Tran N-D (2022) IMIDS: An Smart intrusion detection system against cyber threats in IoT. Electronics 11(4):524","journal-title":"Electronics"},{"key":"517_CR19","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/978-3-030-74753-4_9","volume-title":"In\u00a0Handbook of Big Data Analytics and Forensics","author":"P Semwal","year":"2022","unstructured":"Semwal P, Handa A (2022) \u201cCyber-attack detection in cyber-physical systems using supervised machine learning.\u201d In\u00a0Handbook of Big Data Analytics and Forensics. Cham, Springer, pp 131\u2013140"},{"issue":"3","key":"517_CR20","doi-asserted-by":"publisher","first-page":"1598","DOI":"10.3390\/app12031598","volume":"12","author":"RJ Raimundo","year":"2022","unstructured":"Raimundo RJ, Ros\u00e1rio AT (2022) Cybersecurity in the internet of things in industrial management. Appl Sci 12(3):1598","journal-title":"Appl Sci"},{"key":"517_CR21","doi-asserted-by":"crossref","unstructured":"Chakrabarty S, Engels DW. \"A secure IoT architecture for smart cities.\" In\u00a02016 13th IEEE annual consumer communications & networking conference (CCNC), pp. 812\u2013813. IEEE, 2016.","DOI":"10.1109\/CCNC.2016.7444889"},{"key":"517_CR22","doi-asserted-by":"publisher","first-page":"209802","DOI":"10.1109\/ACCESS.2020.3036728","volume":"8","author":"N Koroniotis","year":"2020","unstructured":"Koroniotis N, Moustafa N, Schiliro F, Gauravaram P, Janicke H (2020) A holistic review of cybersecurity and reliability perspectives in smart airports. IEEE Access 8:209802\u2013209834","journal-title":"IEEE Access"},{"issue":"4","key":"517_CR23","doi-asserted-by":"publisher","first-page":"6748","DOI":"10.1109\/JIOT.2019.2911109","volume":"6","author":"JA Ansere","year":"2019","unstructured":"Ansere JA, Han G, Wang H, Choi C, Wu C (2019) A reliable energy efficient dynamic spectrum sensing for cognitive radio IoT networks. IEEE Internet Things J 6(4):6748\u20136759","journal-title":"IEEE Internet Things J"},{"issue":"1","key":"517_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13677-022-00305-6","volume":"11","author":"EM Onyema","year":"2022","unstructured":"Onyema EM, Dalal S, Romero CAT, Seth B, Young P, Wajid MA (2022) Design of intrusion detection system based on cyborg intelligence for security of cloud network traffic of smart cities. J Cloud Computing 11(1):1\u201320","journal-title":"J Cloud Computing"},{"issue":"11","key":"517_CR25","doi-asserted-by":"publisher","first-page":"5377","DOI":"10.1007\/s00500-022-07099-4","volume":"26","author":"S Dalal","year":"2022","unstructured":"Dalal S, Seth B, Jaglan V, Surbhi MM, Dahiya N, Rani U, Le DN, Hu YC (2022) An adaptive traffic routing approach toward load balancing and congestion control in Cloud\u2013MANET ad hoc networks. Soft Computing 26(11):5377\u20135388","journal-title":"Soft Computing"},{"key":"517_CR26","doi-asserted-by":"crossref","unstructured":"Krundyshev, Vasiliy, and Maxim Kalinin. \"Hybrid neural network framework for detection of cyber attacks at smart infrastructures.\" In\u00a0Proceedings of the 12th International Conference on Security of Information and Networks, pp. 1\u20137. 2019.","DOI":"10.1145\/3357613.3357623"},{"key":"517_CR27","doi-asserted-by":"publisher","first-page":"161546","DOI":"10.1109\/ACCESS.2021.3128837","volume":"9","author":"YK Saheed","year":"2021","unstructured":"Saheed YK, Arowolo MO (2021) Efficient cyber attack detection on the internet of medical things-smart environment based on deep recurrent neural network and machine learning algorithms. IEEE Access 9:161546\u2013161554","journal-title":"IEEE Access"},{"issue":"4","key":"517_CR28","doi-asserted-by":"publisher","first-page":"e4108","DOI":"10.1002\/ett.4108","volume":"33","author":"B Seth","year":"2022","unstructured":"Seth B, Dalal S, Jaglan V, Le D-N, Mohan S, Srivastava G (2022) Integrating encryption techniques for secure data storage in the cloud. Trans Emerging Telecommun Technol 33(4):e4108","journal-title":"Trans Emerging Telecommun Technol"},{"key":"517_CR29","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1016\/j.future.2020.02.017","volume":"107","author":"M Shafiq","year":"2020","unstructured":"Shafiq M, Tian Z, Sun Y, Xiaojiang Du, Guizani M (2020) Selection of effective machine learning algorithm and Bot-IoT attacks traffic identification for internet of things in smart city. Futur Gener Comput Syst 107:433\u2013442","journal-title":"Futur Gener Comput Syst"},{"issue":"2","key":"517_CR30","first-page":"874","volume":"7","author":"RM Masud","year":"2019","unstructured":"Masud RM (2019) IoT-based electric vehicle state estimation and control algorithms under cyber attacks. IEEE Internet Things J 7(2):874\u2013881","journal-title":"IEEE Internet Things J"},{"key":"517_CR31","doi-asserted-by":"publisher","first-page":"1","DOI":"10.32604\/cmc.2021.014466","volume":"67","author":"B Seth","year":"2021","unstructured":"Seth B, Dalal S, Le DN, Jaglan V, Dahiya N, Agrawal A, Sharma MM, Prakash D, Verma KD (2021) Secure cloud data storage system using hybrid paillier\u2013blowfish algorithm. Computers Materials Continua 67:1","journal-title":"Computers Materials Continua"},{"issue":"8","key":"517_CR32","doi-asserted-by":"publisher","first-page":"5689","DOI":"10.1007\/s11276-019-02036-0","volume":"26","author":"SP Gochhayat","year":"2020","unstructured":"Gochhayat SP, Lal C, Sharma L, Sharma DP, Gupta D, Saucedo JAM, Kose U (2020) Reliable and secure data transfer in IoT networks. Wireless Net 26(8):5689\u20135702","journal-title":"Wireless Net"},{"key":"517_CR33","doi-asserted-by":"crossref","unstructured":"Liu PY, Wu KR, Liang JM, Chen JJ, Tseng YC. \"Energy-efficient uplink scheduling for ultra-reliable communications in NB-IoT networks.\" In\u00a02018 IEEE 29th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), pp. 1\u20135. IEEE, 2018.","DOI":"10.1109\/PIMRC.2018.8580697"},{"issue":"8","key":"517_CR34","doi-asserted-by":"publisher","first-page":"5446","DOI":"10.1109\/TII.2022.3141403","volume":"18","author":"S Ghosh","year":"2022","unstructured":"Ghosh S, Dagiuklas T, Iqbal M, Wang X (2022) A cognitive routing framework for reliable communication in iot for industry 5.0. IEEE Trans Industr Inf 18(8):5446\u20135457","journal-title":"IEEE Trans Industr Inf"},{"key":"517_CR35","doi-asserted-by":"publisher","first-page":"108205","DOI":"10.1016\/j.compeleceng.2022.108205","volume":"102","author":"MS Rathore","year":"2022","unstructured":"Rathore MS, Poongodi M, Saurabh P, Lilhore UK, Bourouis S, Alhakami W, Osamor J, Hamdi M (2022) A novel trust-based security and privacy model for internet of vehicles using encryption and steganography. Comput Electr Engi 102:108205","journal-title":"Comput Electr Engi"},{"key":"517_CR36","doi-asserted-by":"crossref","unstructured":"Conti M, Kaliyar P, Lal C. \"REMI: a reliable and secure multicast routing protocol for IoT networks.\" In\u00a0Proceedings of the 12th International Conference on Availability, Reliability and Security, pp. 1\u20138. 2017.","DOI":"10.1145\/3098954.3106070"},{"key":"517_CR37","first-page":"100257","volume":"26","author":"PKR Maddikunta","year":"2022","unstructured":"Maddikunta PKR, Pham QB, Prabadevi B, Deepa N, Dev K, Gadekallu TR, Ruby R, Liyanage M (2022) Industry 5.0: A survey on enabling technologies and potential applications. J Industrial Inform Integ 26:100257","journal-title":"J Industrial Inform Integ"},{"issue":"11","key":"517_CR38","doi-asserted-by":"publisher","first-page":"7862","DOI":"10.1109\/TII.2022.3161029","volume":"18","author":"WU Khan","year":"2022","unstructured":"Khan WU, Ihsan A, Nguyen TN, Ali Z, Javed MA (2022) NOMA-enabled backscatter communications for green transportation in automotive-industry 5.0. IEEE Transact Industrial Inform 18(11):7862\u20137874","journal-title":"IEEE Transact Industrial Inform"},{"key":"517_CR39","first-page":"165","volume":"30","author":"A Hassan","year":"2021","unstructured":"Hassan A, Prasad D, Khurana M, Lilhore UK, Simaiya S (2021) Integration of internet of things (IoT) in health care industry: an overview of benefits, challenges, and applications. Data Sci Innovations Smart Syst 30:165\u2013180","journal-title":"Data Sci Innovations Smart Syst"},{"issue":"1","key":"517_CR40","doi-asserted-by":"publisher","first-page":"635","DOI":"10.1109\/TII.2022.3200067","volume":"19","author":"Y Liu","year":"2022","unstructured":"Liu Y, Wu H, Rezaee K, Khosravi MR, Khalaf OI, Khan AA, Ramesh D, Qi L (2022) Interaction-enhanced and time-aware graph convolutional network for successive point-of-interest recommendation in traveling enterprises. IEEE Transact Industrial Inform 19(1):635\u2013643","journal-title":"IEEE Transact Industrial Inform"},{"issue":"21","key":"517_CR41","doi-asserted-by":"publisher","first-page":"21398","DOI":"10.1109\/JIOT.2022.3181136","volume":"9","author":"L Qi","year":"2022","unstructured":"Qi L, Liu Y, Zhang Y, Xiaolong Xu, Bilal M, Song H (2022) Privacy-aware point-of-interest category recommendation in internet of things. IEEE Internet Things J 9(21):21398\u201321408","journal-title":"IEEE Internet Things J"},{"issue":"1","key":"517_CR42","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1002\/int.22620","volume":"37","author":"Y Liu","year":"2022","unstructured":"Liu Y, Li D, Wan S, Wang F, Dou W, Xiaolong Xu, Li S, Ma R, Qi L (2022) A long short-term memory-based model for greenhouse climate prediction. Int J Intell Syst 37(1):135\u2013151","journal-title":"Int J Intell Syst"},{"key":"517_CR43","doi-asserted-by":"crossref","unstructured":"Abu Al-Haija Q, Al-Fayoumi M. \"An intelligent identification and classification system for malicious uniform resource locators (URLs).\" Neural Computing and Applications (2023): 1\u201317.","DOI":"10.1007\/s00521-023-08592-z"},{"key":"517_CR44","doi-asserted-by":"crossref","unstructured":"Al-Haija QA, McCurry CD, Zein-Sabatto S. \"Intelligent self-reliant cyber-attacks detection and classification system for IoT communication using deep convolutional neural network.\" Selected Papers from the 12th International Networking Conference: INC 2020 12. Springer International Publishing, 2021.","DOI":"10.1007\/978-3-030-64758-2_8"},{"issue":"10","key":"517_CR45","doi-asserted-by":"publisher","first-page":"e12934","DOI":"10.1111\/exsy.12934","volume":"39","author":"Q Abu Al-Haija","year":"2022","unstructured":"Abu Al-Haija Q, Badawi AA, Bojja GR (2022) Boost-defence for resilient IoT networks: a head-to-toe approach. Expert Syst 39(10):e12934","journal-title":"Expert Syst"},{"issue":"7","key":"517_CR46","doi-asserted-by":"publisher","first-page":"3489","DOI":"10.3390\/s23073489","volume":"23","author":"Q Abu Al-Haija","year":"2023","unstructured":"Abu Al-Haija Q, Alohaly M, Odeh A (2023) A lightweight double-stage scheme to identify malicious DNS over HTTPS traffic using a hybrid learning approach. Sensors 23(7):3489","journal-title":"Sensors"},{"key":"517_CR47","doi-asserted-by":"publisher","first-page":"101266","DOI":"10.1016\/j.rineng.2023.101266","volume":"19","author":"QA Al-Haija","year":"2023","unstructured":"Al-Haija QA (2023) Cost-effective detection system of cross-site scripting attacks using hybrid learning approach. Results Eng 19:101266","journal-title":"Results Eng"}],"updated-by":[{"DOI":"10.1186\/s13677-023-00526-3","type":"correction","label":"Correction","source":"publisher","updated":{"date-parts":[[2023,10,12]],"date-time":"2023-10-12T00:00:00Z","timestamp":1697068800000}}],"container-title":["Journal of Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-023-00517-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13677-023-00517-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-023-00517-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,19]],"date-time":"2023-11-19T21:50:37Z","timestamp":1700430637000},"score":1,"resource":{"primary":{"URL":"https:\/\/journalofcloudcomputing.springeropen.com\/articles\/10.1186\/s13677-023-00517-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,29]]},"references-count":47,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2023,12]]}},"alternative-id":["517"],"URL":"https:\/\/doi.org\/10.1186\/s13677-023-00517-4","relation":{"correction":[{"id-type":"doi","id":"10.1186\/s13677-023-00526-3","asserted-by":"object"}]},"ISSN":["2192-113X"],"issn-type":[{"value":"2192-113X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,9,29]]},"assertion":[{"value":"12 June 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 September 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 September 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 October 2023","order":4,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Correction","order":5,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"A Correction to this paper has been published:","order":6,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"https:\/\/doi.org\/10.1186\/s13677-023-00526-3","URL":"https:\/\/doi.org\/10.1186\/s13677-023-00526-3","order":7,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"137"}}