{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T15:54:48Z","timestamp":1775145288399,"version":"3.50.1"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,5,14]],"date-time":"2024-05-14T00:00:00Z","timestamp":1715644800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,5,14]],"date-time":"2024-05-14T00:00:00Z","timestamp":1715644800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cloud Comp"],"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Due to growing network data dissemination in cloud, the elasticity, pay as you go options, globally accessible facilities, and security of networks have become increasingly important in today's world. Cloud service providers, including AWS, Azure, GCP, and others, facilitate worldwide expansion within minutes by offering decentralized communication network functions, hence providing security to cloud is still remains a challenging task. This paper aims to introduce and evaluate the Biz-SCOP model, a novel intrusion detection system developed for cloud security. The research addresses the pressing need for effective intrusion detection in cloud environments by combining hybrid optimization techniques and advanced deep learning methodologies. The study employs prominent intrusion datasets, including CSE-CIC-IDS 2018, CIC-IDS 2017, and a cloud intrusion dataset, to assess the proposed model's performance. The study's design involves implementing the Biz-SCOP model using Matlab 2019 software on a Windows 10 OS platform, utilizing 8\u00a0GB RAM and an Intel core i3 processor. The hybrid optimization approach, termed HyPSM, is employed for feature selection, enhancing the model's efficiency. Additionally, an intelligent deep learning model, C2AE, is introduced to discern friendly and hostile communication, contributing to accurate intrusion detection. Key findings indicate that the Biz-SCOP model outperforms existing intrusion detection systems, achieving notable accuracy (99.8%), precision (99.7%), F1-score (99.8%), and GEO (99.9%). The model excels in identifying various attack types, as demonstrated by robust ROC analysis. Interpretations and conclusions emphasize the significance of hybrid optimization and advanced deep learning techniques in enhancing intrusion detection system performance. The proposed model exhibits lower computational load, reduced false positives, ease of implementation, and improved accuracy, positioning it as a promising solution for cloud security.<\/jats:p>","DOI":"10.1186\/s13677-024-00657-1","type":"journal-article","created":{"date-parts":[[2024,5,14]],"date-time":"2024-05-14T11:02:19Z","timestamp":1715684539000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["A bizarre synthesized cascaded optimized predictor (BizSCOP) model for enhancing security in cloud systems"],"prefix":"10.1186","volume":"13","author":[{"given":"R. Julian","family":"Menezes","sequence":"first","affiliation":[]},{"given":"P. Jesu","family":"Jayarin","sequence":"additional","affiliation":[]},{"given":"A. Chandra","family":"Sekar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,5,14]]},"reference":[{"key":"657_CR1","first-page":"4319","volume":"74","author":"AM Basahel","year":"2023","unstructured":"Basahel AM, Yamin M, Basahel SM, Lydia EL (2023) Enhanced Coyote optimization with deep learning based cloud-intrusion detection system. Comp Mat Continua 74:4319","journal-title":"Comp Mat Continua"},{"key":"657_CR2","doi-asserted-by":"publisher","first-page":"e6646","DOI":"10.1002\/cpe.6646","volume":"34","author":"Z Liu","year":"2022","unstructured":"Liu Z, Xu B, Cheng B, Hu X, Darbandi M (2022) Intrusion detection systems in the cloud computing: a comprehensive and deep literature review. Concurr Comput Pract Exp 34:e6646","journal-title":"Concurr Comput Pract Exp"},{"key":"657_CR3","doi-asserted-by":"crossref","unstructured":"Dalal S, Manoharan P, Lilhore UK, Seth B, Mohammed Alsekait D, Simaiya S et al (2023) \u201dExtremely boosted neural network for more accurate multi-stage Cyber attack prediction in cloud computing environment\u201d. J Cloud Comput 12:14","DOI":"10.1186\/s13677-022-00356-9"},{"key":"657_CR4","doi-asserted-by":"publisher","unstructured":"Nazoksara A, Etminan N, Hosseinzadeh R, Heidari B (2024) SAutoIDS: A semantic autonomous intrusion detection system based on cellular deep learning and ontology for malware detection in cloud computing. https:\/\/doi.org\/10.21203\/rs.3.rs-3967160\/v1","DOI":"10.21203\/rs.3.rs-3967160\/v1"},{"key":"657_CR5","doi-asserted-by":"publisher","first-page":"170044","DOI":"10.1016\/j.ijleo.2022.170044","volume":"270","author":"A Kumar","year":"2022","unstructured":"Kumar A, Umurzoqovich RS, Duong ND, Kanani P, Kuppusamy A, Praneesh M et al (2022) An intrusion identification and prevention for cloud computing: From the perspective of deep learning. Optik 270:170044","journal-title":"Optik"},{"key":"657_CR6","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1186\/s13677-022-00368-5","volume":"11","author":"SS Panwar","year":"2022","unstructured":"Panwar SS, Rauthan MMS, Barthwal V (2022) A systematic review on effective energy utilization management strategies in cloud data centers. J Cloud Comput 11:95","journal-title":"J Cloud Comput"},{"key":"657_CR7","doi-asserted-by":"publisher","first-page":"89","DOI":"10.3390\/fi14030089","volume":"14","author":"V Chang","year":"2022","unstructured":"Chang V, Golightly L, Modesti P, Xu QA, Doan LMT, Hall K et al (2022) A survey on intrusion detection systems for fog and cloud computing. Future Int 14:89","journal-title":"Future Int"},{"key":"657_CR8","doi-asserted-by":"publisher","unstructured":"Sharon A, Mohanraj P, Abraham TE, Sundan B, Thangasamy A: An intelligent intrusion detection system using hybrid deep learning approaches in cloud environment. Springer International Publishing, Cham, p. 2022:281\u2013298. https:\/\/doi.org\/10.1007\/978-3-031-11633-9_20.volume651","DOI":"10.1007\/978-3-031-11633-9_20.volume651"},{"key":"657_CR9","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1007\/s10723-023-09728-0","volume":"22","author":"SA Bajpai","year":"2024","unstructured":"Bajpai SA, Patankar AB (2024) Marine goal optimizer tuned deep BiLSTM-based self-configuring intrusion detection in cloud. J Grid Comput 22:24","journal-title":"J Grid Comput"},{"key":"657_CR10","doi-asserted-by":"crossref","unstructured":"Prabhakaran V, Kulandasamy A (2023) mLBOA-DML: modified butterfly optimized deep metric learning for enhancing accuracy in intrusion detection system. J Reliab Intell Environ 9:333\u2013347","DOI":"10.1007\/s40860-022-00197-y"},{"key":"657_CR11","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1007\/s11277-022-09960-z","volume":"128","author":"UA Butt","year":"2023","unstructured":"Butt UA, Amin R, Mehmood M, Aldabbas H, Alharbi MT, Albaqami N (2023) Cloud security threats and solutions: a survey. Wireless Pers Commun 128:387\u2013413","journal-title":"Wireless Pers Commun"},{"key":"657_CR12","doi-asserted-by":"publisher","unstructured":"Prasad VK, Raval Abhishek A, Bhavsar M (2023) HIDSC2: Host-based intrusion detection system in cloud computing. In: Ranganathan, G., Fernando, X., Rocha, \u00c1. (eds) Inventive communication and computational technologies. Lecture notes in networks and systems, vol 383. Springer, Singapore. https:\/\/doi.org\/10.1007\/978-981-19-4960-9_6","DOI":"10.1007\/978-981-19-4960-9_6"},{"key":"657_CR13","doi-asserted-by":"publisher","first-page":"2427","DOI":"10.3390\/electronics12112427","volume":"12","author":"M Bakro","year":"2023","unstructured":"Bakro M, Kumar RR, Alabrah AA, Ashraf Z, Bisoy SK, Parveen N et al (2023) Efficient intrusion detection system in the cloud using fusion feature selection approaches and an ensemble classifier. Electronics 12:2427","journal-title":"Electronics"},{"key":"657_CR14","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1201\/9781003185543-5","volume-title":"\"Recent advancements in the state of cloud security in cyber physical systems,\" Security and Resilience of Cyber Physical Systems","author":"J Verma","year":"2022","unstructured":"Verma J, Bhandari A, Singh G (2022) \u201cRecent advancements in the state of cloud security in cyber physical systems,\u201d Security and Resilience of Cyber Physical Systems. Chapman and Hall\/CRC, London, pp 49\u201360"},{"key":"657_CR15","unstructured":"M. Kavitha and A. J. S. Kumar, \"Optimizing Cloud Security with Fusion Feature Selection Techniques and an Ensemble Classifier for Intrusion Detection.\""},{"key":"657_CR16","doi-asserted-by":"publisher","first-page":"960","DOI":"10.1016\/j.procs.2024.03.285","volume":"233","author":"AD Vibhute","year":"2024","unstructured":"Vibhute AD, Patil CH, Mane AV, Kale KV (2024) Towards detection of network anomalies using machine learning algorithms on the NSL-KDD benchmark datasets. Proc Comp Sci 233:960\u2013969","journal-title":"Proc Comp Sci"},{"key":"657_CR17","doi-asserted-by":"publisher","first-page":"100612","DOI":"10.1016\/j.measen.2022.100612","volume":"25","author":"K Samunnisa","year":"2023","unstructured":"Samunnisa K, Kumar GS, Madhavi K (2023) Intrusion detection system in distributed cloud computing: Hybrid clustering and classification methods. Meas Sensors 25:100612","journal-title":"Meas Sensors"},{"key":"657_CR18","doi-asserted-by":"publisher","first-page":"3129","DOI":"10.1007\/s10586-021-03516-9","volume":"25","author":"G Sreelatha","year":"2022","unstructured":"Sreelatha G, Babu AV, Midhunchakkaravarthy D (2022) Improved security in cloud using sandpiper and extended equilibrium deep transfer learning based intrusion detection. Clust Comput 25:3129\u20133144","journal-title":"Clust Comput"},{"key":"657_CR19","doi-asserted-by":"publisher","first-page":"1916","DOI":"10.3390\/sym14091916","volume":"14","author":"A Aldallal","year":"2022","unstructured":"Aldallal A (2022) Toward efficient intrusion detection system using hybrid deep learning approach. Symmetry 14:1916","journal-title":"Symmetry"},{"key":"657_CR20","doi-asserted-by":"publisher","first-page":"1636","DOI":"10.1016\/j.procs.2024.01.161","volume":"232","author":"AD Vibhute","year":"2024","unstructured":"Vibhute AD, Nakum V (2024) Deep learning-based network anomaly detection and classification in an imbalanced cloud environment. Proc Comp Sci 232:1636\u20131645","journal-title":"Proc Comp Sci"},{"issue":"11","key":"657_CR21","first-page":"1","volume":"2022","author":"F Shahzad","year":"2022","unstructured":"Shahzad F, Mannan A, Javed AR, Almadhor AS, Baker T, Al-Jumeily OBE D (2022) Cloud-based multiclass anomaly detection and categorization using ensemble learning. J Cloud Comput 2022(11):1\u201312","journal-title":"J Cloud Comput"},{"key":"657_CR22","doi-asserted-by":"publisher","first-page":"254","DOI":"10.47392\/IRJAEH.2024.0041","volume":"2","author":"ZI Khan","year":"2024","unstructured":"Khan ZI, Afzal MM, Shamsi KN (2024) A comprehensive study on CIC-IDS2017 dataset for intrusion detection systems. Int Res J Adv Eng Hub (IRJAEH) 2:254\u2013260","journal-title":"Int Res J Adv Eng Hub (IRJAEH)"},{"key":"657_CR23","doi-asserted-by":"publisher","unstructured":"Ramadevi P, Baluprithviraj K, Pillai V, Subramaniam K (2022) Deep learning based distributed intrusion detection in secure cyber physical systems. Intell Automation Soft Comput 34: 2067-2081. https:\/\/doi.org\/10.32604\/iasc.2022.026377","DOI":"10.32604\/iasc.2022.026377"},{"key":"657_CR24","doi-asserted-by":"publisher","first-page":"1634","DOI":"10.1109\/TCC.2020.3001017","volume":"10","author":"W Wang","year":"2020","unstructured":"Wang W, Du X, Shan D, Qin R, Wang N (2020) Cloud intrusion detection method based on stacked contractive auto-encoder and support vector machine. IEEE Trans Cloud Comput 10:1634\u20131646","journal-title":"IEEE Trans Cloud Comput"},{"key":"657_CR25","doi-asserted-by":"publisher","first-page":"100557","DOI":"10.1016\/j.iot.2022.100557","volume":"19","author":"S Roy","year":"2022","unstructured":"Roy S, Li J, Bai Y (2022) A Two-layer fog-cloud intrusion detection model for IoT networks. Internet of Things. 19:100557. https:\/\/doi.org\/10.1016\/j.iot.2022.100557","journal-title":"Int Things"},{"key":"657_CR26","doi-asserted-by":"publisher","first-page":"2306","DOI":"10.3390\/sym13122306","volume":"13","author":"A Aldallal","year":"2021","unstructured":"Aldallal A, Alisa F (2021) Effective intrusion detection system to secure data in cloud using machine learning. Symmetry 13:2306","journal-title":"Symmetry"},{"key":"657_CR27","doi-asserted-by":"publisher","first-page":"19723","DOI":"10.1109\/ACCESS.2021.3054688","volume":"9","author":"S Rajagopal","year":"2021","unstructured":"Rajagopal S, Kundapur PP, Hareesha K (2021) Towards effective network intrusion detection: from concept to creation on Azure cloud. IEEE Access 9:19723\u201319742","journal-title":"IEEE Access"},{"key":"657_CR28","first-page":"100134","volume":"2","author":"S Lata","year":"2022","unstructured":"Lata S, Singh D (2022) Intrusion detection system in cloud environment: Literature survey & future research directions. Int J Inform Manage Data Insights 2:100134","journal-title":"Int J Inform Manage Data Insights"},{"key":"657_CR29","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1016\/j.patrec.2022.02.013","volume":"156","author":"E Balamurugan","year":"2022","unstructured":"Balamurugan E, Mehbodniya A, Kariri E, Yadav K, Kumar A, Haq MA (2022) Network optimization using defender system in cloud computing security based intrusion detection system withgame theory deep neural network (IDSGT-DNN). Pattern Recogn Lett 156:142\u2013151","journal-title":"Pattern Recogn Lett"},{"key":"657_CR30","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1515\/comp-2020-0214","volume":"11","author":"W Elmasry","year":"2021","unstructured":"Elmasry W, Akbulut A, Zaim AH (2021) A design of an integrated cloud-based intrusion detection system with third party cloud service. Open Comp Sci 11:365\u2013379","journal-title":"Open Comp Sci"},{"key":"657_CR31","doi-asserted-by":"publisher","first-page":"103719","DOI":"10.1016\/j.micpro.2020.103719","volume":"81","author":"A Mondal","year":"2021","unstructured":"Mondal A, Goswami RT (2021) Enhanced Honeypot cryptographic scheme and privacy preservation for an effective prediction in cloud security. Microprocess Microsyst 81:103719","journal-title":"Microprocess Microsyst"},{"key":"657_CR32","doi-asserted-by":"publisher","first-page":"152300","DOI":"10.1109\/ACCESS.2021.3126535","volume":"9","author":"M Nadeem","year":"2021","unstructured":"Nadeem M, Arshad A, Riaz S, Band SS, Mosavi A (2021) Intercept the cloud network from brute force and DDoS attacks via intrusion detection and prevention system. IEEE Access 9:152300\u2013152309","journal-title":"IEEE Access"},{"key":"657_CR33","doi-asserted-by":"publisher","first-page":"103236","DOI":"10.1016\/j.advengsoft.2022.103236","volume":"173","author":"M Mayuranathan","year":"2022","unstructured":"Mayuranathan M, Saravanan S, Muthusenthil B, Samydurai A (2022) An efficient optimal security system for intrusion detection in cloud computing environment using hybrid deep learning technique. Adv Eng Softw 173:103236","journal-title":"Adv Eng Softw"},{"key":"657_CR34","doi-asserted-by":"publisher","first-page":"565","DOI":"10.1109\/TCYB.2022.3163811","volume":"53","author":"L Vu","year":"2022","unstructured":"Vu L, Nguyen QU, Nguyen DN, Hoang DT, Dutkiewicz E (2022) Deep generative learning models for cloud intrusion detection systems. IEEE Trans Cybernet 53:565\u2013577","journal-title":"IEEE Trans Cybernet"},{"key":"657_CR35","doi-asserted-by":"publisher","first-page":"1917","DOI":"10.1007\/s11277-021-08569-y","volume":"126","author":"L Wen","year":"2022","unstructured":"Wen L (2022) Cloud computing intrusion detection technology based on BP-NN. Wireless Pers Commun 126:1917\u20131934","journal-title":"Wireless Pers Commun"},{"key":"657_CR36","doi-asserted-by":"publisher","first-page":"195","DOI":"10.3390\/info15040195","volume":"15","author":"M Shafi","year":"2024","unstructured":"Shafi M, Lashkari AH, Rodriguez V, Nevo R (2024) Toward generating a new cloud-based Distributed Denial of Service (DDoS) dataset and cloud intrusion traffic characterization. Information 15:195","journal-title":"Information"},{"key":"657_CR37","doi-asserted-by":"publisher","unstructured":"Vibhute A, Khan M, Kanade A, Patil C, Gaikwad S, Patel K, Saini J (2024) An LSTM \u2010based novel near\u2010real\u2010time multiclass network intrusion detection system for complex cloud environments. Concurrency and Computation: Practice and Experience 36. https:\/\/doi.org\/10.1002\/cpe.8024","DOI":"10.1002\/cpe.8024"},{"key":"657_CR38","first-page":"295","volume":"6","author":"SY Ali","year":"2024","unstructured":"Ali SY, Farooq U, Anum L, Mian NA, Asim M, Alyas T (2024) Securing cloud environments: a Convolutional Neural Network (CNN) approach to intrusion detection system. J Comput Biomed Inform 6:295\u2013308","journal-title":"J Comput Biomed Inform"},{"key":"657_CR39","doi-asserted-by":"publisher","unstructured":"Joraviya N, Gohil B, Rao UP (2024). DL-HIDS: deep learning-based host intrusion detection system using system calls-to-image for containerized cloud environment. J Supercomput 1\u201329. https:\/\/doi.org\/10.1007\/s11227-024-05895-3","DOI":"10.1007\/s11227-024-05895-3"},{"key":"657_CR40","unstructured":"Rathod G, Sabnis V, Jain JK (2024) Intrusion Detection System (IDS) in cloud computing using machine learning algorithms: A comparative study. Grenze Int J Eng Technol (GIJET) 10:1"},{"key":"657_CR41","first-page":"106","volume":"12","author":"NS Kumari","year":"2024","unstructured":"Kumari NS, Vurukonda N (2024) Support vector machine with grid search cross-validation for network intrusion detection in cloud. Int J Intell Syst Appl Eng 12:106\u2013113","journal-title":"Int J Intell Syst Appl Eng"},{"key":"657_CR42","doi-asserted-by":"publisher","first-page":"581","DOI":"10.18576\/amis\/160411","volume":"16","author":"P Varun","year":"2022","unstructured":"Varun P, Ashokkumar K (2022) Intrusion detection system in cloud security using deep convolutional network. Appl Math Inf Sci 16:581\u2013588","journal-title":"Appl Math Inf Sci"},{"key":"657_CR43","doi-asserted-by":"publisher","first-page":"2580","DOI":"10.3390\/app13042580","volume":"13","author":"MA Alohali","year":"2023","unstructured":"Alohali MA, Elsadig M, Al-Wesabi FN, Al Duhayyim M, Mustafa Hilal A, Motwakel A (2023) Enhanced chimp optimization-based feature selection with fuzzy logic-based intrusion detection system in cloud environment. Appl Sci 13:2580","journal-title":"Appl Sci"},{"key":"657_CR44","first-page":"62","volume":"6","author":"RSS Dittakavi","year":"2022","unstructured":"Dittakavi RSS (2022) Dimensionality reduction based intrusion detection system in cloud computing environment using machine learning. Int J Inform Cybersec 6:62\u201381","journal-title":"Int J Inform Cybersec"},{"key":"657_CR45","doi-asserted-by":"publisher","first-page":"599","DOI":"10.1007\/s10586-022-03629-9","volume":"26","author":"AK Sangaiah","year":"2023","unstructured":"Sangaiah AK, Javadpour A, Ja\u2019fari F, Pinto P, Zhang W, Balasubramanian S (2023) A hybrid heuristics artificial intelligence feature selection for intrusion detection classifiers in cloud of things.\". Cluster Comput 26:599\u2013612","journal-title":"Cluster Comput"},{"key":"657_CR46","doi-asserted-by":"publisher","first-page":"2637","DOI":"10.1007\/s11277-022-10063-y","volume":"128","author":"LK Vashishtha","year":"2023","unstructured":"Vashishtha LK, Singh AP, Chatterjee K (2023) HIDM: A hybrid intrusion detection model for cloud based systems. Wireless Pers Commun 128:2637\u20132666","journal-title":"Wireless Pers Commun"},{"key":"657_CR47","doi-asserted-by":"publisher","unstructured":"Mani S, Sundan B, Thangasamy A, Govindaraj L (2022) A new intrusion detection and prevention system using a hybrid deep neural network in cloud environment. https:\/\/doi.org\/10.1007\/978-981-19-0898-9_73","DOI":"10.1007\/978-981-19-0898-9_73"},{"key":"657_CR48","doi-asserted-by":"publisher","first-page":"1423","DOI":"10.3390\/electronics12061423","volume":"12","author":"B Rm","year":"2023","unstructured":"Rm B, Mk JK (2023) Intrusion detection on AWS cloud through hybrid deep learning algorithm. Electronics 12:1423","journal-title":"Electronics"}],"container-title":["Journal of Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-024-00657-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13677-024-00657-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-024-00657-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,14]],"date-time":"2024-05-14T11:06:57Z","timestamp":1715684817000},"score":1,"resource":{"primary":{"URL":"https:\/\/journalofcloudcomputing.springeropen.com\/articles\/10.1186\/s13677-024-00657-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,14]]},"references-count":48,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024,12]]}},"alternative-id":["657"],"URL":"https:\/\/doi.org\/10.1186\/s13677-024-00657-1","relation":{},"ISSN":["2192-113X"],"issn-type":[{"value":"2192-113X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,5,14]]},"assertion":[{"value":"7 December 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 April 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 May 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"101"}}