{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T15:42:53Z","timestamp":1773157373263,"version":"3.50.1"},"reference-count":68,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,9,17]],"date-time":"2024-09-17T00:00:00Z","timestamp":1726531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2024,9,17]],"date-time":"2024-09-17T00:00:00Z","timestamp":1726531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cloud Comp"],"DOI":"10.1186\/s13677-024-00703-y","type":"journal-article","created":{"date-parts":[[2024,9,18]],"date-time":"2024-09-18T12:48:08Z","timestamp":1726663688000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Toward security quantification of serverless computing"],"prefix":"10.1186","volume":"13","author":[{"given":"Kan","family":"Ni","sequence":"first","affiliation":[]},{"given":"Subrota Kumar","family":"Mondal","sequence":"additional","affiliation":[]},{"given":"H M Dipu","family":"Kabir","sequence":"additional","affiliation":[]},{"given":"Tian","family":"Tan","sequence":"additional","affiliation":[]},{"given":"Hong-Ning","family":"Dai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,9,17]]},"reference":[{"key":"703_CR1","doi-asserted-by":"crossref","unstructured":"Wen J, Chen Z, Liu Y, Lou Y, Ma Y, Huang G, Jin X, Liu X (2021) An empirical study on challenges of application development in serverless computing. In: Proceedings of the 29th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, Athens, pp 416\u2013428","DOI":"10.1145\/3468264.3468558"},{"issue":"1","key":"703_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13677-021-00253-7","volume":"10","author":"HB Hassan","year":"2021","unstructured":"Hassan HB, Barakat SA, Sarhan QI (2021) Survey on serverless computing. J Cloud Comput 10(1):1\u201329","journal-title":"J Cloud Comput"},{"key":"703_CR3","unstructured":"Hellerstein JM, Faleiro JM, Gonzalez J, Schleier-Smith J, Sreekanti V, Tumanov A, Wu C (2019) Serverless computing: One step forward, two steps back. In: 9th Biennial Conference on Innovative Data Systems Research, CIDR 2019, Asilomar, CA, USA, January 13-16, 2019, Online Proceedings. http:\/\/cidrdb.org\/cidr2019\/papers\/p119-hellerstein-cidr19.pdf"},{"key":"703_CR4","doi-asserted-by":"crossref","unstructured":"Baldini I, Castro P, Chang K, Cheng P, Fink S, Ishakian V, Mitchell N, Muthusamy V, Rabbah R, Slominski A, et\u00a0al (2017) Serverless computing: Current trends and open problems. In: Research advances in cloud computing, Springer, pp 1\u201320","DOI":"10.1007\/978-981-10-5026-8_1"},{"key":"703_CR5","doi-asserted-by":"crossref","unstructured":"Ifrah S (2019) Deploy a containerized application with amazon eks. In: Deploy Containers on AWS, Springer, pp 135\u2013173","DOI":"10.1007\/978-1-4842-5101-0_4"},{"key":"703_CR6","doi-asserted-by":"crossref","unstructured":"Krishnan S, Gonzalez JLU (2015) Building your next big thing with google cloud platform: A guide for developers and enterprise architects. Springer","DOI":"10.1007\/978-1-4842-1004-8"},{"key":"703_CR7","doi-asserted-by":"publisher","unstructured":"Mohanty SK, Premsankar G, di\u00a0Francesco M (2018) An evaluation of open source serverless computing frameworks. In: 2018 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), pp 115\u2013120. https:\/\/doi.org\/10.1109\/CloudCom2018.2018.00033","DOI":"10.1109\/CloudCom2018.2018.00033"},{"key":"703_CR8","unstructured":"(2021) Alex ellis (2019) the power of interfaces in openfaas. https:\/\/blog.alexellis.io\/the-power-of-interfaces-openfaas\/. Accessed 15 Nov 2021"},{"key":"703_CR9","unstructured":"Kaewkasi C (2018) Docker for Serverless Applications: Containerize and orchestrate functions using OpenFaas, OpenWhisk, and Fn. Packt Publishing Ltd"},{"key":"703_CR10","doi-asserted-by":"crossref","unstructured":"Kaviani N, Kalinin D, Maximilien M (2019) Towards serverless as commodity: a case of knative. In: Proceedings of the 5th International Workshop on Serverless Computing, UC Davis, pp 13\u201318","DOI":"10.1145\/3366623.3368135"},{"key":"703_CR11","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1016\/j.ins.2015.01.025","volume":"305","author":"M Ali","year":"2015","unstructured":"Ali M, Khan SU, Vasilakos AV (2015) Security in cloud computing: Opportunities and challenges. Inf Sci 305:357\u2013383. https:\/\/doi.org\/10.1016\/j.ins.2015.01.025","journal-title":"Inf Sci"},{"issue":"2","key":"703_CR12","doi-asserted-by":"publisher","first-page":"2937","DOI":"10.1007\/s11227-021-03982-3","volume":"78","author":"SK Mondal","year":"2022","unstructured":"Mondal SK, Pan R, Kabir H, Tian T, Dai HN (2022) Kubernetes in it administration and serverless computing: An empirical study and research challenges. J Supercomput 78(2):2937\u20132987","journal-title":"J Supercomput"},{"issue":"1","key":"703_CR13","first-page":"18","volume":"22","author":"PR Garvey","year":"1998","unstructured":"Garvey PR, Lansdowne ZF (1998) Risk matrix: an approach for identifying, assessing, and ranking program risks. Air Force J Logist 22(1):18\u201321","journal-title":"Air Force J Logist"},{"key":"703_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/bs.mcps.2020.03.002","volume":"4","author":"FI Khan","year":"2020","unstructured":"Khan FI, Amyotte PR, Amin MT (2020) Advanced methods of risk assessment and management: An overview. Methods Chem Process Saf 4:1\u201334","journal-title":"Methods Chem Process Saf"},{"key":"703_CR15","doi-asserted-by":"crossref","unstructured":"Anthony (Tony) Cox Jr L (2008) What\u2019s wrong with risk matrices? Risk Anal Int J 28(2):497\u2013512","DOI":"10.1111\/j.1539-6924.2008.01030.x"},{"key":"703_CR16","doi-asserted-by":"publisher","unstructured":"Mauw S, Oostdijk M (2006) Foundations of attack trees. In: Information Security and Cryptology - ICISC 2005, Berlin, Heidelberg, vol 3935, pp 186\u2013198. https:\/\/doi.org\/10.1007\/11734727_17","DOI":"10.1007\/11734727_17"},{"key":"703_CR17","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1007\/978-3-642-19751-2_6","volume-title":"Formal Aspects of Security and Trust","author":"B Kordy","year":"2011","unstructured":"Kordy B, Mauw S, Radomirovi\u0107 S, Schweitzer P (2011) Foundations of attack-defense trees. Formal Aspects of Security and Trust. Springer, Berlin, Heidelberg, pp 80\u201395"},{"issue":"1","key":"703_CR18","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1093\/logcom\/exs029","volume":"24","author":"B Kordy","year":"2012","unstructured":"Kordy B, Mauw S, Radomirovi\u0107 S, Schweitzer P (2012) Attack\u2013defense trees1. J Log Comput 24(1):55\u201387. https:\/\/doi.org\/10.1093\/logcom\/exs029","journal-title":"J Log Comput"},{"key":"703_CR19","unstructured":"Ingoldsby TR (2010) Attack tree-based threat risk analysis. Amenaza Technologies Limited, pp 3\u20139"},{"key":"703_CR20","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/s10009-020-00593-w","volume":"23","author":"RR Hansen","year":"2021","unstructured":"Hansen RR, Larsen KG, Legay A, Jensen PG, Poulsen DB (2021) Adtlang: a programming language approach to attack defense trees. Int J Softw Tools Technol Transfer 23:89\u2013104","journal-title":"Int J Softw Tools Technol Transfer"},{"key":"703_CR21","doi-asserted-by":"crossref","unstructured":"Broccia G, ter Beek MH, Lluch\u00a0Lafuente A, Spoletini P, Ferrari A (2024) Assessing the understandability and acceptance of attack-defense trees for modelling security requirements. In: International Working Conference on Requirements Engineering: Foundation for Software Quality, Springer, pp 39\u201356","DOI":"10.1007\/978-3-031-57327-9_3"},{"key":"703_CR22","unstructured":"(2021) Ent-attack tree modeling tool. https:\/\/github.com\/jimmythompson\/ent. Accessed 15 Oct 2021"},{"key":"703_CR23","volume-title":"Seamonster: Providing tool support for security modeling","author":"PH Meland","year":"2008","unstructured":"Meland PH, Spampinato DG, Hagen E, Baadshaug ET, Krister KM, Velle KS (2008) Seamonster: Providing tool support for security modeling. Norsk informasjonssikkerhetskonferanse, NISK"},{"key":"703_CR24","unstructured":"Kordy P, Schweitzer P (2012) The adtool manual. University of Luxembourg"},{"key":"703_CR25","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1007\/978-3-642-40196-1_15","volume-title":"International conference on quantitative evaluation of systems","author":"B Kordy","year":"2013","unstructured":"Kordy B, Kordy P, Mauw S, Schweitzer P (2013) Adtool: security analysis with attack-defense trees. International conference on quantitative evaluation of systems. Springer, Berlin, Heidelberg, pp 173\u2013176"},{"key":"703_CR26","unstructured":"Byres EJ, Franz M, Miller D (2004) The use of attack trees in assessing vulnerabilities in scada systems. In: Proceedings of the international infrastructure survivability workshop, Citeseer, Lisbon, pp 3\u201310"},{"issue":"4","key":"703_CR27","first-page":"124","volume":"23","author":"V Saini","year":"2008","unstructured":"Saini V, Duan Q, Paruchuri V (2008) Threat modeling using attack trees. J Comput Sci Coll 23(4):124\u2013131","journal-title":"J Comput Sci Coll"},{"key":"703_CR28","first-page":"1","volume-title":"2010 Fifth International Conference on Risks and Security of Internet and Systems (CRiSIS)","author":"H Pardue","year":"2010","unstructured":"Pardue H, Yasinsac A, Landry J (2010) Towards internet voting security: A threat tree for risk assessment. 2010 Fifth International Conference on Risks and Security of Internet and Systems (CRiSIS). IEEE, Montreal, pp 1\u20137"},{"key":"703_CR29","doi-asserted-by":"crossref","unstructured":"Kordy B, Pouly M, Schweitzer P (2014) A probabilistic framework for security scenarios with dependent actions. In: Integrated Formal Methods: 11th International Conference, IFM 2014, Bertinoro, Italy, September 9-11, 2014, Proceedings 11, Springer, pp 256\u2013271","DOI":"10.1007\/978-3-319-10181-1_16"},{"key":"703_CR30","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1007\/978-3-319-48393-1_24","volume-title":"The Practice of Enterprise Modeling","author":"M Fraile","year":"2016","unstructured":"Fraile M, Ford M, Gadyatskaya O, Kumar R, Stoelinga M, Trujillo-Rasua R (2016) Using attack-defense trees to analyze threats and countermeasures in an atm: a case study. The Practice of Enterprise Modeling. Springer, Sk\u00f6vde, pp 326\u2013334"},{"key":"703_CR31","first-page":"147","volume-title":"2011 First ACIS\/JNU International Conference on Computers","author":"S Tanimoto","year":"2011","unstructured":"Tanimoto S, Hiramoto M, Iwashita M, Sato H, Kanai A (2011) Risk management on the security problem in cloud computing. 2011 First ACIS\/JNU International Conference on Computers. Networks, Systems and Industrial Engineering, IEEE, Jeju, pp 147\u2013152"},{"key":"703_CR32","doi-asserted-by":"publisher","first-page":"426","DOI":"10.1109\/NBiS.2014.11","volume-title":"2014 17th International Conference on Network-Based Information Systems","author":"S Tanimoto","year":"2014","unstructured":"Tanimoto S, Sato R, Kato K, Iwashita M, Seki Y, Sato H, Kanai A (2014) A study of risk assessment quantification in cloud computing. 2014 17th International Conference on Network-Based Information Systems. IEEE, Salerno, pp 426\u2013431"},{"issue":"3","key":"703_CR33","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1166\/jno.2023.3398","volume":"18","author":"J Li","year":"2023","unstructured":"Li J, Wu Y, Li Y, Zhang Z, Fouad H, Altameem T (2023) A network security prediction method based on attack defense tree. J Nanoelectron Optoelectron 18(3):357\u2013366","journal-title":"J Nanoelectron Optoelectron"},{"issue":"6","key":"703_CR34","doi-asserted-by":"publisher","first-page":"10475","DOI":"10.3233\/JIFS-201126","volume":"40","author":"S Wang","year":"2021","unstructured":"Wang S, Ding L, Sui H, Gu Z (2021) Cybersecurity risk assessment method of ics based on attack-defense tree model. J Intell Fuzzy Syst 40(6):10475\u201310488","journal-title":"J Intell Fuzzy Syst"},{"key":"703_CR35","doi-asserted-by":"publisher","unstructured":"Bryans J, Liew LS, Nguyen HN, Sabaliauskaite G, Shaikh SA (2023) Formal template-based generation of attack\u2013defence trees for automated security analysis. Information 14(9). https:\/\/doi.org\/10.3390\/info14090481","DOI":"10.3390\/info14090481"},{"key":"703_CR36","doi-asserted-by":"crossref","unstructured":"Meng B, Viswanathan A, Paul S, Smith W, Moitra A, Siu K, Durling M (2024) Attack\u2013defense tree-based analysis and optimal defense synthesis for system design. Innovations in Systems and Software Engineering 1\u201317.\u00a0https:\/\/link.springer.com\/article\/10.1007\/s11334-024-00556-3#citeas","DOI":"10.1007\/s11334-024-00556-3"},{"key":"703_CR37","doi-asserted-by":"crossref","unstructured":"Bj\u00f8rner N, Phan AD, Fleckenstein L (2015) $$\\nu$$z - an optimizing smt solver. In: Baier C, Tinelli C (eds) Tools and Algorithms for the Construction and Analysis of Systems. Springer, Berlin Heidelberg, Berlin, Heidelberg, pp 194\u2013199","DOI":"10.1007\/978-3-662-46681-0_14"},{"key":"703_CR38","doi-asserted-by":"crossref","unstructured":"Sabharwal N, Pandey P (2020) Getting started with prometheus and alert manager. In: Monitoring Microservices and Containerized Applications, Springer, pp 43\u201383","DOI":"10.1007\/978-1-4842-6216-0_3"},{"key":"703_CR39","unstructured":"Turnbull J (2018) Monitoring with Prometheus. Turnbull Press"},{"key":"703_CR40","unstructured":"Brazil B (2018) Prometheus: Up & Running: Infrastructure and Application Performance Monitoring, 1st edn. O\u2019Reilly Media, Inc"},{"key":"703_CR41","unstructured":"Labs G (2022) Grafana dashboard. https:\/\/grafana.com\/grafana\/dashboards\/. Accessed 24 June 2022"},{"key":"703_CR42","unstructured":"Aron A, Aron EN (1999) Statistics for psychology. Prentice-Hall, Inc"},{"issue":"7","key":"703_CR43","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1145\/1364782.1364786","volume":"51","author":"B Hayes","year":"2008","unstructured":"Hayes B (2008) Cloud computing. Commun ACM 51(7):9\u201311. https:\/\/doi.org\/10.1145\/1364782.1364786","journal-title":"Commun ACM"},{"key":"703_CR44","unstructured":"Jonas E, Schleier-Smith J, Sreekanti V, Tsai C, Khandelwal A, Pu Q, Shankar V, Carreira J, Krauth K, Yadwadkar NJ, Gonzalez JE, Popa RA, Stoica I, Patterson DA (2019) Cloud programming simplified: A berkeley view on serverless computing. CoRR. arXiv:1902.03383"},{"key":"703_CR45","unstructured":"Almorsy M, Grundy J, Mueller I (2010) An analysis of the cloud computing security problem. In: APSEC 2010 Cloud Workshop, Sydney, pp 1\u20136"},{"issue":"3","key":"703_CR46","first-page":"79","volume":"5","author":"TS Chou","year":"2013","unstructured":"Chou TS (2013) Security threats on cloud computing vulnerabilities. Int J Comput Sci Inf Technol 5(3):79","journal-title":"Int J Comput Sci Inf Technol"},{"key":"703_CR47","unstructured":"Almond C (2009) A practical guide to cloud computing security. A white paper from Accenture and Microsoft, pp 3\u20139"},{"issue":"4","key":"703_CR48","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1145\/1402946.1402967","volume":"38","author":"M Al-Fares","year":"2008","unstructured":"Al-Fares M, Loukissas A, Vahdat A (2008) A scalable, commodity data center network architecture. ACM SIGCOMM Comput Commun Rev 38(4):63\u201374","journal-title":"ACM SIGCOMM Comput Commun Rev"},{"key":"703_CR49","unstructured":"(2024) Mitre cve database. https:\/\/cve.mitre.org. Accessed 26 May 2024"},{"key":"703_CR50","doi-asserted-by":"crossref","unstructured":"Sen J (2015) Security and privacy issues in cloud computing. In: Cloud technology: concepts, methodologies, tools, and applications, IGI global, pp 1585\u20131630","DOI":"10.4018\/978-1-4666-6539-2.ch074"},{"key":"703_CR51","unstructured":"(2022) Tencent cloud says \u2018improper operations\u2019 led to data loss for client as it seeks to implement improvements. https:\/\/www.scmp.com\/tech\/article\/2158785\/tencent-cloud-says-improper-operations-led-data-loss-client-it-seeks-implement. Accessed 31 Jan 2022"},{"key":"703_CR52","doi-asserted-by":"publisher","unstructured":"Priebe C, Muthukumaran D, O\u2019\u00a0Keeffe D, Eyers D, Shand B, Kapitza R, Pietzuch P (2014) Cloudsafetynet: Detecting data leakage between cloud tenants. In: Proceedings of the 6th Edition of the ACM Workshop on Cloud Computing Security, Association for Computing Machinery, Scottsdale, Arizona, USA, CCSW \u201914, p 117\u2013128. https:\/\/doi.org\/10.1145\/2664168.2664174","DOI":"10.1145\/2664168.2664174"},{"key":"703_CR53","unstructured":"(2024) Mitre d3fend knwoledge graph. https:\/\/cve.mitre.org. Accessed 26 May 2024"},{"key":"703_CR54","doi-asserted-by":"publisher","first-page":"52976","DOI":"10.1109\/ACCESS.2019.2911732","volume":"7","author":"S Sultan","year":"2019","unstructured":"Sultan S, Ahmad I, Dimitriou T (2019) Container security: issues, challenges, and the road ahead. IEEE Access 7:52976\u201352996","journal-title":"IEEE Access"},{"key":"703_CR55","unstructured":"Strom BE, Applebaum A, Miller DP, Nickels KC, Pennington AG, Thomas CB (2018) Mitre att &ck: design and philosophy. Tech. rep"},{"key":"703_CR56","unstructured":"(2022) Secure containerized environments with updated threat matrix for kubernetes. https:\/\/www.microsoft.com\/security\/blog\/2021\/03\/23\/secure-containerized-environments-with-updated-threat-matrix-for-kubernetes\/. Accessed 1 Feb 2022"},{"key":"703_CR57","first-page":"2","volume":"239","author":"D Merkel","year":"2014","unstructured":"Merkel D et al (2014) (2014) Docker: lightweight linux containers for consistent development and deployment. Linux J 239:2","journal-title":"Linux J"},{"key":"703_CR58","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1109\/Confluence47617.2020.9058115","volume-title":"2020 10th International Conference on Cloud Computing, Data Science & Engineering (Confluence)","author":"A Tomar","year":"2020","unstructured":"Tomar A, Jeena D, Mishra P, Bisht R (2020) Docker security: A threat model, attack taxonomy and real-time attack scenario of dos. 2020 10th International Conference on Cloud Computing, Data Science & Engineering (Confluence). IEEE, Noida, pp 150\u2013155"},{"key":"703_CR59","doi-asserted-by":"crossref","unstructured":"Diemert D, Jager T (2021) On the tight security of tls 1.3: Theoretically sound cryptographic parameters for real-world deployments. J Cryptol 34(3):1\u201357","DOI":"10.1007\/s00145-021-09388-x"},{"key":"703_CR60","doi-asserted-by":"crossref","unstructured":"Copeland M (2021) Azure sentinel overview. In: Cloud Defense Strategies with Azure Sentinel, Springer, pp 3\u201338","DOI":"10.1007\/978-1-4842-7132-2_1"},{"key":"703_CR61","first-page":"237","volume-title":"2014 IEEE 15th International Symposium on Computational Intelligence and Informatics (CINTI)","author":"F Holik","year":"2014","unstructured":"Holik F, Horalek J, Marik O, Neradova S, Zitta S (2014) Effective penetration testing with metasploit framework and methodologies. 2014 IEEE 15th International Symposium on Computational Intelligence and Informatics (CINTI). IEEE, Budapest, pp 237\u2013242"},{"key":"703_CR62","unstructured":"Kennedy D, O\u2019gorman J, Kearns D, Aharoni M (2011) Metasploit: the penetration tester\u2019s guide. No Starch Press"},{"key":"703_CR63","unstructured":"(2022) Nats introduction. https:\/\/docs.nats.io\/, Accessed 1 Feb 2022"},{"key":"703_CR64","unstructured":"T S, K SN (2019) A study on modern messaging systems- kafka, rabbitmq and NATS streaming. CoRR. arXiv:1912.03715"},{"key":"703_CR65","doi-asserted-by":"publisher","unstructured":"Kwon S, Son S, Choi Y, Lee JH (2020) Protocol fuzzing to find security vulnerabilities of rabbitmq. Concurr Comput Pract Experience 33. https:\/\/doi.org\/10.1002\/cpe.6012","DOI":"10.1002\/cpe.6012"},{"key":"703_CR66","unstructured":"McAteer IN, Malik MI, Baig Z, Hannay P (2017) Security vulnerabilities and cyber threat analysis of the AMQP protocol for the internet of things. In: Valli C (Ed). The Proceedings of 15th Australian Information Security Management Conference, 5\u20136 December 2017, Edith Cowan University, Perth, pp 70\u201380"},{"issue":"1","key":"703_CR67","doi-asserted-by":"publisher","first-page":"134","DOI":"10.3390\/s19010134","volume":"19","author":"B Leang","year":"2019","unstructured":"Leang B, Ean S, Ryu G, Yoo KH (2019) Improvement of Kafka streaming using partition and multi-threading in big data environment. Sensors 19(1):134","journal-title":"Sensors"},{"key":"703_CR68","unstructured":"Jalal A, Zeb MA (2008) Security enhancement for e-learning portal. Int J Comput Sci Netw Secur 8(3):41\u201345"}],"container-title":["Journal of Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-024-00703-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13677-024-00703-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-024-00703-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,20]],"date-time":"2024-09-20T15:05:27Z","timestamp":1726844727000},"score":1,"resource":{"primary":{"URL":"https:\/\/journalofcloudcomputing.springeropen.com\/articles\/10.1186\/s13677-024-00703-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,17]]},"references-count":68,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024,12]]}},"alternative-id":["703"],"URL":"https:\/\/doi.org\/10.1186\/s13677-024-00703-y","relation":{},"ISSN":["2192-113X"],"issn-type":[{"value":"2192-113X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,9,17]]},"assertion":[{"value":"17 January 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 August 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 September 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"The authors declare no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"140"}}