{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T15:44:36Z","timestamp":1774021476559,"version":"3.50.1"},"reference-count":57,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,4,11]],"date-time":"2025-04-11T00:00:00Z","timestamp":1744329600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,4,11]],"date-time":"2025-04-11T00:00:00Z","timestamp":1744329600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Big Data"],"DOI":"10.1186\/s40537-025-01146-1","type":"journal-article","created":{"date-parts":[[2025,4,11]],"date-time":"2025-04-11T11:17:42Z","timestamp":1744370262000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Towards a minimum universal features set for IoT DDoS attack detection"],"prefix":"10.1186","volume":"12","author":[{"given":"Osama","family":"Ebrahem","sequence":"first","affiliation":[]},{"given":"Salah","family":"Dowaji","sequence":"additional","affiliation":[]},{"given":"Suhel","family":"Alhammoud","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,11]]},"reference":[{"key":"1146_CR1","unstructured":"Kaspersky, DDoS attacks hit a record high in Q4 2021. https:\/\/www.kaspersky.com\/about\/press-releases\/2022_ddos-attacks-hit-a-record-high-in-q4-2021. Accessed 14 Mar 2024."},{"key":"1146_CR2","unstructured":"SECURELIST by Kaspersky, DDoS attacks in Q3 2022. https:\/\/securelist.com\/ddos-report-q3-2022\/107860\/. Accessed 14 Mar 2024."},{"key":"1146_CR3","unstructured":"Kaspersky, Kaspersky unveils an overview of IoT-related threats in 2023. https:\/\/www.kaspersky.com\/about\/press-releases\/2023_kaspersky-unveils-an-overview-of-iot-related-threats-in-2023. Accessed 15 Mar 2024."},{"issue":"3","key":"1146_CR4","first-page":"67","volume":"12","author":"V Karanam","year":"2023","unstructured":"Karanam V. Is there a Trojan: Literature survey and critical evaluation of the latest ml based modern intrusion detection systems in IOT environments. Int J Mach Learn Cybern. 2023;12(3):67\u201387.","journal-title":"Int J Mach Learn Cybern"},{"key":"1146_CR5","doi-asserted-by":"crossref","unstructured":"Hussain F, Abbas S, Fayyaz U, Shah G, Toqeer A, Ali A. Towards a Universal Features Set for IoT Botnet Attacks Detection. In: 2020 IEEE 23rd international multitopic conference (INMIC). Bahawalpur. IEEE; 2020.","DOI":"10.1109\/INMIC50486.2020.9318106"},{"key":"1146_CR6","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3009843","author":"DS Kurniabudi","year":"2020","unstructured":"Kurniabudi DS, Darmawijoyo MY, Idris B, Bamhdi AM, Budiarto R. CICIDS-2017 dataset feature analysis with information gain for anomaly detection. IEEE Access. 2020. https:\/\/doi.org\/10.1109\/ACCESS.2020.3009843.","journal-title":"IEEE Access"},{"issue":"105","key":"1146_CR7","first-page":"1","volume":"7","author":"S Kasongo","year":"2020","unstructured":"Kasongo S, Sun Y. Performance analysis of intrusion detection systems using a feature selection method on the UNSW-NB15 dataset. J Big Data. 2020;7(105):1\u201320.","journal-title":"J Big Data"},{"issue":"38","key":"1146_CR8","first-page":"1","volume":"8","author":"J Leevy","year":"2021","unstructured":"Leevy J, Hancock J, Zuech R, Khoshgoftaar T. Detecting cybersecurity attacks across different network features and learners. J Big Data. 2021;8(38):1\u201329.","journal-title":"J Big Data"},{"key":"1146_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101863","author":"M Shafiqa","year":"2020","unstructured":"Shafiqa M, Tiana Z, Bashir A, Duc X, Guizani M. IoT malicious traffic identification using wrapper-based feature selection mechanisms. Comput Secur. 2020. https:\/\/doi.org\/10.1016\/j.cose.2020.101863.","journal-title":"Comput Secur"},{"key":"1146_CR10","doi-asserted-by":"crossref","unstructured":"Susanto, Stiawan D, Arifin A, Rejito J, Idris M, Budiarto R. A Dimensionality Reduction Approach for Machine Learning Based IoT Botnet Detection. In: 2021 8th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI). Semarang, Indonesia. IEEE; 2021.","DOI":"10.23919\/EECSI53397.2021.9624299"},{"key":"1146_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2020.106229","author":"B Dedeturk","year":"2020","unstructured":"Dedeturk B, Akay B. Spam filtering using a logistic regression model trained by an artificial bee colony algorithm. Appl Soft Comput J. 2020. https:\/\/doi.org\/10.1016\/j.asoc.2020.106229.","journal-title":"Appl Soft Comput J."},{"issue":"5","key":"1146_CR12","doi-asserted-by":"publisher","first-page":"3242","DOI":"10.1109\/JIOT.2020.3002255","volume":"8","author":"M Shafiqa","year":"2021","unstructured":"Shafiqa M, Tiana Z, Bashir A, Duc X, Guizani M. CorrAUC: a malicious bot-IoT traffic detection method in IoT network using machine-learning techniques. IEEE Internet Things J. 2021;8(5):3242\u201354.","journal-title":"IEEE Internet Things J"},{"issue":"4","key":"1146_CR13","first-page":"395","volume":"5","author":"M Azmi","year":"2021","unstructured":"Azmi M, Foozy C, Sukri K, Abdullah N, Hamid I, Amnur H. Feature selection approach to detect DDoS attack using machine learning algorithms. Int J Inf Vis. 2021;5(4):395\u2013401.","journal-title":"Int J Inf Vis"},{"issue":"3","key":"1146_CR14","first-page":"120","volume":"9","author":"M Roopak","year":"2020","unstructured":"Roopak M, Tian G, Chambers J. Multi-objective-based feature selection for DDoS attack detection in IoT networks. Inst Eng Technol. 2020;9(3):120\u20137.","journal-title":"Inst Eng Technol"},{"key":"1146_CR15","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-021-02907-5","author":"D Kshirsagar","year":"2021","unstructured":"Kshirsagar D, Kumar S. A feature reduction based reflected and exploited DDoS attacks detection system. J Ambient Intell Human Comput. 2021. https:\/\/doi.org\/10.1007\/s12652-021-02907-5.","journal-title":"J Ambient Intell Human Comput."},{"key":"1146_CR16","doi-asserted-by":"publisher","first-page":"3749","DOI":"10.1007\/s13369-020-05181-3","volume":"46","author":"P Kumar","year":"2021","unstructured":"Kumar P, Gupta G, Tripathi R. Toward design of an intelligent cyber attack detection system using hybrid feature reduced approach for IoT networks. Arab J Sci Eng. 2021;46:3749\u201378.","journal-title":"Arab J Sci Eng"},{"issue":"6","key":"1146_CR17","doi-asserted-by":"publisher","first-page":"4944","DOI":"10.1109\/JIOT.2020.3034156","volume":"8","author":"S Popoola","year":"2021","unstructured":"Popoola S, Adebisi B, Hammoudeh M, Gui G, Gacanin H. Hybrid deep learning for botnet attack detection in the internet of things networks. IEEE Internet Things J. 2021;8(6):4944\u201356.","journal-title":"IEEE Internet Things J"},{"key":"1146_CR18","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-021-05947-3","author":"V Gaur","year":"2021","unstructured":"Gaur V, Kumar R. Analysis of machine learning classifiers for early detection of DDoS attacks on IoT devices. Arab J Sci Eng. 2021. https:\/\/doi.org\/10.1007\/s13369-021-05947-3.","journal-title":"Arab J Sci Eng"},{"issue":"14","key":"1146_CR19","doi-asserted-by":"publisher","first-page":"123","DOI":"10.3991\/ijim.v16i14.30197","volume":"16","author":"M Maabreh","year":"2022","unstructured":"Maabreh M, Obeidat I, Elsoud E, Alnajjar A, Alzyoud R, Darwish O. Towards data-driven network intrusion detection systems: features dimensionality reduction and machine learning. Int J Interact Mobile Technol. 2022;16(14):123\u201335.","journal-title":"Int J Interact Mobile Technol"},{"key":"1146_CR20","doi-asserted-by":"publisher","first-page":"10488","DOI":"10.1007\/s11227-021-03697-5","volume":"77","author":"S Gavel","year":"2021","unstructured":"Gavel S, Raghuvanshi A, Tiwari S. Distributed intrusion detection scheme using dual-axis dimensionality reduction for Internet of things (IoT). J Supercomput. 2021;77:10488\u2013511.","journal-title":"J Supercomput"},{"key":"1146_CR21","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1049\/trit.2020.0073","volume":"5","author":"MK Doreswamy","year":"2020","unstructured":"Doreswamy MK, Hooshmand IG. Feature selection approach using ensemble learning for network anomaly detection. CAAI Trans Intel Technol. 2020;5:283\u201393.","journal-title":"CAAI Trans Intel Technol"},{"key":"1146_CR22","doi-asserted-by":"crossref","unstructured":"Desai M, Shi Y, Suo K. IoT Bonet and Network Intrusion Detection using Dimensionality Reduction and Supervised Machine Learning. In: 2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON). New York City, USA. IEEE; 2020.","DOI":"10.1109\/UEMCON51285.2020.9298146"},{"issue":"11","key":"1146_CR23","first-page":"1422","volume":"26","author":"V Dutta","year":"2020","unstructured":"Dutta V, Chora\u015b M, Pawlicki M, Kozik R. Detection of cyberattacks traces in IoT data. J Univ Comput Sci. 2020;26(11):1422\u201334.","journal-title":"J Univ Comput Sci"},{"issue":"3","key":"1146_CR24","doi-asserted-by":"publisher","first-page":"2361","DOI":"10.32604\/csse.2023.026712","volume":"44","author":"R Alanazi","year":"2023","unstructured":"Alanazi R, Aljuhani A. Anomaly detection for industrial internet of things cyberattacks. Comput Syst Sci Eng. 2023;44(3):2361\u201378.","journal-title":"Comput Syst Sci Eng"},{"key":"1146_CR25","volume-title":"Detection of intrusions and malware, and vulnerability assessment DIMVA","author":"L Dhooge","year":"2022","unstructured":"Dhooge L, Verkerken M, Volckaert B, Wauters T, Turck F. Establishing the contaminating effect of metadata feature inclusion in machine-learned network intrusion detection models. In: Detection of intrusions and malware, and vulnerability assessment DIMVA. Cham: Springer; 2022."},{"issue":"2","key":"1146_CR26","doi-asserted-by":"publisher","first-page":"1153","DOI":"10.1109\/COMST.2015.2494502","volume":"18","author":"A Buczak","year":"2016","unstructured":"Buczak A, Guven E. A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Commun Surv Tutorials. 2016;18(2):1153\u201376.","journal-title":"IEEE Commun Surv Tutorials"},{"key":"1146_CR27","doi-asserted-by":"publisher","DOI":"10.1016\/j.dajour.2023.100233","author":"M Vishwakarma","year":"2023","unstructured":"Vishwakarma M, Kesswani N. A new two-phase intrusion detection system with Na\u00efve Bayes machine learning for data classification and elliptic envelop method for anomaly detection. Decis Anal J. 2023. https:\/\/doi.org\/10.1016\/j.dajour.2023.100233.","journal-title":"Decis Anal J"},{"key":"1146_CR28","doi-asserted-by":"publisher","DOI":"10.1016\/j.mlwa.2021.100156","author":"J Onah","year":"2021","unstructured":"Onah J, Abdulhamid S, Abdullahi M, Hassan I, Al-Ghusham A. Genetic Algorithm based feature selection and Na\u00efve Bayes for anomaly detection in fog computing environment. Mach Learn Appl. 2021. https:\/\/doi.org\/10.1016\/j.mlwa.2021.100156.","journal-title":"Mach Learn Appl"},{"key":"1146_CR29","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102158","author":"J Gu","year":"2021","unstructured":"Gu J, Lu S. An effective intrusion detection approach using SVM with na\u00efve Bayes feature embedding. Comput Secur. 2021. https:\/\/doi.org\/10.1016\/j.cose.2020.102158.","journal-title":"Comput Secur"},{"key":"1146_CR30","unstructured":"Kuang Q, Zhao L. A practical GPU based KNN algorithm. In: Proceedings. The 2009 international symposium on computer science and computational technology (ISCSCI 2009). Citeseer; 2009; 151."},{"issue":"11","key":"1146_CR31","doi-asserted-by":"publisher","first-page":"2159","DOI":"10.1109\/TPAMI.2014.25","volume":"36","author":"TE Schouten","year":"2014","unstructured":"Schouten TE, Broek VD, EL. Fast exact euclidean distance (feed): a new class of adaptable distance transforms. IEEE Trans Pattern Anal Mach Intell. 2014;36(11):2159\u201372.","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"34","key":"1146_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3441448","volume":"15","author":"S Ying","year":"2021","unstructured":"Ying S, Wang B, Wang L, Li Q, Zhao Y, Shang J, Huang H, Cheng G, Yang Z, Geng J. An improved KNN-based efficient log anomaly detection method with automatically labeled samples. ACM Trans Knowl Discov Data. 2021;15(34):1\u201322.","journal-title":"ACM Trans Knowl Discov Data"},{"issue":"2","key":"1146_CR33","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1142\/S0218194020500114","volume":"30","author":"B Wang","year":"2020","unstructured":"Wang B, Ying S, Sheng J, Wang R, Yang Z, Dong B. Log-based anomaly detection with the improved K-nearest neighbor. Int J Software Eng Knowl Eng. 2020;30(2):239\u201362.","journal-title":"Int J Software Eng Knowl Eng"},{"key":"1146_CR34","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/9084704","author":"F Bao","year":"2020","unstructured":"Bao F, Wu Y, Li Z, Li Y, Liu L, Chen G. Effect improved for high-dimensional and unbalanced data anomaly detection model based on KNN-SMOTE-LSTM. Complex J. 2020. https:\/\/doi.org\/10.1155\/2020\/9084704.","journal-title":"Complex J"},{"key":"1146_CR35","volume-title":"Data Mining: Concepts and Techniques","author":"J Han","year":"2011","unstructured":"Han J, Kamber M, Pei J. Data Mining: Concepts and Techniques. Burlington: Morgan Kaufmann; 2011."},{"key":"1146_CR36","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1016\/j.procs.2016.06.016","volume":"89","author":"M Belavagi","year":"2016","unstructured":"Belavagi M, Muniyal B. Performance evaluation of supervised machine learning algorithms for intrusion detection. Procedia Comput Sci. 2016;89:117\u201323.","journal-title":"Procedia Comput Sci"},{"issue":"2","key":"1146_CR37","first-page":"1520","volume":"13","author":"A Hadi","year":"2018","unstructured":"Hadi A. Performance analysis of big data intrusion detection system over random forest algorithm. Int J Appl Eng Res. 2018;13(2):1520\u20137.","journal-title":"Int J Appl Eng Res"},{"key":"1146_CR38","doi-asserted-by":"crossref","unstructured":"Jiang J, Wang Q, Shi Z, Lv B, Qi B. RST-RF: A hybrid model based on rough set theory and random forest for network intrusion detection. In: ICCSP 2018: Proceedings of the 2nd International Conference on Cryptography, Security and Privacy. Guiyang. 2018; 77\u201381.","DOI":"10.1145\/3199478.3199489"},{"issue":"5","key":"1146_CR39","first-page":"3","volume":"2019","author":"R Singh","year":"2019","unstructured":"Singh R, Dalal S, Chauhan K, Kumar D. Optimization of FAR in intrusion detection system by using random forest algorithm. SSRN Electron J. 2019;2019(5):3\u20136.","journal-title":"SSRN Electron J"},{"issue":"5\u20136","key":"1146_CR40","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1016\/S1532-0464(03)00034-0","volume":"35","author":"S Dreiseitl","year":"2002","unstructured":"Dreiseitl S, Ohno-Machado L. Logistic regression and artificial neural network classification models: a methodology review. J Biomed Inform. 2002;35(5\u20136):352\u20139.","journal-title":"J Biomed Inform"},{"key":"1146_CR41","unstructured":"Kaggle, Feature Selection - Variance Threshold. https:\/\/www.kaggle.com\/code\/tanmayunhale\/feature-selection-variance-threshold. Accessed 27 Apr 2024."},{"key":"1146_CR42","unstructured":"Scikit learn, 1.13. Feature selection. https:\/\/scikit-learn.org\/stable\/modules\/feature_selection.html#variance-threshold. Accessed 27 Apr 2024."},{"key":"1146_CR43","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.119527","author":"K Chaudhari","year":"2023","unstructured":"Chaudhari K, Thakkar A. Neural network systems with an integrated coefficient of variation-based feature selection for stock price and trend prediction. Exp Syst Appl. 2023. https:\/\/doi.org\/10.1016\/j.eswa.2023.119527.","journal-title":"Exp Syst Appl"},{"key":"1146_CR44","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2024.111267","author":"C Tsai","year":"2024","unstructured":"Tsai C, Chen K, Lin W. Feature selection and its combination with data over-sampling for multi-class imbalanced datasets. Appl Soft Comput. 2024. https:\/\/doi.org\/10.1016\/j.asoc.2024.111267.","journal-title":"Appl Soft Comput"},{"key":"1146_CR45","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1016\/j.future.2024.05.013","volume":"159","author":"A Fatima","year":"2024","unstructured":"Fatima A, Rehman O, Ali S, Niazi M. ELIDS: ensemble feature selection for lightweight IDS against DDoS attacks in resource-constrained IoT environment. Futur Gener Comput Syst. 2024;159:172\u201387.","journal-title":"Futur Gener Comput Syst"},{"key":"1146_CR46","volume-title":"Computational linguistics and intelligent text processing","author":"B Agarwal","year":"2013","unstructured":"Agarwal B, Mittal N. Optimal feature selection for sentiment analysis. In: Computational linguistics and intelligent text processing. Cham: Springer; 2013."},{"key":"1146_CR47","volume-title":"Proceedings of the international conference on cloud & ubiquitous computing & emerging technologies (CUBE)","author":"A Tesfahun","year":"2013","unstructured":"Tesfahun A, Bhaskari D. Intrusion detection using random forests classifier with smote and feature reduction. In: Proceedings of the international conference on cloud & ubiquitous computing & emerging technologies (CUBE). Pune: IEEE; 2013."},{"key":"1146_CR48","volume-title":"International conference on sensing, diagnostics, prognostics, and control (SDPC), Shanghai","author":"M Pena","year":"2017","unstructured":"Pena M, Alvarez X, Jad\u00e1n D, Lucero P, Barrag\u00e1n M, Guam\u00e1n R, S\u00e1nchez V, Cerrada M. ANOVA and cluster distance based contributions for feature empirical analysis to fault diagnosis in rotating machinery. In: International conference on sensing, diagnostics, prognostics, and control (SDPC), Shanghai. China: IEEE; 2017."},{"issue":"2","key":"1146_CR49","first-page":"26","volume":"6","author":"M Kandel","year":"2023","unstructured":"Kandel M, Rizk F, Hongou L, Zaki A, Khan H, El-Kenawy E. Evaluating the efficacy of deep learning architectures in predicting traffic patterns for smart city development. J Artif Intell Metaheur. 2023;6(2):26\u201335.","journal-title":"J Artif Intell Metaheur"},{"key":"1146_CR50","doi-asserted-by":"publisher","DOI":"10.1007\/s42600-024-00389-w","author":"R Dubey","year":"2024","unstructured":"Dubey R, Bodade R, Dubey D. Two-way analysis of variance (ANOVA) ranking of features based on wavelet bi-phase and bi-spectrum for the classification of adventitious lung sounds. Res Biomed Eng. 2024. https:\/\/doi.org\/10.1007\/s42600-024-00389-w.","journal-title":"Res Biomed Eng"},{"key":"1146_CR51","volume-title":"International conference on next generation computing technologies (NGCT) Dehradun","author":"D Sharma","year":"2015","unstructured":"Sharma D. Implementing chi-square method and even mirroring for cryptography of speech signal using matlab. In: International conference on next generation computing technologies (NGCT) Dehradun. India: IEEE; 2015."},{"key":"1146_CR52","unstructured":"Stratosphere Lab, Aposemat IoT-23 A labeled dataset with malicious and benign IoT network traffic. https:\/\/www.stratosphereips.org\/datasets-iot23. Accessed 5 May 2024."},{"key":"1146_CR53","unstructured":"Canadian Institute for Cybersecurity, Intrusion detection evaluation dataset (CIC-IDS2017). https:\/\/www.unb.ca\/cic\/datasets\/ids-2017.html. Accessed 5 May 2024."},{"key":"1146_CR54","unstructured":"CICFLOWMETER. https:\/\/github.com\/ahlashkari\/CICFlowMeter. Accessed 30 Apr 2024."},{"key":"1146_CR55","unstructured":"WinDump, tcpdump for Windows using WinPcap. https:\/\/www.winpcap.org\/windump\/. Accessed 30 Apr 2024."},{"key":"1146_CR56","unstructured":"CICFLOWMETER. https:\/\/github.com\/ahlashkari\/CICFlowMeter\/blob\/master\/ReadMe.txt. Accessed 30 Apr 2024."},{"key":"1146_CR57","unstructured":"Scikit Learn, Machine Learning in Python. https:\/\/scikit-learn.org\/stable. Accessed 3 May 2024."}],"container-title":["Journal of Big Data"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s40537-025-01146-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s40537-025-01146-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s40537-025-01146-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,11]],"date-time":"2025-04-11T11:17:53Z","timestamp":1744370273000},"score":1,"resource":{"primary":{"URL":"https:\/\/journalofbigdata.springeropen.com\/articles\/10.1186\/s40537-025-01146-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,11]]},"references-count":57,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["1146"],"URL":"https:\/\/doi.org\/10.1186\/s40537-025-01146-1","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-4899214\/v1","asserted-by":"object"}]},"ISSN":["2196-1115"],"issn-type":[{"value":"2196-1115","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,4,11]]},"assertion":[{"value":"12 August 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 March 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 April 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"88"}}