{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,26]],"date-time":"2026-01-26T13:38:26Z","timestamp":1769434706519,"version":"3.49.0"},"reference-count":56,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2026,1,26]],"date-time":"2026-01-26T00:00:00Z","timestamp":1769385600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2026,1,26]],"date-time":"2026-01-26T00:00:00Z","timestamp":1769385600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100012165","name":"Key Technologies Research and Development Program","doi-asserted-by":"publisher","award":["2023YFB3106303"],"award-info":[{"award-number":["2023YFB3106303"]}],"id":[{"id":"10.13039\/501100012165","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cybersecurity"],"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>The trend of heterogeneous servers and the rise of Software-Defined Data Center (SDDC) have transformed data center management. Collaborative management of hardware and software is crucial for rapid deployment and migration. As the boundary between physical infrastructure and virtual infrastructure blurs, data center management faces challenges in fine-grained resource provisioning, energy efficiency optimization, and security assurance. To address these challenges, this paper proposes a novel Software-Defined Platform Management (SDPM) architecture based on out-of-band management. This architecture extends server platform management capabilities from physical infrastructure to virtual machines. By abstracting heterogeneous resources into execution points managed by a centralized control plane and consolidating standard industry interfaces, the architecture introduces capabilities for resource provisioning, energy consumption regulation, as well as access control and trusted computing support. A prototype implementation on a real server and experimental results demonstrate that the architecture can dynamically allocate resources based on predictions of virtual machine workloads, optimize energy consumption through workload-aware and temperature-driven fan control, and support secure communication channels to implement advanced access control policies. These results highlight SDPM\u2019s potential in advancing resource provisioning, energy efficiency, and security in modern data centers.<\/jats:p>","DOI":"10.1186\/s42400-025-00410-4","type":"journal-article","created":{"date-parts":[[2026,1,26]],"date-time":"2026-01-26T03:02:27Z","timestamp":1769396547000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Software-Defined platform management for data center: security, low entropy, and efficiency"],"prefix":"10.1186","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-1941-5606","authenticated-orcid":false,"given":"Da","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Haojun","family":"Xia","sequence":"additional","affiliation":[]},{"given":"Xiaotong","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Bibo","family":"Tu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,26]]},"reference":[{"key":"410_CR1","doi-asserted-by":"publisher","first-page":"93294","DOI":"10.1109\/ACCESS.2019.2927822","volume":"7","author":"Aaqif Afzaal Abbasi","year":"2019","unstructured":"Abbasi Aaqif Afzaal, Abbasi Almas, Shamshirband Shahaboddin, Chronopoulos Anthony Theodore, Persico Valerio, Pescape Antonio (2019) Software-defined cloud computing: a systematic review on latest trends and developments. IEEE Access 7:93294\u201393314","journal-title":"IEEE Access"},{"key":"410_CR2","doi-asserted-by":"crossref","unstructured":"Ali G, Hass J, Sill A, Hojati E, Dang T, Chen Y (2022) Redfish-nagios: A scalable out-of-band data center monitoring framework based on redfish telemetry model. In: fifth international workshop on systems and network telemetry and analytics, pp 3\u201311","DOI":"10.1145\/3526064.3534108"},{"key":"410_CR3","doi-asserted-by":"crossref","unstructured":"Barwasser A, Lentes J, Riedel O, Zimmermann N, Dangelmaier M, Zhang J (2022) Method for the development of software-defined manufacturing equipment. In: international journal of production research, pp 1\u201318","DOI":"10.1080\/00207543.2022.2129501"},{"issue":"1","key":"410_CR4","doi-asserted-by":"publisher","first-page":"655","DOI":"10.1109\/COMST.2015.2489183","volume":"18","author":"A Blenk","year":"2015","unstructured":"Blenk A, Basta A, Reisslein M, Kellerer W (2015) Survey on network virtualization hypervisors for software defined networking. IEEE Commun Surv Tutor 18(1):655\u2013685","journal-title":"IEEE Commun Surv Tutor"},{"issue":"1","key":"410_CR5","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1109\/MSP.2009.12","volume":"7","author":"F Callegati","year":"2009","unstructured":"Callegati F, Cerroni W, Ramilli M (2009) Man-in-the-middle attack to the https protocol. IEEE Secur Privacy 7(1):78\u201381","journal-title":"IEEE Secur Privacy"},{"key":"410_CR6","doi-asserted-by":"crossref","unstructured":"Chou C-H, Bhuyan LN, Wong D (2019) $$\\mu$$dpm: Dynamic power management for the microsecond era. In: 2019 IEEE international symposium on high performance computer architecture (HPCA), pp 120\u2013132. IEEE","DOI":"10.1109\/HPCA.2019.00032"},{"key":"410_CR7","unstructured":"Codexlynx\/hardware-attacks-state-of-the-art: Microarchitectural exploitation and other hardware attacks. https:\/\/github.com\/codexlynx\/hardware-attacks-state-of-the-art"},{"key":"410_CR8","unstructured":"CVE (2019) Cve-2019-6260. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2019-6260,"},{"key":"410_CR9","doi-asserted-by":"crossref","unstructured":"Darabseh A, Al-Ayyoub M, Jararweh Y, Benkhelifa E, Vouk M, Rindos A (2015) Sddc: A software defined datacenter experimental framework. In: 2015 3rd international conference on future internet of things and cloud, pp 189\u2013194. IEEE","DOI":"10.1109\/FiCloud.2015.127"},{"key":"410_CR10","doi-asserted-by":"crossref","unstructured":"Darabseh A, Al-Ayyoub M, Jararweh Y, Benkhelifa E, Vouk M, Rindos A (2015) Sdstorage: a software defined storage experimental framework. In: 2015 IEEE international conference on cloud engineering, pp 341\u2013346. IEEE","DOI":"10.1109\/IC2E.2015.60"},{"key":"410_CR11","unstructured":"Dell (2023) Dell lifecycle controller. https:\/\/www.dell.com\/support\/manuals\/en-us\/poweredge-r250\/idrac9_5.00.00.00_ug\/benefits-of-using-idrac?guid=guid-71ad314e-737c-45a1-be7a-38ec50d403b9&lang=en-us"},{"key":"410_CR12","unstructured":"DMTF (2015) Redfish specification. https:\/\/www.dmtf.org\/sites\/default\/files\/standards\/documents\/DSP0266_1.8.0.pdf"},{"key":"410_CR13","unstructured":"Eduard K (2022) Sophisticated ilobleed rootkit targets hp servers. https:\/\/www.securityweek.com\/sophisticated-ilobleed-rootkit-targets-hp-servers\/"},{"key":"410_CR14","unstructured":"Farmer D (2013) Ipmi: Freight train to hell or linda wu & the night of the leeches. http:\/\/fish2.com\/ipmi\/itrain.pdf"},{"key":"410_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2024.112112","volume":"215","author":"D Feitosa","year":"2024","unstructured":"Feitosa D, Penca M-T, Berardi M, Boza R-D, Andrikopoulos V (2024) Mining for cost awareness in the infrastructure as code artifacts of cloud-based applications: an exploratory study. J Syst Softw 215:112112","journal-title":"J Syst Softw"},{"key":"410_CR16","unstructured":"Fielding RT (2000) Architectural styles and the design of network-based software architectures. University of California, Irvine"},{"issue":"2","key":"410_CR17","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1145\/3369758","volume":"63","author":"J Frazelle","year":"2020","unstructured":"Frazelle J (2020) Opening up the baseboard management controller. Commun ACM 63(2):38\u201340","journal-title":"Commun ACM"},{"key":"410_CR18","unstructured":"Github (2025) Arealuser\/sdpm-data. https:\/\/github.com\/arealuser\/sdpm-data, April"},{"key":"410_CR19","unstructured":"Google\/cluster-data: Borg cluster traces from google. https:\/\/github.com\/google\/cluster-data"},{"key":"410_CR20","unstructured":"Green web dataset. https:\/\/www.thegreenwebfoundation.org\/tools\/green-web-dataset\/"},{"key":"410_CR21","doi-asserted-by":"crossref","unstructured":"Guo J, Chang Z, Wang S, Ding H, Feng Y, Mao L, Bao Y (2019) Who limits the resource efficiency of my datacenter: An analysis of alibaba datacenter traces. In: proceedings of the international symposium on quality of service, IWQoS 2019, Phoenix, AZ, USA, June 24-25, 2019, pp 39:1\u201339:10. ACM","DOI":"10.1145\/3326285.3329074"},{"key":"410_CR22","unstructured":"HPE (2023) Hpe ilo 5. https:\/\/support.hpe.com\/hpesc\/public\/docDisplay?docId=a00105236en_us"},{"key":"410_CR23","doi-asserted-by":"crossref","unstructured":"Huang G, Luo C, Wu K, Ma Y, Zhang Y, Liu X (2019) Software-defined infrastructure for decentralized data lifecycle governance: principled design and open challenges. In: 2019 IEEE 39th international conference on distributed computing systems (ICDCS), pp 1674\u20131683. IEEE","DOI":"10.1109\/ICDCS.2019.00166"},{"key":"410_CR24","unstructured":"Huawei (2014) High throughput computing data center architecture thinking of data center 3.0. http:\/\/www.ctiforum.com\/uploadfile\/2014\/0724\/20140724033415389.pdf"},{"key":"410_CR25","unstructured":"Huawei (2023) Huawei ibma. https:\/\/support.huawei.com\/enterprise\/en\/doc\/EDOC1100121685\/df27dfc3\/ibma-management"},{"key":"410_CR26","unstructured":"Ilobleed (2021) Take the lights-out implant.arm.ilobleed.a. https:\/\/threats.amnpardaz.com\/en\/wp-content\/uploads\/sites\/5\/2021\/12\/Implant.ARM_.iLOBleed.a-en.pdf"},{"key":"410_CR27","doi-asserted-by":"crossref","unstructured":"Ilsche T, Hackenberg D, Sch\u00f6ne R, Bielert M, H\u00f6pfner F, Nagel WE (2019) Metricq: a scalable infrastructure for processing high-resolution time series data. In: 2019 IEEE\/ACM industry\/university joint international workshop on data-center automation, analytics, and control (DAAC), pp 7\u201312. IEEE","DOI":"10.1109\/DAAC49578.2019.00007"},{"key":"410_CR28","unstructured":"Institute U (2014) data center industry survey. https:\/\/journal.uptimeinstitute.com\/2014-data-center-industry-survey\/, 2014"},{"key":"410_CR29","unstructured":"Intel (2013) Intelligent platform management interface specification. https:\/\/www.intel.com\/content\/dam\/www\/public\/us\/en\/documents\/product-briefs\/ipmi-second-gen-interface-spec-v2-rev1-1.pdf"},{"key":"410_CR30","unstructured":"Intel (2018) Rack scale design architecture. https:\/\/www.intel.com\/content\/dam\/www\/public\/us\/en\/documents\/white-papers\/rack-scale-design-architecture-white-paper.pdf"},{"key":"410_CR31","doi-asserted-by":"crossref","unstructured":"Islam MA, Ren S, Wierman A (2017) Exploiting a thermal side channel for power attacks in multi-tenant data centers. In: proceedings of the 2017 ACM SIGSAC conference on computer and communications security, CCS 2017, Dallas, TX, USA, October 30 - November 03, 2017, pp 1079\u20131094. ACM","DOI":"10.1145\/3133956.3133994"},{"key":"410_CR32","doi-asserted-by":"publisher","first-page":"883","DOI":"10.1016\/j.future.2018.01.038","volume":"107","author":"Y Jararweh","year":"2020","unstructured":"Jararweh Y, Al-Ayyoub M, Benkhelifa E et al (2020) An experimental framework for future smart cities using data fusion and software defined systems: the case of environmental monitoring for smart healthcare. Futur Gener Comput Syst 107:883\u2013897","journal-title":"Futur Gener Comput Syst"},{"key":"410_CR33","doi-asserted-by":"crossref","unstructured":"Jeanmart S, Gueheneuc Y-G, Sahraoui H, Habra N (2009) Impact of the visitor pattern on program comprehension and maintenance. In: 2009 3rd International symposium on empirical software engineering and measurement, pp 69\u201378. IEEE","DOI":"10.1109\/ESEM.2009.5316015"},{"issue":"2\/3","key":"410_CR34","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1147\/JRD.2014.2298133","volume":"58","author":"G Kandiraju","year":"2014","unstructured":"Kandiraju G, Hubertus Franke MD, Williams Malgorzata Steinder, Black SM (2014) Software defined infrastructures. IBM J Res Develop 58(2\/3):2","journal-title":"IBM J Res Develop"},{"key":"410_CR35","unstructured":"Kogler A, Juffinger J, Giner L, Gerlach L, Schwarzl M, Schwarz M, Gruss D, Mangard S (2023) $$\\{$$Collide+ Power$$\\}$$: Leaking inaccessible data with software-based power side channels. In: 32nd USENIX security symposium (USENIX Security 23), pp 7285\u20137302"},{"key":"410_CR36","doi-asserted-by":"crossref","unstructured":"Kuncoro IW, Pambudi NA, Biddinika MK, Widiastuti I, Hijriawan M, Wibowo KM (2019) Immersion cooling as the next technology for data center cooling: A review. J Phys Conf Ser. 1402,pp 044057. IOP Publishing","DOI":"10.1088\/1742-6596\/1402\/4\/044057"},{"issue":"5","key":"410_CR37","doi-asserted-by":"publisher","first-page":"2002","DOI":"10.1109\/TCYB.2019.2927410","volume":"50","author":"Y Li","year":"2019","unstructured":"Li Y, Wen Y, Tao D, Guan K (2019) Transforming cooling optimization for green data center via deep reinforcement learning. IEEE Trans Cybernet 50(5):2002\u20132013","journal-title":"IEEE Trans Cybernet"},{"key":"410_CR38","doi-asserted-by":"crossref","unstructured":"Li J, Ali G, Nguyen N, Hass J, Sill A, Dang T, Chen Y (2020) Monster: an out-of-the-box monitoring tool for high performance computing systems. In 2020 IEEE international conference on cluster computing (CLUSTER), pp 119\u2013129. IEEE","DOI":"10.1109\/CLUSTER49012.2020.00022"},{"key":"410_CR39","doi-asserted-by":"crossref","unstructured":"Lipp M, Kogler A, Oswald D, Schwarz M, Easdon C, Canella C, Gruss D (2021) Platypus: software-based power side-channel attacks on x86. In: 2021 IEEE symposium on security and privacy (SP), pp ages 355\u2013371. IEEE","DOI":"10.1109\/SP40001.2021.00063"},{"key":"410_CR40","doi-asserted-by":"crossref","unstructured":"Liu H, Xia H, Tu B, Zhang D, Wang X (2022) A secure and efficient usb-based in-band communication interface between host and bmc. In: 2022 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable computing & communications, social computing & networking (ISPA\/BDCloud\/SocialCom\/SustainCom), pp 228\u2013237. IEEE","DOI":"10.1109\/ISPA-BDCloud-SocialCom-SustainCom57177.2022.00036"},{"key":"410_CR41","doi-asserted-by":"crossref","unstructured":"Li C, Wang Z, Hou X, Chen H, Liang X, Guo M (2016) Power attack defense: securing battery-backed data centers. In: 43rd ACM\/IEEE Annual international symposium on computer architecture, ISCA 2016, Seoul, South Korea, June 18-22, 2016, pp 493\u2013505. IEEE Computer Society","DOI":"10.1109\/ISCA.2016.50"},{"issue":"4","key":"410_CR42","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1145\/1899928.1899933","volume":"44","author":"R McDougall","year":"2010","unstructured":"McDougall R, Anderson J (2010) Virtualization performance: perspectives and challenges ahead. ACM SIGOPS Op Syst Rev 44(4):40\u201356","journal-title":"ACM SIGOPS Op Syst Rev"},{"issue":"2","key":"410_CR43","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1145\/1355734.1355746","volume":"38","author":"N McKeown","year":"2008","unstructured":"McKeown N, Anderson T, Balakrishnan H, Parulkar G, Peterson L, Rexford J, Shenker S, Turner J (2008) Openflow: enabling innovation in campus networks. ACM SIGCOMM Comput Commun Rev 38(2):69\u201374","journal-title":"ACM SIGCOMM Comput Commun Rev"},{"key":"410_CR44","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11432-017-9240-4","volume":"60","author":"H Mei","year":"2017","unstructured":"Mei H (2017) Understanding software-defined from an os perspective: technical challenges and research issues. Sci China Inf Sci 60:1\u20133","journal-title":"Sci China Inf Sci"},{"key":"410_CR45","unstructured":"Moore HD (2020) A penetration tester\u2019s guide to ipmi and bmcs. https:\/\/www.rapid7.com\/blog\/post\/2013\/07\/02\/a-penetration-testers-guide-to-ipmi\/"},{"key":"410_CR46","unstructured":"Moore JD, Chase JS, Ranganathan P, Sharma RK (2005) Making scheduling \"cool\": temperature-aware workload placement in data centers. In: proceedings of the 2005 USENIX annual technical conference, April 10-15, 2005, Anaheim, CA, USA, pp 61\u201375. USENIX"},{"key":"410_CR47","doi-asserted-by":"publisher","first-page":"1402745","DOI":"10.3389\/fdata.2024.1402745","volume":"7","author":"Petar Radanliev","year":"2024","unstructured":"Radanliev Petar, Roure David, Maple Carsten, Nurse Jason RC, Nicolescu Razvan, Ani Uchenna (2024) Ai security and cyber risk in iot systems. Front Big Data 7:1402745","journal-title":"Front Big Data"},{"key":"410_CR48","doi-asserted-by":"crossref","unstructured":"Radanliev P, Santos O, Brandon-Jones A (2024) Capability hardware enhanced instructions and artificial intelligence bill of materials in trustworthy artificial intelligence systems: analyzing cybersecurity threats, exploits, and vulnerabilities in new software bills of materials with artificial intelligence. J Defense Model Simul 15485129241267919","DOI":"10.1177\/15485129241267919"},{"key":"410_CR49","unstructured":"Rick A (2019) Common bmc vulnerabilities and how to avoid repeating them. https:\/\/www.osfc.io\/2019\/talks\/common-bmc-vulnerabilities-and-how-to-avoid-repeating-them\/"},{"issue":"3","key":"410_CR50","doi-asserted-by":"publisher","first-page":"2454","DOI":"10.1109\/COMST.2018.2834731","volume":"20","author":"Amir Roozbeh","year":"2018","unstructured":"Roozbeh Amir, Soares Joao, Maguire Gerald Q, Wuhib Fetahi, Padala Chakri, Mahloo Mozhgan, Turull Daniel, Yadhav Vinay, Kosti\u0107 Dejan (2018) Software-defined hardware infrastructures: a survey on enabling technologies and open research directions. IEEE Communi. Surv. Tutor. 20(3):2454\u20132485","journal-title":"IEEE Communi. Surv. Tutor."},{"key":"410_CR51","doi-asserted-by":"crossref","unstructured":"Sakalkar V, Kontorinis V, Landhuis D, Li S, De\u00a0Ronde D, Blooming T, Ramesh A, Kennedy J, Malone C, Clidaras J, et\u00a0al (2020) Data center power oversubscription with a medium voltage power plane and priority-aware capping. In Proceedings of the Twenty-Fifth International Conference on Architectural Support for Programming Languages and Operating Systems, pages 497\u2013511","DOI":"10.1145\/3373376.3378533"},{"key":"410_CR52","unstructured":"Thomas K (2020) Ipmi sensor monitoring plugin. https:\/\/www.thomaskrenn.com\/en\/wiki\/IPMI_Sensor_Monitoring_Plugin_setup"},{"key":"410_CR53","unstructured":"Wang Y, Paccagnella R, He ET, Shacham H, Fletcher CW, Kohlbrenner D (2022) Hertzbleed: Turning power $$\\{$$Side-Channel$$\\}$$ attacks into remote timing attacks on x86. In: 31st USENIX Security Symposium (USENIX Security 22), pp 679\u2013697"},{"key":"410_CR54","doi-asserted-by":"crossref","unstructured":"Xue J, Chen R, Shao Z (2022) Softssd: Software-defined ssd development platform for rapid flash firmware prototyping. In: 2022 IEEE 40th international conference on computer design (ICCD), pp 602\u2013609. IEEE","DOI":"10.1109\/ICCD56317.2022.00094"},{"issue":"9","key":"410_CR55","doi-asserted-by":"publisher","first-page":"1149","DOI":"10.1360\/N112017-00069","volume":"47","author":"X Zhiwei","year":"2017","unstructured":"Zhiwei X, Li C (2017) Low-entropy cloud computing systems. Scientia Sinica Informationis 47(9):1149\u20131163","journal-title":"Scientia Sinica Informationis"},{"issue":"1","key":"410_CR56","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1007\/s11390-022-2898-7","volume":"38","author":"X Zhi-Wei","year":"2023","unstructured":"Zhi-Wei X, Li Z-Y, Zi-Shu Yu, Li F-Z (2023) Information superbahn: towards a planet-scale, low-entropy and high-goodput computing utility. J Comput Sci Technol 38(1):103\u2013114","journal-title":"J Comput Sci Technol"}],"container-title":["Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-025-00410-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s42400-025-00410-4","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-025-00410-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,26]],"date-time":"2026-01-26T03:02:45Z","timestamp":1769396565000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1186\/s42400-025-00410-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,26]]},"references-count":56,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2026,12]]}},"alternative-id":["410"],"URL":"https:\/\/doi.org\/10.1186\/s42400-025-00410-4","relation":{},"ISSN":["2523-3246"],"issn-type":[{"value":"2523-3246","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1,26]]},"assertion":[{"value":"26 December 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 April 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 January 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"18"}}