{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:55:53Z","timestamp":1772326553169,"version":"3.50.1"},"reference-count":51,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cybersecurity"],"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>Malware classification is a contemporary and ongoing challenge in cyber-security: modern obfuscation techniques are able to evade traditional static analysis, while dynamic analysis is too resource intensive to be deployed at a large-scale. One prominent line of research addresses these limitations by converting malware binaries into 2D images by heuristically reshaping them into a 2D grid before resizing using Lanczos resampling. These images can then be classified based on their textural information using computer vision approaches. While this approach can detect obfuscated malware more effectively than static analysis; the process of converting files into 2D images results in significant information loss due to both quantisation noise, caused by rounding to integer pixel values, and the introduction of 2D dependencies which do not exist in the original data. This loss of signal limits the classification performance of the downstream model. This work addresses these weaknesses by instead resizing the files into 1D signals which avoids the need for heuristic reshaping, additionally these signals do not suffer from quantisation noise due to being stored in a floating-point format. It is shown that existing 2D CNN architectures can be readily adapted to classify these 1D signals for improved performance. Furthermore, a bespoke 1D convolutional neural network, based on the ResNet architecture and squeeze-and-excitation layers, was developed to classify these signals and evaluated on the MalNet dataset. It was found to achieve state-of-the-art performance on binary, type, and family level classification with F1 scores of 0.874, 0.503, and 0.507, respectively, paving the way for future models to operate on the proposed signal modality.<\/jats:p>","DOI":"10.1186\/s42400-025-00454-6","type":"journal-article","created":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:02:00Z","timestamp":1772323320000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Signal-based malware classification using 1D CNNs"],"prefix":"10.1186","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-8046-7770","authenticated-orcid":false,"given":"Jack","family":"Wilkie","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5195-8193","authenticated-orcid":false,"given":"Hanan","family":"Hindy","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9093-5245","authenticated-orcid":false,"given":"Ivan","family":"Andonovic","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9150-6805","authenticated-orcid":false,"given":"Christos","family":"Tachtatzis","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6206-2229","authenticated-orcid":false,"given":"Robert","family":"Atkinson","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,3,1]]},"reference":[{"key":"454_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2021.102828","volume":"59","author":"A Abusitta","year":"2021","unstructured":"Abusitta A, Li MQ, Fung BC (2021) Malware classification and composition analysis: a survey of recent developments. J Inf Secur Appl 59:102828. https:\/\/doi.org\/10.1016\/j.jisa.2021.102828","journal-title":"J Inf Secur Appl"},{"key":"454_CR2","doi-asserted-by":"publisher","unstructured":"Allix K, Bissyand\u00e9 TF, Klein J, et\u00a0al (2016) Androzoo: collecting millions of android apps for the research community. In: Proceedings of the 13th international conference on mining software repositories. ACM, New York, NY, USA, MSR \u201916, pp 468\u2013471, https:\/\/doi.org\/10.1145\/2901739.2903508","DOI":"10.1145\/2901739.2903508"},{"key":"454_CR3","doi-asserted-by":"publisher","unstructured":"Alsulami B, Mancoridis S (2018) Behavioral malware classification using convolutional recurrent neural networks. In: 2018 13th international conference on malicious and unwanted software (MALWARE), pp 103\u2013111, https:\/\/doi.org\/10.1109\/MALWARE.2018.8659358","DOI":"10.1109\/MALWARE.2018.8659358"},{"key":"454_CR4","doi-asserted-by":"publisher","unstructured":"Anderson B, Storlie C, Lane T (2012) Improving malware classification: bridging the static\/dynamic gap. In: Proceedings of the 5th ACM workshop on security and artificial intelligence. Association for Computing Machinery, New York, NY, USA, AISec \u201912, pp 3\u201314, https:\/\/doi.org\/10.1145\/2381896.2381900","DOI":"10.1145\/2381896.2381900"},{"key":"454_CR5","unstructured":"Anderson HS, Roth P (2018) EMBER: an open dataset for training static PE malware machine learning models. ArXiv e-prints arXiv:1804.04637 [cs.CR]"},{"key":"454_CR6","doi-asserted-by":"publisher","unstructured":"Bovenzi G, Cerasuolo F, Montieri A, et\u00a0al (2022) A comparison of machine and deep learning models for detection and classification of android malware traffic. In: 2022 IEEE symposium on computers and communications (ISCC), pp 1\u20136, https:\/\/doi.org\/10.1109\/ISCC55528.2022.9912986","DOI":"10.1109\/ISCC55528.2022.9912986"},{"issue":"19","key":"454_CR7","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11193064","volume":"11","author":"X Chong","year":"2022","unstructured":"Chong X, Gao Y, Zhang R (2022) Classification of malware families based on efficient-net and 1d-cnn fusion. Electronics 11(19):3064","journal-title":"Electronics"},{"key":"454_CR8","doi-asserted-by":"crossref","unstructured":"Conti G, Dean E, Sinda M (2008) Visual reverse engineering of binary and data files. In: Goodall JR, Conti G, Ma KL (eds) Visualization for computer security. Springer, Berlin Heidelberg, Berlin, Heidelberg, pp 1\u201317","DOI":"10.1007\/978-3-540-85933-8_1"},{"key":"454_CR9","doi-asserted-by":"publisher","unstructured":"Conti G, Bratus S, Shubina A et al (2010) Automated mapping of large binary objects using primitive fragment type classification. Digit Investig 7:S3\u2013S12. https:\/\/doi.org\/10.1016\/j.diin.2010.05.002. https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1742287610000290, the Proceedings of the Tenth Annual DFRWS Conference","DOI":"10.1016\/j.diin.2010.05.002"},{"key":"454_CR10","doi-asserted-by":"publisher","DOI":"10.1088\/2632-2153\/aced7f","volume":"4","author":"G Daly","year":"2023","unstructured":"Daly G, Fieldsend J, Hassall G et al (2023) Data-driven plasma modelling: surrogate collisional radiative models of fluorocarbon plasmas from deep generative autoencoders. Mach Learn Sci Technol 4:035035. https:\/\/doi.org\/10.1088\/2632-2153\/aced7f","journal-title":"Mach Learn Sci Technol"},{"issue":"4","key":"454_CR11","doi-asserted-by":"publisher","first-page":"485","DOI":"10.3390\/electronics10040485","volume":"10","author":"R Damasevicius","year":"2021","unstructured":"Damasevicius R, Ven\u010dkauskas A, Toldinas J et al (2021) Ensemble-based classification using neural networks and machine learning models for windows PE malware detection. Electronics 10(4):485. https:\/\/doi.org\/10.3390\/electronics10040485","journal-title":"Electronics"},{"key":"454_CR12","doi-asserted-by":"publisher","unstructured":"Deng X, Mirkovic J (2022) Polymorphic malware behavior through network trace analysis. pp 138\u2013146, https:\/\/doi.org\/10.1109\/COMSNETS53615.2022.9668396","DOI":"10.1109\/COMSNETS53615.2022.9668396"},{"issue":"2","key":"454_CR13","doi-asserted-by":"publisher","first-page":"2756","DOI":"10.1109\/JSYST.2023.3238678","volume":"17","author":"KA Dhanya","year":"2023","unstructured":"Dhanya KA, Vinod P, Yerima SY et al (2023) Obfuscated malware detection in IoT android applications using Markov images and CNN. IEEE Syst J 17(2):2756\u20132766. https:\/\/doi.org\/10.1109\/JSYST.2023.3238678","journal-title":"IEEE Syst J"},{"issue":"2","key":"454_CR14","doi-asserted-by":"publisher","first-page":"1165","DOI":"10.1109\/TNSM.2021.3075315","volume":"18","author":"M Dib","year":"2021","unstructured":"Dib M, Torabi S, Bou-Harb E et al (2021) A multi-dimensional deep learning framework for IoT malware classification and family attribution. IEEE Trans Netw Serv Manage 18(2):1165\u20131177. https:\/\/doi.org\/10.1109\/TNSM.2021.3075315","journal-title":"IEEE Trans Netw Serv Manage"},{"key":"454_CR15","unstructured":"Freitas S, Dong Y, Neil J, et\u00a0al (2021) A large-scale database for graph representation learning. arXiv:2011.07682"},{"key":"454_CR16","unstructured":"Gennissen J, Blasco J (2017) Gamut : sifting through images to detect android malware. https:\/\/api.semanticscholar.org\/CorpusID:44430018"},{"key":"454_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101873","volume":"95","author":"D Gibert","year":"2020","unstructured":"Gibert D, Mateu C, Planes J (2020) Hydra: a multimodal deep learning framework for malware classification. Comput Secur 95:101873. https:\/\/doi.org\/10.1016\/j.cose.2020.101873","journal-title":"Comput Secur"},{"key":"454_CR18","doi-asserted-by":"publisher","unstructured":"Hasegawa C, Iyatomi H (2018) One-dimensional convolutional neural networks for android malware detection. In: 2018 IEEE 14th international colloquium on signal processing & its applications (CSPA), pp 99\u2013102, https:\/\/doi.org\/10.1109\/CSPA.2018.8368693","DOI":"10.1109\/CSPA.2018.8368693"},{"key":"454_CR19","doi-asserted-by":"crossref","unstructured":"He K, Zhang X, Ren S, et\u00a0al (2015) Deep residual learning for image recognition. arXiv:1512.03385","DOI":"10.1109\/CVPR.2016.90"},{"key":"454_CR20","doi-asserted-by":"crossref","unstructured":"He K, Zhang X, Ren S, et\u00a0al (2016) Identity mappings in deep residual networks. arXiv:1603.05027","DOI":"10.1007\/978-3-319-46493-0_38"},{"key":"454_CR21","doi-asserted-by":"crossref","unstructured":"He T, Zhang Z, Zhang H, et\u00a0al (2018) Bag of tricks for image classification with convolutional neural networks. arXiv:1812.01187","DOI":"10.1109\/CVPR.2019.00065"},{"key":"454_CR22","unstructured":"Hendrycks D, Gimpel K (2023) Gaussian error linear units (gelus). arXiv:1606.08415"},{"key":"454_CR23","doi-asserted-by":"crossref","unstructured":"Hu J, Shen L, Sun G (2018) Squeeze-and-excitation networks. In: Proceedings of the IEEE conference on computer vision and pattern recognition (CVPR)","DOI":"10.1109\/CVPR.2018.00745"},{"key":"454_CR24","doi-asserted-by":"crossref","unstructured":"Huang THD, Kao HY (2018) R2-d2: color-inspired convolutional neural network (cnn)-based android malware detections. arXiv:1705.04448","DOI":"10.1109\/BigData.2018.8622324"},{"key":"454_CR25","doi-asserted-by":"publisher","unstructured":"Kalash M, Rochan M, Mohammed N, et\u00a0al (2018) Malware classification with deep convolutional neural networks. In: 2018 9th IFIP international conference on new technologies, mobility and security (NTMS), pp 1\u20135, https:\/\/doi.org\/10.1109\/NTMS.2018.8328749","DOI":"10.1109\/NTMS.2018.8328749"},{"key":"454_CR26","doi-asserted-by":"publisher","first-page":"5518","DOI":"10.1109\/ACCESS.2021.3139334","volume":"10","author":"HI Kim","year":"2022","unstructured":"Kim HI, Kang M, Cho SJ (2022) Efficient deep learning network with multi-streams for Android malware family classification. IEEE Access 10:5518\u20135532. https:\/\/doi.org\/10.1109\/ACCESS.2021.3139334","journal-title":"IEEE Access"},{"key":"454_CR27","doi-asserted-by":"publisher","first-page":"22889","DOI":"10.1109\/ACCESS.2023.3253770","volume":"11","author":"J Kim","year":"2023","unstructured":"Kim J, Paik JY, Cho ES (2023) Attention-based cross-modal cnn using non-disassembled files for malware classification. IEEE Access 11:22889\u201322903. https:\/\/doi.org\/10.1109\/ACCESS.2023.3253770","journal-title":"IEEE Access"},{"issue":"9","key":"454_CR28","doi-asserted-by":"publisher","first-page":"1336","DOI":"10.1631\/FITEE.1601325","volume":"18","author":"L Liu","year":"2017","unstructured":"Liu L, Wang Bs YB et al (2017) Automatic malware classification and new malware detection using machine learning. Front Inf Technol Electron Eng 18(9):1336\u20131347. https:\/\/doi.org\/10.1631\/FITEE.1601325","journal-title":"Front Inf Technol Electron Eng"},{"key":"454_CR29","unstructured":"Llaurad\u00f3 DG (2016) Convolutional neural networks for malware classification. https:\/\/api.semanticscholar.org\/CorpusID:22879106"},{"key":"454_CR30","doi-asserted-by":"publisher","first-page":"95970","DOI":"10.1109\/ACCESS.2022.3202952","volume":"10","author":"Q Lu","year":"2022","unstructured":"Lu Q, Zhang H, Kinawi H et al (2022) Self-attentive models for real-time malware classification. IEEE Access 10:95970\u201395985. https:\/\/doi.org\/10.1109\/ACCESS.2022.3202952","journal-title":"IEEE Access"},{"key":"454_CR31","doi-asserted-by":"publisher","unstructured":"McLaughlin N, Martinez\u00a0del Rincon J, Kang B, et\u00a0al (2017) Deep android malware detection. In: Proceedings of the seventh ACM on conference on data and application security and privacy. Association for Computing Machinery, New York, NY, USA, CODASPY \u201917, pp 301\u2013308, https:\/\/doi.org\/10.1145\/3029806.3029823","DOI":"10.1145\/3029806.3029823"},{"key":"454_CR32","doi-asserted-by":"publisher","DOI":"10.3390\/s22083094","volume":"22","author":"S Mekruksavanich","year":"2022","unstructured":"Mekruksavanich S, Jitpattanakul A (2022) Deep residual network for smartwatch-based user identification through complex hand movements. Sensors (Basel) 22:3094. https:\/\/doi.org\/10.3390\/s22083094","journal-title":"Sensors (Basel)"},{"key":"454_CR33","doi-asserted-by":"publisher","unstructured":"Mohaisen A, West AG, Mankin A, et\u00a0al (2014) Chatter: classifying malware families using system event ordering. In: 2014 IEEE conference on communications and network security, pp 283\u2013291, https:\/\/doi.org\/10.1109\/CNS.2014.6997496","DOI":"10.1109\/CNS.2014.6997496"},{"key":"454_CR34","doi-asserted-by":"publisher","unstructured":"Nataraj L, Karthikeyan S, Jacob G, et\u00a0al (2011a) Malware images: visualization and automatic classification. In: Proceedings of the 8th international symposium on visualization for cyber security. Association for Computing Machinery, New York, NY, USA, VizSec \u201911, https:\/\/doi.org\/10.1145\/2016904.2016908","DOI":"10.1145\/2016904.2016908"},{"key":"454_CR35","doi-asserted-by":"publisher","unstructured":"Nataraj L, Yegneswaran V, Porras P, et\u00a0al (2011b) A comparative assessment of malware classification using binary texture analysis and dynamic analysis. In: Proceedings of the 4th ACM workshop on security and artificial intelligence. Association for Computing Machinery, New York, NY, USA, AISec \u201911, p 21\u201330, https:\/\/doi.org\/10.1145\/2046684.2046689","DOI":"10.1145\/2046684.2046689"},{"key":"454_CR36","unstructured":"Noever D, Noever SEM (2021) Virus-mnist: a benchmark malware dataset. arXiv"},{"issue":"4","key":"454_CR37","doi-asserted-by":"publisher","first-page":"1536","DOI":"10.1111\/coin.12521","volume":"38","author":"JY Paik","year":"2022","unstructured":"Paik JY, Jin R, Cho ES (2022) Malware classification using a byte-granularity feature based on structural entropy. Comput Intell 38(4):1536\u20131558. https:\/\/doi.org\/10.1111\/coin.12521","journal-title":"Comput Intell"},{"key":"454_CR38","doi-asserted-by":"publisher","unstructured":"Priya V, Sathya\u00a0Sofia A (2023) Review on malware classification and malware detection using transfer learning approach. In: 2023 5th international conference on smart systems and inventive technology (ICSSIT), pp 1042\u20131049, https:\/\/doi.org\/10.1109\/ICSSIT55814.2023.10061076","DOI":"10.1109\/ICSSIT55814.2023.10061076"},{"key":"454_CR39","doi-asserted-by":"crossref","unstructured":"Rezende ERS, Ruppert GCS, de\u00a0Carvalho TJ, et\u00a0al (2018) Malicious software classification using vgg16 deep neural network\u2019s bottleneck features. https:\/\/api.semanticscholar.org\/CorpusID:21388434","DOI":"10.1007\/978-3-319-77028-4_9"},{"key":"454_CR40","unstructured":"Ronen R, Radu M, Feuerstein C, et\u00a0al (2018) Microsoft malware classification challenge. arXiv:1802.10135"},{"key":"454_CR41","doi-asserted-by":"publisher","unstructured":"Safa H, Nassar M, Rahal Al\u00a0Orabi WA (2019) Benchmarking convolutional and recurrent neural networks for malware classification. In: 2019 15th international wireless communications & mobile computing conference (IWCMC), pp 561\u2013566, https:\/\/doi.org\/10.1109\/IWCMC.2019.8766515","DOI":"10.1109\/IWCMC.2019.8766515"},{"key":"454_CR42","doi-asserted-by":"publisher","unstructured":"Sathyanarayan V, Kohli P, Bezawada B (2008) Signature generation and detection of malware families. pp 336\u2013349, https:\/\/doi.org\/10.1007\/978-3-540-70500-0_25","DOI":"10.1007\/978-3-540-70500-0_25"},{"key":"454_CR43","doi-asserted-by":"crossref","unstructured":"Schofield M (2021) Comparison of malware classification methods using convolutional neural network based on API call stream. Int J Netw Secur Appl(IJNSA) 13(2). Available at SSRN: https:\/\/ssrn.com\/abstract=3822934","DOI":"10.5121\/ijnsa.2021.13201"},{"key":"454_CR44","doi-asserted-by":"publisher","unstructured":"Schofield M, Alicioglu G, Binaco R, et\u00a0al (2021) Convolutional neural network for malware classification based on API call sequence. pp 85\u201398,https:\/\/doi.org\/10.5121\/csit.2021.110106","DOI":"10.5121\/csit.2021.110106"},{"key":"454_CR45","unstructured":"Schultz MG, Eskin E, Zadok E, et\u00a0al (2001) Data mining methods for detection of new malicious executables: In: Proceedings of the IEEE computer society symposium on research in security and privacy, pp 38\u201349. https:\/\/www.scopus.com\/inward\/record.uri?eid=2-s2.0-0034838197&partnerID=40 &md5=388ce70cc320d3c766cada92e1b12ccf, cited by: 840"},{"key":"454_CR46","doi-asserted-by":"publisher","first-page":"103121","DOI":"10.1109\/access.2022.3206445","volume":"10","author":"S Seneviratne","year":"2022","unstructured":"Seneviratne S, Shariffdeen R, Rasnayaka S et al (2022) Self-supervised vision transformers for malware detection. IEEE Access 10:103121\u2013103135. https:\/\/doi.org\/10.1109\/access.2022.3206445","journal-title":"IEEE Access"},{"key":"454_CR47","doi-asserted-by":"publisher","first-page":"103121","DOI":"10.1109\/access.2022.3206445","volume":"10","author":"S Seneviratne","year":"2022","unstructured":"Seneviratne S, Shariffdeen R, Rasnayaka S et al (2022) Self-supervised vision transformers for malware detection. IEEE Access 10:103121\u2013103135. https:\/\/doi.org\/10.1109\/access.2022.3206445","journal-title":"IEEE Access"},{"key":"454_CR48","unstructured":"Votipka D, Rabin S, Micinski K, et\u00a0al (2020) An observational investigation of reverse Engineers\u2019 processes. In: 29th USENIX security symposium (USENIX Security 20). USENIX Association, pp 1875\u20131892, https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/votipka-observational"},{"key":"454_CR49","doi-asserted-by":"publisher","first-page":"1003","DOI":"10.32604\/cmes.2022.018492","volume":"130","author":"L Wang","year":"2021","unstructured":"Wang L, Sun J, Luo X et al (2021) Transferable features from 1d-convolutional network for industrial malware classification. Comput Model Eng Sci 130:1003\u20131016. https:\/\/doi.org\/10.32604\/cmes.2022.018492","journal-title":"Comput Model Eng Sci"},{"key":"454_CR50","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/2957203","volume":"2022","author":"PN Yeboah","year":"2022","unstructured":"Yeboah PN, Musah HBB (2022) Nlp technique for malware detection using 1d cnn fusion model. Secur Commun Netw 2022:2957203. https:\/\/doi.org\/10.1155\/2022\/2957203","journal-title":"Secur Commun Netw"},{"issue":"6","key":"454_CR51","doi-asserted-by":"publisher","first-page":"1687","DOI":"10.1007\/s10207-023-00712-z","volume":"22","author":"M Zyout","year":"2023","unstructured":"Zyout M, Shatnawi R, Najadat H (2023) Malware classification approaches utilizing binary and text encoding of permissions. Int J Inf Secur 22(6):1687\u20131712. https:\/\/doi.org\/10.1007\/s10207-023-00712-z","journal-title":"Int J Inf Secur"}],"container-title":["Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-025-00454-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s42400-025-00454-6","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-025-00454-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:02:02Z","timestamp":1772323322000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1186\/s42400-025-00454-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,3,1]]},"references-count":51,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2026,12]]}},"alternative-id":["454"],"URL":"https:\/\/doi.org\/10.1186\/s42400-025-00454-6","relation":{},"ISSN":["2523-3246"],"issn-type":[{"value":"2523-3246","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,3,1]]},"assertion":[{"value":"24 March 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 July 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 March 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"36"}}