{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,20]],"date-time":"2025-12-20T09:00:37Z","timestamp":1766221237112,"version":"3.48.0"},"reference-count":47,"publisher":"Walter de Gruyter GmbH","issue":"1","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"Abu Dhabi University - Office of Research and Sponsored Programs","award":["NA"],"award-info":[{"award-number":["NA"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,2,21]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>With the continuous evolution of smart environments powered by Internet of Things (IoT) networks and smart devices, there becomes a crucial need to address and ensure privacy and security. Intrusion Detection Systems (IDSs) that are specially designed for use in IoT networks play a vital role in strengthening the security posture of an IoT network and system by safeguarding and preventing attacks against smart environments. This research paper presents a comparative study of IDSs for IoT networks, with a focus on signature-based, anomaly-based, and specification-based IDS detection methods while highlighting the significance of IDSs in protecting IoT networks and smart environments, which have become recent targets for attackers due to their integration with modern and advanced technologies and their involvement with large volumes of data. The study investigates the mentioned IDS methods covering the strengths and weaknesses of each method in safeguarding smart environments and networks. This paper dives into the characteristics that make IDS decision-making more effective primarily in terms of security, considering privacy and performance. The findings of this study contribute to the hardening of IoT network security by offering recommendations for IDS selection for enhancing IoT overall security, specifically through the adoption of adaptive-based IDSs.<\/jats:p>","DOI":"10.1515\/comp-2025-0046","type":"journal-article","created":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T12:00:21Z","timestamp":1764849621000},"source":"Crossref","is-referenced-by-count":0,"title":["Enhancing IoT network security: a literature review of intrusion detection systems and their adaptability to emerging threats"],"prefix":"10.1515","volume":"15","author":[{"given":"Bara","family":"Fteiha","sequence":"first","affiliation":[{"name":"College of Engineering , 105947 Abu Dhabi University , 59911 , Abu Dhabi , 1790 , United Arab Emirates"}]},{"given":"Huma","family":"Zia","sequence":"additional","affiliation":[{"name":"College of Engineering , 105947 Abu Dhabi University , 59911 , Abu Dhabi , 1790 , United Arab Emirates"}]},{"given":"Mai","family":"Zeyadeh","sequence":"additional","affiliation":[{"name":"College of Engineering , 105947 Abu Dhabi University , 59911 , Abu Dhabi , 1790 , United Arab Emirates"}]},{"given":"Raneem","family":"Abu Hazeem","sequence":"additional","affiliation":[{"name":"College of Engineering , 105947 Abu Dhabi University , 59911 , Abu Dhabi , 1790 , United Arab Emirates"}]},{"given":"Heba","family":"Obaidat","sequence":"additional","affiliation":[{"name":"College of Engineering , 105947 Abu Dhabi University , 59911 , Abu Dhabi , 1790 , United Arab Emirates"}]},{"given":"Rawan","family":"Ghannam","sequence":"additional","affiliation":[{"name":"College of Engineering , 105947 Abu Dhabi University , 59911 , Abu Dhabi , 1790 , United Arab Emirates"}]}],"member":"374","published-online":{"date-parts":[[2025,12,4]]},"reference":[{"key":"2025122008514895282_j_comp-2025-0046_ref_001","doi-asserted-by":"crossref","unstructured":"U. Tariq, I. Ahmed, A. K. Bashir, and K. Shaukat, \u201cA critical cybersecurity analysis and future research directions for the internet of things: A comprehensive review,\u201d Sensors, vol.\u00a023, no.\u00a08, p.\u00a04117, 2023, https:\/\/doi.org\/10.3390\/s23084117.","DOI":"10.3390\/s23084117"},{"key":"2025122008514895282_j_comp-2025-0046_ref_002","doi-asserted-by":"crossref","unstructured":"B. Kaur, S. Dadkhah, F. Shoeleh, E. C. P. Neto, P. Xiong, S. Iqbal, P. Lamontagne, S. Ray, and A. A. Ghorbani, \u201cInternet of things (iot) security dataset evolution: Challenges and future directions,\u201d Internet Things, vol.\u00a022, p.\u00a0100780, 2023, https:\/\/doi.org\/10.1016\/j.iot.2023.100780.","DOI":"10.1016\/j.iot.2023.100780"},{"key":"2025122008514895282_j_comp-2025-0046_ref_003","doi-asserted-by":"crossref","unstructured":"M. Pradhan, C. K. Nayak, and S. K. Pradhan, \u201cIntrusion detection system (ids) and their types,\u201d in Network Security Attacks and Countermeasures, Pennsylvania, IGI Global, 2016, pp. 228\u2013244.","DOI":"10.4018\/978-1-4666-8761-5.ch009"},{"key":"2025122008514895282_j_comp-2025-0046_ref_004","doi-asserted-by":"crossref","unstructured":"M. Noaman, S. Khan, M. Faisal Abrar, S. Ali, A. Alvi, and M. A. Saleem, \u201cChallenges in integration of heterogeneous internet of things,\u201d Sci. Program., vol. 2022, no. 1, pp. 1\u201314, 2022. https:\/\/doi.org\/10.1155\/2022\/8626882.","DOI":"10.1155\/2022\/8626882"},{"key":"2025122008514895282_j_comp-2025-0046_ref_005","doi-asserted-by":"crossref","unstructured":"R. R. Madakam and S. Tripathi, \u201cInternet of things (iot): A literature review.\u201d J. Comput. Commun., vol.\u00a03, no.\u00a01, pp.\u00a0164\u2013173, 2015.","DOI":"10.4236\/jcc.2015.35021"},{"key":"2025122008514895282_j_comp-2025-0046_ref_006","doi-asserted-by":"crossref","unstructured":"S. Balaji, K. Nathani, and R. Santhakumar, \u201cIot technology, applications and challenges: A contemporary survey,\u201d Wirel. Pers. Commun., vol.\u00a0108, no.\u00a01, pp.\u00a0363\u2013388, 2019, https:\/\/doi.org\/10.1007\/s11277-019-06407-w.","DOI":"10.1007\/s11277-019-06407-w"},{"key":"2025122008514895282_j_comp-2025-0046_ref_007","doi-asserted-by":"crossref","unstructured":"A. A. Laghari, H. Li, A. A. Khan, Y. Shoulin, S. Karim, and M. A. K. Khani, \u201cInternet of Things (IoT) applications security trends and challenges,\u201d Discover Internet of Things, vol. 4, no. 1, pp. 1\u201336, 2024. https:\/\/doi.org\/10.1007\/s43926-024-00090-5.","DOI":"10.1007\/s43926-024-00090-5"},{"key":"2025122008514895282_j_comp-2025-0046_ref_008","doi-asserted-by":"crossref","unstructured":"R. Hunzinger, \u201cScada fundamentals and applications in the iot,\u201d in Internet of Things and Data Analytics Handbook, New Jersey, John Wiley & Sons, Ltd, 2017, pp. 283\u2013293.","DOI":"10.1002\/9781119173601.ch17"},{"key":"2025122008514895282_j_comp-2025-0046_ref_009","doi-asserted-by":"crossref","unstructured":"R. Mouha, \u201cInternet of things (iot),\u201d J. Data Anal. Inf. Process., vol.\u00a09, pp.\u00a077\u2013101, 2021.","DOI":"10.4236\/jdaip.2021.92006"},{"key":"2025122008514895282_j_comp-2025-0046_ref_010","doi-asserted-by":"crossref","unstructured":"R. Krishnamurthi, A. Kumar, D. Gopinathan, A. Nayyar, and B. Qureshi, \u201cAn overview of iot sensor data processing, fusion, and analysis techniques,\u201d Sensors, vol.\u00a020, no.\u00a021, p.\u00a06076, 2020, https:\/\/doi.org\/10.3390\/s20216076.","DOI":"10.3390\/s20216076"},{"key":"2025122008514895282_j_comp-2025-0046_ref_011","doi-asserted-by":"crossref","unstructured":"S. Al-Sarawi, M. Anbar, K. Alieyan, and M. Alzubaidi, \u201cInternet of things (iot) communication protocols,\u201d in 2017 8th International conference on information technology (ICIT), Amman, IEEE, 2017, pp. 685\u2013690.","DOI":"10.1109\/ICITECH.2017.8079928"},{"key":"2025122008514895282_j_comp-2025-0046_ref_012","unstructured":"D. Rani and N. S. Gill, \u201cReview of various iot standards and communication protocols,\u201d Int. J. Eng. Res. Technol., vol.\u00a012, no.\u00a05, pp.\u00a0647\u2013657, 2019."},{"key":"2025122008514895282_j_comp-2025-0046_ref_013","doi-asserted-by":"crossref","unstructured":"S. El Jaouhari and E. Bouvet, \u201cSecure firmware over-the-air updates for iot: Survey, challenges, and discussions,\u201d Internet of Things, vol.\u00a018, p.\u00a0100508, 2022, https:\/\/doi.org\/10.1016\/j.iot.2022.100508.","DOI":"10.1016\/j.iot.2022.100508"},{"key":"2025122008514895282_j_comp-2025-0046_ref_014","doi-asserted-by":"crossref","unstructured":"A. Cilfone, L. Davoli, L. Belli, and G. Ferrari, \u201cWireless mesh networking: An iot-oriented perspective survey on relevant technologies,\u201d Future Internet, vol.\u00a011, no.\u00a04, p.\u00a099, 2019, https:\/\/doi.org\/10.3390\/fi11040099.","DOI":"10.3390\/fi11040099"},{"key":"2025122008514895282_j_comp-2025-0046_ref_015","doi-asserted-by":"crossref","unstructured":"K. S. Mohamed, \u201cIot networking and communication layer,\u201d in The Era of internet of things: towards a smart world, vol. 131, Cham, Springer, 2019, pp. 49\u201370.","DOI":"10.1007\/978-3-030-18133-8_3"},{"key":"2025122008514895282_j_comp-2025-0046_ref_016","doi-asserted-by":"crossref","unstructured":"M. A. and S. T., \u201cInternet of things: Architecture, security issues and countermeasures,\u201d Int. J. Comput. Appl., vol. 125, no. 14, pp. 1\u20134, 2015. https:\/\/doi.org\/10.5120\/ijca2015906251.","DOI":"10.5120\/ijca2015906251"},{"key":"2025122008514895282_j_comp-2025-0046_ref_017","doi-asserted-by":"crossref","unstructured":"H. A. Khattak, M. A. Shah, S. Khan, I. Ali, and M. Imran, \u201cPerception layer security in internet of things,\u201d Future Gener. Comp. Syst., vol.\u00a0100, pp.\u00a0144\u2013164, 2019, https:\/\/doi.org\/10.1016\/j.future.2019.04.038.","DOI":"10.1016\/j.future.2019.04.038"},{"key":"2025122008514895282_j_comp-2025-0046_ref_018","doi-asserted-by":"crossref","unstructured":"M. Burhan, R. A. Rehman, B. Khan, and B.-S. Kim, \u201cIot elements, layered architectures and security issues: A comprehensive survey,\u201d Sensors, vol.\u00a018, no.\u00a09, p.\u00a02796, 2018, https:\/\/doi.org\/10.3390\/s18092796.","DOI":"10.3390\/s18092796"},{"key":"2025122008514895282_j_comp-2025-0046_ref_019","doi-asserted-by":"crossref","unstructured":"P. Varga, S. Plosz, G. Soos, and C. Hegedus, \u201cSecurity threats and issues in automation iot,\u201d in 2017 IEEE 13th International Workshop on Factory Communication Systems (WFCS), Trondheim, IEEE, 2017, pp. 1\u20136.","DOI":"10.1109\/WFCS.2017.7991968"},{"key":"2025122008514895282_j_comp-2025-0046_ref_020","doi-asserted-by":"crossref","unstructured":"B. B. Gupta and P. Chaudhary, Cross-Site Scripting Attacks: Classification, Attack, and Countermeasures, Boca Raton, CRC Press, 2020.","DOI":"10.1201\/9780429351327"},{"key":"2025122008514895282_j_comp-2025-0046_ref_021","doi-asserted-by":"crossref","unstructured":"S. N. Swamy, D. Jadhav, and N. Kulkarni, \u201cSecurity threats in the application layer in iot applications,\u201d in 2017 International Conference on i-SMAC (Iot in Social, Mobile, Analytics and Cloud)(i-SMAC), Palladam, IEEE, 2017, pp. 477\u2013480.","DOI":"10.1109\/I-SMAC.2017.8058395"},{"key":"2025122008514895282_j_comp-2025-0046_ref_022","unstructured":"A. Mahendiran, R. Appusamy, and K. S, \u201cIntrusion detection and prevention system: Technologies and challenges,\u201d Int. J. App. Eng. Res., vol. 10, no. 87, pp. 1\u201312, 2015."},{"key":"2025122008514895282_j_comp-2025-0046_ref_023","doi-asserted-by":"crossref","unstructured":"R. Ganeshan, C. sekhar kolli, C. M. kumar, and T. Daniya, \u201cA systematic review on anomaly based intrusion detection system,\u201d IOP Conf. Ser.: Mater. Sci. Eng., vol.\u00a0981, no.\u00a02, p.\u00a0022010, 2020, https:\/\/doi.org\/10.1088\/1757-899x\/981\/2\/022010.","DOI":"10.1088\/1757-899X\/981\/2\/022010"},{"key":"2025122008514895282_j_comp-2025-0046_ref_024","doi-asserted-by":"crossref","unstructured":"A. Khraisat, I. Gondal, P. Vamplew, and J. Kamruzzaman, \u201cSurvey of intrusion detection systems: Techniques, datasets and challenges,\u201d Cybersecurity, vol.\u00a02, no.\u00a01, pp.\u00a01\u201322, 2019, https:\/\/doi.org\/10.1186\/s42400-019-0038-7.","DOI":"10.1186\/s42400-019-0038-7"},{"key":"2025122008514895282_j_comp-2025-0046_ref_025","unstructured":"A. S. Ashoor and S. Gore, \u201cImportance of intrusion detection system (ids),\u201d Int. J. Sci. Eng. Res., vol.\u00a02, no.\u00a01, pp.\u00a01\u20134, 2011."},{"key":"2025122008514895282_j_comp-2025-0046_ref_026","doi-asserted-by":"crossref","unstructured":"M. F. Elrawy, A. I. Awad, and H. F. Hamed, \u201cIntrusion detection systems for iot-based smart environments: A survey,\u201d J. Cloud Comp., vol.\u00a07, no.\u00a01, pp.\u00a01\u201320, 2018, https:\/\/doi.org\/10.1186\/s13677-018-0123-6.","DOI":"10.1186\/s13677-018-0123-6"},{"key":"2025122008514895282_j_comp-2025-0046_ref_027","doi-asserted-by":"crossref","unstructured":"A. Tabassum, A. Erbad, and M. Guizani, \u201cA survey on Recent Approaches in Intrusion Detection system in Iots,\u201d in 2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC), Tangier, Morocco, IEEE, 2019, pp. 1190\u20131197. https:\/\/doi.org\/10.1109\/IWCMC.2019.8766455.","DOI":"10.1109\/IWCMC.2019.8766455"},{"key":"2025122008514895282_j_comp-2025-0046_ref_028","doi-asserted-by":"crossref","unstructured":"E. Gyamfi and A. Jurcut, \u201cIntrusion detection in internet of things systems: A review on design approaches leveraging multi-access edge computing, machine learning, and datasets,\u201d Sensors, vol.\u00a022, no.\u00a010, p.\u00a03744, 2022, https:\/\/doi.org\/10.3390\/s22103744.","DOI":"10.3390\/s22103744"},{"key":"2025122008514895282_j_comp-2025-0046_ref_029","doi-asserted-by":"crossref","unstructured":"S. O. Amin, M. S. Siddiqui, C. S. Hong, and J. Choe, \u201cA novel coding scheme to implement signature based ids in ip based sensor networks,\u201d in 2009 IFIP\/IEEE International Symposium on Integrated Network Management-Workshops, New York, IEEE, 2009, pp. 269\u2013274.","DOI":"10.1109\/INMW.2009.5195973"},{"key":"2025122008514895282_j_comp-2025-0046_ref_030","doi-asserted-by":"crossref","unstructured":"S. Hajiheidari, K. Wakil, M. Badri, and N. J. Navimipour, \u201cIntrusion detection systems in the internet of things: A comprehensive investigation,\u201d Computer Networks, vol.\u00a0160, pp.\u00a0165\u2013191, 2019, https:\/\/doi.org\/10.1016\/j.comnet.2019.05.014.","DOI":"10.1016\/j.comnet.2019.05.014"},{"key":"2025122008514895282_j_comp-2025-0046_ref_031","doi-asserted-by":"crossref","unstructured":"P. Kasinathan, G. Costamagna, H. Khaleel, C. Pastrone, and M. A. Spirito, \u201cAn ids framework for internet of things empowered by 6lowpan,\u201d in Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, New York, Association for Computing Machinery, 2013, pp. 1337\u20131340.","DOI":"10.1145\/2508859.2512494"},{"key":"2025122008514895282_j_comp-2025-0046_ref_032","unstructured":"N. U. Sheikh, H. Rahman, S. Vikram, and H. AlQahtani, \u201cA lightweight signature-based ids for iot environment,\u201d arXiv preprint arXiv:1811.04582, 2018."},{"key":"2025122008514895282_j_comp-2025-0046_ref_033","doi-asserted-by":"crossref","unstructured":"M. Farooq and M. H. Khan, \u201cSignature-based intrusion detection system in wireless 6g iot networks,\u201d J. Internet Things, vol.\u00a04, no.\u00a03, pp.\u00a0155\u2013168, 2022, https:\/\/doi.org\/10.32604\/jiot.2022.039271.","DOI":"10.32604\/jiot.2022.039271"},{"key":"2025122008514895282_j_comp-2025-0046_ref_034","doi-asserted-by":"crossref","unstructured":"V. Jyothsna and K. M. Prasad, \u201cAnomaly-based intrusion detection system,\u201d Comp. Netw. Sec., vol. 10, 2019. https:\/\/doi.org\/10.5772\/intechopen.82287.","DOI":"10.5772\/intechopen.82287"},{"key":"2025122008514895282_j_comp-2025-0046_ref_035","doi-asserted-by":"crossref","unstructured":"S. Ashraf and T. Ahmed, \u201cSagacious intrusion detection strategy in sensor network,\u201d in 2020 International Conference on UK-China Emerging Technologies (UCET), Glasgow, IEEE, 2020, pp. 1\u20134.","DOI":"10.1109\/UCET51115.2020.9205412"},{"key":"2025122008514895282_j_comp-2025-0046_ref_036","doi-asserted-by":"crossref","unstructured":"M. Bhavsar, K. Roy, J. Kelly, and O. Olusola, \u201cAnomaly-based intrusion detection system for iot application,\u201d Discover Internet of things, vol.\u00a03, no.\u00a01, p.\u00a05, 2023, https:\/\/doi.org\/10.1007\/s43926-023-00034-5.","DOI":"10.1007\/s43926-023-00034-5"},{"key":"2025122008514895282_j_comp-2025-0046_ref_037","doi-asserted-by":"crossref","unstructured":"B. Sharma, L. Sharma, C. Lal, and S. Roy, \u201cAnomaly based network intrusion detection for iot attacks using deep learning technique,\u201d Comp. Elect. Eng., vol.\u00a0107, p.\u00a0108626, 2023, https:\/\/doi.org\/10.1016\/j.compeleceng.2023.108626.","DOI":"10.1016\/j.compeleceng.2023.108626"},{"key":"2025122008514895282_j_comp-2025-0046_ref_038","doi-asserted-by":"crossref","unstructured":"A. Le, J. Loo, K. K. Chai, and M. Aiash, \u201cA specification-based ids for detecting attacks on rpl-based network topology,\u201d Information, vol.\u00a07, no.\u00a02, p.\u00a025, 2016, https:\/\/doi.org\/10.3390\/info7020025.","DOI":"10.3390\/info7020025"},{"key":"2025122008514895282_j_comp-2025-0046_ref_039","doi-asserted-by":"crossref","unstructured":"H. Olufowobi, C. Young, J. Zambreno, and G. Bloom, \u201cSaiducant: Specification-based automotive intrusion detection using controller area network (can) timing,\u201d IEEE Trans. Veh. Technol., vol.\u00a069, no.\u00a02, pp.\u00a01484\u20131494, 2019, https:\/\/doi.org\/10.1109\/tvt.2019.2961344.","DOI":"10.1109\/TVT.2019.2961344"},{"key":"2025122008514895282_j_comp-2025-0046_ref_040","doi-asserted-by":"crossref","unstructured":"M. J. Babu and A. R. Reddy, \u201cSh-ids: Specification heuristics based intrusion detection system for iot networks,\u201d Wirel. Pers. Commun., vol.\u00a0112, no.\u00a03, pp.\u00a02023\u20132045, 2020, https:\/\/doi.org\/10.1007\/s11277-020-07137-0.","DOI":"10.1007\/s11277-020-07137-0"},{"key":"2025122008514895282_j_comp-2025-0046_ref_041","doi-asserted-by":"crossref","unstructured":"A. Shaikh and P. Gupta, \u201cAdvanced signature-based intrusion detection system,\u201d in Intelligent Communication Technologies and Virtual Mobile Networks: Proceedings of ICICV 2022, Singapore, Springer, 2022, pp. 305\u2013321.","DOI":"10.1007\/978-981-19-1844-5_24"},{"key":"2025122008514895282_j_comp-2025-0046_ref_042","doi-asserted-by":"crossref","unstructured":"S. Smys et al.., \u201cHybrid intrusion detection system for internet of things (iot),\u201d J. ISMAC, vol.\u00a02, no.\u00a004, pp.\u00a0190\u2013199, 2020, https:\/\/doi.org\/10.36548\/jismac.2020.4.002.","DOI":"10.36548\/jismac.2020.4.002"},{"key":"2025122008514895282_j_comp-2025-0046_ref_043","doi-asserted-by":"crossref","unstructured":"H. C. Altunay and Z. Albayrak, \u201cA hybrid cnn+ lstm-based intrusion detection system for industrial iot networks,\u201d Eng. Sci. Technol. Int. J., vol.\u00a038, p.\u00a0101322, 2023, https:\/\/doi.org\/10.1016\/j.jestch.2022.101322.","DOI":"10.1016\/j.jestch.2022.101322"},{"key":"2025122008514895282_j_comp-2025-0046_ref_044","doi-asserted-by":"crossref","unstructured":"N. W. Khan et al.., \u201cA hybrid deep learning-based intrusion detection system for iot networks,\u201d Math. Biosci. Eng., vol.\u00a020, no.\u00a08, pp.\u00a013 491\u201313 520, 2023, https:\/\/doi.org\/10.3934\/mbe.2023602.","DOI":"10.3934\/mbe.2023602"},{"key":"2025122008514895282_j_comp-2025-0046_ref_045","doi-asserted-by":"crossref","unstructured":"P. Aravamudhan, \u201cA novel adaptive network intrusion detection system for internet of things,\u201d PLoS One, vol.\u00a018, no.\u00a04, p.\u00a0e0283725, 2023, https:\/\/doi.org\/10.1371\/journal.pone.0283725.","DOI":"10.1371\/journal.pone.0283725"},{"key":"2025122008514895282_j_comp-2025-0046_ref_046","doi-asserted-by":"crossref","unstructured":"H. Sallay, \u201cDesigning an adaptive effective intrusion detection system for smart home iot,\u201d Int. J. Adv. Comp. Sci. Appl. (IJACSA), vol.\u00a015, no.\u00a01, 2024, https:\/\/doi.org\/10.14569\/ijacsa.2024.0150194.","DOI":"10.14569\/IJACSA.2024.0150194"},{"key":"2025122008514895282_j_comp-2025-0046_ref_047","doi-asserted-by":"crossref","unstructured":"J. J. Shirley and M. Priya, \u201cAn adaptive intrusion detection system for evolving iot threats: An autoencoder-fnn fusion,\u201d IEEE Access, vol.\u00a013, pp.\u00a04201\u20134217, 2025, https:\/\/doi.org\/10.1109\/access.2024.3525074.","DOI":"10.1109\/ACCESS.2024.3525074"}],"container-title":["Open Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.1515\/comp-2025-0046\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.1515\/comp-2025-0046\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,20]],"date-time":"2025-12-20T08:58:29Z","timestamp":1766221109000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.1515\/comp-2025-0046\/html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,1]]},"references-count":47,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,9,17]]},"published-print":{"date-parts":[[2025,9,17]]}},"alternative-id":["10.1515\/comp-2025-0046"],"URL":"https:\/\/doi.org\/10.1515\/comp-2025-0046","relation":{},"ISSN":["2299-1093"],"issn-type":[{"type":"electronic","value":"2299-1093"}],"subject":[],"published":{"date-parts":[[2025,1,1]]},"article-number":"20250046"}}