{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T23:04:51Z","timestamp":1773615891870,"version":"3.50.1"},"reference-count":39,"publisher":"Allerton Press","issue":"6","license":[{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.3103\/s0146411625701317","type":"journal-article","created":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T14:13:24Z","timestamp":1771251204000},"page":"783-797","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Enhanced Network Intrusion Detection Framework Using Deep Convolutional Neural Networks"],"prefix":"10.3103","volume":"59","author":[{"family":"Abdul Mazid","sequence":"first","affiliation":[]},{"given":"Sheeraz","family":"Kirmani","sequence":"additional","affiliation":[]},{"given":"Manaullah","family":"Abid","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2026,2,16]]},"reference":[{"key":"7877_CR1","doi-asserted-by":"publisher","unstructured":"Mazid, A., Kirmani, Sh., and Manaullah,, IoT enabled framework for smart home automation using artificial intelligence and blockchain technology, Artificial Intelligence of Things. ICAIoT 2023, Challa, R.K. et al., Eds., Communications in Computer and Information Science, vol. 1930, Cham: Springer, 2023, pp. 357\u2013367. https:\/\/doi.org\/10.1007\/978-3-031-48781-1_28","DOI":"10.1007\/978-3-031-48781-1_28"},{"key":"7877_CR2","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/jiot.2019.2948888","volume":"7","author":"L. Chettri","year":"2020","unstructured":"Chettri, L. and Bera, R., A comprehensive survey on Internet of Things (IoT) toward 5G wireless systems, IEEE Internet Things J., 2020, vol. 7, no. 1, pp. 16\u201332. https:\/\/doi.org\/10.1109\/jiot.2019.2948888","journal-title":"IEEE Internet Things J."},{"key":"7877_CR3","doi-asserted-by":"publisher","first-page":"717","DOI":"10.3390\/su15010717","volume":"15","author":"Sh. Kirmani","year":"2022","unstructured":"Kirmani, Sh., Mazid, A., Khan, I.A., and Abid, M., A survey on IoT-enabled smart grids: Technologies, architectures, applications, and challenges, Sustainability, 2022, vol. 15, no. 1, p. 717. https:\/\/doi.org\/10.3390\/su15010717","journal-title":"Sustainability"},{"key":"7877_CR4","doi-asserted-by":"publisher","first-page":"9586","DOI":"10.1080\/15567036.2021.1954110","volume":"47","author":"H.P. Nguyen","year":"2021","unstructured":"Nguyen, H.P., Le, P.Q.H., Pham, V.V., Nguyen, X.P., Balasubramaniam, D., and Hoang, A.-T., Application of the Internet of Things in 3E (efficiency, economy, and environment) factor-based energy management as smart and sustainable strategy, Energy Sources, \n               Part A, 2021, vol. 47, no. 1, pp. 9586\u20139608. https:\/\/doi.org\/10.1080\/15567036.2021.1954110","journal-title":"Part A"},{"key":"7877_CR5","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1186\/s42400-019-0038-7","volume":"2","author":"A. Khraisat","year":"2019","unstructured":"Khraisat, A., Gondal, I., Vamplew, P., and Kamruzzaman, J., Survey of intrusion detection systems: techniques, datasets and challenges, Cybersecurity, 2019, vol. 2, no. 1, p. 20. https:\/\/doi.org\/10.1186\/s42400-019-0038-7","journal-title":"Cybersecurity"},{"key":"7877_CR6","doi-asserted-by":"publisher","unstructured":"Meffert, C., Clark, D., Baggili, I., and Breitinger, F., Forensic state acquisition from Internet of Things (FSAIoT): A general framework and practical approach for IoT forensics through IoT device state acquisition, Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, 2017, New York: Association for Computing Machinery, 2017, p. 56. https:\/\/doi.org\/10.1145\/3098954.3104053","DOI":"10.1145\/3098954.3104053"},{"key":"7877_CR7","doi-asserted-by":"publisher","unstructured":"Firdous, S.N., Baig, Z., Valli, C., and Ibrahim, A., Modelling and evaluation of malicious attacks against the IoT MQTT protocol, 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Exeter, UK, 2017, IEEE, 2017, pp. 748\u2013755. https:\/\/doi.org\/10.1109\/ithings-greencom-cpscom-smartdata.2017.115","DOI":"10.1109\/ithings-greencom-cpscom-smartdata.2017.115"},{"key":"7877_CR8","doi-asserted-by":"publisher","first-page":"2135","DOI":"10.1109\/tits.2021.3127681","volume":"24","author":"Zh. Wang","year":"2023","unstructured":"Wang, Zh., Xie, X., Chen, L., Song, Sh., and Wang, Zh., Intrusion detection and network information security based on deep learning algorithm in urban rail transit management system, IEEE Trans. Intell. Transp. Syst., 2023, vol. 24, no. 2, pp. 2135\u20132143. https:\/\/doi.org\/10.1109\/tits.2021.3127681","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"7877_CR9","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1109\/tifs.2022.3221893","volume":"18","author":"M.L. Han","year":"2023","unstructured":"Han, M.L., Kwak, B.I., and Kim, H.K., TOW-IDS: Intrusion detection system based on three overlapped wavelets for automotive ethernet, IEEE Trans. Inf. Forensics Secur., 2023, vol. 18, pp. 411\u2013422. https:\/\/doi.org\/10.1109\/tifs.2022.3221893","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"7877_CR10","doi-asserted-by":"publisher","first-page":"22133","DOI":"10.1109\/jiot.2021.3106898","volume":"9","author":"Yu. Li","year":"2022","unstructured":"Li, Yu., Zuo, Yu., Song, H., and Lv, Zh., Deep learning in security of Internet of Things, IEEE Internet Things J., 2022, vol. 9, no. 22, pp. 22133\u201322146. https:\/\/doi.org\/10.1109\/jiot.2021.3106898","journal-title":"IEEE Internet Things J."},{"key":"7877_CR11","doi-asserted-by":"publisher","first-page":"121173","DOI":"10.1109\/access.2022.3220622","volume":"10","author":"P.L.S. Jayalaxmi","year":"2022","unstructured":"Jayalaxmi, P.L.S., Saha, R., Kumar, G., Conti, M., and Kim, T.-H., Machine and deep learning solutions for intrusion detection and prevention in IoTs: A survey, IEEE Access, 2022, vol. 10, pp. 121173\u2013121192. https:\/\/doi.org\/10.1109\/access.2022.3220622","journal-title":"IEEE Access"},{"key":"7877_CR12","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1016\/j.aej.2023.09.023","volume":"81","author":"S. Soliman","year":"2023","unstructured":"Soliman, S., Oudah, W., and Aljuhani, A., Deep learning-based intrusion detection approach for securing industrial Internet of Things, Alexandria \n               Eng. J., 2023, vol. 81, pp. 371\u2013383. https:\/\/doi.org\/10.1016\/j.aej.2023.09.023","journal-title":"Eng. J."},{"key":"7877_CR13","doi-asserted-by":"publisher","first-page":"107764","DOI":"10.1016\/j.compeleceng.2022.107764","volume":"99","author":"E. Qazi","year":"2022","unstructured":"Qazi, E., Imran, M., Haider, N., Shoaib, M., and Razzak, I., An intelligent and efficient network intrusion detection system using deep learning, Comput. Electr. Eng., 2022, vol. 99, p. 107764. https:\/\/doi.org\/10.1016\/j.compeleceng.2022.107764","journal-title":"Comput. Electr. Eng."},{"key":"7877_CR14","doi-asserted-by":"publisher","first-page":"1646","DOI":"10.1109\/comst.2020.2988293","volume":"22","author":"M.A. Al-Garadi","year":"2020","unstructured":"Al-Garadi, M.A., Mohamed, A., Al-Ali, A.Kh., Du, X., Ali, I., and Guizani, M., A survey of machine and deep learning methods for Internet of Things (IoT) security, IEEE Commun. Surv. Tutorials, 2020, vol. 22, no. 3, pp.\u00a01646\u20131685. https:\/\/doi.org\/10.1109\/comst.2020.2988293","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"7877_CR15","doi-asserted-by":"publisher","first-page":"108513","DOI":"10.1016\/j.measurement.2020.108513","volume":"171","author":"Yi. Guo","year":"2021","unstructured":"Guo, Yi., Zhou, Yi., and Zhang, Zh., Fault diagnosis of multi-channel data by the CNN with the multilinear principal component analysis, Measurement, 2021, vol. 171, p. 108513. https:\/\/doi.org\/10.1016\/j.measurement.2020.108513","journal-title":"Measurement"},{"key":"7877_CR16","doi-asserted-by":"publisher","first-page":"104676","DOI":"10.1016\/j.cageo.2020.104676","volume":"148","author":"Yi. Liu","year":"2021","unstructured":"Liu, Yi. and Durlofsky, L.J., 3D CNN-PCA: A deep-learning-based parameterization for complex geomodels, Comput. Geosci., 2021, vol. 148, p. 104676. https:\/\/doi.org\/10.1016\/j.cageo.2020.104676","journal-title":"Comput. Geosci."},{"key":"7877_CR17","doi-asserted-by":"publisher","first-page":"107450","DOI":"10.1016\/j.measurement.2019.107450","volume":"154","author":"Ya. Li","year":"2020","unstructured":"Li, Ya., Xu, Yi., Liu, Zh., Hou, H., Zheng, Yu., Xin, Ya., Zhao, Yu., and Cui, L., Robust detection for network intrusion of industrial IoT based on multi-CNN fusion, Measurement, 2020, vol. 154, p. 107450. https:\/\/doi.org\/10.1016\/j.measurement.2019.107450","journal-title":"Measurement"},{"key":"7877_CR18","doi-asserted-by":"publisher","first-page":"110173","DOI":"10.1016\/j.asoc.2023.110173","volume":"137","author":"H. Mohammadian","year":"2023","unstructured":"Mohammadian, H., Ghorbani, A.A., and Lashkari, A.H., A gradient-based approach for adversarial attack on deep learning-based network intrusion detection systems, Appl. Soft Comput., 2023, vol. 137, p. 110173. https:\/\/doi.org\/10.1016\/j.asoc.2023.110173","journal-title":"Appl. Soft Comput."},{"key":"7877_CR19","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1109\/lnet.2022.3186589","volume":"4","author":"P. Barnard","year":"2022","unstructured":"Barnard, P., Marchetti, N., and Dasilva, L.A., Robust network intrusion detection through explainable artificial intelligence (XAI), IEEE Networking Letters, 2022, vol. 4, no. 3, pp. 167\u2013171. https:\/\/doi.org\/10.1109\/lnet.2022.3186589","journal-title":"IEEE Networking Letters"},{"key":"7877_CR20","doi-asserted-by":"publisher","first-page":"2093","DOI":"10.1109\/jiot.2018.2883344","volume":"6","author":"J. Li","year":"2019","unstructured":"Li, J., Zhao, Zh., Li, R., and Zhang, H., AI-based two-stage intrusion detection for software defined IoT networks, IEEE Internet Things J., 2019, vol. 6, no. 2, pp. 2093\u20132102. https:\/\/doi.org\/10.1109\/jiot.2018.2883344","journal-title":"IEEE Internet Things J."},{"key":"7877_CR21","doi-asserted-by":"publisher","first-page":"9042","DOI":"10.1109\/jiot.2019.2926365","volume":"6","author":"E. Anthi","year":"2019","unstructured":"Anthi, E., Williams, L., Slowinska, M., Theodorakopoulos, G., and Burnap, P., A supervised intrusion detection system for smart home IoT devices, IEEE Internet Things J., 2019, vol. 6, no. 5, pp. 9042\u20139053. https:\/\/doi.org\/10.1109\/jiot.2019.2926365","journal-title":"IEEE Internet Things J."},{"key":"7877_CR22","doi-asserted-by":"publisher","first-page":"e7438","DOI":"10.1002\/cpe.7438","volume":"35","author":"A.O. Alzahrani","year":"2023","unstructured":"Alzahrani, A.O. and Alenazi, M.J.F., ML-IDSDN: Machine learning based intrusion detection system for software-defined network, Concurrency Comput.: Pract. Exper., 2023, vol. 35, no. 1, p. e7438. https:\/\/doi.org\/10.1002\/cpe.7438","journal-title":"Concurrency Comput.: Pract. Exper."},{"key":"7877_CR23","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1186\/s13677-023-00491-x","volume":"12","author":"A.-R. Al-Ghuwairi","year":"2023","unstructured":"Al-Ghuwairi, A.-R., Sharrab, Yo., Al-Fraihat, D., Alelaimat, M., Alsarhan, A., and Algarni, A., Intrusion detection in cloud computing based on time series anomalies utilizing machine learning, J. Cloud Comput., 2023, vol. 12, no. 1, p. 127. https:\/\/doi.org\/10.1186\/s13677-023-00491-x","journal-title":"J. Cloud Comput."},{"key":"7877_CR24","doi-asserted-by":"publisher","first-page":"123448","DOI":"10.1109\/access.2021.3109081","volume":"9","author":"A. Fatani","year":"2021","unstructured":"Fatani, A., Abd Elaziz, M., Dahou, A., Al-Qaness, M.A.A., and Lu, S., IoT intrusion detection system using deep learning and enhanced transient search optimization, IEEE Access, 2021, vol. 9, pp. 123448\u2013123464. https:\/\/doi.org\/10.1109\/access.2021.3109081","journal-title":"IEEE Access"},{"key":"7877_CR25","doi-asserted-by":"publisher","first-page":"140","DOI":"10.3390\/s22010140","volume":"22","author":"A. Fatani","year":"2021","unstructured":"Fatani, A., Dahou, A., Al-Qaness, M.A.A., Lu, S., and Abd Elaziz, M.A., Advanced feature extraction and selection approach using deep learning and aquila optimizer for IoT intrusion detection system, Sensors, 2021, vol.\u00a022, no. 1, p. 140. https:\/\/doi.org\/10.3390\/s22010140","journal-title":"Sensors"},{"key":"7877_CR26","doi-asserted-by":"publisher","first-page":"74571","DOI":"10.1109\/access.2020.2988854","volume":"8","author":"A. Samy","year":"2020","unstructured":"Samy, A., Yu, H., and Zhang, H., Fog-based attack detection framework for Internet of Things using deep learning, IEEE Access, 2020, vol. 8, pp. 74571\u201374585. https:\/\/doi.org\/10.1109\/access.2020.2988854","journal-title":"IEEE Access"},{"key":"7877_CR27","doi-asserted-by":"publisher","first-page":"1706","DOI":"10.3390\/s20061706","volume":"20","author":"D. Zheng","year":"2020","unstructured":"Zheng, D., Hong, Zh., Wang, N., and Chen, P., An improved LDA-based ELM classification for intrusion detection algorithm in IoT application, Sensors, 2020, vol. 20, no. 6, p. 1706. https:\/\/doi.org\/10.3390\/s20061706","journal-title":"Sensors"},{"key":"7877_CR28","doi-asserted-by":"publisher","first-page":"49730","DOI":"10.1109\/access.2020.2980136","volume":"8","author":"Yi. Yu","year":"2020","unstructured":"Yu, Yi. and Bian, N., An intrusion detection method using few-shot learning, IEEE Access, 2020, vol. 8, pp.\u00a049730\u201349740. https:\/\/doi.org\/10.1109\/access.2020.2980136","journal-title":"IEEE Access"},{"key":"7877_CR29","doi-asserted-by":"publisher","first-page":"115524","DOI":"10.1016\/j.eswa.2021.115524","volume":"185","author":"Ya. Imrana","year":"2021","unstructured":"Imrana, Ya., Xiang, Ya., Ali, L., and Abdul-Rauf, Z., A bidirectional LSTM deep learning approach for intrusion detection, Expert Syst. Appl., 2021, vol. 185, p. 115524. https:\/\/doi.org\/10.1016\/j.eswa.2021.115524","journal-title":"Expert Syst. Appl."},{"key":"7877_CR30","doi-asserted-by":"publisher","first-page":"6473507","DOI":"10.1155\/2022\/6473507","volume":"2022","author":"A. Dahou","year":"2022","unstructured":"Dahou, A., Abd Elaziz, M., Chelloug, S.A., Awadallah, M.A., Al-Betar, M.A., Al-Qaness, M.A.A., and Forestiero, A., Intrusion detection system for IoT based on deep learning and modified reptile search algorithm, Computational Intelligence and Neuroscience, 2022, vol. 2022, p. 6473507. https:\/\/doi.org\/10.1155\/2022\/6473507","journal-title":"Computational Intelligence and Neuroscience"},{"key":"7877_CR31","doi-asserted-by":"publisher","first-page":"1396","DOI":"10.3390\/s22041396","volume":"22","author":"S.S. Kareem","year":"2022","unstructured":"Kareem, S.S., Mostafa, R.R., Hashim, F.A., and El-Bakry, H.M., An effective feature selection model using hybrid metaheuristic algorithms for IoT intrusion detection, Sensors, 2022, vol. 22, no. 4, p. 1396. https:\/\/doi.org\/10.3390\/s22041396","journal-title":"Sensors"},{"key":"7877_CR32","doi-asserted-by":"publisher","first-page":"8499","DOI":"10.1007\/s11042-021-11747-6","volume":"81","author":"M. Rani","year":"2022","unstructured":"Rani, M. and Gagandeep, Effective network intrusion detection by addressing class imbalance with deep neural networks multimedia tools and applications, Multimedia Tools Appl., 2022, vol. 81, no. 6, pp. 8499\u20138518. https:\/\/doi.org\/10.1007\/s11042-021-11747-6","journal-title":"Multimedia Tools Appl."},{"key":"7877_CR33","doi-asserted-by":"publisher","first-page":"1769","DOI":"10.32604\/cmc.2022.018708","volume":"71","author":"K. Abodayeh","year":"2022","unstructured":"Abodayeh, K., Raza, A., Rafiq, M., Arif, M.A.M., Naveed, M., Zeb, Z., Abbas, S., Shahzadi, K., Sarwar, S., Naveed, Q., Zaman, B.U., and Mohsin, M.A., Development of PCCNN-based network intrusion detection system for edge computing, Comput., \n               Mater. Continua, 2022, vol. 71, no. 1, pp. 1769\u20131788. https:\/\/doi.org\/10.32604\/cmc.2022.018708","journal-title":"Mater. Continua"},{"key":"7877_CR34","first-page":"74","volume":"3584","author":"J.B. Awotunde","year":"2023","unstructured":"Awotunde, J.B., Panigrahi, R., Agarwal, M., Brahma, B., and Bhoi, A.K., CNN-KPCA: A hybrid convolutional neural network with kernel principal component analysis for intrusion detection system for the Internet of Things environments, CEUR Workshop Proc., 2023, vol. 3584, pp. 74\u201383.","journal-title":"CEUR Workshop Proc."},{"key":"7877_CR35","doi-asserted-by":"publisher","first-page":"9444","DOI":"10.1109\/jiot.2021.3126811","volume":"9","author":"A. Jamalipour","year":"2022","unstructured":"Jamalipour, A. and Murali, S., A taxonomy of machine-learning-based intrusion detection systems for the Internet of Things: A survey, IEEE Internet Things J., 2022, vol. 9, no. 12, pp. 9444\u20139466. https:\/\/doi.org\/10.1109\/jiot.2021.3126811","journal-title":"IEEE Internet Things J."},{"key":"7877_CR36","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/lsens.2022.3209102","volume":"6","author":"H. Pan","year":"2022","unstructured":"Pan, H., Badawi, D., Bassi, I., Ozev, S., and Cetin, A.E., Detecting anomaly in chemical sensors via L1-kernel-based principal component analysis, IEEE Sensors Letters, 2022, vol. 6, no. 10, pp. 1\u20134. https:\/\/doi.org\/10.1109\/lsens.2022.3209102","journal-title":"IEEE Sensors Letters"},{"key":"7877_CR37","doi-asserted-by":"publisher","first-page":"1587","DOI":"10.1109\/tnnls.2017.2676130","volume":"29","author":"Ya. Pang","year":"2018","unstructured":"Pang, Ya., Sun, M., Jiang, X., and Li, X., Convolution in convolution for network in network, IEEE Trans. Neural Networks Learn. Syst., 2018, vol. 29, no. 5, pp. 1587\u20131597. https:\/\/doi.org\/10.1109\/tnnls.2017.2676130","journal-title":"IEEE Trans. Neural Networks Learn. Syst."},{"key":"7877_CR38","doi-asserted-by":"publisher","unstructured":"Tavallaee, M., Bagheri, E., Lu, W., and Ghorbani, A.A., A detailed analysis of the KDD CUP 99 data set, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, Ottawa, 2009, IEEE, 2009, pp. 1\u20136. https:\/\/doi.org\/10.1109\/cisda.2009.5356528","DOI":"10.1109\/cisda.2009.5356528"},{"key":"7877_CR39","doi-asserted-by":"publisher","unstructured":"Hong, R.-F., Horng, S.-C., and Lin, S.-S., Machine learning in cyber security analytics using NSL-KDD dataset, 2021 International Conference on Technologies and Applications of Artificial Intelligence (TAAI), Taichung, Taiwan, 2021, IEEE, 2021, pp. 260\u2013265. https:\/\/doi.org\/10.1109\/taai54685.2021.00057","DOI":"10.1109\/taai54685.2021.00057"}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411625701317.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411625701317","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411625701317.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:06:29Z","timestamp":1773612389000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411625701317"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12]]},"references-count":39,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2025,12]]}},"alternative-id":["7877"],"URL":"https:\/\/doi.org\/10.3103\/s0146411625701317","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12]]},"assertion":[{"value":"9 October 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 February 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 February 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 February 2026","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors of this work declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}