{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T02:24:51Z","timestamp":1771467891394,"version":"3.50.1"},"reference-count":55,"publisher":"SAGE Publications","issue":"5","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IFS"],"published-print":{"date-parts":[[2023,11,4]]},"abstract":"<jats:p>Technology development brought numerous lifestyle changes. People move around with smart gadgets and devices in the home, work environment, and familiar places. The Internet acts as a backbone for all applications and connecting multiple devices to set up a smart environment is technically termed as IoT (Internet of Things). The feature merits of IoT are explored in numerous fields from simple psychical data measurement to complex trajectory data measurement. Where the place is inaccessible to humans, IoT devices are used to analyze the region. Though IoT provides numerous benefits, due to its size and energy limitations, it faces security and privacy issues. Intrusions in IoT networks have become common due to these limitations and various intrusion detection methods are introduced in the past decade. Existing learning-based methods lag in performance while detecting multiple attacks. Conventional detection models could not be able to detect the intrusion type in detail. The diverse IoT network data has several types of high dimensional features which could not be effectively processed by the conventional methods while detecting intrusions. Recently improvements in learning strategies proved the performance of deep learning models in intrusion detection systems. However, detecting multiple attacks using a single deep learning model is quite complex. Thus, in this research a multi deep learning model is presented to detect multiple attacks. The initial intrusion features are extracted through the AlexNet, and then essential features are selected through bidirectional LSTM. Finally, the selected features are classified using the decision tree C5.0 algorithm to attain better detection accuracy. Proposed model experimentations include benchmark NSL-KDD dataset to verify performances and compared the results with existing IDSs based on DeepNet, Multi-CNN, Auto Encoder, Gaussian mixture, Generative adversarial Network, and Convolutional Neural Network models. The proposed model attained maximum detection accuracy of 98.8% over conventional methods. Overall, an average of 15% improved detection performance is attained by the proposed model in detecting several types of intrusions in the IoT network.<\/jats:p>","DOI":"10.3233\/jifs-233575","type":"journal-article","created":{"date-parts":[[2023,8,22]],"date-time":"2023-08-22T10:12:15Z","timestamp":1692699135000},"page":"7827-7840","source":"Crossref","is-referenced-by-count":1,"title":["Hybrid intrusion detection model for Internet of Things (IoT) network environment"],"prefix":"10.1177","volume":"45","author":[{"given":"S.","family":"Rajarajan","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, Kings College of Engineering, Punalkulam, Tamilnadu, India"}]},{"given":"M.G.","family":"Kavitha","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, University College of Engineering, Pattukkottai, Rajamadam, Thanjavur, Tamilnadu, India"}]}],"member":"179","reference":[{"issue":"3","key":"10.3233\/JIFS-233575_ref1","doi-asserted-by":"crossref","first-page":"2671","DOI":"10.1109\/COMST.2019.2896380","article-title":"Network Intrusion Detection for IoT Security Based on Learning Techniques","volume":"21","author":"Chaabouni","year":"2019","journal-title":"IEEE Communications Surveys & Tutorials"},{"issue":"4","key":"10.3233\/JIFS-233575_ref2","doi-asserted-by":"crossref","first-page":"3496","DOI":"10.1109\/COMST.2018.2844742","article-title":"A Critical Review of Practices and Challenges in Intrusion Detection Systems for IoT: Toward Universal and Resilient Systems","volume":"20","author":"Benkhelifa","year":"2018","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"10.3233\/JIFS-233575_ref3","doi-asserted-by":"crossref","first-page":"59353","DOI":"10.1109\/ACCESS.2021.3073408","article-title":"Internet of Things Applications, Security Challenges, Attacks, Intrusion Detection, and Future Visions: A Systematic Review","volume":"9","author":"Mishra","year":"2021","journal-title":"IEEE Access"},{"issue":"3","key":"10.3233\/JIFS-233575_ref4","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s12046-022-01939-7","article-title":"Double attribute-based node deployment in wireless sensor networks using novel weight-based clustering approach","volume":"47","author":"Manoharan","year":"2022","journal-title":"S\u0101dhan\u0101"},{"issue":"5","key":"10.3233\/JIFS-233575_ref5","doi-asserted-by":"crossref","first-page":"9042","DOI":"10.1109\/JIOT.2019.2926365","article-title":"A Supervised Intrusion Detection System for Smart Home IoT Devices","volume":"6","author":"Anthi","year":"2019","journal-title":"IEEE Internet of Things Journal"},{"issue":"6","key":"10.3233\/JIFS-233575_ref7","doi-asserted-by":"crossref","first-page":"4280","DOI":"10.1109\/JIOT.2021.3103829","article-title":"On the Performance of Machine Learning Models for Anomaly-Based Intelligent Intrusion Detection Systems for the Internet of Things","volume":"9","author":"Abdelmoumin","year":"2022","journal-title":"IEEE Internet of Things Journal"},{"issue":"15","key":"10.3233\/JIFS-233575_ref8","doi-asserted-by":"crossref","first-page":"12251","DOI":"10.1109\/JIOT.2021.3060878","article-title":"Semi-Supervised Spatiotemporal Deep Learning for Intrusions Detection in IoT Networks","volume":"8","author":"Abdel-Basset","year":"2021","journal-title":"IEEE Internet of Things Journal"},{"issue":"12","key":"10.3233\/JIFS-233575_ref9","doi-asserted-by":"crossref","first-page":"9444","DOI":"10.1109\/JIOT.2021.3126811","article-title":"A Taxonomy of Machine-Learning-Based Intrusion Detection Systems for the Internet of Things: A Survey","volume":"9","author":"Jamalipour","year":"2022","journal-title":"IEEE Internet of Things Journal"},{"key":"10.3233\/JIFS-233575_ref10","doi-asserted-by":"crossref","first-page":"121173","DOI":"10.1109\/ACCESS.2022.3220622","article-title":"Machine and Deep Learning Solutions for Intrusion Detection and Prevention in IoTs: A Survey","volume":"10","author":"Jayalaxmi","year":"2022","journal-title":"IEEE Access"},{"key":"10.3233\/JIFS-233575_ref11","doi-asserted-by":"crossref","first-page":"42450","DOI":"10.1109\/ACCESS.2019.2907965","article-title":"Toward a Lightweight Intrusion Detection System for the Internet of Things","volume":"7","author":"Jan","year":"2019","journal-title":"IEEE Access"},{"key":"10.3233\/JIFS-233575_ref12","doi-asserted-by":"crossref","first-page":"169944","DOI":"10.1109\/ACCESS.2020.3023764","article-title":"Design of Intrusion Detection Honeypot Using Social Leopard Algorithm to Detect IoT Ransomware Attacks","volume":"8","author":"Chakkaravarthy","year":"2020","journal-title":"IEEE Access"},{"issue":"8","key":"10.3233\/JIFS-233575_ref13","doi-asserted-by":"crossref","first-page":"6882","DOI":"10.1109\/JIOT.2020.2970501","article-title":"Passban IDS: An Intelligent Anomaly-Based Intrusion Detection System for IoT Edge Devices","volume":"7","author":"Eskandari","year":"2020","journal-title":"IEEE Internet of Things Journal"},{"key":"10.3233\/JIFS-233575_ref14","doi-asserted-by":"crossref","first-page":"117734","DOI":"10.1109\/ACCESS.2021.3107337","article-title":"An Ensemble Multi-View Federated Learning Intrusion Detection for IoT","volume":"9","author":"Attota","year":"2021","journal-title":"IEEE Access"},{"key":"10.3233\/JIFS-233575_ref15","doi-asserted-by":"crossref","first-page":"9136","DOI":"10.1109\/ACCESS.2023.3238664","article-title":"Detection of Real-Time Malicious Intrusions and Attacks in IoT Empowered Cybersecurity Infrastructures","volume":"11","author":"Kandhro","year":"2023","journal-title":"IEEE Access"},{"issue":"2","key":"10.3233\/JIFS-233575_ref16","doi-asserted-by":"crossref","first-page":"314","DOI":"10.1109\/TETC.2016.2633228","article-title":"A Two-Layer Dimension Reduction and Two-Tier Classification Model for Anomaly-Based Intrusion Detection in IoT Backbone Networks","volume":"7","author":"Pajouh","year":"2019","journal-title":"IEEE Transactions on Emerging Topics in Computing"},{"key":"10.3233\/JIFS-233575_ref17","first-page":"3545","article-title":"Rusett, LCCDE: A Decision-Based Ensemble Framework for Intrusion Detection on The Internet of Vehicle, pp","author":"Yang","year":"2022","journal-title":"IEEE Global Communications Conference, Rio de Janeiro, Brazil"},{"key":"10.3233\/JIFS-233575_ref18","doi-asserted-by":"crossref","first-page":"168994","DOI":"10.1109\/ACCESS.2020.3023616","article-title":"Attack and Defense Strategies for Intrusion Detection in Autonomous Distributed IoT Systems,pp","volume":"8","author":"Al-Hamadi","year":"2020","journal-title":"IEEE Access"},{"key":"10.3233\/JIFS-233575_ref19","doi-asserted-by":"crossref","first-page":"137494","DOI":"10.1109\/ACCESS.2021.3118361","article-title":"An Agile Approach to Identify Single and Hybrid Normalization for Enhancing Machine Learning-Based Network Intrusion Detection","volume":"9","author":"Siddiqi","year":"2021","journal-title":"IEEE Access"},{"key":"10.3233\/JIFS-233575_ref20","unstructured":"Mirsky Y. Doitshman T. , Elovici Y. and Shabtai A. , Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection, https:\/\/arxiv.org\/pdf\/1802.09089.pdf"},{"issue":"18","key":"10.3233\/JIFS-233575_ref21","doi-asserted-by":"crossref","first-page":"17058","DOI":"10.1109\/JIOT.2021.3131981","article-title":"Malware Traffic Classification Using Domain Adaptation and Ladder Network for Secure Industrial Internet of Things","volume":"9","author":"Ning","year":"2022","journal-title":"IEEE Internet of Things Journal"},{"key":"10.3233\/JIFS-233575_ref22","doi-asserted-by":"crossref","first-page":"1171","DOI":"10.1007\/s11277-022-09994-3","article-title":"A Novel Load Balancing Aware Graph Theory Based Node Deployment in Wireless Sensor Networks","volume":"128","author":"Manoharan","year":"2023","journal-title":"Wireless Personal Communications"},{"issue":"12","key":"10.3233\/JIFS-233575_ref23","doi-asserted-by":"crossref","first-page":"9310","DOI":"10.1109\/JIOT.2021.3130434","article-title":"Wang, Hierarchical Adversarial Attacks Against Graph-Neural-Network-Based IoT Network Intrusion Detection System","volume":"9","author":"Zhou","year":"2022","journal-title":"IEEE Internet of Things Journal"},{"key":"10.3233\/JIFS-233575_ref24","doi-asserted-by":"crossref","first-page":"103906","DOI":"10.1109\/ACCESS.2021.3094024","article-title":"Design and Development of a Deep Learning-Based Model for Anomaly Detection in IoT Networks","volume":"9","author":"Ullah","year":"2021","journal-title":"IEEE Access"},{"issue":"20","key":"10.3233\/JIFS-233575_ref25","doi-asserted-by":"crossref","first-page":"19706","DOI":"10.1109\/JIOT.2022.3167005","article-title":"Intrusion Detection in the IoT Under Data and Concept Drifts: Online Deep Learning Approach","volume":"9","author":"Wahab","year":"2022","journal-title":"IEEE Internet of Things Journal"},{"issue":"1","key":"10.3233\/JIFS-233575_ref26","doi-asserted-by":"crossref","first-page":"1006","DOI":"10.1109\/TII.2022.3164770","article-title":"Dependable Intrusion Detection System for IoT: A Deep Transfer Learning Based Approach","volume":"19","author":"Mehedi","year":"2022","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"10.3233\/JIFS-233575_ref27","doi-asserted-by":"crossref","first-page":"2269","DOI":"10.1109\/ACCESS.2021.3137201","article-title":"Protocol-Based Deep Intrusion Detection for DoS and DDoS Attacks Using UNSW-NB15 and Bot-IoT Datasets","volume":"10","author":"Zeeshan","year":"2022","journal-title":"IEEE Access"},{"key":"10.3233\/JIFS-233575_ref28","doi-asserted-by":"crossref","first-page":"38254","DOI":"10.1109\/ACCESS.2021.3063671","article-title":"Research on Intrusion Detection Based on Particle Swarm Optimization in IoT","volume":"9","author":"Liu","year":"2021","journal-title":"IEEE Access"},{"key":"10.3233\/JIFS-233575_ref29","doi-asserted-by":"crossref","first-page":"123448","DOI":"10.1109\/ACCESS.2021.3109081","article-title":"IoT Intrusion Detection System Using Deep Learning and Enhanced Transient Search Optimization","volume":"9","author":"Fatani","year":"2021","journal-title":"IEEE Access"},{"issue":"24","key":"10.3233\/JIFS-233575_ref30","doi-asserted-by":"crossref","first-page":"24843","DOI":"10.1109\/JIOT.2022.3194837","article-title":"Intrusion Detection in Internet of Things with MQTT Protocol\u2014 An Accurate and Interpretable Genetic-Fuzzy Rule-Based Solution","volume":"9","author":"Gorza\u0142czany","year":"2022","journal-title":"IEEE Internet of Things Journal"},{"key":"10.3233\/JIFS-233575_ref31","doi-asserted-by":"crossref","first-page":"31711","DOI":"10.1109\/ACCESS.2019.2903723","article-title":"Intrusion Detection for IoT Based on Improved Genetic Algorithm and Deep Belief Network","volume":"7","author":"Zhang","year":"2019","journal-title":"IEEE Access"},{"key":"10.3233\/JIFS-233575_ref32","doi-asserted-by":"crossref","first-page":"113199","DOI":"10.1109\/ACCESS.2021.3104113","article-title":"An Advanced Intrusion Detection System for IIoT Based on GA and Tree-Based Algorithms","volume":"9","author":"Kasongo","year":"2021","journal-title":"IEEE Access"},{"key":"10.3233\/JIFS-233575_ref33","doi-asserted-by":"crossref","first-page":"62722","DOI":"10.1109\/ACCESS.2022.3176317","article-title":"Design and Development of RNN Anomaly Detection Model for IoT Networks","volume":"10","author":"Ullah","year":"2022","journal-title":"IEEE Access"},{"key":"10.3233\/JIFS-233575_ref34","doi-asserted-by":"crossref","unstructured":"Zhao R. , Wang Y. , Xue Z. , Ohtsuki T. , Adebisi B. and Gui G. , Semi-Supervised Federated Learning Based Intrusion Detection Method for Internet of Things, IEEE Internet of Things Journal May 2022.","DOI":"10.1109\/JIOT.2022.3175918"},{"key":"10.3233\/JIFS-233575_ref35","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.measurement.2019.107450","article-title":"Robust detection for network intrusion of industrial IoT based on multi-CNN fusion","volume":"154","author":"Li","year":"2020","journal-title":"Measurement"},{"key":"10.3233\/JIFS-233575_ref36","doi-asserted-by":"crossref","first-page":"127192","DOI":"10.1109\/ACCESS.2022.3226879","article-title":"A Novel Tunicate Swarm Algorithm with Hybrid Deep Learning Enabled Attack Detection for Secure IoT Environment","volume":"10","author":"Taher","year":"2022","journal-title":"IEEE Access"},{"key":"10.3233\/JIFS-233575_ref37","doi-asserted-by":"crossref","first-page":"8","DOI":"10.5815\/ijcnis.2019.03.02","article-title":"Deep Learning Approach on Network Intrusion Detection System using NSL-KDD Dataset","volume":"3","author":"Gurung","year":"2019","journal-title":"International Journal of Computer Network and Information Security"},{"key":"10.3233\/JIFS-233575_ref38","doi-asserted-by":"crossref","first-page":"272","DOI":"10.1007\/s10489-022-03361-2","article-title":"A novel multi-module integrated intrusion detection system for high-dimensional imbalanced data","volume":"53","author":"Cui","year":"2023","journal-title":"Applied Intelligence"},{"key":"10.3233\/JIFS-233575_ref39","doi-asserted-by":"crossref","unstructured":"Tavallaee M. , Bagheri E. , Lu W. and Ghorbani A. , A Detailed Analysis of the KDD CUP 99 Data Set, Submitted to Second IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA), 2009.","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"10.3233\/JIFS-233575_ref40","doi-asserted-by":"crossref","first-page":"22756","DOI":"10.1109\/ACCESS.2022.3153716","article-title":"Towards SDN-Enabled, Intelligent Intrusion Detection System for Internet of Things (IoT)","volume":"10","author":"Muthanna","year":"2022","journal-title":"IEEE Access"},{"key":"10.3233\/JIFS-233575_ref41","doi-asserted-by":"crossref","first-page":"53015","DOI":"10.1109\/ACCESS.2022.3172304","article-title":"Cyber Threats Detection in Smart Environments Using SDN-Enabled DNN-LSTM Hybrid Framework","volume":"10","author":"Razib","year":"2022","journal-title":"IEEE Access"},{"issue":"4","key":"10.3233\/JIFS-233575_ref42","doi-asserted-by":"crossref","first-page":"2716","DOI":"10.1109\/TII.2019.2956474","article-title":"Artificial Intelligence for Detection, Estimation, and Compensation of Malicious Attacks in Nonlinear Cyber-Physical Systems and Industrial IoT","volume":"16","author":"Farivar","year":"2020","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"10.3233\/JIFS-233575_ref43","doi-asserted-by":"crossref","first-page":"77039","DOI":"10.1109\/ACCESS.2022.3188635","article-title":"A Hybrid Deep Learning Approach for Bottleneck Detection in IoT","volume":"10","author":"Sattari","year":"2022","journal-title":"IEEE Access"},{"key":"10.3233\/JIFS-233575_ref44","doi-asserted-by":"crossref","first-page":"91038","DOI":"10.1109\/ACCESS.2021.3092054","article-title":"Developing an Efficient Feature Engineering and Machine Learning Model for Detecting IoT-Botnet Cyber Attacks","volume":"9","author":"Panda","year":"2021","journal-title":"IEEE Access"},{"key":"10.3233\/JIFS-233575_ref45","doi-asserted-by":"crossref","first-page":"117078","DOI":"10.1016\/j.enconman.2023.117078","article-title":"Design and investigation of PV string\/central architecture for bayesian fusion technique using grey wolf optimization and flower pollination optimized algorithm","volume":"286","author":"Hemalatha","year":"2023","journal-title":"Energy Conversion and Management"},{"key":"10.3233\/JIFS-233575_ref46","doi-asserted-by":"publisher","DOI":"10.3233\/JIFS-231389"},{"key":"10.3233\/JIFS-233575_ref47","doi-asserted-by":"crossref","unstructured":"Albert J.R. , Kaliannan T. , Singaram G. , Sehar F.I. Raj Edward , Periasamy M. and Kuppusamy S. , A Remote Diagnosis Using Variable Fractional Order with Reinforcement Controller for Solar-MPPT Intelligent System, Photovoltaic Systems, pp. 45\u201364, Publisher: CRC press. https:\/\/doi.org\/10.1201\/9781003202288","DOI":"10.1201\/9781003202288-3"},{"key":"10.3233\/JIFS-233575_ref48","doi-asserted-by":"crossref","first-page":"2059","DOI":"10.1007\/s11277-023-10372-w","article-title":"A Symmetric Solar Photovoltaic Inverter to Improve Power Quality Using Digital Pulsewidth Modulation Approach","volume":"130","author":"Albert","year":"2023","journal-title":"Wireless Pers Commun"},{"issue":"4","key":"10.3233\/JIFS-233575_ref49","doi-asserted-by":"publisher","first-page":"2498","DOI":"10.11591\/ijpeds.v13.i4.pp2498-2505","article-title":"Various PSO methods investigation in renewable and nonrenewable sources","volume":"13","author":"Periasamy","year":"2505","journal-title":"International Journal of Power Electronics and Drive Systems"},{"issue":"5","key":"10.3233\/JIFS-233575_ref50","doi-asserted-by":"publisher","first-page":"5877","DOI":"10.3233\/JIFS-213259","article-title":"An Experimental Simulation Testing of Single-diode PV Integrated MPPT Grid-tied Optimized Control Using Grey Wolf Algorithm","volume":"43","author":"Babypriya","year":"2022","journal-title":"Journal of Intelligent and Fuzzy System"},{"issue":"4","key":"10.3233\/JIFS-233575_ref51","doi-asserted-by":"publisher","first-page":"4395","DOI":"10.3233\/JIFS-220089","article-title":"An Advanced Electrical Vehicle Charging Station Using Adaptive Hybrid Particle Swarm Optimization Intended for Renewable Energy System for Simultaneous Distributions","volume":"43","author":"Albert","year":"2022","journal-title":"Journal of Intelligent and Fuzzy System"},{"key":"10.3233\/JIFS-233575_ref52","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/01430750.2022.2092773","article-title":"Testing and Performance Evaluation of Water Pump Irrigation System using Voltage-Lift Multilevel Inverter","author":"Renoald","year":"2022","journal-title":"International Journal of Ambient Energy"},{"issue":"6","key":"10.3233\/JIFS-233575_ref53","doi-asserted-by":"publisher","first-page":"5939","DOI":"10.3233\/JIFS-212583","article-title":"Design and Experimental Investigation on VL-MLI Intended for Half Height (H-H) Method to Improve Power Quality Using Modified Particle Swarm Optimization (MPSO) Algorithm","volume":"42","author":"Ramaraju","year":"2022","journal-title":"J Intell Fuzzy Syst"},{"issue":"1","key":"10.3233\/JIFS-233575_ref54","doi-asserted-by":"crossref","first-page":"1091","DOI":"10.3233\/JIFS-213241","article-title":"Design and development of extract maximum power from single-double diode PV model for different environmental condition using BAT optimization algorithm","volume":"43","author":"Thangamuthu","year":"2022","journal-title":"J Intell Fuzzy Syst"},{"issue":"1","key":"10.3233\/JIFS-233575_ref55","doi-asserted-by":"publisher","first-page":"1163","DOI":"10.3233\/JIFS-212668","article-title":"Experimental Investigation and Comparative Harmonic Optimization of AMLI Incorporate Modified Genetic Algorithm Using for Power Quality Improvement","volume":"43","author":"Palanisamy","year":"2022","journal-title":"Journal of Intelligent and Fuzzy System"},{"key":"10.3233\/JIFS-233575_ref56","doi-asserted-by":"crossref","first-page":"1537","DOI":"10.1007\/s40313-021-00892-w","article-title":"Design and Investigation of Solar PV Fed Single-Source Voltage-Lift Multilevel Inverter Using Intelligent Controllers","volume":"33","author":"Albert","year":"2022","journal-title":"J Control Autom Electr Syst"}],"updated-by":[{"DOI":"10.1177\/10641246251331509","type":"retraction","label":"Retraction","source":"retraction-watch","updated":{"date-parts":[[2025,4,17]],"date-time":"2025-04-17T00:00:00Z","timestamp":1744848000000},"record-id":"64333"},{"DOI":"10.1177\/10641246251331509","type":"retraction","label":"Retraction","source":"publisher","updated":{"date-parts":[[2025,4,17]],"date-time":"2025-04-17T00:00:00Z","timestamp":1744848000000}}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/JIFS-233575","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T06:59:42Z","timestamp":1769669982000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/JIFS-233575"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,4]]},"references-count":55,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.3233\/jifs-233575","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,11,4]]}}}