{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T01:45:15Z","timestamp":1760060715501,"version":"build-2065373602"},"reference-count":60,"publisher":"MDPI AG","issue":"10","license":[{"start":{"date-parts":[[2025,9,24]],"date-time":"2025-09-24T00:00:00Z","timestamp":1758672000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers"],"abstract":"<jats:p>Network flow collection has become a cornerstone of cyber defence, yet the literature still lacks a consolidated view of which technologies are effective across different environments and conditions. We conducted a systematic review of 362 publications indexed in six digital libraries between January 2019 and July 2025, of which 51 met PRISMA 2020 eligibility criteria. All extraction materials are archived on OSF. NetFlow derivatives appear in 62.7% of the studies, IPFIX in 45.1%, INT\/P4 or OpenFlow mirroring in 17.6%, and sFlow in 9.8%, with totals exceeding 100% because several papers evaluate multiple protocols. In total, 17 of the 51 studies (33.3%) tested production links of at least 40 Gbps, while others remained in laboratory settings. Fewer than half reported packet-loss thresholds or privacy controls, and none adopted a shared benchmark suite. These findings highlight trade-offs between throughput, fidelity, computational cost, and privacy, as well as gaps in encrypted-traffic support and GDPR-compliant anonymisation. Most importantly, our synthesis demonstrates that flow-collection methods directly shape what can be detected: some exporters are effective for volumetric attacks such as DDoS, while others enable visibility into brute-force authentication, botnets, or IoT malware. In other words, the choice of telemetry technology determines which threats and anomalous behaviours remain visible or hidden to defenders. By mapping technologies, metrics, and gaps, this review provides a single reference point for researchers, engineers, and regulators facing the challenges of flow-aware cybersecurity.<\/jats:p>","DOI":"10.3390\/computers14100407","type":"journal-article","created":{"date-parts":[[2025,9,24]],"date-time":"2025-09-24T08:19:45Z","timestamp":1758701985000},"page":"407","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Network Data Flow Collection Methods for Cybersecurity: A Systematic Literature Review"],"prefix":"10.3390","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7951-7066","authenticated-orcid":false,"given":"Alessandro Carvalho","family":"Coutinho","sequence":"first","affiliation":[{"name":"School of Arts, Sciences and Humanities, University of S\u00e3o Paulo, S\u00e3o Paulo 03828-000, Brazil"}]},{"given":"Luciano Vieira de","family":"Ara\u00fajo","sequence":"additional","affiliation":[{"name":"School of Arts, Sciences and Humanities, University of S\u00e3o Paulo, S\u00e3o Paulo 03828-000, Brazil"}]}],"member":"1968","published-online":{"date-parts":[[2025,9,24]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"2525","DOI":"10.1134\/S1995080220120021","article-title":"Collection, Analysis and Interactive Visualization of NetFlow Data: Experience with Big Data on the Base of the National Research Computer Network of Russia","volume":"41","author":"Abramov","year":"2020","journal-title":"Lobachevskii J. Math."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1016\/j.jpdc.2021.04.015","article-title":"Scalable Flow Probe Architecture for 100 Gbps+ Rates on Commodity Hardware: Design Considerations and Approach","volume":"155","author":"Bhattacharjee","year":"2021","journal-title":"J. Parallel Distrib. Comput."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"102934","DOI":"10.1016\/j.jnca.2020.102934","article-title":"Unified and Standalone Monitoring Module for NFV\/SDN Infrastructures","volume":"175","author":"Borylo","year":"2021","journal-title":"J. Netw. Comput. Appl."},{"unstructured":"\u010celeda, P., Velan, P., Kral, B., and Kozak, O. (2019, January 8\u201312). Enabling SSH Protocol Visibility in Flow Monitoring. Proceedings of the 2019 IFIP\/IEEE International Symposium on Integrated Network Management (IM2019): Experience Sessions, Washington, DC, USA.","key":"ref_4"},{"unstructured":"Wrona, J., and \u017d\u00e1dn\u00edk, M. (2019, January 8\u201312). Low Overhead Distributed IP Flow Records Collection and Analysis. Proceedings of the 2019 IFIP\/IEEE Symposium on Integrated Network and Service Management (IM), Washington, DC, USA.","key":"ref_5"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"109951","DOI":"10.1016\/j.comnet.2023.109951","article-title":"Analyzing the Influence of the Sampling Rate in the Detection of Malicious Traffic on Flow Data","volume":"235","year":"2023","journal-title":"Comput. Netw."},{"doi-asserted-by":"crossref","unstructured":"Velan, P., and Jirsik, T. (2020, January 20\u201324). On the Impact of Flow Monitoring Configuration. Proceedings of the 2020 IEEE\/IFIP Network Operations and Management Symposium (NOMS 2020), Budapest, Hungary.","key":"ref_7","DOI":"10.1109\/NOMS47738.2020.9110361"},{"doi-asserted-by":"crossref","unstructured":"Fejrskov, M., Pedersen, J.M., and Vasilomanolakis, E. (2020, January 15\u201319). Cyber-Security Research by ISPs: A NetFlow and DNS Anonymization Policy. Proceedings of the 2020 International Conference on Cyber Security and Protection of Digital Services (Cyber Security), Dublin, Ireland.","key":"ref_8","DOI":"10.1109\/CyberSecurity49315.2020.9138869"},{"doi-asserted-by":"crossref","unstructured":"Sateesan, A., Vliegen, J., Scherrer, S., Hsiao, H.-C., Perrig, A., and Mentens, N. (September, January 30). Speed Records in Network Flow Measurement on FPGA. Proceedings of the 2021 31st International Conference on Field-Programmable Logic and Applications (FPL), Dresden, Germany.","key":"ref_9","DOI":"10.1109\/FPL53798.2021.00043"},{"unstructured":"Chen, X., Min, G., Guo, D., Xie, X., and Pu, L. (2025). Intelligent Telemetry: P4-Driven Network Telemetry and Service Flow Intelligent Aviation Platform. Network and Parallel Computing, Springer Nature.","key":"ref_10"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"2338","DOI":"10.1109\/TNSE.2023.3305125","article-title":"CS-Sketch: Compressive Sensing Enhanced Sketch for Full Traffic Measurement","volume":"11","author":"Li","year":"2024","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"doi-asserted-by":"crossref","unstructured":"Lin, K.C.-J., and Lai, W.-L. (2022, January 2\u20135). MC-Sketch: Enabling Heterogeneous Network Monitoring Resolutions with Multi-Class Sketch. Proceedings of the IEEE INFOCOM 2022\u2014IEEE Conference on Computer Communications, London, UK.","key":"ref_12","DOI":"10.1109\/INFOCOM48880.2022.9796955"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"47815","DOI":"10.1109\/ACCESS.2021.3068459","article-title":"Deep Reinforcement Learning-Based Traffic Sampling for Multiple Traffic Analyzers on Software-Defined Networks","volume":"9","author":"Kim","year":"2021","journal-title":"IEEE Access"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"103871","DOI":"10.1016\/j.csi.2024.103871","article-title":"Detecting and Mitigating Security Anomalies in Software-Defined Networking (SDN) Using Gradient-Boosted Trees and Floodlight Controller Characteristics","volume":"91","author":"Jafarian","year":"2025","journal-title":"Comput. Stand. Interfaces"},{"key":"ref_15","first-page":"102535","article-title":"Flow Based Monitoring of ICS Communication in the Smart Grid","volume":"54","author":"Havlena","year":"2020","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1186\/s13174-020-00127-2","article-title":"A Survey on Data Analysis on Large-Scale Wireless Networks: Online Stream Processing, Trends, and Challenges","volume":"11","author":"Medeiros","year":"2020","journal-title":"J. Internet Serv. Appl."},{"unstructured":"(2025, January 03). ACM Digital Library. Available online: https:\/\/dl.acm.org\/.","key":"ref_17"},{"unstructured":"(2025, January 03). IEEE Xplore. Available online: https:\/\/ieeexplore.ieee.org\/Xplore\/home.jsp.","key":"ref_18"},{"unstructured":"(2025, January 03). ScienceDirect.Com|Science, Health and Medical Journals, Full Text Articles and Books. Available online: https:\/\/www.sciencedirect.com\/.","key":"ref_19"},{"unstructured":"(2025, January 03). Computer Science: Books and Journals|Springer|Springer\u2014International Publisher. Available online: https:\/\/www.springer.com\/br\/computer-science.","key":"ref_20"},{"unstructured":"(2025, August 06). Smart Search\u2014Web of Science Core Collection. Available online: https:\/\/www.webofscience.com\/wos\/woscc\/smart-search.","key":"ref_21"},{"unstructured":"(2025, August 06). Scopus\u2014Homepage. Available online: https:\/\/www.scopus.com\/pages\/home?display=basic#basic.","key":"ref_22"},{"unstructured":"(2025, January 03). Zotero|Your Personal Research Assistant. Available online: https:\/\/www.zotero.org\/.","key":"ref_23"},{"unstructured":"(2025, June 21). StArt. Available online: https:\/\/www.lapes.ufscar.br\/resources\/tools-1\/start-1.","key":"ref_24"},{"unstructured":"Keele, S. (2007). Guidelines for Performing Systematic Literature Reviews in Software Engineering, EBSE. Technical Report, ver. 2.3 EBSE Technical Report.","key":"ref_25"},{"doi-asserted-by":"crossref","unstructured":"Jirsik, T., and \u010celeda, P. (2020, January 20\u201324). Cyber Situation Awareness via IP Flow Monitoring. Proceedings of the IEEE\/IFIP Network Operations and Management Symposium (NOMS 2020), Budapest, Hungary.","key":"ref_26","DOI":"10.1109\/NOMS47738.2020.9110327"},{"doi-asserted-by":"crossref","unstructured":"Watkins, J., Tummala, M., and McEachen, J. (2021, January 13\u201315). A Machine Learning Approach to Network Security Classification Utilizing NetFlow Data. Proceedings of the 15th International Conference on Signal Processing and Communication Systems (ICSPCS), Sydney, Australia.","key":"ref_27","DOI":"10.1109\/ICSPCS53099.2021.9660294"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"110147","DOI":"10.1016\/j.comnet.2023.110147","article-title":"NetTiSA: Extended IP Flow with Time-Series Features for Universal Bandwidth-Constrained High-Speed Network Traffic Classification","volume":"240","author":"Koumar","year":"2024","journal-title":"Comput. Netw."},{"doi-asserted-by":"crossref","unstructured":"Campazas-Vega, A., Crespo-Mart\u00ednez, I.S., Guerrero-Higueras, \u00c1.M., and Fern\u00e1ndez-Llamas, C. (2020). Flow-Data Gathering Using NetFlow Sensors for Fitting Malicious-Traffic Detection Models. Sensors, 20.","key":"ref_29","DOI":"10.3390\/s20247294"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"9245","DOI":"10.1109\/TIFS.2024.3468632","article-title":"Cyber-AnDe: Cybersecurity Framework with Adaptive Distributed Sampling for Anomaly Detection on SDNs","volume":"19","author":"Niknami","year":"2024","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"unstructured":"Velan, P., and \u010celeda, P. (2019, January 8\u201312). Application-Aware Flow Monitoring. Proceedings of the 2019 IFIP\/IEEE Symposium on Integrated Network and Service Management (IM), Washington, DC, USA.","key":"ref_31"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"102609","DOI":"10.1016\/j.cose.2022.102609","article-title":"CRUSOE: A Toolset for Cyber Situational Awareness and Decision Support in Incident Handling","volume":"115","author":"Sadlek","year":"2022","journal-title":"Comput. Secur."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"012039","DOI":"10.1088\/1755-1315\/428\/1\/012039","article-title":"Detecting Abnormal Interactions among Intranet Groups Based on Netflow Data","volume":"428","author":"Yu","year":"2020","journal-title":"IOP Conf. Ser. Earth Environ. Sci."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"5764","DOI":"10.1134\/S1995080224606763","article-title":"Enhancement of Services for Working with Big Data with an Emphasis on Intelligent Analysis and Visualization of Network Traffic Exchange in the National Research Computer Network","volume":"45","author":"Abramov","year":"2024","journal-title":"Lobachevskii J. Math."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"4930","DOI":"10.1134\/S1995080223110021","article-title":"Methods and High-Performance Tools for Collecting, Analysis and Visualization of Data Exchange with a Focus on Research and Education Telecommunications Networks","volume":"44","author":"Abramov","year":"2023","journal-title":"Lobachevskii J. Math."},{"doi-asserted-by":"crossref","unstructured":"Aquino, A.N.S., and Villanueva, A.R. (2023, January 11\u201312). Network Anomaly Detection Using NetFlow and Network Automation. Proceedings of the 2023 11th International Symposium on Digital Forensics and Security (ISDFS), Chattanooga, TN, USA.","key":"ref_36","DOI":"10.1109\/ISDFS58141.2023.10131880"},{"key":"ref_37","first-page":"2255","article-title":"CMShark: A NetFlow and Machine-Learning Based Crypto-Jacking Intrusion-Detection Method","volume":"18","author":"Danesh","year":"2024","journal-title":"Intell. Decis. Technol."},{"doi-asserted-by":"crossref","unstructured":"Dias, L., Valente, S., and Correia, M. (2020, January 24\u201327). Go with the Flow: Clustering Dynamically-Defined NetFlow Features for Network Intrusion Detection with DynIDS. Proceedings of the 2020 IEEE 19th International Symposium on Network Computing and Applications (NCA), Cambridge, MA, USA.","key":"ref_38","DOI":"10.1109\/NCA51143.2020.9306732"},{"doi-asserted-by":"crossref","unstructured":"Fejrskov, M., Pedersen, J.M., and Vasilomanolakis, E. (2022, January 3\u20135). Detecting DNS Hijacking by Using NetFlow Data. Proceedings of the 2022 IEEE Conference on Communications and Network Security (CNS), Austin, TX, USA.","key":"ref_39","DOI":"10.1109\/CNS56114.2022.9947264"},{"doi-asserted-by":"crossref","unstructured":"Hsupeng, B., Lee, K.-W., Wei, T.-E., and Wang, S.-H. (2022, January 13\u201316). Explainable Malware Detection Using Predefined Network Flow. Proceedings of the 2022 24th International Conference on Advanced Communication Technology (ICACT), PyeongChang, Korea.","key":"ref_40","DOI":"10.23919\/ICACT53585.2022.9728897"},{"doi-asserted-by":"crossref","unstructured":"Hus\u00e1k, M., La\u015btovi\u010dka, M., and Tovar\u0148\u00e1k, D. (2021, January 17\u201320). System for Continuous Collection of Contextual Information for Network Security Management and Incident Handling. Proceedings of the 16th International Conference on Availability, Reliability and Security, Vienna, Austria.","key":"ref_41","DOI":"10.1145\/3465481.3470037"},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"107641","DOI":"10.1016\/j.future.2024.107641","article-title":"Flow Timeout Matters: Investigating the Impact of Active and Idle Timeouts on the Performance of Machine Learning Models in Detecting Security Threats","volume":"166","author":"Alami","year":"2025","journal-title":"Future Gener. Comput. Syst."},{"doi-asserted-by":"crossref","unstructured":"Jare, S., and Abraham, J. (2024, January 23\u201324). Creating an Experimental Setup in Mininet for Traffic Flow Collection During DDoS Attack. Proceedings of the 2024 8th International Conference on Computing, Communication, Control and Automation (ICCUBEA), Pune, India.","key":"ref_43","DOI":"10.1109\/ICCUBEA61740.2024.10774866"},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"728","DOI":"10.23919\/transcom.2023EBP3208","article-title":"Spatial Anomaly Detection Using Fast xFlow Proxy for Nation-Wide IP Network","volume":"E107.B","author":"Kamamura","year":"2024","journal-title":"IEICE Trans. Commun."},{"doi-asserted-by":"crossref","unstructured":"Komisarek, M., Pawlicki, M., Kozik, R., Ho\u0142ubowicz, W., and Chora\u015b, M. (2021). How to Effectively Collect and Process Network Data for Intrusion Detection?. Entropy, 23.","key":"ref_45","DOI":"10.3390\/e23111532"},{"doi-asserted-by":"crossref","unstructured":"Liu, X., Tang, Z., and Yang, B. (2019, January 27\u201329). Predicting Network Attacks with CNN by Constructing Images from NetFlow Data. Proceedings of the 2019 IEEE 5th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing, (HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS), Washington, DC, USA.","key":"ref_46","DOI":"10.1109\/BigDataSecurity-HPSC-IDS.2019.00022"},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1007\/s12243-023-00991-6","article-title":"A Data Infrastructure for Heterogeneous Telemetry Adaptation: Application to Netflow-Based Cryptojacking Detection","volume":"79","author":"Pastor","year":"2024","journal-title":"Ann. Telecommun."},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"100385","DOI":"10.1016\/j.ijcip.2020.100385","article-title":"Network Trace Generation for Flow-Based IDS Evaluation in Control and Automation Systems","volume":"31","author":"Ndonda","year":"2020","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"doi-asserted-by":"crossref","unstructured":"Pesek, J., Plny, R., Koumar, J., Je\u0159\u00e1bek, K., and \u010cejka, T. (2023, January 20\u201323). Augmenting Monitoring Infrastructure For Dynamic Software-Defined Networks. Proceedings of the 2023 8th International Conference on Smart and Sustainable Technologies (SpliTech), Split, Croatia.","key":"ref_49","DOI":"10.23919\/SpliTech58164.2023.10193216"},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"495","DOI":"10.1109\/TDSC.2020.2973992","article-title":"On High-Speed Flow-Based Intrusion Detection Using Snort-Compatible Signatures","volume":"19","author":"Erlacher","year":"2022","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"doi-asserted-by":"crossref","unstructured":"Leal, R., Santos, L., Vieira, L., Gon\u00e7alves, R., and Rabad\u00e3o, C. (2019, January 19\u201322). MQTT Flow Signatures for the Internet of Things. Proceedings of the 2019 14th Iberian Conference on Information Systems and Technologies (CISTI), Coimbra, Portugal.","key":"ref_51","DOI":"10.23919\/CISTI.2019.8760849"},{"doi-asserted-by":"crossref","unstructured":"Tovar\u0148\u00e1k, D., Racek, M., and Velan, P. (2021, January 25\u201329). Cloud Native Data Platform for Network Telemetry and Analytics. Proceedings of the 2021 17th International Conference on Network and Service Management (CNSM), Izmir, Turkey.","key":"ref_52","DOI":"10.23919\/CNSM52442.2021.9615568"},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"763","DOI":"10.1016\/j.future.2019.10.015","article-title":"Towards sFlow and Adaptive Polling Sampling for Deep Learning Based DDoS Detection in SDN","volume":"111","author":"Ujjan","year":"2020","journal-title":"Future Gener. Comput. Syst."},{"doi-asserted-by":"crossref","unstructured":"Zhang, H., Huang, H., Sun, Y.-E., and Wang, Z. (2023, January 10\u201313). MIME: Fast and Accurate Flow Information Compression for Multi-Spread Estimation. Proceedings of the 2023 IEEE 31st International Conference on Network Protocols (ICNP), Reykjavik, Iceland.","key":"ref_54","DOI":"10.1109\/ICNP59255.2023.10355571"},{"doi-asserted-by":"crossref","unstructured":"Gao, G., Qian, Z., Huang, H., and Du, Y. (2023, January 19\u201321). An Adaptive Counter-Splicing-Based Sketch for Efficient Per-Flow Size Measurement. Proceedings of the 2023 IEEE\/ACM 31st International Symposium on Quality of Service (IWQoS), Orlando, FL, USA.","key":"ref_55","DOI":"10.1109\/IWQoS57198.2023.10188733"},{"doi-asserted-by":"crossref","unstructured":"Kim, S., Jung, C., Jang, R., Mohaisen, D., and Nyang, D. (March, January 27). A Robust Counting Sketch for Data Plane Intrusion Detection. Proceedings of the 30th Annual Network and Distributed System Security Symposium (NDSS 2023), San Diego, CA, USA.","key":"ref_56","DOI":"10.14722\/ndss.2023.23102"},{"doi-asserted-by":"crossref","unstructured":"Lu, J., Zhang, Z., and Chen, H. (2022, January 28\u201330). A Two-Layer Sketch for Entropy Estimation in the Data Plane. Proceedings of the 2022 7th International Conference on Cloud Computing and Big Data Analytics (ICCCBDA), Chengdu, China.","key":"ref_57","DOI":"10.1109\/ICCCBDA55098.2022.9778903"},{"key":"ref_58","doi-asserted-by":"crossref","first-page":"2219","DOI":"10.1109\/TNSM.2022.3149734","article-title":"Monitoring OpenFlow Virtual Networks via Coordinated Switch-Based Traffic Mirroring","volume":"19","author":"Sadrhaghighi","year":"2022","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"ref_59","doi-asserted-by":"crossref","first-page":"102549","DOI":"10.1016\/j.jnca.2020.102549","article-title":"An Adaptive Security Data Collection and Composition Recognition Method for Security Measurement over LTE\/LTE-a Networks","volume":"155","author":"Fu","year":"2020","journal-title":"J. Netw. Comput. Appl."},{"doi-asserted-by":"crossref","unstructured":"Coutinho, A.C., and Ara\u00fajo, L.V. (2025). de MICRA: A Modular Intelligent Cybersecurity Response Architecture with Machine Learning Integration. J. Cybersecur. Priv., 5.","key":"ref_60","DOI":"10.3390\/jcp5030060"}],"container-title":["Computers"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-431X\/14\/10\/407\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T18:48:38Z","timestamp":1760035718000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-431X\/14\/10\/407"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,24]]},"references-count":60,"journal-issue":{"issue":"10","published-online":{"date-parts":[[2025,10]]}},"alternative-id":["computers14100407"],"URL":"https:\/\/doi.org\/10.3390\/computers14100407","relation":{},"ISSN":["2073-431X"],"issn-type":[{"type":"electronic","value":"2073-431X"}],"subject":[],"published":{"date-parts":[[2025,9,24]]}}}