{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,30]],"date-time":"2025-11-30T22:35:08Z","timestamp":1764542108118,"version":"build-2065373602"},"reference-count":63,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2021,2,25]],"date-time":"2021-02-25T00:00:00Z","timestamp":1614211200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100002851","name":"China Academy of Engineering Physics","doi-asserted-by":"publisher","award":["XH35 and SJ2019A05"],"award-info":[{"award-number":["XH35 and SJ2019A05"]}],"id":[{"id":"10.13039\/501100002851","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Entropy"],"abstract":"<jats:p>Anomaly detection research was conducted traditionally using mathematical and statistical methods. This topic has been widely applied in many fields. Recently reinforcement learning has achieved exceptional successes in many areas such as the AlphaGo chess playing and video gaming etc. However, there were scarce researches applying reinforcement learning to the field of anomaly detection. This paper therefore aimed at proposing an adaptable asynchronous advantage actor-critic model of reinforcement learning to this field. The performances were evaluated and compared among classical machine learning and the generative adversarial model with variants. Basic principles of the related models were introduced firstly. Then problem definitions, modelling processes and testing were detailed. The proposed model differentiated the sequence and image from other anomalies by proposing appropriate neural networks of attention mechanism and convolutional network for the two kinds of anomalies, respectively. Finally, performances with classical models using public benchmark datasets (NSL-KDD, AWID and CICIDS-2017, DoHBrw-2020) were evaluated and compared. Experiments confirmed the effectiveness of the proposed model with the results indicating higher rewards and lower loss rates on the datasets during training and testing. The metrics of precision, recall rate and F1 score were higher than or at least comparable to the state-of-the-art models. We concluded the proposed model could outperform or at least achieve comparable results with the existing anomaly detection models.<\/jats:p>","DOI":"10.3390\/e23030274","type":"journal-article","created":{"date-parts":[[2021,2,25]],"date-time":"2021-02-25T21:16:53Z","timestamp":1614287813000},"page":"274","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["Application of Improved Asynchronous Advantage Actor Critic Reinforcement Learning Model on Anomaly Detection"],"prefix":"10.3390","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7926-6017","authenticated-orcid":false,"given":"Kun","family":"Zhou","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu 611731, China"},{"name":"Institute for Computer Application, China Academy of Engineering Physics, Mianyang 621900, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4095-547X","authenticated-orcid":false,"given":"Wenyong","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu 611731, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8624-0210","authenticated-orcid":false,"given":"Teng","family":"Hu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu 611731, China"},{"name":"Institute for Computer Application, China Academy of Engineering Physics, Mianyang 621900, China"}]},{"given":"Kai","family":"Deng","sequence":"additional","affiliation":[{"name":"Institute for Computer Application, China Academy of Engineering Physics, Mianyang 621900, China"}]}],"member":"1968","published-online":{"date-parts":[[2021,2,25]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Liu, L., and \u00d6zsu, M.T. (2017). Outlier Detection. Encyclopedia of Database Systems, Springer.","DOI":"10.1007\/978-1-4899-7993-3"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"463","DOI":"10.1016\/0893-6080(95)00120-4","article-title":"Network constraints and multi-objective optimization for one-class classification","volume":"9","author":"Moya","year":"1996","journal-title":"Neural Netw."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1080\/00031305.1992.10475879","article-title":"An Introduction to Kernel and Nearest-Neighbor Nonparametric Regression","volume":"46","author":"Altman","year":"1992","journal-title":"Am. Stat."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1145\/335191.335388","article-title":"LOF: Identifying Density-Based Local Outliers","volume":"29","author":"Breunig","year":"2000","journal-title":"SIGMOD Rec."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Goldstein, M., and Uchida, S. (2016). A comparative evaluation of unsupervised anomaly detection algorithms for multivariate data. PLoS ONE, 11.","DOI":"10.1371\/journal.pone.0152173"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Liu, F.T., Ting, K.M., and Zhou, Z. (2008, January 15\u201319). Isolation Forest. Proceedings of the 2008 Eighth IEEE International Conference on Data Mining, Pisa, Italy.","DOI":"10.1109\/ICDM.2008.17"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Lazarevic, A., and Kumar, V. (2005, January 21\u201324). Feature Bagging for Outlier Detection. Proceedings of the Eleventh ACM SIGKDD International Conference on Knowledge Discovery in Data Mining; Association for Computing Machinery, Chicago, IL, USA. KDD\u201905.","DOI":"10.1145\/1081870.1081891"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Said Elsayed, M., Le-Khac, N.A., Dev, S., and Jurcut, A.D. (2020, January 16\u201320). Network Anomaly Detection Using LSTM Based Autoencoder. Proceedings of the 16th ACM Symposium on QoS and Security for Wireless and Mobile Networks, Alicante, Spain.","DOI":"10.1145\/3416013.3426457"},{"key":"ref_9","unstructured":"Di Mattia, F., Galeone, P., De Simoni, M., and Ghelfi, E. (2019). A survey on gans for anomaly detection. arXiv."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1016\/j.jnca.2018.12.006","article-title":"A holistic review of Network Anomaly Detection Systems: A comprehensive survey","volume":"128","author":"Moustafa","year":"2019","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"447","DOI":"10.1007\/s11235-018-0475-8","article-title":"A comprehensive survey on network anomaly detection","volume":"70","author":"Fernandes","year":"2019","journal-title":"Telecommun. Syst."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"406","DOI":"10.1016\/j.patcog.2017.09.037","article-title":"A comparative evaluation of outlier detection algorithms: Experiments and analyses","volume":"74","author":"Domingues","year":"2018","journal-title":"Pattern Recognit."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"107964","DOI":"10.1109\/ACCESS.2019.2932769","article-title":"Progress in Outlier Detection Techniques: A Survey","volume":"7","author":"Wang","year":"2019","journal-title":"IEEE Access"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Chalapathy, R., and Chawla, S. (2019). Deep Learning for Anomaly Detection: A Survey. arXiv.","DOI":"10.1145\/3394486.3406704"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"132330","DOI":"10.1109\/ACCESS.2020.3010274","article-title":"Anomalous Example Detection in Deep Learning: A Survey","volume":"8","author":"Bulusu","year":"2020","journal-title":"IEEE Access"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"859","DOI":"10.1016\/j.asoc.2009.10.003","article-title":"Sequential anomaly detection based on temporal-difference learning: Principles, models and case studies","volume":"10","author":"Xu","year":"2010","journal-title":"Appl. Soft Comput. J."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Oh, M.H., and Iyengar, G. (2019, January 4\u20138). Sequential anomaly detection using inverse reinforcement learning. Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Anchorage, AK, USA.","DOI":"10.1145\/3292500.3330932"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1109\/MCOM.2017.1700246","article-title":"Software-Defined Networks with Mobile Edge Computing and Caching for Smart Cities: A Big Data Deep Reinforcement Learning Approach","volume":"55","author":"He","year":"2017","journal-title":"IEEE Commun. Mag."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1109\/MNET.2018.1800109","article-title":"Deep Reinforcement Learning for Mobile Edge Caching: Review, New Features, and Open Issues","volume":"32","author":"Zhu","year":"2018","journal-title":"IEEE Netw."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"116","DOI":"10.1109\/MWC.2018.1700291","article-title":"Security in Mobile Edge Caching with Reinforcement Learning","volume":"25","author":"Xiao","year":"2018","journal-title":"IEEE Wirel. Commun."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Akazaki, T., Liu, S., Yamagata, Y., and Duan, Y. (2018). Falsification of Cyber-Physical Systems, Springer.","DOI":"10.1007\/978-3-319-95582-7_27"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Yu, Z., Machado, P., Zahid, A., Abdulghani, A.M., Dashtipour, K., Heidari, H., Imran, M.A., and Abbasi, Q.H. (2020). Energy and Performance Trade-Off Optimization in Heterogeneous Computing via Reinforcement Learning. Electronics, 9.","DOI":"10.3390\/electronics9111812"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Han, G., Xiao, L., and Poor, H.V. (2017, January 5\u20139). Two-dimensional anti-jamming communication based on deep reinforcement learning. Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), New Orleans, LA, USA.","DOI":"10.1109\/ICASSP.2017.7952524"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"10037","DOI":"10.1109\/TVT.2016.2524258","article-title":"PHY-Layer Spoofing Detection with Reinforcement Learning in Wireless Networks","volume":"65","author":"Xiao","year":"2016","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Wan, X., Sheng, G., Li, Y., Xiao, L., and Du, X. (2017, January 4\u20138). Reinforcement Learning Based Mobile Offloading for Cloud-Based Malware Detection. Proceedings of the 2017 IEEE Global Communications Conference, GLOBECOM, Singapore.","DOI":"10.1109\/GLOCOM.2017.8254503"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1109\/TIFS.2017.2737968","article-title":"A Secure Mobile Crowdsensing Game with Deep Reinforcement Learning","volume":"13","author":"Xiao","year":"2018","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Chatterjee, M., and Namin, A.S. (2019, January 15\u201319). Detecting phishing websites through deep reinforcement learning. Proceedings of the 2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC), Milwaukee, WI, USA.","DOI":"10.1109\/COMPSAC.2019.10211"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"5174","DOI":"10.1109\/TSG.2018.2878570","article-title":"Online Cyber-Attack Detection in Smart Grid: A Reinforcement Learning Approach","volume":"10","author":"Kurt","year":"2018","journal-title":"IEEE Trans. Smart Grid"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"2315","DOI":"10.1109\/JIOT.2017.2737479","article-title":"Vehicles Using Reinforcement Learning","volume":"5","author":"Lu","year":"2018","journal-title":"IEEE Internet Things J."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"2063","DOI":"10.1109\/TNNLS.2018.2790388","article-title":"Applications of Deep Learning and Reinforcement Learning to Biological Data","volume":"29","author":"Mahmud","year":"2018","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Otoum, S., Kantarci, B., and Mouftah, H. (2019, January 20\u201324). Empowering Reinforcement Learning on Big Sensed Data for Intrusion Detection. Proceedings of the 2019 IEEE International Conference on Communications (ICC), Shanghai, China.","DOI":"10.1109\/ICC.2019.8761575"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"112963","DOI":"10.1016\/j.eswa.2019.112963","article-title":"Application of deep reinforcement learning to intrusion detection for supervised problems","volume":"141","author":"Carro","year":"2020","journal-title":"Expert Syst. Appl."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"102479","DOI":"10.1016\/j.jnca.2019.102479","article-title":"An efficient reinforcement learning-based Botnet detection approach","volume":"150","author":"Alauthman","year":"2020","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"270","DOI":"10.1016\/j.engappai.2015.01.013","article-title":"Distributed response to network intrusions using multiagent reinforcement learning","volume":"41","author":"Malialis","year":"2015","journal-title":"Eng. Appl. Artif. Intell."},{"key":"ref_35","unstructured":"Hendrycks, D., Mazeika, M., and Dietterich, T. (2019, January 6\u20139). Deep anomaly detection with outlier exposure. Proceedings of the 7th International Conference on Learning Representations, (ICLR), New Orleans, LA, USA."},{"key":"ref_36","unstructured":"Wang, S., Zeng, Y., Liu, X., Zhu, E., Yin, J., Xu, C., and Kloft, M. (2019). Effective End-to-end Unsupervised Outlier Detection via Inlier Priority of Discriminative Network. NeurIPS, 1\u201314. Available online: https:\/\/ml.informatik.uni-kl.de\/publications\/2019\/NeurIPS19_final.pdf."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"63195","DOI":"10.1109\/ACCESS.2019.2915388","article-title":"Tripartite Active Learning for Interactive Anomaly Discovery","volume":"7","author":"Zhu","year":"2019","journal-title":"IEEE Access"},{"key":"ref_38","unstructured":"Zong, B., Song, Q., Min, M.R., Cheng, W., Lumezanu, C., Cho, D., and Chen, H. (May, January 30). Deep autoencoding Gaussian mixture model for unsupervised anomaly detection. Proceedings of the 6th International Conference on Learning Representations, (ICLR), Vancouver, BC, Canada."},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Zhou, C., and Paffenroth, R.C. (2017, January 13\u201317). Anomaly detection with robust deep autoencoders. Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Halifax, NS, Canada. Part F1296.","DOI":"10.1145\/3097983.3098052"},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Chen, J., Sathe, S., Aggarwal, C., and Turaga, D. (2017, January 27\u201329). Outlier detection with autoencoder ensembles. Proceedings of the 17th SIAM International Conference on Data Mining, (SDM 2017), Houston, TX, USA.","DOI":"10.1137\/1.9781611974973.11"},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Hundman, K., Constantinou, V., Laporte, C., Colwell, I., and Soderstrom, T. (2018, January 19\u201323). Detecting spacecraft anomalies using LSTMs and nonparametric dynamic thresholding. Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, London, UK.","DOI":"10.1145\/3219819.3219845"},{"key":"ref_42","unstructured":"Lee, T.J., Gottschlich, J., Tatbul, N., Metcalf, E., and Zdonik, S. (2018). Greenhouse: A Zero-Positive Machine Learning System for Time-Series Anomaly Detection. arXiv."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1016\/j.cose.2018.07.004","article-title":"Using LSTM encoder-decoder algorithm for detecting anomalous ADS-B messages","volume":"78","author":"Habler","year":"2018","journal-title":"Comput. Secur."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"3127","DOI":"10.1109\/TNNLS.2019.2935975","article-title":"Unsupervised Anomaly Detection With LSTM Neural Networks","volume":"31","author":"Ergen","year":"2020","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Li, C., Qiu, M., and Li, C. (2019). Reinforcement Learning for Cybersecurity. Reinf. Learn. Cyber-Phys. Syst., 155\u2013168.","DOI":"10.1201\/9781351006620-7"},{"key":"ref_46","first-page":"1517","article-title":"Generative Adversarial Active Learning for Unsupervised Outlier Detection","volume":"32","author":"Liu","year":"2020","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"ref_47","first-page":"1","article-title":"An emphatic approach to the problem of off-policy temporal-difference learning","volume":"17","author":"Sutton","year":"2016","journal-title":"J. Mach. Learn. Res."},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"107390","DOI":"10.1016\/j.comnet.2020.107390","article-title":"An efficient and robust deep learning based network anomaly detection against distributed denial of service attacks","volume":"180","author":"Kasim","year":"2020","journal-title":"Comput. Netw."},{"key":"ref_49","first-page":"5","article-title":"Addressing Imbalanced Classes Problem of Intrusion Detection System Using Weighted Extreme Learning Machine","volume":"11","author":"Awad","year":"2019","journal-title":"Int. J. Comput. Netw. Commun."},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1186\/s13635-019-0098-y","article-title":"Multi-layer intrusion detection system with ExtraTrees feature selection, extreme learning machine ensemble, and softmax aggregation","volume":"2019","author":"Sharma","year":"2019","journal-title":"EURASIP J. Inf. Secur."},{"key":"ref_51","unstructured":"Bahdanau, D., Brakel, P., Xu, K., Goyal, A., Lowe, R., Pineau, J., Courville, A., and Bengio, Y. (2016). An Actor-Critic Algorithm for Sequence Prediction. arXiv."},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"Zhong, C., Gursoy, M.C., and Velipasalar, S. (2019, January 9\u201313). Deep actor-critic reinforcement learning for anomaly detection. Proceedings of the 2019 IEEE Global Communications Conference, GLOBECOM 2019, Waikoloa, HI, USA.","DOI":"10.1109\/GLOBECOM38437.2019.9013223"},{"key":"ref_53","doi-asserted-by":"crossref","unstructured":"Van Hasselt, H., Guez, A., and Silver, D. Deep reinforcement learning with double Q-Learning. Proceedings of the 30th AAAI Conference on Artificial Intelligence, Available online: https:\/\/dl.acm.org\/doi\/10.5555\/3016100.3016191.","DOI":"10.1609\/aaai.v30i1.10295"},{"key":"ref_54","unstructured":"(2021, February 21). Deep Reinforcement Learning and Control Lectures. Available online: http:\/\/www.andrew.cmu.edu\/course\/10-403\/."},{"key":"ref_55","unstructured":"Pfau, D., and Vinyals, O. (2016). Connecting generative adversarial networks and actor-critic methods. arXiv."},{"key":"ref_56","unstructured":"Mnih, V., Badia, A.P., Mirza, M., Graves, A., Lillicrap, T., Harley, T., Silver, D., and Kavukcuoglu, K. (2016, January 19\u201324). Asynchronous methods for deep reinforcement learning. Proceedings of the International Conference on Machine Learning, New York City, NY, USA."},{"key":"ref_57","doi-asserted-by":"crossref","unstructured":"Sharafaldin, I., Lashkari, A.H., and Ghorbani, A.A. (2018, January 22\u201324). Toward generating a new intrusion detection dataset and intrusion traffic characterization. Proceedings of the International Conference on Information Systems Security and Privacy (ICISSP), Funchal, Portugal.","DOI":"10.5220\/0006639801080116"},{"key":"ref_58","doi-asserted-by":"crossref","unstructured":"MontazeriShatoori, M., Davidson, L., Kaur, G., and Lashkari, A.H. (2020, January 17\u201322). Detection of DoH Tunnels using Time-series Classification of Encrypted Traffic. Proceedings of the 2020 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech), Calgary, AB, Canada.","DOI":"10.1109\/DASC-PICom-CBDCom-CyberSciTech49142.2020.00026"},{"key":"ref_59","unstructured":"Sabhnani, M., and Serpen, G. (2003, January 23\u201326). Application of Machine Learning Algorithms to KDD Intrusion Detection Dataset within Misuse Detection Context. Proceedings of the MLMTA, Las Vegas, NV, USA."},{"key":"ref_60","doi-asserted-by":"crossref","unstructured":"Yang, Y., Zheng, K., Wu, C., and Yang, Y. (2019). Improving the classification effectiveness of intrusion detection by using improved conditional variational autoencoder and deep neural network. Sensors, 19.","DOI":"10.3390\/s19112528"},{"key":"ref_61","unstructured":"Lin, Z., Shi, Y., and Xue, Z. (2018). Idsgan: Generative adversarial networks for attack generation against intrusion detection. arXiv."},{"key":"ref_62","doi-asserted-by":"crossref","first-page":"157555","DOI":"10.1109\/ACCESS.2019.2949890","article-title":"Intrusion Detection Classification Model on an Improved k-Dependence Bayesian Network","volume":"7","author":"Yin","year":"2019","journal-title":"IEEE Access"},{"key":"ref_63","doi-asserted-by":"crossref","unstructured":"Zhou, K., Wang, W., Hu, T., and Deng, K. (2020). Time Series Forecasting and Classification Models Based on Recurrent with Attention Mechanism and Generative Adversarial Networks. Sensors, 20.","DOI":"10.3390\/s20247211"}],"container-title":["Entropy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1099-4300\/23\/3\/274\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T05:28:15Z","timestamp":1760160495000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1099-4300\/23\/3\/274"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,2,25]]},"references-count":63,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2021,3]]}},"alternative-id":["e23030274"],"URL":"https:\/\/doi.org\/10.3390\/e23030274","relation":{},"ISSN":["1099-4300"],"issn-type":[{"type":"electronic","value":"1099-4300"}],"subject":[],"published":{"date-parts":[[2021,2,25]]}}}