{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T22:55:35Z","timestamp":1777935335255,"version":"3.51.4"},"reference-count":65,"publisher":"MDPI AG","issue":"2","license":[{"start":{"date-parts":[[2025,1,21]],"date-time":"2025-01-21T00:00:00Z","timestamp":1737417600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>In cloud computing environments, the representation and management of data through workflows are crucial to ensuring efficient processing. This paper focuses on securing scientific workflow scheduling, which involves executing complex data-processing tasks with specific dependencies. The security of intermediate data, often transmitted between virtual machines during workflow execution, is critical for maintaining the integrity and confidentiality of scientific workflows. This review analyzes methods for securing scientific workflow scheduling in cloud environments, emphasizing the application of security principles such as confidentiality, authentication, and integrity. Various scheduling algorithms, including heuristics and metaheuristics, are examined for their effectiveness in balancing security with constraints like execution time and cost.<\/jats:p>","DOI":"10.3390\/fi17020051","type":"journal-article","created":{"date-parts":[[2025,1,21]],"date-time":"2025-01-21T05:47:42Z","timestamp":1737438462000},"page":"51","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Survey on Secure Scientific Workflow Scheduling in Cloud Environments"],"prefix":"10.3390","volume":"17","author":[{"given":"Hadeel Amjed","family":"Saeed","sequence":"first","affiliation":[{"name":"College of Computer Science and Information Technology, University of Anbar, Ramadi 31001, Iraq"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2805-5738","authenticated-orcid":false,"given":"Sufyan T. Faraj","family":"Al-Janabi","sequence":"additional","affiliation":[{"name":"College of Computer Science and Information Technology, University of Anbar, Ramadi 31001, Iraq"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6980-6606","authenticated-orcid":false,"given":"Esam Taha","family":"Yassen","sequence":"additional","affiliation":[{"name":"College of Computer Science and Information Technology, University of Anbar, Ramadi 31001, Iraq"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0235-2862","authenticated-orcid":false,"given":"Omar A.","family":"Aldhaibani","sequence":"additional","affiliation":[{"name":"School of Computer Science and Mathematics, Liverpool John Moores University, Liverpool L3 5AH, UK"}]}],"member":"1968","published-online":{"date-parts":[[2025,1,21]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"108458","DOI":"10.1016\/j.compeleceng.2022.108458","article-title":"Multi-criteria scheduling of scientific workflows in the Workflow as a Service platform","volume":"105","author":"Tarafdar","year":"2023","journal-title":"Comput. Electr. Eng."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"100436","DOI":"10.1016\/j.measen.2022.100436","article-title":"Workflow scheduling in cloud environment\u2014Challenges, tools, limitations & methodologies: A review","volume":"24","author":"Menaka","year":"2022","journal-title":"Meas. Sens."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Rodriguez, M.A., and Buyya, R. (2017). Scientific Workflow Management System for Clouds. Software Architecture for Big Data and the Cloud, Elsevier.","DOI":"10.1016\/B978-0-12-805467-3.00018-1"},{"key":"ref_4","unstructured":"Alejandra, M., and Sossa, R. (2016). Resource Provisioning and Scheduling Algorithms for Scientific Workflows in Cloud Computing Environments. [Doctoral Dissertation, Department of Computing and Information Systems, University of Melbourne]."},{"key":"ref_5","first-page":"336","article-title":"A Modified Workflow Scheduling Algorithm for Cloud Computing Environment","volume":"15","author":"Ahmed","year":"2022","journal-title":"Int. J. Intell. Eng. Syst."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1049\/iet-ifs.2018.5279","article-title":"Protecting scientific workflows in clouds with an intrusion tolerant system","volume":"14","author":"Wang","year":"2020","journal-title":"IET Inf. Secur."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"1522","DOI":"10.1631\/FITEE.1800621","article-title":"Scientific workflow execution system based on mimic defense in the cloud environment","volume":"19","author":"Wang","year":"2018","journal-title":"Front. Inf. Technol. Electron. Eng."},{"key":"ref_8","unstructured":"Hammouti, S., Yagoubi, B., and Makhlouf, S.A. (2022, January 7\u20138). Parametric Scientific Workflow Scheduling Algorithm in Cloud Computing. Proceedings of the 2022 International Symposium on iNnovative Informatics of Biskra, ISNIB 2022, Biskra, Algeria."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"378","DOI":"10.1016\/j.compeleceng.2017.12.004","article-title":"Genetic-based algorithms applied to a workflow scheduling algorithm with security and deadline constraints in clouds","volume":"69","author":"Shishido","year":"2018","journal-title":"Comput. Electr. Eng."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"57792","DOI":"10.1109\/ACCESS.2021.3073203","article-title":"A Systematic Literature Review on Cloud Computing Security: Threats and Mitigation Strategies","volume":"9","author":"Alouffi","year":"2021","journal-title":"IEEE Access"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"1281","DOI":"10.1007\/s00607-021-00943-9","article-title":"Optimizing security and cost of workflow execution using task annotation and genetic-based algorithm","volume":"103","author":"Shishido","year":"2021","journal-title":"Computing"},{"key":"ref_12","unstructured":"Sarra, H. (2020). Job Scheduling in Cloud Computing Environment. [Master\u2019s Thesis, University Mohamed Boudiaf-M\u2019sila]."},{"key":"ref_13","first-page":"1387","article-title":"Comparative Analysis of PSO-derived Workflow Scheduling Algorithms in Cloud Computing based on QoS Requirements","volume":"11","author":"Farid","year":"2020","journal-title":"Int. J. Adv. Res. Eng. Technol."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Kour, R., Koul, S., and Kour, M. (2017, January 11\u201312). A Classification Based Approach for Data Confidentiality in Cloud Environment. Proceedings of the 2017 International Conference on Next Generation Computing and Information Systems (ICNGCIS), Jammu, India.","DOI":"10.1109\/ICNGCIS.2017.36"},{"key":"ref_15","first-page":"1047","article-title":"Research on secure workload execution scheme in heterogeneous cloud environment","volume":"29","author":"Pasha","year":"2023","journal-title":"Indones. J. Electr. Eng. Comput. Sci."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"2867","DOI":"10.1007\/s13369-018-3614-3","article-title":"Quality of Service (QoS) Aware Workflow Scheduling (WFS) in Cloud Computing: A Systematic Review","volume":"44","author":"Kaur","year":"2019","journal-title":"Arab. J. Sci. Eng."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"e4041","DOI":"10.1002\/cpe.4041","article-title":"A taxonomy and survey on scheduling algorithms for scientific workflows in IaaS cloud computing environments","volume":"29","author":"Rodriguez","year":"2017","journal-title":"Concurr. Comput. Pract. Exp."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"460","DOI":"10.1016\/j.future.2019.11.003","article-title":"CLOSURE: A cloud scientific workflow scheduling algorithm based on attack\u2013defense game model","volume":"111","author":"Wang","year":"2020","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"3197","DOI":"10.1109\/TCC.2023.3269144","article-title":"A Fully Hybrid Algorithm for Deadline Constrained Workflow Scheduling in Clouds","volume":"11","author":"Yang","year":"2023","journal-title":"IEEE Trans. Cloud Comput."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"480","DOI":"10.1016\/j.future.2018.03.055","article-title":"A hyper-heuristic cost optimisation approach for Scientific Workflow Scheduling in cloud computing","volume":"86","author":"Alkhanak","year":"2018","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"020019","DOI":"10.1063\/5.0112122","article-title":"A survey on provisioning and scheduling algorithms for scientific workflows in cloud computing","volume":"2400","author":"Jihad","year":"2022","journal-title":"AIP Conf. Proc."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Soveizi, N., and Karastoyanova, D. (2024). Enhancing Workflow Security in Multi-cloud Environments Through Monitoring and Adaptation upon Cloud Service and Network Security Violations. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Springer Science and Business Media Deutschland GmbH.","DOI":"10.1007\/978-3-031-46846-9_9"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Mu\u00f1oz, A., Ma\u00f1a, A., and Gonz\u00e1lez, J. (2012). Dynamic security properties monitoring architecture for cloud computing. Security Engineering for Cloud Computing: Approaches and Tools, IGI Global.","DOI":"10.4018\/978-1-4666-2125-1.ch001"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10115-017-1044-2","article-title":"A review of task scheduling based on meta-heuristics approach in cloud computing","volume":"52","author":"Singh","year":"2017","journal-title":"Knowl. Inf. Syst."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"1934784","DOI":"10.1155\/2018\/1934784","article-title":"Workflow Scheduling Using Hybrid GA-PSO Algorithm in Cloud Computing","volume":"2018","author":"Manasrah","year":"2018","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"ref_26","unstructured":"Solanki, S.V. (2024, May 23). An Approach for Task Scheduling in Cloud Computing Using Hybrid Algorithm. Available online: http:\/\/www.webology.org."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"1587","DOI":"10.32604\/iasc.2023.039380","article-title":"Hyper-Heuristic Task Scheduling Algorithm Based on Reinforcement Learning in Cloud Computing","volume":"37","author":"Yin","year":"2023","journal-title":"Intell. Autom. Soft Comput."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"1545","DOI":"10.1007\/s11277-022-09621-1","article-title":"A Review on Energy-Aware Scheduling Techniques for Workflows in IaaS Clouds","volume":"125","author":"Medara","year":"2022","journal-title":"Wirel. Pers. Commun."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1016\/j.future.2012.09.009","article-title":"Security, energy, and performance-aware resource allocation mechanisms for computational grids","volume":"31","author":"Khan","year":"2014","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Prakash, V., Bawa, S., and Garg, L. (2021). Multi-Dependency and Time Based Resource Scheduling Algorithm for Scientific Applications in Cloud Computing. Electronics, 10.","DOI":"10.3390\/electronics10111320"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"5953","DOI":"10.1007\/s10586-024-04288-8","article-title":"Machine learning-based intelligent security framework for secure cloud key management","volume":"27","author":"Ahmad","year":"2024","journal-title":"Clust. Comput."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"3733","DOI":"10.1007\/s10586-022-03598-z","article-title":"RSM analysis based cloud access security broker: A systematic literature review","volume":"25","author":"Ahmad","year":"2022","journal-title":"Clust. Comput."},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Sotiriadis, S., Bessis, N., Antonopoulos, N., and Anjum, A. (2013, January 25\u201328). SimIC: Designing a New Inter-cloud Simulation Platform for Integrating Large-Scale Resource Management. Proceedings of the 2013 IEEE 27th International Conference on Advanced Information Networking and Applications (AINA), Barcelona, Spain.","DOI":"10.1109\/AINA.2013.123"},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Albtoush, A., Yunus, F., Almi\u2019ani, K., and Noor, N.M.M. (2023). Structure-Aware Scheduling Methods for Scientific Workflows in Cloud. Appl. Sci., 13.","DOI":"10.3390\/app13031980"},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"126603","DOI":"10.1109\/ACCESS.2019.2938823","article-title":"Securing the Intermediate Data of Scientific Workflows in Clouds with ACISO","volume":"7","author":"Wang","year":"2019","journal-title":"IEEE Access"},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"475","DOI":"10.1016\/j.jcss.2009.11.008","article-title":"Efficiently supporting secure and reliable collaboration in scientific workflows","volume":"76","author":"Ma","year":"2010","journal-title":"J. Comput. Syst. Sci."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"272","DOI":"10.1016\/j.future.2020.08.004","article-title":"INHIBITOR: An intrusion tolerant scheduling algorithm in cloud-based scientific workflow system","volume":"114","author":"Wang","year":"2021","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Francis, A.O., Emmanuel, B., Zhang, D., Zheng, W., Qin, Y., and Zhang, D. (2018, January 12\u201315). Exploration of Secured Workflow Scheduling Models in Cloud Environment: A Survey. Proceedings of the 2018 6th International Conference on Advanced Cloud and Big Data, CBD 2018, Lanzhou, China.","DOI":"10.1109\/CBD.2018.00022"},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"184","DOI":"10.1016\/j.future.2023.05.015","article-title":"Security and privacy concerns in cloud-based scientific and business workflows: A systematic review","volume":"148","author":"Soveizi","year":"2023","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_40","unstructured":"Sheikh, A., Munro, M., and Budgen, D. (2024, May 03). Systematic Literature Review (SLR) of Resource Scheduling and Security in Cloud Computing. Available online: www.ijacsa.thesai.org."},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Shishido, H.Y., Estrella, J.C., Toledo, C.F.M., and Reiff-Marganiec, S. (2018, January 2\u20137). (WIP) Tasks Selection Policies for Securing Sensitive Data on Workflow Scheduling in Clouds. Proceedings of the 2018 IEEE International Conference on Services Computing, SCC 2018\u2014Part of the 2018 IEEE World Congress on Services, San Francisco, CA, USA.","DOI":"10.1109\/SCC.2018.00037"},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"140","DOI":"10.1016\/j.future.2015.12.014","article-title":"A security and cost aware scheduling algorithm for heterogeneous tasks of scientific workflow in clouds","volume":"65","author":"Li","year":"2016","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1016\/j.future.2022.02.018","article-title":"Deadline-constrained energy-aware workflow scheduling in geographically distributed cloud data centers","volume":"132","author":"Hussain","year":"2022","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"8105145","DOI":"10.1155\/2020\/8105145","article-title":"Fuzzy Theory-Based Data Placement for Scientific Workflows in Hybrid Cloud Environments","volume":"2020","author":"Chen","year":"2020","journal-title":"Discret. Dyn. Nat. Soc."},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Marcon, D.S., Bittencourt, L.F., Dantas, R., Neves, M.C., Madeira, E.R.M., Fernandes, S., Kamienski, C.A., Barcelos, M.P., Gaspary, L.P., and da Fonseca, N.L.S. (2013, January 9\u201310). Workflow specification and scheduling with security constraints in hybrid clouds. Proceedings of the 2013 IEEE Latin America Conference on Cloud Computing and Communications (LatinCloud), Maceio, Brazil.","DOI":"10.1109\/LatinCloud.2013.6842219"},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"1745","DOI":"10.1007\/s00500-017-2897-8","article-title":"Smart PSO-based secured scheduling approaches for scientific workflows in cloud computing","volume":"23","author":"Sujana","year":"2019","journal-title":"Soft Comput."},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"102353","DOI":"10.1016\/j.simpat.2021.102353","article-title":"Metaheuristics for scheduling of heterogeneous tasks in cloud computing environments: Analysis, performance evaluation, and future directions","volume":"111","author":"Singh","year":"2021","journal-title":"Simul. Model. Pract. Theory"},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"40","DOI":"10.5755\/j01.eie.26.6.25865","article-title":"Resource Allocation Techniques in Cloud Computing: A Review and Future Directions","volume":"26","author":"Manzoor","year":"2020","journal-title":"Elektron. Elektrotechnika"},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1007\/s10586-024-04843-3","article-title":"A heuristic task scheduling algorithm in cloud computing environment: An overall cost minimization approach","volume":"28","author":"Boroumand","year":"2025","journal-title":"Clust. Comput."},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1016\/j.jpdc.2014.09.002","article-title":"SABA: A security-aware and budget-aware workflow scheduling strategy in clouds","volume":"75","author":"Zeng","year":"2015","journal-title":"J. Parallel Distrib. Comput."},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Arunarani, A.R., Manjula, D., and Sugumaran, V. (2017). FFBAT: A security and cost-aware workflow scheduling approach combining firefly and bat algorithms. Concurrency and Computation: Practice and Experience, John Wiley and Sons Ltd.","DOI":"10.1002\/cpe.4295"},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"Shishido, H.Y., Estrella, J.C., Toledo, C.F.M., and Reiff-Marganiec, S. (2018, January 27\u201330). A CloudSim Extension for Evaluating Security Overhead in Workflow Execution in Clouds. Proceedings of the 2018 Sixth International Symposium on Computing and Networking (CANDAR), Takayama, Japan.","DOI":"10.1109\/CANDAR.2018.00031"},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"8","DOI":"10.21817\/indjcse\/2019\/v10i1\/191001002","article-title":"A new optimization method for security-constrained workflow scheduling","volume":"10","author":"Abdali","year":"2019","journal-title":"Indian J. Comput. Sci. Eng."},{"key":"ref_54","doi-asserted-by":"crossref","unstructured":"Hammouti, S., Yagoubi, B., and Makhlouf, S.A. (2020). Workflow Security Scheduling Strategy in Cloud Computing. Modelling and Implementation of Complex Systems, Springer.","DOI":"10.1007\/978-3-030-58861-8_4"},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"e747","DOI":"10.7717\/peerj-cs.747","article-title":"A fault-intrusion-tolerant system and deadline-aware algorithm for scheduling scientific workflow in the cloud","volume":"7","author":"Farid","year":"2021","journal-title":"PeerJ Comput. Sci."},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"e4240","DOI":"10.1002\/dac.4240","article-title":"Efficient workflow scheduling in cloud computing for security maintenance of sensitive data","volume":"35","author":"Hammed","year":"2022","journal-title":"Int. J. Commun. Syst."},{"key":"ref_57","doi-asserted-by":"crossref","unstructured":"Alam, M., Shahid, M., and Mustajab, S. (2022). Security Prioritized Heterogeneous Earliest Finish Time Workflow Allocation Algorithm for Cloud Computing. Congress on Intelligent Systems, Springer Science and Business Media Deutschland GmbH. Lecture Notes on Data Engineering and Communications Technologies, Volume 114.","DOI":"10.1007\/978-981-16-9416-5_17"},{"key":"ref_58","doi-asserted-by":"crossref","first-page":"269","DOI":"10.1016\/j.future.2022.01.018","article-title":"Privacy and security-aware workflow scheduling in a hybrid cloud","volume":"131","author":"Lei","year":"2022","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_59","doi-asserted-by":"crossref","unstructured":"Farid, M., Lim, H.S., Lee, C.P., and Latip, R. (2023). Scheduling Scientific Workflow in Multi-Cloud: A Multi-Objective Minimum Weight Optimization Decision-Making Approach. Symmetry, 15.","DOI":"10.3390\/sym15112047"},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"341","DOI":"10.1007\/s10586-022-03819-5","article-title":"Security prioritized multiple workflow allocation model under precedence constraints in cloud computing environment","volume":"27","author":"Alam","year":"2023","journal-title":"Clust. Comput."},{"key":"ref_61","doi-asserted-by":"crossref","unstructured":"Alam, M., Shahid, M., Mustajab, S., Ahmad, F., and Haidri, R.A. (2023, January 1\u20133). Security Driven Cost-Effective Deadline Aware Workflow Allocation Strategy in Cloud Computing Environment. Proceedings of the 2023 3rd International Conference on Technological Advancements in Computational Sciences (ICTACS), Tashkent, Uzbekistan.","DOI":"10.1109\/ICTACS59847.2023.10390144"},{"key":"ref_62","doi-asserted-by":"crossref","first-page":"5373","DOI":"10.1109\/ACCESS.2024.3350741","article-title":"Multi Objective Prioritized Workflow Scheduling Using Deep Reinforcement Based Learning in Cloud Computing","volume":"12","author":"Mangalampalli","year":"2024","journal-title":"IEEE Access"},{"key":"ref_63","doi-asserted-by":"crossref","unstructured":"Liang, H., Zhang, S., Liu, X., Cheng, G., Ma, H., and Wang, Q. (2024). SMWE: A Framework for Secure and Makespan-Oriented Workflow Execution in Serverless Computing. Electronics, 13.","DOI":"10.3390\/electronics13163246"},{"key":"ref_64","doi-asserted-by":"crossref","first-page":"10235","DOI":"10.1007\/s10586-024-04534-z","article-title":"An autonomous blockchain-based workflow execution broker for e-science","volume":"27","year":"2024","journal-title":"Clust. Comput."},{"key":"ref_65","doi-asserted-by":"crossref","first-page":"111","DOI":"10.52783\/jes.1860","article-title":"Integration of Ethereum Blockchain with Cloud Computing for Secure Healthcare Data Management System","volume":"20","author":"Prasanna","year":"2024","journal-title":"J. Electr. Syst."}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/17\/2\/51\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T10:32:46Z","timestamp":1759919566000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/17\/2\/51"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,21]]},"references-count":65,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2025,2]]}},"alternative-id":["fi17020051"],"URL":"https:\/\/doi.org\/10.3390\/fi17020051","relation":{},"ISSN":["1999-5903"],"issn-type":[{"value":"1999-5903","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1,21]]}}}