{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T13:59:26Z","timestamp":1773842366364,"version":"3.50.1"},"reference-count":59,"publisher":"MDPI AG","issue":"7","license":[{"start":{"date-parts":[[2025,6,20]],"date-time":"2025-06-20T00:00:00Z","timestamp":1750377600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>This research introduces Fortified-Edge 2.0, a novel authentication framework that addresses critical security and privacy challenges in Physically Unclonable Function (PUF)-based systems for collaborative edge computing (CEC). Unlike conventional methods that transmit full binary Challenge\u2013Response Pairs (CRPs) and risk exposing sensitive data, Fortified-Edge 2.0 employs a machine-learning-driven feature-abstraction technique to extract and utilize only essential characteristics of CRPs, obfuscating the raw binary sequences. These feature vectors are then processed using lightweight cryptographic primitives, including ECDSA, to enable secure authentication without exposing the original CRP. This eliminates the need to transmit sensitive binary data, reducing the attack surface and bandwidth usage. The proposed method demonstrates strong resilience against modeling attacks, replay attacks, and side-channel threats while maintaining the inherent efficiency and low power requirements of PUFs. By integrating PUF unpredictability with ML adaptability, this research delivers a scalable, secure, and resource-efficient solution for next-generation authentication in edge environments.<\/jats:p>","DOI":"10.3390\/fi17070272","type":"journal-article","created":{"date-parts":[[2025,6,20]],"date-time":"2025-06-20T06:50:45Z","timestamp":1750402245000},"page":"272","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Fortified-Edge 2.0: Advanced Machine-Learning-Driven Framework for Secure PUF-Based Authentication in Collaborative Edge Computing"],"prefix":"10.3390","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-8807-3352","authenticated-orcid":false,"given":"Seema G.","family":"Aarella","sequence":"first","affiliation":[{"name":"Department of Computer Science, Austin College, Sherman, TX 75090, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4625-8050","authenticated-orcid":false,"given":"Venkata P.","family":"Yanambaka","sequence":"additional","affiliation":[{"name":"School of Sciences, Texas Woman\u2019s University, Denton, TX 76204, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2959-6541","authenticated-orcid":false,"given":"Saraju P.","family":"Mohanty","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, University of North Texas, Denton, TX 76203, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1616-7628","authenticated-orcid":false,"given":"Elias","family":"Kougianos","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, University of North Texas, Denton, TX 76203, USA"}]}],"member":"1968","published-online":{"date-parts":[[2025,6,20]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1109\/MC.2017.9","article-title":"The Emergence of Edge Computing","volume":"50","author":"Satyanarayanan","year":"2017","journal-title":"Computer"},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Deepak, Upadhyay, M.K., and Alam, M. (2023, January 1\u20133). Edge Computing: Architecture, Application, Opportunities, and Challenges. Proceedings of the 3rd International Conference on Technological Advancements in Computational Sciences (ICTACS), Tashkent, Uzbekistan.","DOI":"10.1109\/ICTACS59847.2023.10390171"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Cao, J., Zhang, Q., and Shi, W. (2018). Challenges and Opportunities in Edge Computing. Edge Computing: A Primer, Springer International Publishing.","DOI":"10.1007\/978-3-030-02083-5_5"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Tirupatamma, N., Anjali, N., Keerthi, V.P.M., Atchi, H.S., and Sammy, F. (2024, January 29\u201330). An Exploration of Edge Computing: Emergence, Evolution, Challenges, Approaches. Proceedings of the 8th International Conference on Inventive Systems and Control (ICISC), Coimbatore, India.","DOI":"10.1109\/ICISC62624.2024.00011"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"23472","DOI":"10.1109\/JIOT.2022.3200431","article-title":"Edge Computing for Internet of Everything: A Survey","volume":"9","author":"Kong","year":"2022","journal-title":"IEEE Internet Things J."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Reddy, K.S., Balaji, M., Baba, A., Yuvaraj, G., and Ramesh, D. (2024). An Enhancing Load Balancing and Security in Edge Computing: Comprehensive Review Analysis. Challenges in Information, Communication and Computing Technology, CRC Press.","DOI":"10.1201\/9781003559092-124"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Aarella, S.G., Mohanty, S.P., Kougianos, E., and Puthal, D. (2022, January 18\u201322). PUF-based Authentication Scheme for Edge Data Centers in Collaborative Edge Computing. Proceedings of the IEEE International Symposium on Smart Electronic Systems (iSES), Warangal, India.","DOI":"10.1109\/iSES54909.2022.00094"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Danger, J.L., Guilley, S., Mukhopadhyay, D., and R\u00fchrmair, U. (2025). Physically Unclonable Functions. Hardware Security: Design, Threats, and Safeguards, Wiley.","DOI":"10.1002\/9781394351909.ch14"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Santikellur, P. (2022). Physically Unclonable Functions. Physically Unclonable Functions, Springer.","DOI":"10.1007\/978-981-19-4017-0_2"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Gaur, J.D., Kumar Singh, A., Singh, N.P., and Rajan V, G. (2021, January 4\u20135). Comparative Study on Different Encryption and Decryption Algorithm. Proceedings of the International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE), Greater Noida, India.","DOI":"10.1109\/ICACITE51222.2021.9404734"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Su\u00e1rez-Albela, M., Fern\u00e1ndez-Caram\u00e9s, T.M., Fraga-Lamas, P., and Castedo, L. (2018, January 4\u20137). A Practical Performance Comparison of ECC and RSA for Resource-Constrained IoT Devices. Proceedings of the Global Internet of Things Summit (GIoTS), Bilbao, Spain.","DOI":"10.1109\/GIOTS.2018.8534575"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"107593","DOI":"10.1016\/j.comnet.2020.107593","article-title":"A survey on physical unclonable function (PUF)-based security solutions for Internet of Things","volume":"183","author":"Shamsoshoara","year":"2020","journal-title":"Comput. Netw."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Aarella, S.G., Mohanty, S.P., Kougianos, E., and Puthal, D. (2023, January 5\u20137). Fortified-Edge: Secure PUF Certificate Authentication Mechanism for Edge Data Centers in Collaborative Edge Computing. Proceedings of the Great Lakes Symposium on VLSI 2023, New York, NY, USA.","DOI":"10.1145\/3583781.3590249"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1186\/s42400-024-00308-7","article-title":"Deep neural network modeling attacks on arbiter-PUF-based designs","volume":"8","author":"Wang","year":"2025","journal-title":"Cybersecurity"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"104164","DOI":"10.1016\/j.cose.2024.104164","article-title":"Encoder-decoder-based Virtual Physically Unclonable Function for Internet of Things device authentication using split-learning","volume":"148","author":"Khan","year":"2025","journal-title":"Comput. Secur."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Kumar, V.S., Khalaf, O.I., Chandan, R.R., Bsoul, Q., Gupta, S.K., Zawaideh, F., Alsekait, D.M., and AbdElminaam, D.S. (2024). Implementation of a Novel Secured Authentication Protocol for Cyber Security Applications. Sci. Rep., 14.","DOI":"10.1038\/s41598-024-76306-z"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"1234","DOI":"10.1109\/TIFS.2023.3266624","article-title":"PUF-Phenotype: A Robust and Noise-Resilient Approach to Aid Intra-Group-based Authentication with DRAM-PUFs Using Machine Learning","volume":"18","author":"Millwood","year":"2023","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Sadhu, P.K., Baul, A., Yanambaka, V.P., and Abdelgawad, A. (2022, January 4\u20137). Machine Learning and PUF based Authentication Framework for Internet of Medical Things. Proceedings of the International Conference on Microelectronics (ICM), Casablanca, Morocco.","DOI":"10.1109\/ICM56065.2022.10005380"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"103693","DOI":"10.1016\/j.jnca.2023.103693","article-title":"DC-PUF: Machine Learning-Resistant PUF-Based Authentication Protocol Using Dependency Chain for Resource-Constrained IoT Devices","volume":"217","author":"Sajadi","year":"2023","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_20","first-page":"1","article-title":"Deep Neural Network Modeling Attacks on Arbiter-PUF-Based Designs","volume":"7","author":"Zhang","year":"2024","journal-title":"Cybersecurity"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1186\/s40537-024-00886-w","article-title":"Machine Learning-Based Network Intrusion Detection for Big and Imbalanced Data Using Oversampling, Stacking Feature Embedding and Feature Extraction","volume":"11","author":"Talukder","year":"2024","journal-title":"J. Big Data"},{"key":"ref_22","first-page":"1502","article-title":"Optimizing network security with machine learning and multi-factor authentication for enhanced intrusion detection","volume":"5","author":"Mahmood","year":"2024","journal-title":"J. Robot. Control"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Zhou, H., Chen, J., Mei, Y., Adam, G., Aggarwal, V., Bastian, N.D., and Lan, T. (2024, January 23\u201325). Real-time Network Intrusion Detection via Importance Sampled Decision Transformers. Proceedings of the IEEE 21st International Conference on Mobile Ad-Hoc and Smart Systems (MASS), Seoul, Republic of Korea.","DOI":"10.1109\/MASS62177.2024.00022"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Hernandez-Ramos, J., Karopoulos, G., Chatzoglou, E., Kouliaridis, V., Marmol, E., Gonzalez-Vidal, A., and Kambourakis, G. (2025). Intrusion Detection Based on Federated Learning: A Systematic Review. ACM Comput. Surv.","DOI":"10.1145\/3731596"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"103176","DOI":"10.1016\/j.cose.2023.103176","article-title":"Adv-Bot: Realistic Adversarial Botnet Attacks Against Network Intrusion Detection Systems","volume":"125","author":"Debicha","year":"2023","journal-title":"Comput. Secur."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Kaushik, S., Bhardwaj, A., Almogren, A., Bharany, S., Altameem, A., Rehman, A.U., Hussen, S., and Hamam, H. (2025). Robust Machine Learning Based Intrusion Detection System Using Simple Statistical Techniques in Feature Selection. Sci. Rep., 15.","DOI":"10.1038\/s41598-025-88286-9"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Tang, Z.T.A., Yu, K.W., Yuta, K., Chen, T.Y., and Karati, A. (2024, January 10\u201312). Enhancing Security of a PUF-based Remote Keyless Entry System using Machine Learning Approach. Proceedings of the 2024 6th International Electronics Communication Conference, Singapore.","DOI":"10.1145\/3686625.3686636"},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Sheikh, A.M., Islam, M.R., Habaebi, M.H., Zabidi, S.A., Bin Najeeb, A.R., and Kabbani, A. (2025). A Survey on Edge Computing (EC) Security Challenges: Classification, Threats, and Mitigation Strategies. Future Internet, 17.","DOI":"10.20944\/preprints202502.1500.v1"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"1152","DOI":"10.26599\/TST.2023.9010080","article-title":"A Review of Privacy and Security of Edge Computing in Smart Healthcare Systems: Issues, Challenges, and Research Directions","volume":"29","author":"Alomar","year":"2024","journal-title":"Tsinghua Sci. Technol."},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Bot\u00edn-Sanabria, D.M., Mihaita, A.S., Peimbert-Garc\u00eda, R.E., Ram\u00edrez-Moreno, M.A., Ram\u00edrez-Mendoza, R.A., and Lozoya-Santos, J.d.J. (2022). Digital Twin Technology Challenges and Applications: A Comprehensive Review. Remote Sens., 14.","DOI":"10.3390\/rs14061335"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"176","DOI":"10.1109\/TSUSC.2024.3409329","article-title":"Safeguarding Patient Data-Sharing: Blockchain-Enabled Federated Learning in Medical Diagnostics","volume":"10","author":"Myrzashova","year":"2025","journal-title":"IEEE Trans. Sustain. Comput."},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Alasmari, S., and Anwar, M. (2016, January 15\u201317). Security & Privacy Challenges in IoT-Based Health Cloud. Proceedings of the International Conference on Computational Science and Computational Intelligence (CSCI), Las Vegas, NV, USA.","DOI":"10.1109\/CSCI.2016.0044"},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Amanat, A., Rizwan, M., Maple, C., Zikria, Y.B., Almadhor, A.S., and Kim, S.W. (2022). Blockchain and cloud computing-based secure electronic healthcare records storage and sharing. Front. Public Health, 10.","DOI":"10.3389\/fpubh.2022.938707"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"103499","DOI":"10.1016\/j.ipm.2023.103499","article-title":"An encrypted medical blockchain data search method with access control mechanism","volume":"60","author":"Gan","year":"2023","journal-title":"Inf. Process. Manag."},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Taherdoost, H. (2023). Blockchain-Based Internet of Medical Things. Appl. Sci., 13.","DOI":"10.3390\/app13031287"},{"key":"ref_36","first-page":"12396","article-title":"Contribution-Aware Federated Learning for Smart Healthcare","volume":"36","author":"Liu","year":"2022","journal-title":"Proc. Aaai Conf. Artif. Intell."},{"key":"ref_37","first-page":"e145","article-title":"Fog computing security and privacy for the Internet of Thing applications: State-of-the-art","volume":"3","author":"Alzoubi","year":"2020","journal-title":"Secur. Priv."},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Masys, A.J. (2018). Security by Design: Innovative Perspectives on Complex Problems, Springer International Publishing.","DOI":"10.1007\/978-3-319-78021-4"},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Wang, X., Zhang, Z., Hao, Q., Xu, D., Wang, J., Jia, H., and Zhou, Z. (2021). Hardware-Assisted Security Monitoring Unit for Real-Time Ensuring Secure Instruction Execution and Data Processing in Embedded Systems. Micromachines, 12.","DOI":"10.3390\/mi12121450"},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Mishra, A., Goswami, M., Kumar, M., and Rajput, N.S. (2025). Hardware-Assisted Security of Smart IoT Applications. Hardware Security: Challenges and Solutions, Springer Nature.","DOI":"10.1007\/978-3-031-81213-2"},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Bathalapalli, V.K.V.V., Mohanty, S.P., Kougianos, E., Iyer, V., and Rout, B. (2024). PUFchain 3.0: Hardware-Assisted Distributed Ledger for Robust Authentication in Healthcare Cyber-Physical Systems. Sensors, 24.","DOI":"10.3390\/s24030938"},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1109\/MSEC.2019.2947124","article-title":"Trusted Execution Environments: Properties, Applications, and Challenges","volume":"18","author":"Jauernig","year":"2020","journal-title":"IEEE Secur. Priv."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"100055","DOI":"10.1016\/j.iot.2019.100055","article-title":"A comprehensive survey of hardware-assisted security: From the edge to the cloud","volume":"6","author":"Coppolino","year":"2019","journal-title":"Internet Things"},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Tan, B. (2022, January 6\u20138). Challenges and Opportunities for Hardware-Assisted Security Improvements in the Field. Proceedings of the 23rd International Symposium on Quality Electronic Design (ISQED), Santa Clara, CA, USA.","DOI":"10.1109\/ISQED54688.2022.9806254"},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Halak, B., Zwolinski, M., and Mispan, M.S. (2016, January 16\u201319). Overview of PUF-based hardware security solutions for the internet of things. Proceedings of the IEEE 59th International Midwest Symposium on Circuits and Systems (MWSCAS), Abu Dhabi, United Arab Emirates.","DOI":"10.1109\/MWSCAS.2016.7870046"},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/MPOT.2015.2490261","article-title":"Everything You Wanted to Know About PUFs","volume":"36","author":"Joshi","year":"2017","journal-title":"IEEE Potentials"},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Ikezaki, Y., Nozaki, Y., and Yoshikawa, M. (2016, January 11\u201314). Deep learning attack for physical unclonable function. Proceedings of the IEEE 5th Global Conference on Consumer Electronics, Kyoto, Japan.","DOI":"10.1109\/GCCE.2016.7800478"},{"key":"ref_48","doi-asserted-by":"crossref","unstructured":"Idrissi, I.C.E., Nouh, S., Bellfkih, E.M., Marzak, A., and El Assad Assad, M. (2023, January 22\u201323). Error-Correcting Codes and the Power of Machine Learning: Enhancing Data Reliability. Proceedings of the 14th International Conference on Intelligent Systems: Theories and Applications (SITA), Casablanca, Morocco.","DOI":"10.1109\/SITA60746.2023.10373727"},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Poniszewska-Maranda, A., and Sarniak, W. (2024, January 18\u201321). Automatic detection and correction of code errors applying machine learning\u2014current research state. Proceedings of the 28th International Conference on Evaluation and Assessment in Software Engineering, Salerno, Italy.","DOI":"10.1145\/3661167.3661198"},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"041009","DOI":"10.1115\/1.4043567","article-title":"A Machine Learning Approach to Aircraft Sensor Error Detection and Correction","volume":"19","author":"Swischuk","year":"2019","journal-title":"J. Comput. Inf. Sci. Eng."},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"124760","DOI":"10.1109\/ACCESS.2023.3330690","article-title":"Machine Learning-Based Error Correction Codes and Communication Protocols for Power Line Communication: An Overview","volume":"11","author":"Akinci","year":"2023","journal-title":"IEEE Access"},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"Chen, Y.G., and Wu, T.Y. (2024, January 8\u201310). Special Session: Overcoming Transient Faults and Aging Effects in Digital Computing-in-Memory Architectures: Detection, Tolerance, and Mitigation Strategies. Proceedings of the IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT), Didcot, UK.","DOI":"10.1109\/DFT63277.2024.10753529"},{"key":"ref_53","unstructured":"Wang, Z., and Tang, H. (2024). Artificial Intelligence for Quantum Error Correction: A Comprehensive Review. arXiv."},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"13581","DOI":"10.1007\/s10668-024-04479-8","article-title":"A novel discrete conformable fractional grey system model for forecasting carbon dioxide emissions","volume":"27","author":"Zhu","year":"2024","journal-title":"Environ. Dev. Sustain."},{"key":"ref_55","doi-asserted-by":"crossref","unstructured":"Aarella, S.G., Yanambaka, V.P., Mohanty, S.P., and Kougianos, E. (2024, January 12\u201314). Fortified-Edge 4.0: A ML-Based Error Correction Framework for Secure Authentication in Collaborative Edge Computing. Proceedings of the Great Lakes Symposium on VLSI 2024, New York, NY, USA.","DOI":"10.1145\/3649476.3660384"},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"2289","DOI":"10.1016\/j.csbj.2024.05.025","article-title":"A survey of k-mer methods and applications in bioinformatics","volume":"23","author":"Moeckel","year":"2024","journal-title":"Comput. Struct. Biotechnol. J."},{"key":"ref_57","doi-asserted-by":"crossref","unstructured":"Aarella, S.G., Yanambaka, V.P., Mohanty, S.P., and Kougianos, E. (2024, January 6\u20139). Fortified-Edge 5.0: Federated Learning for Secure and Reliable PUF in Authentication Systems. Proceedings of the IFIP\/IEEE 32nd International Conference on Very Large Scale Integration (VLSI-SoC), Tanger, Morocco.","DOI":"10.1109\/VLSI-SoC62099.2024.10767788"},{"key":"ref_58","doi-asserted-by":"crossref","unstructured":"Aarella, S.G., Mohanty, S.P., Kougianos, E., and Puthal, D. (2023, January 20\u201323). Fortified-Edge 2.0: Machine Learning based Monitoring and Authentication of PUF-Integrated Secure Edge Data Center. Proceedings of the IEEE Computer Society Annual Symposium on VLSI (ISVLSI), Foz do Iguacu, Brazil.","DOI":"10.1109\/ISVLSI59464.2023.10238517"},{"key":"ref_59","unstructured":"Puthal, D., Mohanty, S., and Choi, B.Y. (2024). Easy-Sec: PUF-Based Rapid and Robust Authentication Framework for the Internet of Vehicles. Internet of Things: Advances in Information and Communication Technology, Springer."}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/17\/7\/272\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T17:55:42Z","timestamp":1760032542000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/17\/7\/272"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,20]]},"references-count":59,"journal-issue":{"issue":"7","published-online":{"date-parts":[[2025,7]]}},"alternative-id":["fi17070272"],"URL":"https:\/\/doi.org\/10.3390\/fi17070272","relation":{},"ISSN":["1999-5903"],"issn-type":[{"value":"1999-5903","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6,20]]}}}