{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,26]],"date-time":"2025-12-26T05:16:20Z","timestamp":1766726180032,"version":"3.48.0"},"reference-count":67,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2025,12,19]],"date-time":"2025-12-19T00:00:00Z","timestamp":1766102400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"EU Funded project CAIOC with Grant Agreement","award":["101190339"],"award-info":[{"award-number":["101190339"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Informatics"],"abstract":"<jats:p>Healthcare faces a critical challenge: protecting sensitive medical data while enabling necessary clinical access. Evolving user behaviors, dynamic clinical contexts, and strict regulatory requirements demand adaptive access control mechanisms. Despite strict regulations, healthcare remains the most breached industry, consistently facing severe security risks related to unauthorized access. Traditional access control models cannot handle contextual variations, detect credential compromise, or provide transparent decision rationales. To address this, SAFE-GUARD (Semantic Access Control Framework Employing Generative User Assessment and Rule Decisions) is proposed as a two-layer framework that combines behavioral analysis with policy enforcement. The Behavioral Analysis Layer uses Retrieval-Augmented Generation (RAG) to detect contextual anomalies by comparing current requests against historical patterns. The Rule-Based Policy Evaluation Layer independently validates organizational procedures and regulatory requirements. Access is granted only when behavioral consistency and both organizational and regulatory policies are satisfied. We evaluate SAFE-GUARD using simulated healthcare scenarios with three LLMs (GPT-4o, Claude 3.5 Sonnet, and Gemini 2.5 Flash) achieving an anomaly detection accuracy of 95.2%, 94.1%, and 91.3%, respectively. The framework effectively identifies both compromised credentials and insider misuse by detecting deviations from established behavioral patterns, significantly outperforming conventional RBAC and ABAC approaches that rely solely on static rules.<\/jats:p>","DOI":"10.3390\/informatics13010001","type":"journal-article","created":{"date-parts":[[2025,12,19]],"date-time":"2025-12-19T14:27:16Z","timestamp":1766154436000},"page":"1","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["SAFE-GUARD: Semantic Access Control Framework Employing Generative User Assessment and Rule Decisions"],"prefix":"10.3390","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1578-0711","authenticated-orcid":false,"given":"Nastaran","family":"Farhadighalati","sequence":"first","affiliation":[{"name":"Center of Technology and Systems (UNINOVA-CTS), Associated Lab of Intelligent Systems (LASI), Department of Electrical and Computer Engineering, NOVA School of Science and Technology, NOVA University Lisbon, 2829-516 Lisbon, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8595-3713","authenticated-orcid":false,"given":"Luis A.","family":"Estrada-Jimenez","sequence":"additional","affiliation":[{"name":"Center of Technology and Systems (UNINOVA-CTS), Associated Lab of Intelligent Systems (LASI), Department of Electrical and Computer Engineering, NOVA School of Science and Technology, NOVA University Lisbon, 2829-516 Lisbon, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7124-3729","authenticated-orcid":false,"given":"Sepideh","family":"Kalateh","sequence":"additional","affiliation":[{"name":"Center of Technology and Systems (UNINOVA-CTS), Associated Lab of Intelligent Systems (LASI), Department of Electrical and Computer Engineering, NOVA School of Science and Technology, NOVA University Lisbon, 2829-516 Lisbon, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0839-9250","authenticated-orcid":false,"given":"Sanaz","family":"Nikghadam-Hojjati","sequence":"additional","affiliation":[{"name":"Center of Technology and Systems (UNINOVA-CTS), Associated Lab of Intelligent Systems (LASI), Department of Electrical and Computer Engineering, NOVA School of Science and Technology, NOVA University Lisbon, 2829-516 Lisbon, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6348-1847","authenticated-orcid":false,"given":"Jose","family":"Barata","sequence":"additional","affiliation":[{"name":"Center of Technology and Systems (UNINOVA-CTS), Associated Lab of Intelligent Systems (LASI), Department of Electrical and Computer Engineering, NOVA School of Science and Technology, NOVA University Lisbon, 2829-516 Lisbon, Portugal"}]}],"member":"1968","published-online":{"date-parts":[[2025,12,19]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Scott, P.F. (2019). National Security, Data Protection, and Data Sharing after the Data Protection Act 2018. SSRN Electron. J.","DOI":"10.2139\/ssrn.3340543"},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Sargiotis, D. (2024). Data Security and Privacy: Protecting Sensitive Information. Data Governance: A Guide, Springer Nature.","DOI":"10.1007\/978-3-031-67268-2"},{"key":"ref_3","unstructured":"U.S. Department of Health and Human Services Office for Civil Rights (2025, December 08). Available online: https:\/\/ocrportal.hhs.gov\/ocr\/breach\/breach_report.jsf."},{"key":"ref_4","unstructured":"(2025, December 08). Cost of a Data Breach: The Healthcare Industry. Available online: https:\/\/www.ibm.com\/think\/insights\/cost-of-a-data-breach-healthcare-industry."},{"key":"ref_5","unstructured":"HIPAA Journal (2025, November 26). Average Cost of a Data Breach Rises to $4.88M; Falls to $9.77M in Healthcare. Available online: https:\/\/www.hipaajournal.com\/cost-healthcare-data-breach-2024\/."},{"key":"ref_6","first-page":"156","article-title":"A systematic literature review for authorization and access control: Definitions, strategies and models","volume":"18","author":"Mohamed","year":"2022","journal-title":"Int. J. Web Inf. Syst."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Kashmar, N., Adda, M., and Atieh, M. (2019). From Access Control Models to Access Control Metamodels: A Survey. Future of Information and Communication Conference, Springer International Publishing.","DOI":"10.1007\/978-3-030-12385-7_61"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Vijayalakshmi, K., and Jayalakshmi, V. (2022). A Study on Current Research and Challenges in Attribute-Based Access Control Model. Intelligent Data Communication Technologies and Internet of Things: Proceedings of ICICI 2021, Springer.","DOI":"10.1007\/978-981-16-7610-9_2"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Ahsan, M.S., and Pathan, A.S.K. (2025). A Comprehensive Survey on the Requirements, Applications, and Future Challenges for Access Control Models in IoT: The State of the Art. IoT, 6.","DOI":"10.3390\/iot6010009"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"17777","DOI":"10.1109\/ACCESS.2025.3533145","article-title":"A systematic review of access control models: Background, existing research, and challenges","volume":"13","author":"Farhadighalati","year":"2025","journal-title":"IEEE Access"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"51832","DOI":"10.1109\/JIOT.2025.3577675","article-title":"Large Language Model-driven Security Assistant for Internet of Things via Chain-of-Thought","volume":"12","author":"Zeng","year":"2025","journal-title":"IEEE Internet Things J."},{"key":"ref_12","unstructured":"Malhotra, P., Vig, L., Shroff, G., and Agarwal, P. (2015, January 22\u201324). Long Short Term Memory Networks for Anomaly Detection in Time Series. Proceedings of the European Symposium on Artificial Neural Networks, Bruges, Belgium."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Sakurada, M., and Yairi, T. (2014, January 2). Anomaly Detection Using Autoencoders with Nonlinear Dimensionality Reduction. Proceedings of the MLSDA 2014 2nd Workshop on Machine Learning for Sensory Data Analysis, Gold Coast, QLD, Australia.","DOI":"10.1145\/2689746.2689747"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1016\/j.patcog.2016.03.028","article-title":"High-dimensional and large-scale anomaly detection using a linear one-class SVM with deep learning","volume":"58","author":"Erfani","year":"2016","journal-title":"Pattern Recognit."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"1966","DOI":"10.1007\/s13198-015-0411-1","article-title":"A cloud-user behavior assessment based dynamic access control model","volume":"8","author":"Jing","year":"2017","journal-title":"Int. J. Syst. Assur. Eng. Manag."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Argento, L., Margheri, A., Paci, F., Sassone, V., and Zannone, N. (2018). Towards Adaptive Access Control. IFIP Annual Conference on Data and Applications Security and Privacy, Springer International Publishing.","DOI":"10.1007\/978-3-319-95729-6_7"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"1550147720921778","DOI":"10.1177\/1550147720921778","article-title":"Dynamic and semantic-aware access-control model for privacy preservation in multiple data center environments","volume":"16","author":"Chen","year":"2020","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Afshar, M., Samet, S., and Usefi, H. (2021, January 22\u201325). Incorporating Behavior in Attribute Based Access Control Model Using Machine Learning. Proceedings of the 2021 IEEE International Systems Conference (SysCon), Virtually.","DOI":"10.1109\/SysCon48628.2021.9447115"},{"key":"ref_19","unstructured":"Karimi, L., Abdelhakim, M., and Joshi, J. (2021). Adaptive abac policy learning: A reinforcement learning approach. arXiv."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"3158","DOI":"10.1109\/TDSC.2022.3197265","article-title":"Behavior-based anomaly detection in log data of physical access control systems","volume":"20","author":"Skopik","year":"2022","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Hu, X., Hu, Y., Cheng, G., Wu, H., Qin, Y., and Gong, J. (2022, January 4\u20138). A Dynamic Access Control Model Based on Attributes and Intro VAE. Proceedings of the GLOBECOM 2022\u20142022 IEEE Global Communications Conference, Rio de Janeiro, Brazil.","DOI":"10.1109\/GLOBECOM48099.2022.10001289"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Zhang, H., Wen, G., Liu, D., and Dong, G. (2023, January 22\u201324). A Dynamic Access Control Method Based on User Behavior Trust Evaluation in Edge Cloud Environment. Proceedings of the 2023 3rd Guangdong-Hong Kong-Macao Greater Bay Area Artificial Intelligence and Big Data Forum, Guangzhou, China.","DOI":"10.1145\/3660395.3660412"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1186\/s40537-023-00783-8","article-title":"Risk and UCON-based access control model for healthcare big data","volume":"10","author":"Jiang","year":"2023","journal-title":"J. Big Data"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Amour, S., and Gudes, E. (2024). Access Policy Prediction via User Behavior. International Symposium on Cyber Security, Cryptology, and Machine Learning, Springer Nature.","DOI":"10.1007\/978-3-031-76934-4_16"},{"key":"ref_25","unstructured":"Sonune, P., Rai, R., Sural, S., Atluri, V., and Kundu, A. (2025). LMN: A Tool for Generating Machine Enforceable Policies from Natural Language Access Control Rules using LLMs. arXiv."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Vatsa, A., Patel, P., and Eiers, W. (2025, January 27\u201328). Synthesizing Access Control Policies using Large Language Models. Proceedings of the 2025 IEEE\/ACM International Workshop on Natural Language-Based Software Engineering (NLBSE), Ottawa, ON, Canada.","DOI":"10.1109\/NLBSE66842.2025.00008"},{"key":"ref_27","unstructured":"Jayasundara, S.H., Arachchilage, N.A.G., and Russello, G. (2024). Ragent: Retrieval-based access control policy generation. arXiv."},{"key":"ref_28","unstructured":"Subramaniam, P., and Krishnan, S. (2024). Intent-based access control: Using llms to intelligently manage access control. arXiv."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Martinelli, F., Mercaldo, F., Petrillo, L., and Santone, A. (2024, January 19\u201321). Security Policy Generation and Verification Through Large Language Models: A Proposal. Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy, Porto, Portugal.","DOI":"10.1145\/3626232.3658635"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"201","DOI":"10.3758\/BF03212870","article-title":"Temporal and spatial characteristics of selective encoding from visual displays","volume":"12","author":"Eriksen","year":"1972","journal-title":"Percept. Psychophys."},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Wang, Y., Tian, L., and Chen, Z. (2019). Game analysis of access control based on user behavior trust. Information, 10.","DOI":"10.3390\/info10040132"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"100052","DOI":"10.1016\/j.iot.2019.100052","article-title":"An efficient security risk estimation technique for Risk-based access control model for IoT","volume":"6","author":"Atlam","year":"2019","journal-title":"Internet Things"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"297","DOI":"10.1007\/s42979-024-02616-8","article-title":"RUBAC: Proposed access control for flexible utility\u2013privacy model in healthcare","volume":"5","author":"Churi","year":"2024","journal-title":"SN Comput. Sci."},{"key":"ref_34","unstructured":"Boyes, H. (2023, January 1\u20135). Access Control to Support Security-Minded Sharing of Information. Proceedings of the 2023 COSAC Ireland Conference, Kildare, Ireland."},{"key":"ref_35","first-page":"9459","article-title":"Retrieval-augmented generation for knowledge-intensive nlp tasks","volume":"33","author":"Lewis","year":"2020","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Shuster, K., Poff, S., Chen, M., Kiela, D., and Weston, J. (2021). Retrieval augmentation reduces hallucination in conversation. arXiv.","DOI":"10.18653\/v1\/2021.findings-emnlp.320"},{"key":"ref_37","unstructured":"Guu, K., Lee, K., Tung, Z., Pasupat, P., and Chang, M. (2020, January 13\u201318). Retrieval Augmented Language Model Pre-Training. Proceedings of the International Conference on Machine Learning PMLR, Virtual Event."},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Khan, M.A., Din, I.U., Majali, T.E., and Kim, B.S. (2022). A survey of authentication in internet of things-enabled healthcare systems. Sensors, 22.","DOI":"10.3390\/s22239089"},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Khilar, P.M., Chaudhari, V., and Swain, R.R. (2018). Trust-Based Access Control in Cloud Computing Using Machine Learning. Cloud Computing for Geospatial Big Data Analytics: Intelligent Edge, Fog and Mist Computing, Springer International Publishing.","DOI":"10.1007\/978-3-030-03359-0_3"},{"key":"ref_40","first-page":"1","article-title":"General data protection regulation","volume":"25","author":"Regulation","year":"2018","journal-title":"Intouch"},{"key":"ref_41","first-page":"191","article-title":"Health insurance portability and accountability act of 1996","volume":"104","author":"Act","year":"1996","journal-title":"Public Law"},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1038\/sdata.2016.35","article-title":"MIMIC-III, a freely accessible critical care database","volume":"3","author":"Johnson","year":"2016","journal-title":"Sci. Data"},{"key":"ref_43","unstructured":"(2025, November 25). National Role-Based Access Control (RBAC) for Developers. Available online: https:\/\/digital.nhs.uk\/developer\/guides-and-documentation\/security-and-authorisation\/national-rbac-for-developers."},{"key":"ref_44","unstructured":"(2025, November 25). Healthcare Dataset (ABAC-Lab). Available online: https:\/\/github.com\/ABAC-Lab-Admin\/ABAC-Lab\/tree\/main\/DATASETS\/healthcare."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1007\/s10515-024-00453-w","article-title":"Data cleaning and machine learning: A systematic literature review","volume":"31","author":"Cote","year":"2024","journal-title":"Autom. Softw. Eng."},{"key":"ref_46","unstructured":"Guo, X., and Chen, Y. (2024). Generative ai for synthetic data generation: Methods, challenges and the future. arXiv."},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1038\/sdata.2018.178","article-title":"The eICU Collaborative Research Database, a freely available multi-center database for critical care research","volume":"5","author":"Pollard","year":"2018","journal-title":"Sci. Data"},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"827","DOI":"10.1093\/ije\/dyv098","article-title":"Data resource profile: Clinical practice research datalink (CPRD)","volume":"44","author":"Herrett","year":"2015","journal-title":"Int. J. Epidemiol."},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"143266","DOI":"10.1109\/ACCESS.2021.3118297","article-title":"Behavioral based insider threat detection using deep learning","volume":"9","author":"Nasir","year":"2021","journal-title":"IEEE Access"},{"key":"ref_50","doi-asserted-by":"crossref","unstructured":"Yasaei, R., and Faruque, M.A.A. (2023). Context-Aware Adaptive Anomaly Detection in IOT Systems. Embedded Machine Learning for Cyber-Physical, IoT, and Edge Computing: Use Cases and Emerging Challenges, Springer Nature.","DOI":"10.1007\/978-3-031-40677-5_8"},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Nolle, T., Seeliger, A., and M\u00fchlh\u00e4user, M. (2016). Unsupervised Anomaly Detection in Noisy Business Process Event Logs Using Denoising Autoencoders. International Conference on Discovery Science, Springer International Publishing.","DOI":"10.1007\/978-3-319-46307-0_28"},{"key":"ref_52","unstructured":"HHS Office for Civil Rights (2002). Standards for privacy of individually identifiable health information. Final rule. Fed. Regist., 67, 53181\u201353273."},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1038\/sdata.2016.18","article-title":"The FAIR Guiding Principles for scientific data management and stewardship","volume":"3","author":"Wilkinson","year":"2016","journal-title":"Sci. Data"},{"key":"ref_54","unstructured":"(2016). Health Informatics-Information Security Management in Health Using ISO\/IEC 27002 (Standard No. ISO 27799:2016)."},{"key":"ref_55","unstructured":"(2025, November 25). Art. 5 GDPR Principles Relating to Processing of Personal Data. Available online: https:\/\/gdpr-info.eu\/art-5-gdpr\/."},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"118250","DOI":"10.1109\/ACCESS.2024.3440657","article-title":"Fine-tuned understanding: Enhancing social bot detection with transformer-based classification","volume":"12","author":"Sallah","year":"2024","journal-title":"IEEE Access"},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"12253","DOI":"10.1109\/ACCESS.2020.2965333","article-title":"Intelligent role-based access control model and framework using semantic business roles in multi-domain environments","volume":"8","author":"Ghazal","year":"2020","journal-title":"IEEE Access"},{"key":"ref_58","unstructured":"Yang, Z., Zhang, Z., Zheng, Z., Jiang, Y., Gan, Z., Wang, Z., Ling, Z., Chen, J., Ma, M., and Dong, B. (2024). Oasis: Open agent social interaction simulations with one million agents. arXiv."},{"key":"ref_59","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1186\/s42400-025-00361-w","article-title":"When llms meet cybersecurity: A systematic literature review","volume":"8","author":"Zhang","year":"2025","journal-title":"Cybersecurity"},{"key":"ref_60","unstructured":"(2025, November 25). GPT-4o vs. Gemini 1.5 Pro vs. Claude 3 Opus: Multimodal AI Model Comparison. Available online: https:\/\/encord.com\/blog\/gpt-4o-vs-gemini-vs-claude-3-opus\/."},{"key":"ref_61","unstructured":"(2025, November 25). Compare Claude 3 Opus vs GPT-4o. Available online: https:\/\/docsbot.ai\/models\/compare\/claude-3-opus\/gpt-4o."},{"key":"ref_62","unstructured":"(2025, November 25). Claude vs GPT-4o vs Gemini: Architecture and Reasoning Depth. Available online: https:\/\/www.evolution.ai\/post\/claude-vs-gpt-4o-vs-gemini."},{"key":"ref_63","unstructured":"Russell-Gilbert, A. (2025). RAAD-LLM: Adaptive Anomaly Detection Using LLMs and RAG Integration. [Ph.D. Thesis, Mississippi State University]."},{"key":"ref_64","unstructured":"(2025, December 08). ChatGPT vs Claude vs Gemini: Full Report and Comparison of Features, Performance, Integrations, Pricing, and Use Cases. Available online: https:\/\/www.datastudios.org\/post\/chatgpt-vs-claude-vs-gemini-full-report-and-comparison-of-features-performance-integrations-pric."},{"key":"ref_65","doi-asserted-by":"crossref","unstructured":"Improta, G., Romano, M., Di Cicco, M.V., Ferraro, A., Borrelli, A., Verdoliva, C., Triassi, M., and Cesarelli, M. (2018). Lean thinking to improve emergency department throughput at AORN Cardarelli hospital. BMC Health Serv. Res., 18.","DOI":"10.1186\/s12913-018-3654-0"},{"key":"ref_66","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1177\/001316446002000104","article-title":"A coefficient of agreement for nominal scales","volume":"20","author":"Cohen","year":"1960","journal-title":"Educ. Psychol. Meas."},{"key":"ref_67","doi-asserted-by":"crossref","first-page":"18273","DOI":"10.1109\/TVT.2025.3580859","article-title":"Deep Reinforcement Learning for Energy Efficiency Maximization in RSMA-IRS-Assisted ISAC System","volume":"74","author":"Ma","year":"2025","journal-title":"IEEE Trans. Veh. Technol."}],"container-title":["Informatics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2227-9709\/13\/1\/1\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,26]],"date-time":"2025-12-26T05:14:12Z","timestamp":1766726052000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2227-9709\/13\/1\/1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,19]]},"references-count":67,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2026,1]]}},"alternative-id":["informatics13010001"],"URL":"https:\/\/doi.org\/10.3390\/informatics13010001","relation":{},"ISSN":["2227-9709"],"issn-type":[{"type":"electronic","value":"2227-9709"}],"subject":[],"published":{"date-parts":[[2025,12,19]]}}}