{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T17:19:51Z","timestamp":1774718391857,"version":"3.50.1"},"reference-count":56,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T00:00:00Z","timestamp":1676851200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001230","name":"Macquarie University","doi-asserted-by":"publisher","award":["2018360"],"award-info":[{"award-number":["2018360"]}],"id":[{"id":"10.13039\/501100001230","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001230","name":"Macquarie University","doi-asserted-by":"publisher","award":["50075957"],"award-info":[{"award-number":["50075957"]}],"id":[{"id":"10.13039\/501100001230","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001230","name":"Macquarie University","doi-asserted-by":"publisher","award":["LP190100140"],"award-info":[{"award-number":["LP190100140"]}],"id":[{"id":"10.13039\/501100001230","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000943","name":"CSIRO\u2019s Data61 PhD Top-Up Scholarship","doi-asserted-by":"publisher","award":["2018360"],"award-info":[{"award-number":["2018360"]}],"id":[{"id":"10.13039\/501100000943","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000943","name":"CSIRO\u2019s Data61 PhD Top-Up Scholarship","doi-asserted-by":"publisher","award":["50075957"],"award-info":[{"award-number":["50075957"]}],"id":[{"id":"10.13039\/501100000943","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000943","name":"CSIRO\u2019s Data61 PhD Top-Up Scholarship","doi-asserted-by":"publisher","award":["LP190100140"],"award-info":[{"award-number":["LP190100140"]}],"id":[{"id":"10.13039\/501100000943","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Australian Research Council Linkage Project","award":["2018360"],"award-info":[{"award-number":["2018360"]}]},{"name":"Australian Research Council Linkage Project","award":["50075957"],"award-info":[{"award-number":["50075957"]}]},{"name":"Australian Research Council Linkage Project","award":["LP190100140"],"award-info":[{"award-number":["LP190100140"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>The rapid proliferation of the emerging yet promising notion of the Internet-of-Vehicles (IoV) has led to the development of a variety of conventional trust assessment schemes to tackle insider attackers. The primary reliance of these frameworks is on the accumulation of individual trust attributes. While aggregating these influential parameters, weights are often associated with each individual attribute to reflect its impact on the final trust score. It is of paramount importance that such weights be precise to lead to an accurate trust assessment. Moreover, the value of the minimum acceptable trust threshold employed for the identification of dishonest vehicles needs to be carefully defined to avoid delayed or erroneous detection. This paper employs an IoT data set from CRAWDAD by suitably transforming it into an IoV format. This data set encompasses information regarding 18,226 interactions among 76 nodes, both honest and dishonest. First, the influencing parameters (i.e., packet delivery ratio, familiarity, timeliness and interaction frequency) were computed, and two feature matrices were formed. The first matrix (FM1) takes into account all the pairwise individual parameters as individual features, whereas the second matrix (FM2) considers the average of all pairwise computations performed for each individual parameter as one feature. Subsequently, unsupervised learning is employed to achieve the ground truth prior to applying supervised machine learning algorithms for classification purposes. It is worth noting that Subspace KNN yielded a perfect precision, recall, and the F1-score equal to 1 for individual parametric scores, whereas Subspace Discriminant returned an ideal precision, recall, and the F1-score equal to 1 for mean parametric scores. It is also evident from extensive simulations that FM2 yielded more accurate classification results compared to FM1. Furthermore, decision boundaries among honest and dishonest vehicles have also been computed for respective feature matrices.<\/jats:p>","DOI":"10.3390\/s23042325","type":"journal-article","created":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T02:29:08Z","timestamp":1676860148000},"page":"2325","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Towards a Machine Learning Driven Trust Management Heuristic for the Internet of Vehicles"],"prefix":"10.3390","volume":"23","author":[{"given":"Sarah Ali","family":"Siddiqui","sequence":"first","affiliation":[{"name":"School of Computing, Macquarie University, Sydney, NSW 2109, Australia"},{"name":"Data61, Commonwealth Science and Industrial Research Organisation (CSIRO), Marsfield, NSW 2122, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3526-9037","authenticated-orcid":false,"given":"Adnan","family":"Mahmood","sequence":"additional","affiliation":[{"name":"School of Computing, Macquarie University, Sydney, NSW 2109, Australia"}]},{"given":"Quan Z.","family":"Sheng","sequence":"additional","affiliation":[{"name":"School of Computing, Macquarie University, Sydney, NSW 2109, Australia"}]},{"given":"Hajime","family":"Suzuki","sequence":"additional","affiliation":[{"name":"Data61, Commonwealth Science and Industrial Research Organisation (CSIRO), Marsfield, NSW 2122, Australia"}]},{"given":"Wei","family":"Ni","sequence":"additional","affiliation":[{"name":"Data61, Commonwealth Science and Industrial Research Organisation (CSIRO), Marsfield, NSW 2122, Australia"}]}],"member":"1968","published-online":{"date-parts":[[2023,2,20]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"1116","DOI":"10.1109\/TVT.2018.2890418","article-title":"An Integrated Longitudinal and Lateral Vehicle Following Control System with Radar and Vehicle-to-Vehicle Communication","volume":"68","author":"Wei","year":"2019","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_2","unstructured":"Australian Bureau of Statistics (2022, March 24). Motor Vehicle Census, Australia, Available online: https:\/\/www.abs.gov.au\/statistics\/industry\/tourism-and-transport\/motor-Vehicle-census-australia\/latest-release#key-statistics."},{"key":"ref_3","unstructured":"(2022, March 24). How Many Cars Are There in the World?. Available online: https:\/\/www.carsguide.com.au\/car-advice\/how-many-cars-are-there-in-the-world-70629."},{"key":"ref_4","unstructured":"(2022, March 24). Road Traffic Injuries. Available online: https:\/\/www.who.int\/news-room\/fact-sheets\/detail\/road-traffic-injuries."},{"key":"ref_5","unstructured":"(2022, March 24). Association for Safe International Road Traffic. Available online: https:\/\/www.asirt.org\/safe-travel\/road-safety-facts\/."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Miucic, R. (2018). Connected Vehicles: Intelligent Transportation Systems, Springer.","DOI":"10.1007\/978-3-319-94785-3"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"8420","DOI":"10.1109\/TVT.2020.3000471","article-title":"Real-time Model Predictive Powertrain Control for a Connected Plug-in Hybrid Electric Vehicle","volume":"69","author":"Oncken","year":"2020","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Zhang, W.E., Sheng, Q.Z., Mahmood, A., Tran, D.H., Zaib, M., Hamad, S.A., Aljubairy, A., Alhazmi, A.A.F., Sagar, S., and Ma, C. (2020, January 1\u20133). The 10 research topics in the Internet of Things. Proceedings of the 2020 IEEE 6th International Conference on Collaboration and Internet Computing (CIC), Atlanta, GA, USA.","DOI":"10.1109\/CIC50333.2020.00015"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"11701","DOI":"10.1109\/JIOT.2020.2999469","article-title":"Routing Algorithm Based on Vehicle Position Analysis for Internet of Vehicles","volume":"7","author":"Wang","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Panigrahy, S.K., and Emany, H. (2023). A Survey and Tutorial on Network Optimization for Intelligent Transport System Using the Internet of Vehicles. Sensors, 23.","DOI":"10.3390\/s23010555"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"1341","DOI":"10.1109\/TVT.2019.2960110","article-title":"Personalized Vehicle Trajectory Prediction based on Joint Time-Series Modeling for Connected Vehicles","volume":"69","author":"Xing","year":"2020","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Mahmood, A., Zhang, W.E., and Sheng, Q.Z. (2019). Software-defined Heterogeneous Vehicular Networking: The Architectural Design and Open Challenges. Future Internet, 11.","DOI":"10.3390\/fi11030070"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"693","DOI":"10.1109\/TIV.2020.2987430","article-title":"Securing Vehicle-to-Everything (V2X) Communication Platforms","volume":"5","author":"Hasan","year":"2020","journal-title":"IEEE Trans. Intell. Veh."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"162","DOI":"10.1109\/TMC.2019.2939803","article-title":"Heterogeneous V2V Communications in Multi-Link and Multi-RAT Vehicular Networks","volume":"20","author":"Sepulcre","year":"2021","journal-title":"IEEE Trans. Mob. Comput."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"St\u0119pie\u0144, K., and Poniszewska-Mara\u0144da, A. (2021). Security Measures with Enhanced Behavior Processing and Footprint Algorithm against Sybil and Bogus Attacks in Vehicular Ad Hoc Network. Sensors, 21.","DOI":"10.3390\/s21103538"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"222","DOI":"10.1109\/COMST.2020.3029723","article-title":"Challenges and Solutions for Cellular based V2X Communications","volume":"23","author":"Gyawali","year":"2020","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"3893","DOI":"10.1109\/TITS.2018.2791484","article-title":"Real-time Detection and Estimation of Denial of Service Attack in Connected Vehicle Systems","volume":"19","author":"Biron","year":"2018","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Akwirry, B., Bessis, N., Malik, H., and McHale, S. (2022). A Multi-Tier Trust-Based Security Mechanism for Vehicular Ad-Hoc Network Communications. Sensors, 22.","DOI":"10.3390\/s22218285"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"8647","DOI":"10.1109\/TVT.2018.2839979","article-title":"Decentralized and Scalable Privacy-preserving Authentication Scheme in VANETs","volume":"67","author":"Tangade","year":"2018","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Siddiqui, S.A., Mahmood, A., Zhang, W.E., and Sheng, Q.Z. (2019, January 12\u201315). Machine Learning based Trust Model for Misbehavior Detection in Internet-of-Vehicles. Proceedings of the 2019 26th International Conference On Neural Information Processing (ICONIP), Sydney, Australia.","DOI":"10.1007\/978-3-030-36808-1_56"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1016\/j.dcan.2021.10.007","article-title":"Machine Learning in Vehicular Networking: An Overview","volume":"8","author":"Tan","year":"2021","journal-title":"Digit. Commun. Netw."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Teixeira, L.H., and Husz\u00e1k, \u00c1. (2022). Reinforcement Learning Environment for Advanced Vehicular Ad Hoc Networks Communication Systems. Sensors, 22.","DOI":"10.3390\/s22134732"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1109\/MVT.2018.2811185","article-title":"Machine Learning for Vehicular Networks: Recent Advances and Application Examples","volume":"13","author":"Ye","year":"2018","journal-title":"IEEE Veh. Technol. Mag."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"3657","DOI":"10.1109\/TVT.2014.2360883","article-title":"A Job Market Signaling Scheme for Incentive and Trust Management in Vehicular Ad Hoc Networks","volume":"64","author":"Haddadou","year":"2015","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"15980","DOI":"10.1109\/ACCESS.2019.2893262","article-title":"Decentralized Trust Evaluation in Vehicular Internet of Things","volume":"7","author":"Guleng","year":"2019","journal-title":"IEEE Access"},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Lu, Z., Wang, Q., Qu, G., and Liu, Z. (2018, January 1\u20133). BARS: A Blockchain-based Anonymous Reputation System for Trust Management in VANETs. Proceedings of the 2018 17th IEEE International Conference On Trust, Security And Privacy in Computing and Communications\/12th IEEE International Conference on Big Data Science and Engineering (TrustCom\/BigDataSE), New York, NY, USA.","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00025"},{"key":"ref_27","first-page":"148","article-title":"Distributed Privacy-preserving Collaborative Intrusion Detection Systems for VANETs","volume":"4","author":"Zhang","year":"2018","journal-title":"IEEE Trans. Signal Inf. Process. Netw."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"101842","DOI":"10.1016\/j.adhoc.2019.02.001","article-title":"An Intrusion Detection System for Connected Vehicles in Smart Cities","volume":"90","author":"Aloqaily","year":"2019","journal-title":"Ad Hoc Netw."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1016\/j.cose.2018.06.008","article-title":"Trust Aware Support Vector Machine Intrusion Detection and Prevention System in Vehicular Ad hoc Networks","volume":"78","author":"Shams","year":"2018","journal-title":"Comput. Secur."},{"key":"ref_30","unstructured":"Abraham, A., Mauri, J.L., Buford, J.F., Suzuki, J., and Thampi, S.M. Machine Learning Approach for Multiple Misbehavior Detection in VANET. Proceedings of the Advances in Computing and Communications."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"16504","DOI":"10.1109\/TITS.2021.3129458","article-title":"A Hybrid Approach to Trust Node Assessment and Management for VANETs Cooperative Data Communication: Historical Interaction Perspective","volume":"23","author":"Gao","year":"2021","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"1397","DOI":"10.1109\/TETC.2020.3033532","article-title":"Blockchain-based Trust Management for Internet of Vehicles","volume":"9","author":"Zhang","year":"2021","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"9244","DOI":"10.1109\/TVT.2021.3049189","article-title":"NOTRINO: A NOvel Hybrid Trust Management Scheme for Internet-of-Vehicles","volume":"70","author":"Ahmad","year":"2021","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"21077","DOI":"10.1109\/ACCESS.2020.2966747","article-title":"AATMS: An Anti-Attack Trust Management Scheme in VANET","volume":"8","author":"Zhang","year":"2020","journal-title":"IEEE Access"},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"348","DOI":"10.3390\/smartcities5010020","article-title":"A Decentralized Blockchain-Based Trust Management Framework for Vehicular Ad Hoc Networks","volume":"5","author":"Gazdar","year":"2022","journal-title":"Smart Cities"},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Alkhalidy, M., Al-Serhan, A.F., Alsarhan, A., and Igried, B. (2022). A New Scheme for Detecting Malicious Nodes in Vehicular Ad Hoc Networks Based on Monitoring Node Behavior. Future Internet, 14.","DOI":"10.3390\/fi14080223"},{"key":"ref_37","unstructured":"Jain, A.K., and Dubes, R.C. (1988). Algorithms for Clustering Data, Prentice-Hall, Inc."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"80716","DOI":"10.1109\/ACCESS.2020.2988796","article-title":"Unsupervised K-means Clustering Algorithm","volume":"8","author":"Sinaga","year":"2020","journal-title":"IEEE Access"},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Pugazhenthi, A., and Kumar, L.S. (2020, January 14\u201316). Selection of Optimal Number of Clusters and Centroids for K-means and Fuzzy C-means Clustering: A Review. Proceedings of the 2020 5th International Conference on Computing, Communication and Security (ICCCS), Patna, India.","DOI":"10.1109\/ICCCS49678.2020.9276978"},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"204","DOI":"10.1109\/RBME.2020.2969915","article-title":"A Review on Machine Learning for EEG Signal Processing in Bioengineering","volume":"14","author":"Hosseini","year":"2020","journal-title":"IEEE Rev. Biomed. Eng."},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Pugazhenthi, A., and Singhai, J. (2014, January 3\u20135). Automatic Centroids Selection in K-means Clustering based Image Segmentation. Proceedings of the 2014 International Conference on Communication and Signal Processing, Chennai, India.","DOI":"10.1109\/ICCSP.2014.6950057"},{"key":"ref_42","unstructured":"Yuan, B., Klir, G.J., and Swan-Stone, J.F. (1995, January 20\u201324). Evolutionary Fuzzy C-means Clustering Algorithm. Proceedings of the 1995 IEEE International Conference on Fuzzy Systems, Yokohama, Japan."},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Pugazhenthi, A., Sreenivasulu, G., and Indhirani, A. (2016, January 17\u201318). Background Removal by Modified Fuzzy C-means Clustering Algorithm. Proceedings of the 2015 IEEE International Conference on Engineering and Technology (ICETECH), Coimbatore, India.","DOI":"10.1109\/ICETECH.2015.7274999"},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"65579","DOI":"10.1109\/ACCESS.2019.2916648","article-title":"Unsupervised Machine Learning for Networking: Techniques, Applications and Research Challenges","volume":"7","author":"Usama","year":"2019","journal-title":"IEEE Access"},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Wang, R., Zhou, J., Liu, X., Han, S., Wang, L., and Chen, Y. (2019, January 6\u20139). Transfer Clustering based on Gaussian Mixture Model. Proceedings of the 2019 IEEE Symposium Series on Computational Intelligence (SSCI), Xiamen, China.","DOI":"10.1109\/SSCI44817.2019.9003043"},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Gao, M.M., Tai-hua, C., and Gao, X.X. (2010, January 29\u201331). Application of Gaussian Mixture Model Genetic Algorithm in Data Stream Clustering Analysis. Proceedings of the 2010 IEEE International Conference on Intelligent Computing and Intelligent Systems, Xiamen, China.","DOI":"10.1109\/ICICISYS.2010.5658322"},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"3533","DOI":"10.1109\/JIOT.2018.2840129","article-title":"Clustering of Data Streams with Dynamic Gaussian Mixture Models: An IoT Application in Industrial Processes","volume":"5","author":"Bielza","year":"2018","journal-title":"IEEE Internet Things J."},{"key":"ref_48","first-page":"1","article-title":"Machine and Deep Learning Algorithms and Applications","volume":"12","author":"Shanthamallu","year":"2021","journal-title":"Synth. Lect. Signal Process."},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Kushwaha, P.K., and Kumaresan, M. (2021, January 10\u201312). Machine Learning Algorithm in Healthcare System: A Review. Proceedings of the 2021 International Conference on Technological Advancements and Innovations (ICTAI), Tashkent, Uzbekistan.","DOI":"10.1109\/ICTAI53825.2021.9673220"},{"key":"ref_50","unstructured":"Chitralekha, G., and Roogi, J.M. (2021, January 8\u201310). A Quick Review of ML Algorithms. Proceedings of the 2021 6th International Conference on Communication and Electronics Systems (ICCES), Coimbatore, India."},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"605","DOI":"10.1109\/TKDE.2011.28","article-title":"Cluster-oriented Ensemble Classifier: Impact of Multicluster Characterization on Ensemble Classifier Learning","volume":"24","author":"Verma","year":"2011","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"866","DOI":"10.1109\/TITB.2008.2010552","article-title":"Integrating Heterogeneous Classifier Ensembles for EMG Signal Decomposition based on Classifier Agreement","volume":"14","author":"Rasheed","year":"2009","journal-title":"IEEE Trans. Inf. Technol. Biomed."},{"key":"ref_53","doi-asserted-by":"crossref","unstructured":"Amasyali, M., and Ersoy, O. (2011, January 15\u201318). Comparison of Single and Ensemble Classifiers in Terms of Accuracy and Execution Time. Proceedings of the 2011 International Symposium on Innovations in Intelligent Systems and Applications, Istanbul, Turkey.","DOI":"10.1109\/INISTA.2011.5946119"},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"503","DOI":"10.1007\/s00607-021-01001-0","article-title":"A hybrid machine learning model for intrusion detection in VANET","volume":"104","author":"Bangui","year":"2022","journal-title":"Computing"},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"148913","DOI":"10.1109\/ACCESS.2018.2876153","article-title":"TMEC: A Trust Management Based on Evidence Combination on Attack-Resistant and Collaborative Internet of Vehicles","volume":"7","author":"Chen","year":"2019","journal-title":"IEEE Access"},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"960","DOI":"10.1109\/TITS.2015.2494017","article-title":"ART: An attack-resistant trust management scheme for securing vehicular ad hoc networks","volume":"17","author":"Li","year":"2015","journal-title":"IEEE Trans. Intell. Transp. Syst."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/23\/4\/2325\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T18:36:45Z","timestamp":1760121405000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/23\/4\/2325"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2,20]]},"references-count":56,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2023,2]]}},"alternative-id":["s23042325"],"URL":"https:\/\/doi.org\/10.3390\/s23042325","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,2,20]]}}}