{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T16:42:35Z","timestamp":1775839355501,"version":"3.50.1"},"reference-count":66,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2023,12,26]],"date-time":"2023-12-26T00:00:00Z","timestamp":1703548800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>In the context of 6G technology, the Internet of Everything aims to create a vast network that connects both humans and devices across multiple dimensions. The integration of smart healthcare, agriculture, transportation, and homes is incredibly appealing, as it allows people to effortlessly control their environment through touch or voice commands. Consequently, with the increase in Internet connectivity, the security risk also rises. However, the future is centered on a six-fold increase in connectivity, necessitating the development of stronger security measures to handle the rapidly expanding concept of IoT-enabled metaverse connections. Various types of attacks, often orchestrated using botnets, pose a threat to the performance of IoT-enabled networks. Detecting anomalies within these networks is crucial for safeguarding applications from potentially disastrous consequences. The voting classifier is a machine learning (ML) model known for its effectiveness as it capitalizes on the strengths of individual ML models and has the potential to improve overall predictive performance. In this research, we proposed a novel classification technique based on the DRX approach that combines the advantages of the Decision tree, Random forest, and XGBoost algorithms. This ensemble voting classifier significantly enhances the accuracy and precision of network intrusion detection systems. Our experiments were conducted using the NSL-KDD, UNSW-NB15, and CIC-IDS2017 datasets. The findings of our study show that the DRX-based technique works better than the others. It achieved a higher accuracy of 99.88% on the NSL-KDD dataset, 99.93% on the UNSW-NB15 dataset, and 99.98% on the CIC-IDS2017 dataset, outperforming the other methods. Additionally, there is a notable reduction in the false positive rates to 0.003, 0.001, and 0.00012 for the NSL-KDD, UNSW-NB15, and CIC-IDS2017 datasets.<\/jats:p>","DOI":"10.3390\/s24010127","type":"journal-article","created":{"date-parts":[[2023,12,26]],"date-time":"2023-12-26T04:40:44Z","timestamp":1703565644000},"page":"127","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":27,"title":["Enhancing Network Intrusion Detection Using an Ensemble Voting Classifier for Internet of Things"],"prefix":"10.3390","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4540-8697","authenticated-orcid":false,"given":"Ashfaq Hussain","family":"Farooqi","sequence":"first","affiliation":[{"name":"Faculty of Computing and AI, Air University, Islamabad 44000, Pakistan"}]},{"given":"Shahzaib","family":"Akhtar","sequence":"additional","affiliation":[{"name":"Faculty of Computing and AI, Air University, Islamabad 44000, Pakistan"}]},{"given":"Hameedur","family":"Rahman","sequence":"additional","affiliation":[{"name":"Faculty of Computing and AI, Air University, Islamabad 44000, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6603-3639","authenticated-orcid":false,"given":"Touseef","family":"Sadiq","sequence":"additional","affiliation":[{"name":"Centre for Artificial Intelligence Research, Department of Information and Communication Technology, University of Agder, 4879 Grimstad, Norway"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1293-3049","authenticated-orcid":false,"given":"Waseem","family":"Abbass","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering and Computer Engineering, Capital University of Science and Technology, Islamabad 44000, Pakistan"}]}],"member":"1968","published-online":{"date-parts":[[2023,12,26]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"14671","DOI":"10.1109\/JIOT.2023.3278329","article-title":"A Survey on the Metaverse: The State-of-the-Art, Technologies, Applications, and Challenges","volume":"10","author":"Wang","year":"2023","journal-title":"IEEE Internet Things J."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Anwer, A.H., Khan, N., Ansari, M.Z., Baek, S.S., Yi, H., Kim, S., Noh, S.M., and Jeong, C. (2022). Recent Advances in Touch Sensors for Flexible Wearable Devices. Sensors, 22.","DOI":"10.3390\/s22124460"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1109\/COMST.2022.3202047","article-title":"A Survey on Metaverse: Fundamentals, Security, and Privacy","volume":"25","author":"Wang","year":"2023","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1016\/j.knosys.2015.01.009","article-title":"CANN: An intrusion detection system based on combining cluster centers and nearest neighbors","volume":"78","author":"Lin","year":"2015","journal-title":"Knowl. Based Syst."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1016\/j.eswa.2014.08.002","article-title":"On the combination of genetic fuzzy systems and pairwise learning for improving detection rates on intrusion detection systems","volume":"42","author":"Elhag","year":"2015","journal-title":"Expert Syst. Appl."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Can, O., and Sahingoz, O.K. (2015, January 27\u201329). A survey of intrusion detection systems in wireless sensor networks. Proceedings of the 2015 6th International Conference on Modeling, Simulation, and Applied Optimization (ICMSAO), Istanbul, Turkey.","DOI":"10.1109\/ICMSAO.2015.7152200"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"1153","DOI":"10.1109\/COMST.2015.2494502","article-title":"A survey of data mining and machine learning methods for cyber security intrusion detection","volume":"18","author":"Buczak","year":"2015","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_8","unstructured":"Creech, G. (2014). Developing a High-Accuracy Cross Platform Host-Based Intrusion Detection System Capable of Reliably Detecting Zero-Day Attacks. [Ph.D. Thesis, UNSW Sydney]."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Mishra, M.K., and Dash, R. (2014, January 19\u201321). A comparative study of chebyshev functional link artificial neural network, multi-layer perceptron and decision tree for credit card fraud detection. Proceedings of the 2014 International Conference on Information Technology, Kolkata, India.","DOI":"10.1109\/ICIT.2014.25"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"1729","DOI":"10.1587\/transinf.2016ICP0018","article-title":"HFSTE: Hybrid feature selections and tree-based classifiers ensemble for intrusion detection system","volume":"100","author":"Tama","year":"2017","journal-title":"IEICE Trans. Inf. Syst."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"2221","DOI":"10.1007\/s11227-018-2680-3","article-title":"A comprehensive security analysis of LEACH++ clustering protocol for wireless sensor networks","volume":"75","author":"Khan","year":"2019","journal-title":"J. Supercomput."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"103283","DOI":"10.1016\/j.cose.2023.103283","article-title":"A Comprehensive Survey for IoT Security Datasets Taxonomy, Classification and Machine Learning Mechanisms","volume":"132","author":"Christin","year":"2023","journal-title":"Comput. Secur."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"955","DOI":"10.1007\/s00521-017-3128-z","article-title":"An in-depth experimental study of anomaly detection using gradient boosted machine","volume":"31","author":"Tama","year":"2019","journal-title":"Neural Comput. Appl."},{"key":"ref_14","first-page":"108","article-title":"Toward generating a new intrusion detection dataset and intrusion traffic characterization","volume":"1","author":"Sharafaldin","year":"2018","journal-title":"ICISSP"},{"key":"ref_15","first-page":"479","article-title":"A detailed analysis of CICIDS2017 dataset for designing Intrusion Detection Systems","volume":"7","author":"Panigrahi","year":"2018","journal-title":"Int. J. Eng. Technol."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1080\/19393555.2015.1125974","article-title":"The evaluation of Network Anomaly Detection Systems: Statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set","volume":"25","author":"Moustafa","year":"2016","journal-title":"Inf. Secur. J. A Glob. Perspect."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Khraisat, A., Gondal, I., and Vamplew, P. (2018, January 3\u20136). An anomaly intrusion detection system using C5 decision tree classifier. Proceedings of the Pacific-Asia Conference on Knowledge Discovery and Data Mining, Melbourne, VIC, Australia.","DOI":"10.1007\/978-3-030-04503-6_14"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Tavallaee, M., Bagheri, E., Lu, W., and Ghorbani, A.A. (2009, January 8\u201310). A detailed analysis of the KDD CUP 99 data set. Proceedings of the 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, Ottawa, ON, Canada.","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Primartha, R., and Tama, B.A. (2017, January 1\u20132). Anomaly detection using random forest: A performance revisited. Proceedings of the 2017 International Conference on Data and Software Engineering (ICoDSE), Palembang, Indonesia.","DOI":"10.1109\/ICODSE.2017.8285847"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"103452","DOI":"10.1109\/ACCESS.2021.3098986","article-title":"An ensemble of deep learning-based multi-model for ECG heartbeats arrhythmia classification","volume":"9","author":"Essa","year":"2021","journal-title":"IEEE Access"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Kanakarajan, N.K., and Muniasamy, K. (2015, January 25). Improving the accuracy of intrusion detection using gar-forest with feature selection. Proceedings of the 4th International Conference on Frontiers in Intelligent Computing: Theory and Applications (FICTA) 2015, New Dehli, India.","DOI":"10.1007\/978-81-322-2695-6_45"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1016\/j.inffus.2013.04.006","article-title":"A survey of multiple classifier systems as hybrid systems","volume":"16","author":"Grana","year":"2014","journal-title":"Inf. Fusion"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"10916","DOI":"10.1016\/j.eswa.2012.03.033","article-title":"Two-level classifier ensembles for credit risk assessment","volume":"39","year":"2012","journal-title":"Expert Syst. Appl."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1016\/j.jocs.2016.01.001","article-title":"HMV: A medical decision support framework using multi-layer classifiers for disease prediction","volume":"13","author":"Bashir","year":"2016","journal-title":"J. Comput. Sci."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"107247","DOI":"10.1016\/j.comnet.2020.107247","article-title":"Building an efficient intrusion detection system based on feature selection and ensemble classifier","volume":"174","author":"Zhou","year":"2020","journal-title":"Comput. Netw."},{"key":"ref_26","first-page":"219","article-title":"Defense against distributed DoS attack detection by using intelligent evolutionary algorithm","volume":"44","author":"Dwivedi","year":"2022","journal-title":"Int. J. Comput. Appl."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","article-title":"The internet of things: A survey","volume":"54","author":"Atzori","year":"2010","journal-title":"Comput. Netw."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Giuliano, R. (2021, January 20\u201321). The Next Generation Network in 2030: Applications, Services, and Enabling Technologies. Proceedings of the 2021 8th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI), Semarang, Indonesia.","DOI":"10.23919\/EECSI53397.2021.9624241"},{"key":"ref_29","first-page":"149","article-title":"An extensive empirical evaluation of classifier ensembles for intrusion detection task","volume":"32","author":"Tama","year":"2017","journal-title":"Comput. Syst. Sci. Eng."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1007\/s12243-017-0566-7","article-title":"Securing wireless sensor networks for improved performance in cloud-based environments","volume":"72","author":"Farooqi","year":"2017","journal-title":"Ann. Telecommun."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1016\/j.comnet.2014.11.008","article-title":"Security, privacy and trust in Internet of Things: The road ahead","volume":"76","author":"Sicari","year":"2015","journal-title":"Comput. Netw."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"2481","DOI":"10.1007\/s11276-014-0761-7","article-title":"Security of the Internet of Things: Perspectives and challenges","volume":"20","author":"Jing","year":"2014","journal-title":"Wirel. Netw."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"12667","DOI":"10.1007\/s00500-021-06067-8","article-title":"Ensemble classification for intrusion detection via feature extraction based on deep Learning","volume":"25","author":"Yousefnezhad","year":"2021","journal-title":"Soft Comput."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1016\/j.future.2021.03.024","article-title":"Multi-dimensional feature fusion and stacking ensemble mechanism for network intrusion detection","volume":"122","author":"Zhang","year":"2021","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"24120","DOI":"10.1109\/ACCESS.2020.2969428","article-title":"An enhanced anomaly detection in web traffic using a stack of classifier ensemble","volume":"8","author":"Tama","year":"2020","journal-title":"IEEE Access"},{"key":"ref_36","first-page":"389","article-title":"A two-stage classifier approach using reptree algorithm for network intrusion detection","volume":"8","author":"Belouch","year":"2017","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Liu, L., and Lai, S. (2006, January 22\u201324). ALOHA-based anti-collision algorithms used in RFID system. Proceedings of the 2006 International Conference on Wireless Communications, Networking and Mobile Computing, Wuhan, China.","DOI":"10.1109\/WiCOM.2006.342"},{"key":"ref_38","first-page":"467","article-title":"Enhance intrusion detection in computer networks based on deep extreme learning machine","volume":"66","author":"Khan","year":"2021","journal-title":"Comput. Mater. Contin."},{"key":"ref_39","first-page":"1","article-title":"An Intrusion Detection Method Based on Decision Tree-Recursive Feature Elimination in Ensemble Learning","volume":"2020","author":"Lian","year":"2020","journal-title":"Math. Probl. Eng."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"82512","DOI":"10.1109\/ACCESS.2019.2923640","article-title":"An Adaptive Ensemble Machine Learning Model for Intrusion Detection","volume":"7","author":"Gao","year":"2019","journal-title":"IEEE Access"},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"437","DOI":"10.1007\/s11277-021-09139-y","article-title":"Detection and Multi-Class Classification of Intrusion in Software Defined Networks Using Stacked Auto-Encoders and CICIDS2017 Dataset","volume":"123","author":"Choobdar","year":"2022","journal-title":"Wirel. Pers. Commun."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"77039","DOI":"10.1109\/ACCESS.2022.3188635","article-title":"A Hybrid Deep Learning Approach for Bottleneck Detection in IoT","volume":"10","author":"Sattari","year":"2022","journal-title":"IEEE Access"},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"100435","DOI":"10.1016\/j.iot.2021.100435","article-title":"Ensemble Detection Model for IoT IDS","volume":"16","author":"Alhowaide","year":"2021","journal-title":"Internet Things"},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"2191","DOI":"10.1016\/j.procs.2020.03.271","article-title":"Attribute Selection and Ensemble Classifier based Novel Approach to Intrusion Detection System","volume":"167","author":"Dua","year":"2020","journal-title":"Procedia Comput. Sci."},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Das, S., Mahfouz, A.M., Venugopal, D., and Shiva, S. (2019, January 22\u201326). DDoS Intrusion Detection Through Machine Learning Ensemble. Proceedings of the 2019 IEEE 19th International Conference on Software Quality, Reliability and Security Companion (QRS-C), Sofia, Bulgaria.","DOI":"10.1109\/QRS-C.2019.00090"},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Otoum, S., Kantarci, B., and Mouftah, H.T. (2020, January 7\u201311). A Novel Ensemble Method for Advanced Intrusion Detection in Wireless Sensor Networks. Proceedings of the 2020 IEEE International Conference on Communications (ICC), Dublin, Ireland.","DOI":"10.1109\/ICC40277.2020.9149413"},{"key":"ref_47","unstructured":"Chen, W., Wang, Z., Zhong, Y., Han, D., Duan, C., Yin, X., Yang, J., and Shi, X. (2021, January 17\u201321). ADSIM: Network anomaly detection via similarity-aware heterogeneous ensemble learning. Proceedings of the 2021 IFIP\/IEEE International Symposium on Integrated Network Management (IM), Virtual."},{"key":"ref_48","doi-asserted-by":"crossref","unstructured":"Karna, I., Madam, A., Deokule, C., Adhao, R., and Pachghare, V. (2021, January 2\u20134). Ensemble-Based Filter Feature Selection Technique for Building Flow-Based IDS. Proceedings of the 2021 2nd International Conference on Advances in Computing, Communication, Embedded and Secure Systems (ACCESS), Ernakulum, India.","DOI":"10.1109\/ACCESS51619.2021.9563297"},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s40537-021-00498-8","article-title":"A novel time efficient learning-based approach for smart intrusion detection system","volume":"8","author":"Seth","year":"2021","journal-title":"J. Big Data"},{"key":"ref_50","doi-asserted-by":"crossref","unstructured":"Kabir, M.H., Rajib, M.S., Rahman, A.S.M.T., Rahman, M.M., and Dey, S.K. (2022, January 24\u201326). Network Intrusion Detection Using UNSW-NB15 Dataset: Stacking Machine Learning Based Approach. Proceedings of the 2022 International Conference on Advancement in Electrical and Electronic Engineering (ICAEEE), Gazipur, Bangladesh.","DOI":"10.1109\/ICAEEE54957.2022.9836404"},{"key":"ref_51","first-page":"102601","article-title":"A comparison of two hybrid ensemble techniques for network anomaly detection in spark distributed environment","volume":"55","author":"Kaur","year":"2020","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_52","first-page":"433","article-title":"Detecting intrusions in computer network traffic with machine learning approaches","volume":"13","author":"Maniriho","year":"2020","journal-title":"Int. J. Intell. Eng. Syst."},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"e7103","DOI":"10.1002\/cpe.7103","article-title":"Network intrusion detection system for Internet of Things based on enhanced flower pollination algorithm and ensemble classifier","volume":"34","author":"Gangula","year":"2022","journal-title":"Concurr. Comput. Pract. Exp."},{"key":"ref_54","first-page":"275","article-title":"OSS-RF: Intrusion Detection Using Optimized Sine Swarm Based Random Forest Classifier on UNSW-NB15 Dataset","volume":"14","author":"Brittorameshkumar","year":"2022","journal-title":"IJTPE"},{"key":"ref_55","first-page":"6719","article-title":"Emerging Trends in Blockchain Technology and Applications: A Review and Outlook","volume":"34","author":"Gad","year":"2022","journal-title":"J. King Saud Univ. Comput. Inf. Sci."},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s13677-022-00353-y","article-title":"A systematic review of the purposes of Blockchain and fog computing integration: Classification and open issues","volume":"11","author":"Alzoubi","year":"2022","journal-title":"J. Cloud Comput."},{"key":"ref_57","first-page":"5079","article-title":"Feature selection algorithms in intrusion detection system: A survey","volume":"12","author":"Maza","year":"2018","journal-title":"KSII Trans. Internet Inf. Syst. (TIIS)"},{"key":"ref_58","unstructured":"Awujoola, O.J., Ogwueleka, F.N., Irhebhude, M.E., and Misra, S. (2021). Artificial Intelligence for Cyber Security: Methods, Issues and Possible Horizons or Opportunities, Springer."},{"key":"ref_59","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s13634-022-00871-6","article-title":"Intrusion detection system combined enhanced random forest with SMOTE algorithm","volume":"2022","author":"Wu","year":"2022","journal-title":"EURASIP J. Adv. Signal Process."},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"1296","DOI":"10.1002\/sec.403","article-title":"New class-dependent feature transformation for intrusion detection systems","volume":"5","author":"Mohammadi","year":"2012","journal-title":"Secur. Commun. Netw."},{"key":"ref_61","doi-asserted-by":"crossref","unstructured":"Kumar, M., Hanumanthappa, M., and Kumar, T.V.S. (2012, January 9\u201311). Intrusion Detection System using decision tree algorithm. Proceedings of the 2012 IEEE 14th International Conference on Communication Technology, Chengdu, China.","DOI":"10.1109\/ICCT.2012.6511281"},{"key":"ref_62","doi-asserted-by":"crossref","unstructured":"Kiflay, A.Z., Tsokanos, A., and Kirner, R. (2021, January 11\u201315). A Network Intrusion Detection System Using Ensemble Machine Learning. Proceedings of the 2021 International Carnahan Conference on Security Technology (ICCST), Hatfield, UK.","DOI":"10.1109\/ICCST49569.2021.9717397"},{"key":"ref_63","first-page":"725","article-title":"Intrusion detection System using Random Forest Approach","volume":"13","author":"Yogesh","year":"2022","journal-title":"Turk. J. Comput. Math. Educ. (TURCOMAT)"},{"key":"ref_64","unstructured":"Negandhi, P., Trivedi, Y., and Mangrulkar, R. (2019). Emerging Research in Computing, Information, Communication and Applications, Springer."},{"key":"ref_65","doi-asserted-by":"crossref","unstructured":"Dhaliwal, S.S., Nahid, A.A., and Abbas, R. (2018). Effective intrusion detection system using XGBoost. Information, 9.","DOI":"10.3390\/info9070149"},{"key":"ref_66","doi-asserted-by":"crossref","first-page":"7427","DOI":"10.1007\/s12652-022-04449-w","article-title":"A practical intrusion detection system based on denoising autoencoder and LightGBM classifier with improved detection performance","volume":"14","author":"Ayubkhan","year":"2022","journal-title":"J. Ambient. Intell. Humaniz. Comput."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/24\/1\/127\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T21:42:07Z","timestamp":1760132527000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/24\/1\/127"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,26]]},"references-count":66,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024,1]]}},"alternative-id":["s24010127"],"URL":"https:\/\/doi.org\/10.3390\/s24010127","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,12,26]]}}}