{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,21]],"date-time":"2026-05-21T02:40:47Z","timestamp":1779331247489,"version":"3.51.4"},"reference-count":67,"publisher":"MDPI AG","issue":"15","license":[{"start":{"date-parts":[[2024,7,27]],"date-time":"2024-07-27T00:00:00Z","timestamp":1722038400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"the Ministry of Education of the Republic of Korea and the National Research Foundation of Korea","award":["NRF-2022S1A5C2A03093690"],"award-info":[{"award-number":["NRF-2022S1A5C2A03093690"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Cyber-security challenges are growing globally and are specifically targeting critical infrastructure. Conventional countermeasure practices are insufficient to provide proactive threat hunting. In this study, random forest (RF), support vector machine (SVM), multi-layer perceptron (MLP), AdaBoost, and hybrid models were applied for proactive threat hunting. By automating detection, the hybrid machine learning-based method improves threat hunting and frees up time to concentrate on high-risk warnings. These models are implemented on approach devices, access, and principal servers. The efficacy of several models, including hybrid approaches, is assessed. The findings of these studies are that the AdaBoost model provides the highest efficiency, with a 0.98 ROC area and 95.7% accuracy, detecting 146 threats with 29 false positives. Similarly, the random forest model achieved a 0.98 area under the ROC curve and a 95% overall accuracy, accurately identifying 132 threats and reducing false positives to 31. The hybrid model exhibited promise with a 0.89 ROC area and 94.9% accuracy, though it requires further refinement to lower its false positive rate. This research emphasizes the role of machine learning in improving cyber-security, particularly for critical infrastructure. Advanced ML techniques enhance threat detection and response times, and their continuous learning ability ensures adaptability to new threats.<\/jats:p>","DOI":"10.3390\/s24154888","type":"journal-article","created":{"date-parts":[[2024,7,29]],"date-time":"2024-07-29T12:27:43Z","timestamp":1722256063000},"page":"4888","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":22,"title":["Proactive Threat Hunting in Critical Infrastructure Protection through Hybrid Machine Learning Algorithm Application"],"prefix":"10.3390","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-6830-2777","authenticated-orcid":false,"given":"Ali","family":"Shan","sequence":"first","affiliation":[{"name":"Center of Security Convergence & eGovernance, Inha University, Incheon 22212, Republic of Korea"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6730-2770","authenticated-orcid":false,"given":"Seunghwan","family":"Myeong","sequence":"additional","affiliation":[{"name":"Department of Public Administration, Inha University, Incheon 22212, Republic of Korea"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"1968","published-online":{"date-parts":[[2024,7,27]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"307","DOI":"10.13166\/jms\/143848","article-title":"Increase in the Internetization of economic processes, economic, pandemic and climate crisis as well as cybersecurity as key challenges and philosophical paradigms for the development of the 21st century civilization","volume":"47","author":"Prokopowicz","year":"2021","journal-title":"J. Mod. Sci."},{"key":"ref_2","first-page":"137","article-title":"The Exponential Rise of Cybercrime","volume":"5","author":"Ruposky","year":"2022","journal-title":"Univ. Cent. Fla. Dep. Leg. Stud. Law J."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"2157","DOI":"10.1007\/s40747-021-00409-7","article-title":"Online social networks security and privacy: Comprehensive review and analysis","volume":"7","author":"Jain","year":"2021","journal-title":"Complex Intell. Syst."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"1333","DOI":"10.3390\/electronics12061333","article-title":"A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions","volume":"12","author":"Aslan","year":"2023","journal-title":"Electronics"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Khadidos, A.O., AlKubaisy, Z.M., Khadidos, A.O., Alyoubi, K.H., Alshareef, A.M., and Ragab, M. (2023). Binary Hunter\u2013Prey Optimization with Machine Learning\u2014Based Cybersecurity Solution on Internet of Things Environment. Sensors, 23.","DOI":"10.3390\/s23167207"},{"key":"ref_6","first-page":"51","article-title":"Machine Learning and Big Data analytics for Cybersecurity Threat Detection: A Holistic review of techniques and case studies","volume":"5","author":"Nassar","year":"2021","journal-title":"J. Artif. Intell. Mach. Learn. Manag."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"2299","DOI":"10.1109\/COMST.2023.3299519","article-title":"A Survey on Threat Hunting in Enterprise Networks","volume":"25","author":"Nour","year":"2023","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Khordadpour, P. (2023). Toward Efficient Protecting Cyber-Physical Systems with Cyber Threat Hunting and Intelligence. TechRxiv.","DOI":"10.36227\/techrxiv.22009226.v1"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Rabbani, M., Wang, Y., Khoshkangini, R., Jelodar, H., Zhao, R., Bagheri Baba Ahmadi, S., and Ayobi, S. (2021). A review on machine learning approaches for network malicious behavior detection in emerging technologies. Entropy, 23.","DOI":"10.3390\/e23050529"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Bhardwaj, A., Kaushik, K., Alomari, A., Alsirhani, A., Alshahrani, M.M., and Bharany, S. (2022). Bth: Behavior-based structured threat hunting framework to analyze and detect advanced adversaries. Electronics, 11.","DOI":"10.3390\/electronics11192992"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1109\/TBDATA.2019.2933039","article-title":"Special Issue on Big Data Applications in Cyber Security and Threat Intelligence\u2013Part 1","volume":"5","author":"Choo","year":"2019","journal-title":"IEEE Trans. Big Data"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Kuhl, M.E., Sudit, M., Kistner, J., and Costantini, K. (2007, January 9\u201312). Cyber attack modeling and simulation for network security analysis. Proceedings of the 2007 Winter Simulation Conference, Washington, DC, USA.","DOI":"10.1109\/WSC.2007.4419720"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Farraj, A., Hammad, E., and Kundur, D. (2017, January 21). Impact of Cyber Attacks on Data Integrity in Transient Stability Control. Proceedings of the 2nd Workshop on Cyber-Physical Security and Resilience in Smart Grids, Pittsburgh, PA, USA.","DOI":"10.1145\/3055386.3055387"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Cheng, M., Crow, M., and Erbacher, R.F. (2013, January 8\u201310). Vulnerability analysis of a smart grid with monitoring and control system. Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop, Oak Ridge, TN, USA.","DOI":"10.1145\/2459976.2460042"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Jeffrey, N., Tan, Q., and Villar, J.R. (2023). A review of anomaly detection strategies to detect threats to cyber-physical systems. Electronics, 12.","DOI":"10.3390\/electronics12153283"},{"key":"ref_16","unstructured":"Kim, I., Kim, D., Kim, B., Choi, Y., Yoon, S., Oh, J., and Jang, J. (2009, January 15\u201318). A case study of unknown attack detection against Zero-day worm in the honeynet environment. Proceedings of the 2009 11th International Conference on Advanced Communication Technology, Gangwon, Republic of Korea."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Aparicio-Navarro, F.J., Kyriakopoulos, K.G., Gong, Y., Parish, D.J., and Chambers, J.A. (2017). Using Pattern-of-Life as Contextual Information for Anomaly-Based Intrusion Detection Systems, IEEE Access.","DOI":"10.1109\/ACCESS.2017.2762162"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Aishwarya, R., and Malliga, S. (2014, January 10\u201312). Intrusion detection system-An efficient way to thwart against Dos\/DDos attack in the cloud environment. Proceedings of the 2014 International Conference on Recent Trends in Information Technology, Chennai, India.","DOI":"10.1109\/ICRTIT.2014.6996163"},{"key":"ref_19","first-page":"1049","article-title":"An intrusion detection system for cyber attacks in wireless networked control systems","volume":"65","author":"Li","year":"2017","journal-title":"IEEE Trans. Circuits Syst. II Express Briefs"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Bhadre, P., and Gothawal, D. (2014, January 19\u201320). Detection and blocking of spammers using SPOT detection algorithm. Proceedings of the 2014 First International Conference on Networks & Soft Computing (ICNSC2014), Guntur, India.","DOI":"10.1109\/CNSC.2014.6906679"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Bottazzi, G., Casalicchio, E., Cingolani, D., Marturana, F., and Piu, M. (2015, January 26\u201328). MP-shield: A framework for phishing detection in mobile devices. Proceedings of the 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing, Liverpool, UK.","DOI":"10.1109\/CIT\/IUCC\/DASC\/PICOM.2015.293"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Chen, C.-M., Hsiao, H.-W., Yang, P.-Y., and Ou, Y.-H. (2013, January 19\u201320). Defending malicious attacks in cyber physical systems. Proceedings of the 2013 IEEE 1st International Conference on Cyber-Physical Systems, Networks, and Applications (CPSNA), Taipei, China.","DOI":"10.1109\/CPSNA.2013.6614240"},{"key":"ref_23","unstructured":"Trajkovic, L., Wong, S., Triphati, S.K., and Lin, K.-J. (2010, January 16\u201318). In Proceedings of the International Computer Symposium (ICS 2010), Tainan, China."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Chonka, A., and Abawajy, J. (2012, January 26\u201328). Detecting and mitigating HX-DoS attacks against cloud web services. Proceedings of the 2012 15th International Conference on Network-Based Information Systems, Melbourne, VIC, Australia.","DOI":"10.1109\/NBiS.2012.146"},{"key":"ref_25","unstructured":"Devi, B.K., Preetha, G., Selvaram, G., and Shalinie, S.M. (2014, January 10\u201312). An impact analysis: Real time DDoS attack detection and mitigation using machine learning. Proceedings of the 2014 International Conference on Recent Trends in Information Technology, Chennai, India."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Eslahi, M., Hashim, H., and Tahir, N. (2013, January 7\u20139). An efficient false alarm reduction approach in HTTP-based botnet detection. Proceedings of the 2013 IEEE Symposium on Computers & Informatics (ISCI), Langkawi, Malaysia.","DOI":"10.1109\/ISCI.2013.6612403"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1016\/j.techsoc.2010.07.001","article-title":"An overview of social engineering malware: Trends, tactics, and implications","volume":"32","author":"Abraham","year":"2010","journal-title":"Technol. Soc."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"819","DOI":"10.1007\/s10207-023-00768-x","article-title":"A comprehensive survey of phishing: Mediums, intended targets, attack and defence techniques and a novel taxonomy","volume":"23","author":"Goenka","year":"2024","journal-title":"Int. J. Inf. Secur."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"252","DOI":"10.1080\/19393555.2021.1995537","article-title":"A systematic review of detection and prevention techniques of SQL injection attacks","volume":"32","author":"Nasereddin","year":"2023","journal-title":"Inf. Secur.J. A Glob. Perspect."},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Alarfaj, F.K., and Khan, N.A. (2023). Enhancing the performance of SQL injection attack detection through probabilistic neural networks. Appl. Sci., 13.","DOI":"10.3390\/app13074365"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Gupta, A., Gupta, U., Kumar, A., and Bhushan, B. (2023, January 29\u201330). Analysing Security Threats And Elevating Healthcare Privacy For A Resilient Future. Proceedings of the 2023 International Conference on Artificial Intelligence for Innovations in Healthcare Industries (ICAIIHI), Raipur, India.","DOI":"10.1109\/ICAIIHI57871.2023.10489079"},{"key":"ref_32","unstructured":"Okigui, H.H. (2023). An Analysis of Cyber-Security Policy Compliance in Organisations, Cape Peninsula University of Technology."},{"key":"ref_33","first-page":"1047","article-title":"Cloud Computing Threats and Risks: Uncertainty and Unconrollability in the Risk Socety","volume":"7","author":"Bhadra","year":"2020","journal-title":"Electron. J."},{"key":"ref_34","unstructured":"Bhadra, S. (2020). Securing Cloudy Cyberspace: An Overview of Crimes, Threats and Risks. Int. Res. J. Eng. Technol., 7."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"34","DOI":"10.61841\/turcomat.v15i1.14393","article-title":"From Detection to Prediction: AI-powered SIEM for Proactive Threat Hunting and Risk Mitigation","volume":"15","author":"Pulyala","year":"2024","journal-title":"Turk. J. Comput. Math. Educ. (TURCOMAT)"},{"key":"ref_36","first-page":"106","article-title":"Beyond Defense: Proactive Approaches to Disaster Recovery and Threat Intelligence in Modern Enterprises","volume":"15","author":"Tahmasebi","year":"2024","journal-title":"J. Inf. Secur."},{"key":"ref_37","first-page":"51","article-title":"Cyber Threats to Critical Infrastructure: Assessing Vulnerabilities Across Key Sectors","volume":"2","author":"George","year":"2024","journal-title":"Partn. Univers. Int. Innov. J."},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Kumar, P., Javeed, D., Kumar, R., and Islam, A.N. (2024). Blockchain and explainable AI for enhanced decision making in cyber threat detection. Softw. Pract. Exp., 54.","DOI":"10.1002\/spe.3319"},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"8049","DOI":"10.1038\/s41598-023-35198-1","article-title":"A holistic and proactive approach to forecasting cyber threats","volume":"13","author":"Almahmoud","year":"2023","journal-title":"Sci. Rep."},{"key":"ref_40","first-page":"869","article-title":"A new proactive feature selection model based on the enhanced optimization algorithms to detect DRDoS attacks","volume":"12","author":"Nuiaa","year":"2022","journal-title":"Int. J. Electr. Comput. Eng."},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Gautam, A.S., Gahlot, Y., and Kamat, P. (2020). Hacker forum exploit and classification for proactive cyber threat intelligence. Inventive Computation Technologies, Springer.","DOI":"10.1007\/978-3-030-33846-6_32"},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"1337","DOI":"10.1145\/3649218","article-title":"A Survey on Cyber Resilience: Key Strategies, Research Challenges, and Future Directions","volume":"56","author":"AlHidaifi","year":"2024","journal-title":"ACM Comput. Surv."},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Awotunde, J.B., Folorunso, S.O., Imoize, A.L., Odunuga, J.O., Lee, C.C., Li, C.T., and Do, D.T. (2023). An ensemble tree-based model for intrusion detection in industrial internet of things networks. Appl. Sci., 13.","DOI":"10.3390\/app13042479"},{"key":"ref_44","unstructured":"Ravi, R., and Shekhar, B. (2015). Sql Vulnerability Prevention in Cybercrime Using Dynamic Evaluation of Shell and Remote File Injection Attacks. Int. J. Adv. Res. Biol. Ecol. Sci. Technol."},{"key":"ref_45","unstructured":"Krishnan, S. (2018, July 10). A Hybrid Approach to Threat Modelling. Available online: https:\/\/blogs.sans.org\/appsecstreetfighter\/files\/2017\/03\/A-Hybrid-Approach-to-Threat-Modelling.pdf."},{"key":"ref_46","unstructured":"Mushore, K. (2015). Security Concerns in Implementing Service Oriented Architecture: A Game Theoretical Analysis, University of Johannesburg."},{"key":"ref_47","unstructured":"Arora, A. (2019). Towards Safeguarding Users Against Phishing and Ransomware Attacks, The University of Alabama at Birmingham."},{"key":"ref_48","doi-asserted-by":"crossref","unstructured":"Yau, S.S., Buduru, A.B., and Nagaraja, V. (July, January 27). Protecting critical cloud infrastructures with predictive capability. Proceedings of the 2015 IEEE 8th International Conference on Cloud Computing, New York, NY, USA.","DOI":"10.1109\/CLOUD.2015.165"},{"key":"ref_49","first-page":"42","article-title":"Information Security in modern way of education system in Pakistan","volume":"3","author":"Jafri","year":"2015","journal-title":"Int. J. Technol. Res."},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1016\/S1353-4858(20)30056-8","article-title":"Hybrid intrusion detection system using machine learning","volume":"2020","author":"Meryem","year":"2020","journal-title":"Netw. Secur."},{"key":"ref_51","unstructured":"Shaukat, S.U. (2018). Optimum Parameter Machine Learning Classification and Prediction of Internet of Things (IoT) Malwares Using Static malware Analysis Techniques, University of Salford."},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"Rathod, T., Jadav, N.K., Tanwar, S., Polkowsk, Z., Yamsa, N., Sharm, R., Alqahtan, F., and Gafa, A. (2023). AI and Blockchain-Based Secure Data Dissemination Architecture for IoT-Enabled Critical Infrastructure. Sensors, 23.","DOI":"10.3390\/s23218928"},{"key":"ref_53","doi-asserted-by":"crossref","unstructured":"Fatani, A., Dahou, A., Abd Elaziz, M., Al-Qaness, M.A., Lu, S., Alfadhli, S.A., and Alresheedi, S.S. (2023). Enhancing intrusion detection systems for IoT and cloud environments using a growth optimizer algorithm and conventional neural networks. Sensors, 23.","DOI":"10.3390\/s23094430"},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"106273","DOI":"10.1016\/j.infsof.2020.106273","article-title":"Detection of malicious software by analyzing the behavioral artifacts using machine learning algorithms","volume":"121","author":"Singh","year":"2020","journal-title":"Inf. Softw. Technol."},{"key":"ref_55","unstructured":"Kiourkoulis, S. (2020). DDoS datasets: Use of Machine Learning to Analyse Intrusion Detection Performance. [Master\u2019s Thesis, Lule\u00e5 University of Technology]."},{"key":"ref_56","unstructured":"Alfawareh, M.D. (2020). Cyber Threat Intelligence Using Deep Learning to Detect Abnormal Network Behavior. [Ph.D. Thesis, Princess Sumaya University for Technology]."},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"261","DOI":"10.1515\/math-2017-0029","article-title":"Learnheuristics: Hybridizing metaheuristics with machine learning for optimization with dynamic inputs","volume":"15","author":"Calvet","year":"2017","journal-title":"Open Math."},{"key":"ref_58","doi-asserted-by":"crossref","first-page":"119208","DOI":"10.1016\/j.conbuildmat.2020.119208","article-title":"Multi-objective optimization of concrete mixture proportions using machine learning and metaheuristic algorithms","volume":"253","author":"Zhang","year":"2020","journal-title":"Constr. Build. Mater."},{"key":"ref_59","doi-asserted-by":"crossref","first-page":"10421","DOI":"10.1109\/ACCESS.2018.2801792","article-title":"A bi-objective hyper-heuristic support vector machines for big data cyber-security","volume":"6","author":"Sabar","year":"2018","journal-title":"IEEE Access"},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"9427","DOI":"10.1007\/s00521-019-04453-w","article-title":"A whale optimization algorithm-trained artificial neural network for smart grid cyber intrusion detection","volume":"32","author":"Haghnegahdar","year":"2020","journal-title":"Neural Comput. Appl."},{"key":"ref_61","first-page":"15","article-title":"A survey of cyber security approaches for attack detection prediction and prevention","volume":"12","author":"Ibor","year":"2018","journal-title":"Int. J. Secur. Its Appl."},{"key":"ref_62","doi-asserted-by":"crossref","unstructured":"Balyan, A.K., Ahuja, S., Lilhore, U.K., Sharma, S.K., Manoharan, P., Algarni, A.D., Elmannai, H., and Raahemifar, K. (2022). A hybrid intrusion detection model using ega-pso and improved random forest method. Sensors, 22.","DOI":"10.3390\/s22165986"},{"key":"ref_63","doi-asserted-by":"crossref","first-page":"107168","DOI":"10.1016\/j.comnet.2020.107168","article-title":"New hybrid method for attack detection using combination of evolutionary algorithms, SVM, and ANN","volume":"173","author":"Hosseini","year":"2020","journal-title":"Comput. Netw."},{"key":"ref_64","doi-asserted-by":"crossref","unstructured":"Elnour, M., Meskin, N., and Khan, K.M. (2020, January 24\u201326). Hybrid attack detection framework for industrial control systems using 1D-convolutional neural network and isolation forest. Proceedings of the 2020 IEEE Conference on Control Technology and Applications (CCTA), Montreal, QC, Canada.","DOI":"10.1109\/CCTA41146.2020.9206394"},{"key":"ref_65","doi-asserted-by":"crossref","unstructured":"Alhaidari, F.A., and Al-Dahasi, E.M. (2019, January 3\u20134). New approach to determine DDoS attack patterns on SCADA system using machine learning. Proceedings of the 2019 International conference on computer and information sciences (ICCIS), Sakaka, Saudi Arabia.","DOI":"10.1109\/ICCISci.2019.8716432"},{"key":"ref_66","doi-asserted-by":"crossref","first-page":"107754","DOI":"10.1016\/j.compeleceng.2022.107754","article-title":"Decision tree based user-centric security solution for critical IoT infrastructure","volume":"99","author":"Puthal","year":"2022","journal-title":"Comput. Electr. Eng."},{"key":"ref_67","first-page":"1579","article-title":"A Blockchain-based architecture for enabling cybersecurity in the internet-of-critical infrastructures","volume":"72","author":"Ragab","year":"2022","journal-title":"Comput. Mater. Contin."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/24\/15\/4888\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T15:25:11Z","timestamp":1760109911000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/24\/15\/4888"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,27]]},"references-count":67,"journal-issue":{"issue":"15","published-online":{"date-parts":[[2024,8]]}},"alternative-id":["s24154888"],"URL":"https:\/\/doi.org\/10.3390\/s24154888","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,7,27]]}}}