{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,3]],"date-time":"2025-10-03T08:41:41Z","timestamp":1759480901551,"version":"build-2065373602"},"reference-count":61,"publisher":"MDPI AG","issue":"10","license":[{"start":{"date-parts":[[2025,10,3]],"date-time":"2025-10-03T00:00:00Z","timestamp":1759449600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Independent fund project of Shaanxi Provincial Intelligent New Criminal Technology Practical Application Research Center","award":["SXZHXJ202202"],"award-info":[{"award-number":["SXZHXJ202202"]}]}],"content-domain":{"domain":["www.mdpi.com"],"crossmark-restriction":true},"short-container-title":["Symmetry"],"abstract":"<jats:p>Terminal forensics in large mobile networks is a vital activity for identifying compromised devices and analyzing malicious actions. In contrast, the study described here begins with the domain of terminal forensics as the primary focus, rather than the threat itself. This paper proposes a new multi-criteria decision-making (MCDM) model that integrates complex picture fuzzy sets (CPFS) with the combinative distance-based assessment (CODAS), referred to throughout as complex picture fuzzy CODAS (CPF-CODAS). The aim is to assist in forensic analysis for detecting mobile botnet command and control (C&amp;C) systems. The CPF-CODAS model accounts for the uncertainty, hesitation, and complex numerical values involved in expert decision-making, using degrees of membership as positive, neutral, and negative values. An illustrative forensic case study is constructed where three mobile devices are evaluated by three cybersecurity professionals based on six key parameters related to botnet activity. The results demonstrate that the model can effectively distinguish suspicious devices and support the use of the CPF-CODAS approach in terminal forensics of mobile networks. The robustness, symmetry, and advantages of this model over existing MCDM methods are confirmed through sensitivity and comparison analyses. In conclusion, this paper introduces a novel probabilistic decision-support tool that digital forensic specialists can incorporate into their workflow to proactively identify and prevent actions of mobile botnet C&amp;C servers.<\/jats:p>","DOI":"10.3390\/sym17101637","type":"journal-article","created":{"date-parts":[[2025,10,3]],"date-time":"2025-10-03T07:57:27Z","timestamp":1759478247000},"page":"1637","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Terminal Forensics in Mobile Botnet Command and Control Detection Using a Novel Complex Picture Fuzzy CODAS Algorithm"],"prefix":"10.3390","volume":"17","author":[{"given":"Geng","family":"Niu","sequence":"first","affiliation":[{"name":"Department of Information Technology, Shaanxi Police College, Xi\u2019an 710021, China"},{"name":"Shaanxi Provincial Key Laboratory of Intelligent Policing, Xi\u2019an 710021, China"},{"name":"Key Laboratory of Digital Forensics and Analysis of Shaanxi Higher Education Institutes, Xi\u2019an 710021, China"}]},{"given":"Fei","family":"Zhang","sequence":"additional","affiliation":[{"name":"Department of Information Technology, Shaanxi Police College, Xi\u2019an 710021, China"},{"name":"Shaanxi Provincial Key Laboratory of Intelligent Policing, Xi\u2019an 710021, China"},{"name":"Key Laboratory of Digital Forensics and Analysis of Shaanxi Higher Education Institutes, Xi\u2019an 710021, China"}]},{"given":"Muyuan","family":"Guo","sequence":"additional","affiliation":[{"name":"Department of Information Technology, Shaanxi Police College, Xi\u2019an 710021, China"},{"name":"Shaanxi Provincial Key Laboratory of Intelligent Policing, Xi\u2019an 710021, China"},{"name":"Key Laboratory of Digital Forensics and Analysis of Shaanxi Higher Education Institutes, Xi\u2019an 710021, China"}]}],"member":"1968","published-online":{"date-parts":[[2025,10,3]]},"reference":[{"key":"ref_1","first-page":"3815","article-title":"Efficient Usage of Web Forensics, Disk Forensics and Email Forensics in Successful Investigation of Cyber Crime","volume":"16","author":"Pandey","year":"2024","journal-title":"Int. J. Inf. Technol."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"103195","DOI":"10.1016\/j.cose.2023.103195","article-title":"A Lightweight Deep Learning Framework for Botnet Detecting at the IoT Edge","volume":"129","author":"Wei","year":"2023","journal-title":"Comput. Secur."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"38947","DOI":"10.1109\/ACCESS.2018.2846740","article-title":"BotDet: A System for Real Time Botnet Command and Control Traffic Detection","volume":"6","author":"Ghafir","year":"2018","journal-title":"IEEE Access"},{"key":"ref_4","first-page":"1","article-title":"Design and Evaluation of a Lightweight Intrusion Detection System for Resource-Constrained IoT Devices Using Fuzzy Logic and Swarm Intelligence","volume":"15","author":"Saputro","year":"2025","journal-title":"Q. J. Emerg. Sci. Trends Technol."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"116","DOI":"10.1016\/j.scijus.2022.11.004","article-title":"Digital Evidence Strategies for Digital Forensic Science Examinations","volume":"63","author":"Horsman","year":"2023","journal-title":"Sci. Justice"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"662","DOI":"10.3390\/jcp3040031","article-title":"Cyberattacks in Smart Grids: Challenges and Solving the Multi-Criteria Decision-Making for Cybersecurity Options, Including Ones That Incorporate Artificial Intelligence, Using an Analytical Hierarchy Process","volume":"3","author":"Bouramdane","year":"2023","journal-title":"J. Cybersecur. Priv."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"338","DOI":"10.1016\/S0019-9958(65)90241-X","article-title":"Fuzzy Sets","volume":"8","author":"Zadeh","year":"1965","journal-title":"Inf. Control"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1016\/S0165-0114(86)80034-3","article-title":"Intuitionistic Fuzzy Sets","volume":"20","author":"Atanassov","year":"1986","journal-title":"Fuzzy Sets Syst."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Yager, R.R. (2013, January 24\u201328). Pythagorean Fuzzy Subsets. Proceedings of the 2013 Joint IFSA World Congress and NAFIPS Annual Meeting (IFSA\/NAFIPS), Edmonton, AB, Canada.","DOI":"10.1109\/IFSA-NAFIPS.2013.6608375"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"1222","DOI":"10.1109\/TFUZZ.2016.2604005","article-title":"Generalized Orthopair Fuzzy Sets","volume":"25","author":"Yager","year":"2016","journal-title":"IEEE Trans. Fuzzy Syst."},{"key":"ref_11","first-page":"409","article-title":"Picture Fuzzy Sets-First Results. Part 1, in: Seminar","volume":"30","author":"Cuong","year":"2013","journal-title":"Neuro-Fuzzy Syst. Appl."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"102902","DOI":"10.1016\/j.inffus.2024.102902","article-title":"A Novel Bi-Objective R-Mathematical Programming Method for Risk Group Decision Making","volume":"118","author":"Tang","year":"2025","journal-title":"Inf. Fusion"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"117034","DOI":"10.1016\/j.eswa.2022.117034","article-title":"A New Integrated Multi-Attribute Decision-Making Approach for Mobile Medical App Evaluation under q-Rung Orthopair Fuzzy Environment","volume":"200","author":"Tang","year":"2022","journal-title":"Expert Syst. Appl."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"226","DOI":"10.1007\/s40314-020-01251-2","article-title":"Decision-Making Model under Complex Picture Fuzzy Hamacher Aggregation Operators","volume":"39","author":"Akram","year":"2020","journal-title":"Comput. Appl. Math."},{"key":"ref_15","first-page":"25","article-title":"A New Combinative Distance-Based Assessment (CODAS) Method for Multi-Criteria Decision-Making","volume":"50","author":"Zavadskas","year":"2016","journal-title":"Econ. Comput. Econ. Cybern. Stud. Res."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"09544062251327546","DOI":"10.1177\/09544062251327546","article-title":"WASPAS Based Taguchi Approach to Reduce the Energy Consumption of a Typical Office Building","volume":"239","author":"Arif","year":"2025","journal-title":"Proc. Inst. Mech. Eng. Part C J. Mech. Eng. Sci."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"124612","DOI":"10.1016\/j.eswa.2024.124612","article-title":"Complete Ranking for Generalized Trapezoidal Fuzzy Numbers and Its Application in Supplier Selection Using the GTrF-CoCoSo Approach","volume":"255","author":"Bihari","year":"2024","journal-title":"Expert Syst. Appl."},{"key":"ref_18","first-page":"1","article-title":"A Fuzzy TOPSIS Method for Assessment Blockchain Technology Strategies","volume":"1","author":"Abdelhafeez","year":"2024","journal-title":"Inf. Sci. Appl."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"e37872","DOI":"10.1016\/j.heliyon.2024.e37872","article-title":"Analysis of Renewable Energy Resources Based on Frank Power Aggregation Operators and EDAS Method for Circular Bipolar Complex Fuzzy Uncertainty","volume":"10","author":"Ali","year":"2024","journal-title":"Heliyon"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"108270","DOI":"10.1016\/j.comcom.2025.108270","article-title":"Mitigating IoT Botnet Attacks: An Early-Stage Explainable Network-Based Anomaly Detection Approach","volume":"241","author":"Diaf","year":"2025","journal-title":"Comput. Commun."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"2458","DOI":"10.1109\/TNSE.2025.3548411","article-title":"A Lightweight Method for Botnet Detection in Internet of Things Environment","volume":"12","author":"Ma","year":"2025","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Drabent, K., Janowski, R., and Mongay Batalla, J. (2024). How to Circumvent and Beat the Ransomware in Android Operating System\u2014A Case Study of Locker.CB!Tr. Electronics, 13.","DOI":"10.3390\/electronics13112212"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Gelgi, M., Guan, Y., Arunachala, S., Samba Siva Rao, M., and Dragoni, N. (2024). Systematic Literature Review of IoT Botnet DDOS Attacks and Evaluation of Detection Techniques. Sensors, 24.","DOI":"10.3390\/s24113571"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Qian, K., Yang, H., Li, R., Chen, W., Luo, X., and Yin, L. (2024). Distributed Detection of Large-Scale Internet of Things Botnets Based on Graph Partitioning. Appl. Sci., 14.","DOI":"10.3390\/app14041615"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Shin, D.-H., Han, S.-J., Kim, Y.-B., and Euom, I.-C. (2024). Research on Digital Forensics Analyzing Heterogeneous Internet of Things Incident Investigations. Appl. Sci., 14.","DOI":"10.3390\/app14031128"},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"and Gupta, N. (2024, January 23\u201324). Fuzzy Based Mamdani Inference System for Botnet Detection. Proceedings of the 2024 1st International Conference on Advanced Computing and Emerging Technologies (ACET), Ghaziabad, India.","DOI":"10.1109\/ACET61898.2024.10730059"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"18352","DOI":"10.1109\/ACCESS.2022.3148140","article-title":"Ranking Security of IoT-Based Smart Home Consumer Devices","volume":"10","author":"Allifah","year":"2022","journal-title":"IEEE Access"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"660","DOI":"10.1177\/0734242X19899729","article-title":"A Novel Intuitionistic Fuzzy MCDM-Based CODAS Approach for Locating an Authorized Dismantling Center: A Case Study of Istanbul","volume":"38","author":"Karagoz","year":"2020","journal-title":"Waste Manag. Res."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1186\/s40854-023-00588-x","article-title":"A Comprehensive MCDM Assessment for Economic Data: Success Analysis of Maximum Normalization, CODAS, and Fuzzy Approaches","volume":"10","year":"2024","journal-title":"Financ. Innov."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"500","DOI":"10.1007\/s43621-025-01069-0","article-title":"Multi-Model MCDM Framework for Sustainable Renewable Energy Selection in India: Integrating CRITIC-EDAS-CODAS-CoCoSo","volume":"6","author":"Goswami","year":"2025","journal-title":"Discov. Sustain."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"47","DOI":"10.33765\/thate.15.2.1","article-title":"ANALYSIS OF CLIMATE CHANGE PERFORMANCE OF G7 COUNTRIES BASED ON AHP-CODAS METHODS","volume":"15","year":"2025","journal-title":"Holist. Approach Environ."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"380","DOI":"10.1504\/IJPMB.2025.144330","article-title":"Analysis of Factors Affecting Industrial Performance Using Fuzzy CODAS Method","volume":"19","author":"Singh","year":"2025","journal-title":"Int. J. Process. Manag. Benchmarking"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"43751","DOI":"10.1109\/ACCESS.2022.3169133","article-title":"Cybersecurity Risk Assessment of Industrial Control Systems Based on Order-\u03b1 Divergence Measures Under an Interval-Valued Intuitionistic Fuzzy Environment","volume":"10","author":"Guo","year":"2022","journal-title":"IEEE Access"},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"P\u00e9rez-Dominguez, L., Dur\u00e1n, S.-N.A., L\u00f3pez, R.R., P\u00e9rez-Olguin, I.J.C., Luviano-Cruz, D., and G\u00f3mez, J.A.H. (2021). Assessment Urban Transport Service and Pythagorean Fuzzy Sets CODAS Method: A Case of Study of Ciudad Ju\u00e1rez. Sustainability, 13.","DOI":"10.3390\/su13031281"},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Farid, H.M.A., Bouye, M., Riaz, M., and Jamil, N. (2023). Fermatean Fuzzy CODAS Approach with Topology and Its Application to Sustainable Supplier Selection. Symmetry, 15.","DOI":"10.3390\/sym15020433"},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"759","DOI":"10.15388\/21-INFOR458","article-title":"Novel Entropy Measure Definitions and Their Uses in a Modified Combinative Distance-Based Assessment (CODAS) Method Under Picture Fuzzy Environment","volume":"32","year":"2021","journal-title":"Informatica"},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Radulescu, C.Z., and Radulescu, M. (2024). A Hybrid Group Multi-Criteria Approach Based on SAW, TOPSIS, VIKOR, and COPRAS Methods for Complex IoT Selection Problems. Electronics, 13.","DOI":"10.3390\/electronics13040789"},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Nguyen, T.-L., Nguyen, P.-H., Pham, H.-A., Nguyen, T.-G., Nguyen, D.-T., Tran, T.-H., Le, H.-C., and Phung, H.-T. (2022). A Novel Integrating Data Envelopment Analysis and Spherical Fuzzy MCDM Approach for Sustainable Supplier Selection in Steel Industry. Mathematics, 10.","DOI":"10.3390\/math10111897"},{"key":"ref_39","first-page":"409","article-title":"Picture Fuzzy Sets","volume":"30","year":"2014","journal-title":"J. Comput. Sci. Cybern."},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Choudhury, A., Kaushik, K., Kumar, V., and Singh, B.K. (2025). Applications of Multi Criteria Decision Making Methods in Cyber Security. Cyber-Physical Systems Security: A Multi-Disciplinary Approach, Springer Nature.","DOI":"10.1007\/978-981-97-5734-3"},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"347","DOI":"10.1007\/s11416-022-00421-6","article-title":"Detection of Suspicious Internet Traffic Based on Differential Analysis and Logical Rules","volume":"18","author":"Mejri","year":"2022","journal-title":"J. Comput. Virol. Hacking Tech."},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Mazhar, T., Irfan, H.M., Khan, S., Haq, I., Ullah, I., Iqbal, M., and Hamam, H. (2023). Analysis of Cyber Security Attacks and Its Solutions for the Smart Grid Using Machine Learning and Blockchain Methods. Future Internet, 15.","DOI":"10.3390\/fi15020083"},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Shinan, K., Alsubhi, K., Alzahrani, A., and Ashraf, M.U. (2021). Machine Learning-Based Botnet Detection in Software-Defined Network: A Systematic Review. Symmetry, 13.","DOI":"10.3390\/sym13050866"},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Koumar, J., Pesek, J., Jerabek, K., and \u010cejka, T. (2025, January 12\u201316). Towards Building Network Outlier Detection System for Network Traffic Monitoring. Proceedings of the NOMS 2025-2025 IEEE Network Operations and Management Symposium, Honolulu, HI, USA.","DOI":"10.1109\/NOMS57970.2025.11073727"},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"4465","DOI":"10.1109\/TSE.2021.3119980","article-title":"Android Custom Permissions Demystified: A Comprehensive Security Evaluation","volume":"48","author":"Li","year":"2022","journal-title":"IEEE Trans. Softw. Eng."},{"key":"ref_46","first-page":"100007","article-title":"A Survey on Recent Advances in Distributed Filtering over Sensor Networks Subject to Communication Constraints","volume":"2","author":"Wang","year":"2023","journal-title":"Int. J. Netw. Dyn. Intell."},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"6200121","DOI":"10.1155\/2022\/6200121","article-title":"Cyber Security of Smart Metering Infrastructure Using Median Absolute Deviation Methodology","volume":"2022","author":"Prabhakar","year":"2022","journal-title":"Secur. Commun. Netw."},{"key":"ref_48","doi-asserted-by":"crossref","unstructured":"Park, J., Khanal, S., Zhao, K., and Byun, K. (2024). Remote Sensing of Chlorophyll-a and Water Quality over Inland Lakes: How to Alleviate Geo-Location Error and Temporal Discrepancy in Model Training. Remote Sens., 16.","DOI":"10.3390\/rs16152761"},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Lopata, A., Gudas, S., Butleris, R., Rud\u017eionis, V., \u017dioba, L., Veitait\u0117, I., Dilijonas, D., Gri\u0161ius, E., and Zwitserloot, M. (2022). Financial Data Anomaly Discovery Using Behavioral Change Indicators. Electronics, 11.","DOI":"10.3390\/electronics11101598"},{"key":"ref_50","doi-asserted-by":"crossref","unstructured":"Ahmed, M., Alasad, Q., Yuan, J.-S., and Alawad, M. (2024). Re-Evaluating Deep Learning Attacks and Defenses in Cybersecurity Systems. Big Data Cogn. Comput., 8.","DOI":"10.3390\/bdcc8120191"},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"61137","DOI":"10.1109\/ACCESS.2024.3392019","article-title":"T-Spherical Fuzzy-CRITIC-WASPAS Model for the Evaluation of Cooperative Intelligent Transportation System Scenarios","volume":"12","author":"Anjum","year":"2024","journal-title":"IEEE Access"},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"65","DOI":"10.15388\/23-INFOR537","article-title":"Selection of Suitable Cloud Vendors for Health Centre: A Personalized Decision Framework with Fermatean Fuzzy Set, LOPCOW, and CoCoSo","volume":"35","author":"Dhruva","year":"2024","journal-title":"Informatica"},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"121134","DOI":"10.1016\/j.eswa.2023.121134","article-title":"A Novel Interval-Valued Intuitionistic Fuzzy CRITIC-TOPSIS Methodefinitiondology: An Application for Transportation Mode Selection Problem for a Glass Production Company","volume":"235","author":"Duman","year":"2024","journal-title":"Expert Syst. Appl."},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"5077","DOI":"10.1007\/s00500-023-07927-1","article-title":"Modified EDAS Method for MCDM in Robotic Agrifarming with Picture Fuzzy Soft Dombi Aggregation Operators","volume":"27","author":"Dhumras","year":"2023","journal-title":"Soft Comput."},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"7041","DOI":"10.1007\/s00521-018-3521-2","article-title":"An Approach toward Decision-Making and Medical Diagnosis Problems Using the Concept of Spherical Fuzzy Sets","volume":"31","author":"Mahmood","year":"2019","journal-title":"Neural Comput. Appl."},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"7925","DOI":"10.1002\/int.22614","article-title":"Frank Aggregation Operators and Analytic Hierarchy Process Based on Interval-valued Picture Fuzzy Sets and Their Applications","volume":"36","author":"Mahmood","year":"2021","journal-title":"Int. J. Intell. Syst."},{"key":"ref_57","first-page":"44","article-title":"An Intelligent Algorithm for Evaluating Martial Arts Teaching Skills Based on Complex Picture Fuzzy Dombi Aggregation Operator","volume":"3","author":"Nazeer","year":"2024","journal-title":"J. Innov. Res. Math. Comput. Sci."},{"key":"ref_58","doi-asserted-by":"crossref","first-page":"79","DOI":"10.59400\/jam.v1i2.79","article-title":"A Novel Decision-Making Approach Based on Interval-Valued T-Spherical Fuzzy Information with Applications","volume":"1","author":"Nazeer","year":"2023","journal-title":"J. AppliedMath"},{"key":"ref_59","doi-asserted-by":"crossref","first-page":"76","DOI":"10.31181\/sems31202537i","article-title":"Circular Intuitionistic Fuzzy EDAS Approach: A New Paradigm for Decision-Making in the Automotive Industry Sector","volume":"3","author":"Imran","year":"2025","journal-title":"Spectr. Eng. Manag. Sci."},{"key":"ref_60","first-page":"23","article-title":"Multi-Criteria Personnel Evaluation and Selection Using an Objective Pairwise Adjusted Ratio Analysis (OPARA)","volume":"58","author":"Mehdi","year":"2024","journal-title":"Econ. Comput. Econ. Cybern. Stud. Res."},{"key":"ref_61","doi-asserted-by":"crossref","unstructured":"Keshavarz-Ghorabaee, M., Amiri, M., Zavadskas, E.K., Turskis, Z., and Antucheviciene, J. (2021). Determination of Objective Weights Using a New Method Based on the Removal Effects of Criteria (MEREC). Symmetry, 13.","DOI":"10.3390\/sym13040525"}],"container-title":["Symmetry"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-8994\/17\/10\/1637\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,3]],"date-time":"2025-10-03T08:08:10Z","timestamp":1759478890000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-8994\/17\/10\/1637"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,3]]},"references-count":61,"journal-issue":{"issue":"10","published-online":{"date-parts":[[2025,10]]}},"alternative-id":["sym17101637"],"URL":"https:\/\/doi.org\/10.3390\/sym17101637","relation":{},"ISSN":["2073-8994"],"issn-type":[{"value":"2073-8994","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,3]]}}}