{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,6]],"date-time":"2026-02-06T19:27:46Z","timestamp":1770406066062,"version":"3.49.0"},"reference-count":58,"publisher":"PeerJ","license":[{"start":{"date-parts":[[2026,2,6]],"date-time":"2026-02-06T00:00:00Z","timestamp":1770336000000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Spanish Government, Cybersecurity Institute of Spain, INCIBE"},{"DOI":"10.13039\/501100000780","name":"European Union","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100000780","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"abstract":"<jats:p>The widespread adoption of Internet of Things (IoT) technology has driven significant advancements in fields such as agriculture, manufacturing, industry, and transportation. However, the highly interconnected and resource-constrained nature of IoT ecosystems makes them particularly vulnerable to cyberattacks. Although AI-based intrusion detection systems provide an effective protection, their deployment on IoT devices is hindered due to limited memory, processing power, and storage capacity. One strategy for addressing these limitations is dimensionality reduction, consisting of the removal of redundant or irrelevant features in order to reduce computational demands without compromising model accuracy. This work analyses the effectiveness of various dimensionality reduction approaches for the development of efficient and lightweight Random Forest models for anomaly detection in IoT environments. Among the considered methods, Permutation Feature Importance consistently produced the most balanced models, reducing inference time, model size, and RAM usage, while slightly enhancing predictive performance. Furthermore, the feasibility of model deployment in real-world environments was assessed through experiments on a resource-constrained Raspberry Pi device.<\/jats:p>","DOI":"10.7717\/peerj-cs.3553","type":"journal-article","created":{"date-parts":[[2026,2,6]],"date-time":"2026-02-06T08:32:05Z","timestamp":1770366725000},"page":"e3553","source":"Crossref","is-referenced-by-count":0,"title":["A comparative study of dimensionality reduction techniques for intrusion detection in IoT networks"],"prefix":"10.7717","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9326-0578","authenticated-orcid":true,"given":"Jos\u00e9 Carlos","family":"Garc\u00eda-Merino","sequence":"first","affiliation":[{"name":"Sistemas de Comunicaci\u00f3n y Control, Universidad Nacional de Educaci\u00f3n a Distancia, Madrid, Spain"},{"name":"Programa de Doctorado en Sistemas Inteligentes, Escuela Internacional de Doctorado UNED (EIDUNED), Universidad Nacional de Educaci\u00f3n a Distancia, Madrid, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2779-4042","authenticated-orcid":true,"given":"Llanos","family":"Tobarra","sequence":"additional","affiliation":[{"name":"Sistemas de Comunicaci\u00f3n y Control, Universidad Nacional de Educaci\u00f3n a Distancia, Madrid, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5181-0199","authenticated-orcid":true,"given":"Antonio","family":"Robles-G\u00f3mez","sequence":"additional","affiliation":[{"name":"Sistemas de Comunicaci\u00f3n y Control, Universidad Nacional de Educaci\u00f3n a Distancia, Madrid, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4089-9538","authenticated-orcid":true,"given":"Rafael","family":"Pastor-Vargas","sequence":"additional","affiliation":[{"name":"Sistemas de Comunicaci\u00f3n y Control, Universidad Nacional de Educaci\u00f3n a Distancia, Madrid, Spain"}]},{"given":"Jo\u00e3o","family":"Sarraipa","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Universidade Nova de Lisboa, Lisbon, Portugal"}]}],"member":"4443","published-online":{"date-parts":[[2026,2,6]]},"reference":[{"issue":"1","key":"10.7717\/peerj-cs.3553\/ref-1","doi-asserted-by":"publisher","first-page":"4126536","DOI":"10.1155\/2022\/4126536","article-title":"Ensemble feature selection in binary machine learning classification: a novel application of the evaluation based on distance from average solution (EDAS) method","volume":"2022","author":"Abellana","year":"2022","journal-title":"Mathematical Problems in Engineering"},{"issue":"3","key":"10.7717\/peerj-cs.3553\/ref-2","doi-asserted-by":"publisher","first-page":"e437","DOI":"10.7717\/peerj-cs.437","article-title":"Classification model for accuracy and intrusion detection using machine learning approach","volume":"7","author":"Agarwal","year":"2021","journal-title":"PeerJ Computer Science"},{"issue":"2","key":"10.7717\/peerj-cs.3553\/ref-3","doi-asserted-by":"publisher","first-page":"e13726","DOI":"10.1111\/exsy.13726","article-title":"A comprehensive survey on deep learning-based intrusion detection systems in Internet of Things (IoT)","volume":"42","author":"Al-Haija","year":"2025","journal-title":"Expert Systems"},{"issue":"9","key":"10.7717\/peerj-cs.3553\/ref-4","doi-asserted-by":"publisher","first-page":"109401","DOI":"10.1016\/j.compag.2024.109401","article-title":"Cyber security in smart agriculture: threat types, current status, and future trends","volume":"226","author":"Alahe","year":"2024","journal-title":"Computers and Electronics in Agriculture"},{"issue":"10","key":"10.7717\/peerj-cs.3553\/ref-5","doi-asserted-by":"publisher","first-page":"5015","DOI":"10.3390\/app12105015","article-title":"IoT intrusion detection using machine learning with a novel high performing feature selection method","volume":"12","author":"Albulayhi","year":"2022","journal-title":"Applied Sciences"},{"key":"10.7717\/peerj-cs.3553\/ref-6","doi-asserted-by":"crossref","DOI":"10.1109\/IEMTRONICS51293.2020.9216388","article-title":"PCA, random-forest and pearson correlation for dimensionality reduction in IoT IDS","author":"Alhowaide","year":"2020"},{"issue":"10","key":"10.7717\/peerj-cs.3553\/ref-7","doi-asserted-by":"publisher","first-page":"1340","DOI":"10.1093\/bioinformatics\/btq134","article-title":"Permutation importance: a corrected feature importance measure","volume":"26","author":"Altmann","year":"2010","journal-title":"Bioinformatics"},{"issue":"2","key":"10.7717\/peerj-cs.3553\/ref-8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3587255","article-title":"Understanding indicators of compromise against cyber-attacks in industrial control systems: a security perspective","volume":"7","author":"Asiri","year":"2023","journal-title":"ACM Transactions on Cyber-Physical Systems"},{"issue":"5","key":"10.7717\/peerj-cs.3553\/ref-9","doi-asserted-by":"publisher","first-page":"100389","DOI":"10.1016\/j.cosrev.2021.100389","article-title":"A systematic review on deep learning approaches for IoT security","volume":"40","author":"Aversano","year":"2021","journal-title":"Computer Science Review"},{"key":"10.7717\/peerj-cs.3553\/ref-10","doi-asserted-by":"publisher","first-page":"8846","DOI":"10.1109\/access.2024.3353055","article-title":"Building a cloud-IDS by hybrid bio-inspired feature selection algorithms along with random forest model","volume":"12","author":"Bakro","year":"2024","journal-title":"IEEE Access"},{"key":"10.7717\/peerj-cs.3553\/ref-11","doi-asserted-by":"publisher","first-page":"104284","DOI":"10.1016\/j.cose.2024.104284","article-title":"Cybersecurity in smart agriculture: a systematic literature review","volume":"150","author":"Campoverde-Molina","year":"2024","journal-title":"Computers & Security"},{"issue":"5","key":"10.7717\/peerj-cs.3553\/ref-12","doi-asserted-by":"publisher","first-page":"e12553","DOI":"10.1111\/exsy.12553","article-title":"Ensemble feature selection in medical datasets: combining filter, wrapper, and embedded feature selection results","volume":"37","author":"Chen","year":"2020","journal-title":"Expert Systems"},{"key":"10.7717\/peerj-cs.3553\/ref-13","doi-asserted-by":"crossref","DOI":"10.1109\/VLSI-SoC53125.2021.9606986","article-title":"Adaptive random forests for energy-efficient inference on microcontrollers","author":"Daghero","year":"2021"},{"issue":"3","key":"10.7717\/peerj-cs.3553\/ref-14","doi-asserted-by":"publisher","first-page":"322","DOI":"10.1016\/j.knosys.2014.08.013","article-title":"Feature selection by multi-objective optimisation: application to network anomaly detection by hierarchical self-organising maps","volume":"71","author":"De la Hoz","year":"2014","journal-title":"Knowledge-Based Systems"},{"key":"10.7717\/peerj-cs.3553\/ref-15","first-page":"459","article-title":"Smart village: an IoT based digital transformation","author":"Degada","year":"2021"},{"issue":"1","key":"10.7717\/peerj-cs.3553\/ref-16","doi-asserted-by":"publisher","first-page":"13642","DOI":"10.1038\/s41598-025-98604-w","article-title":"A new intrusion detection method using ensemble classification and feature selection","volume":"15","author":"Doost","year":"2025","journal-title":"Scientific Reports"},{"key":"10.7717\/peerj-cs.3553\/ref-17","doi-asserted-by":"publisher","first-page":"123448\u2013123464","DOI":"10.1109\/access.2021.3109081","article-title":"IoT intrusion detection system using deep learning and enhanced transient search optimization","volume":"9","author":"Fatani","year":"2021a","journal-title":"IEEE Access"},{"issue":"1","key":"10.7717\/peerj-cs.3553\/ref-18","doi-asserted-by":"publisher","first-page":"140","DOI":"10.3390\/s22010140","article-title":"Advanced feature extraction and selection approach using deep learning and Aquila optimizer for IoT intrusion detection system","volume":"22","author":"Fatani","year":"2021b","journal-title":"Sensors"},{"issue":"10","key":"10.7717\/peerj-cs.3553\/ref-19","doi-asserted-by":"publisher","first-page":"368","DOI":"10.3390\/fi16100368","article-title":"Towards ensemble feature selection for lightweight intrusion detection in resource-constrained IoT devices","volume":"16","author":"Fatima","year":"2024","journal-title":"Future Internet"},{"key":"10.7717\/peerj-cs.3553\/ref-20","doi-asserted-by":"crossref","DOI":"10.1109\/SmartNets58706.2023.10216096","article-title":"Li-IDS: an approach towards a lightweight IDS for resource-constrained IoT","author":"Fatima","year":"2023"},{"key":"10.7717\/peerj-cs.3553\/ref-21","doi-asserted-by":"publisher","first-page":"40281","DOI":"10.1109\/access.2022.3165809","article-title":"Edge-IIoTset: a new comprehensive realistic cyber security dataset of IoT and IIoT applications for centralized and federated learning","volume":"10","author":"Ferrag","year":"2022","journal-title":"IEEE Access"},{"issue":"3","key":"10.7717\/peerj-cs.3553\/ref-22","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1109\/jas.2021.1004344","article-title":"Cyber security intrusion detection for agriculture 4.0: machine learning-based solutions, datasets, and future directions","volume":"9","author":"Ferrag","year":"2021","journal-title":"IEEE\/CAA Journal of Automatica Sinica"},{"issue":"3","key":"10.7717\/peerj-cs.3553\/ref-23","doi-asserted-by":"publisher","first-page":"102702","DOI":"10.1016\/j.artmed.2023.102702","article-title":"A systematic and comprehensive review and investigation of intelligent IoT-based healthcare systems in rural societies and governments","volume":"146","author":"Ge","year":"2023","journal-title":"Artificial Intelligence in Medicine"},{"issue":"10","key":"10.7717\/peerj-cs.3553\/ref-24","doi-asserted-by":"publisher","first-page":"3744","DOI":"10.3390\/s22103744","article-title":"Intrusion detection in Internet of Things systems: a review on design approaches leveraging multi-access edge computing, machine learning, and datasets","volume":"22","author":"Gyamfi","year":"2022","journal-title":"Sensors"},{"key":"10.7717\/peerj-cs.3553\/ref-25","doi-asserted-by":"crossref","DOI":"10.1109\/IPCCC47392.2019.8958734","article-title":"Efficient attack correlation and identification of attack scenarios based on network-motifs","author":"Haas","year":"2019"},{"key":"10.7717\/peerj-cs.3553\/ref-26","doi-asserted-by":"publisher","first-page":"102448","DOI":"10.1016\/j.cose.2021.102448","article-title":"An effective genetic algorithm-based feature selection method for intrusion detection systems","volume":"110","author":"Halim","year":"2021","journal-title":"Computers & Security"},{"issue":"4","key":"10.7717\/peerj-cs.3553\/ref-27","doi-asserted-by":"publisher","first-page":"571","DOI":"10.3390\/math12040571","article-title":"Next\u2013generation intrusion detection for IoT EVCS: integrating CNN, LSTM, and GRU models","volume":"12","author":"Kilichev","year":"2024","journal-title":"Mathematics"},{"key":"10.7717\/peerj-cs.3553\/ref-28","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1016\/j.ijcip.2019.01.001","article-title":"Cyber security challenges for IoT-based smart grid networks","volume":"25","author":"Kimani","year":"2019","journal-title":"International Journal of Critical Infrastructure Protection"},{"issue":"7","key":"10.7717\/peerj-cs.3553\/ref-29","doi-asserted-by":"publisher","first-page":"779","DOI":"10.1016\/j.future.2019.05.041","article-title":"Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: bot-IoT dataset","volume":"100","author":"Koroniotis","year":"2019","journal-title":"Future Generation Computer Systems"},{"key":"10.7717\/peerj-cs.3553\/ref-30","doi-asserted-by":"publisher","first-page":"65520","DOI":"10.1109\/access.2020.2985089","article-title":"IMPACT: impersonation attack detection via edge computing using deep autoencoder and feature abstraction","volume":"8","author":"Lee","year":"2020","journal-title":"IEEE Access"},{"issue":"1","key":"10.7717\/peerj-cs.3553\/ref-31","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1186\/s40537-024-00892-y","article-title":"Optimizing IoT intrusion detection system: feature selection versus feature extraction in machine learning","volume":"11","author":"Li","year":"2024","journal-title":"Journal of Big Data"},{"issue":"1","key":"10.7717\/peerj-cs.3553\/ref-32","doi-asserted-by":"publisher","first-page":"6634811","DOI":"10.1155\/2021\/6634811","article-title":"Explainable artificial intelligence (XAI) to enhance trust management in intrusion detection systems using decision tree model","volume":"2021","author":"Mahbooba","year":"2021","journal-title":"Complexity"},{"issue":"1","key":"10.7717\/peerj-cs.3553\/ref-33","doi-asserted-by":"publisher","first-page":"109860","DOI":"10.1016\/j.compeleceng.2024.109860","article-title":"Optimizing random forests to detect intrusion in the Internet of Things","volume":"120","author":"Majidian","year":"2024","journal-title":"Computers and Electrical Engineering"},{"issue":"4","key":"10.7717\/peerj-cs.3553\/ref-34","doi-asserted-by":"publisher","first-page":"621","DOI":"10.1007\/s11227-025-07107-y","article-title":"Deep learning inference optimisation for IoT: Conv2D-ReLU-BN layer fusion and quantisation","volume":"81","author":"Mestre","year":"2025","journal-title":"The Journal of Supercomputing"},{"issue":"18","key":"10.7717\/peerj-cs.3553\/ref-35","doi-asserted-by":"publisher","first-page":"e2152","DOI":"10.7717\/peerj-cs.2152","article-title":"An intrusion detection system based on convolution neural network","volume":"10","author":"Mo","year":"2024","journal-title":"PeerJ Computer Science"},{"issue":"4","key":"10.7717\/peerj-cs.3553\/ref-36","doi-asserted-by":"publisher","first-page":"102983","DOI":"10.1016\/j.jnca.2021.102983","article-title":"A comprehensive survey and taxonomy of the SVM-based intrusion detection systems","volume":"178","author":"Mohammadi","year":"2021","journal-title":"Journal of Network and Computer Applications"},{"issue":"15","key":"10.7717\/peerj-cs.3553\/ref-37","doi-asserted-by":"publisher","first-page":"23615","DOI":"10.1007\/s11042-023-14795-2","article-title":"An efficient network intrusion detection model for IoT security using K-NN classifier and feature selection","volume":"82","author":"Mohy-Eddine","year":"2023","journal-title":"Multimedia Tools and Applications"},{"key":"10.7717\/peerj-cs.3553\/ref-38","volume-title":"Interpretable machine learning","author":"Molnar","year":"2022","edition":"2"},{"issue":"4","key":"10.7717\/peerj-cs.3553\/ref-39","doi-asserted-by":"publisher","first-page":"e2616","DOI":"10.7717\/peerj-cs.2616","article-title":"Machine learning models and dimensionality reduction for improving the android malware detection","volume":"10","author":"Mor\u00e1n","year":"2024","journal-title":"PeerJ Computer Science"},{"key":"10.7717\/peerj-cs.3553\/ref-40","doi-asserted-by":"publisher","first-page":"102994","DOI":"10.1016\/j.scs.2021.102994","article-title":"A new distributed architecture for evaluating AI-based security systems at the edge: network TON_IoT datasets","volume":"72","author":"Moustafa","year":"2021","journal-title":"Sustainable Cities and Society"},{"issue":"15","key":"10.7717\/peerj-cs.3553\/ref-41","doi-asserted-by":"publisher","first-page":"4231","DOI":"10.3390\/s20154231","article-title":"A systematic review of IoT solutions for smart farming","volume":"20","author":"Navarro","year":"2020","journal-title":"Sensors"},{"issue":"1","key":"10.7717\/peerj-cs.3553\/ref-42","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1007\/s43926-025-00119-3","article-title":"IoT and AI for smart agriculture in resource-constrained environments: challenges, opportunities and solutions","volume":"5","author":"Nawaz","year":"2025","journal-title":"Discover Internet of Things"},{"issue":"13","key":"10.7717\/peerj-cs.3553\/ref-43","doi-asserted-by":"publisher","first-page":"5941","DOI":"10.3390\/s23135941","article-title":"CICIoT2023: a real-time dataset and benchmark for large-scale attacks in IoT environment","volume":"23","author":"Neto","year":"2023","journal-title":"Sensors"},{"issue":"2","key":"10.7717\/peerj-cs.3553\/ref-44","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1016\/j.icte.2021.04.012","article-title":"Feature selection for intrusion detection system in Internet-of-Things (IoT)","volume":"7","author":"Nimbalkar","year":"2021","journal-title":"ICT Express"},{"issue":"5","key":"10.7717\/peerj-cs.3553\/ref-45","doi-asserted-by":"publisher","first-page":"637","DOI":"10.22266\/ijies2023.1031.54","article-title":"Feature selection for intrusion detection using independence level test with an exhaustive approach","volume":"16","author":"Nururrahmah","year":"2023","journal-title":"International Journal of Intelligent Engineering & Systems"},{"key":"10.7717\/peerj-cs.3553\/ref-46","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4842-4294-0","volume-title":"Cyber operations: building, defending, and attacking modern computer networks","author":"O\u2019Leary","year":"2019"},{"issue":"1","key":"10.7717\/peerj-cs.3553\/ref-47","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1109\/icodt262145.2024.10740248","article-title":"Host-based intrusion detection using signature-based and AI-driven anomaly detection methods","volume":"50","author":"Panagiotou","year":"2021","journal-title":"Information & Security: An International Journal"},{"issue":"7","key":"10.7717\/peerj-cs.3553\/ref-48","doi-asserted-by":"publisher","first-page":"111125","DOI":"10.1016\/j.asoc.2023.111125","article-title":"Cost based random forest classifier for intrusion detection system in internet of things","volume":"151","author":"Pramilarani","year":"2024","journal-title":"Applied Soft Computing"},{"issue":"1","key":"10.7717\/peerj-cs.3553\/ref-49","doi-asserted-by":"publisher","first-page":"100082","DOI":"10.1016\/j.csa.2024.100082","article-title":"A survey on intrusion detection system in IoT networks","volume":"3","author":"Rahman","year":"2025","journal-title":"Cyber Security and Applications"},{"key":"10.7717\/peerj-cs.3553\/ref-50","first-page":"0562","article-title":"An intrusion detection system against DDoS attacks in IoT networks","author":"Roopak","year":"2020"},{"issue":"8","key":"10.7717\/peerj-cs.3553\/ref-51","doi-asserted-by":"publisher","first-page":"1833","DOI":"10.3390\/s19081833","article-title":"State-of-the-art internet of things in protected agriculture","volume":"19","author":"Shi","year":"2019","journal-title":"Sensors"},{"issue":"1","key":"10.7717\/peerj-cs.3553\/ref-52","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1109\/jproc.2022.3226481","article-title":"Efficient acceleration of deep learning inference on resource-constrained edge devices: a review","volume":"111","author":"Shuvo","year":"2022","journal-title":"Proceedings of the IEEE"},{"key":"10.7717\/peerj-cs.3553\/ref-53","first-page":"227","article-title":"Feature selection methods for IoT intrusion detection system: comparative study","author":"Singh","year":"2023"},{"issue":"1","key":"10.7717\/peerj-cs.3553\/ref-54","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/1471-2105-8-25","article-title":"Bias in random forest variable importance measures: illustrations, sources and a solution","volume":"8","author":"Strobl","year":"2007","journal-title":"BMC Bioinformatics"},{"issue":"3","key":"10.7717\/peerj-cs.3553\/ref-55","doi-asserted-by":"publisher","first-page":"1279","DOI":"10.3390\/s23031279","article-title":"A survey on optimization techniques for edge artificial intelligence (AI)","volume":"23","author":"Surianarayanan","year":"2023","journal-title":"Sensors"},{"issue":"6","key":"10.7717\/peerj-cs.3553\/ref-56","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1016\/j.comcom.2020.05.048","article-title":"An effective feature engineering for DNN using hybrid PCA-GWO for intrusion detection in IoMT architecture","volume":"160","author":"Swarna Priya","year":"2020","journal-title":"Computer Communications"},{"issue":"2","key":"10.7717\/peerj-cs.3553\/ref-57","doi-asserted-by":"publisher","first-page":"939","DOI":"10.1109\/jiot.2021.3111624","article-title":"A comprehensive survey on training acceleration for large machine learning models in IoT","volume":"9","author":"Wang","year":"2021","journal-title":"IEEE Internet of Things Journal"},{"issue":"20","key":"10.7717\/peerj-cs.3553\/ref-58","doi-asserted-by":"publisher","first-page":"4289","DOI":"10.3390\/electronics12204289","article-title":"IoT intrusion detection system based on machine learning","volume":"12","author":"Xu","year":"2023","journal-title":"Electronics"}],"container-title":["PeerJ Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/peerj.com\/articles\/cs-3553.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/peerj.com\/articles\/cs-3553.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/peerj.com\/articles\/cs-3553.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/peerj.com\/articles\/cs-3553.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,6]],"date-time":"2026-02-06T08:32:10Z","timestamp":1770366730000},"score":1,"resource":{"primary":{"URL":"https:\/\/peerj.com\/articles\/cs-3553"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,6]]},"references-count":58,"alternative-id":["10.7717\/peerj-cs.3553"],"URL":"https:\/\/doi.org\/10.7717\/peerj-cs.3553","archive":["CLOCKSS","LOCKSS","Portico"],"relation":{},"ISSN":["2376-5992"],"issn-type":[{"value":"2376-5992","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,6]]},"article-number":"e3553"}}