{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T18:50:22Z","timestamp":1772736622628,"version":"3.50.1"},"reference-count":52,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2023,1,18]],"date-time":"2023-01-18T00:00:00Z","timestamp":1674000000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,18]],"date-time":"2023-01-18T00:00:00Z","timestamp":1674000000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2023,8]]},"DOI":"10.1007\/s10207-023-00661-7","type":"journal-article","created":{"date-parts":[[2023,1,18]],"date-time":"2023-01-18T15:02:45Z","timestamp":1674054165000},"page":"749-762","update-policy":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["P2ADF: a privacy-preserving attack detection framework in fog-IoT environment"],"prefix":"10.1007","volume":"22","author":[{"given":"Jasleen","family":"Kaur","sequence":"first","affiliation":[]},{"given":"Alka","family":"Agrawal","sequence":"additional","affiliation":[]},{"given":"Raees Ahmad","family":"Khan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,1,18]]},"reference":[{"issue":"15","key":"661_CR1","doi-asserted-by":"publisher","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","volume":"54","author":"L Atzori","year":"2010","unstructured":"Atzori, L., Iera, A., Morabito, G.: The Internet of things: a survey. Comput. Netw. 54(15), 2787\u20132805 (2010)","journal-title":"Comput. Netw."},{"key":"661_CR2","doi-asserted-by":"crossref","unstructured":"Atlam, H.F., & Wills, G.B.: IoT security, privacy, safety and ethics. In: Digital twin technologies and smart cities (pp. 123\u2013149). Springer, Cham (2020)","DOI":"10.1007\/978-3-030-18732-3_8"},{"key":"661_CR3","doi-asserted-by":"publisher","first-page":"19293","DOI":"10.1109\/ACCESS.2017.2749422","volume":"5","author":"M Mukherjee","year":"2017","unstructured":"Mukherjee, M., Matam, R., Shu, L., Maglaras, L., Ferrag, M.A., Choudhury, N., Kumar, V.: Security and privacy in fog computing: challenges. IEEE Access 5, 19293\u201319304 (2017)","journal-title":"IEEE Access"},{"key":"661_CR4","doi-asserted-by":"crossref","unstructured":"Kaur, J., Verma, R., Alharbe, N.R., Agrawal, A., & Khan, R.A.: Importance of fog computing in healthcare 4.0. In Fog Computing for Healthcare 4.0 Environments (pp. 79\u2013101). Springer, Cham. (2021)","DOI":"10.1007\/978-3-030-46197-3_4"},{"issue":"5","key":"661_CR5","first-page":"367","volume":"7","author":"R Verma","year":"2019","unstructured":"Verma, R., Chandra, S.: Security and privacy issues in fog driven IoT environment. Int. J. Comput. Sci. Eng. 7(5), 367\u2013370 (2019)","journal-title":"Int. J. Comput. Sci. Eng."},{"key":"661_CR6","doi-asserted-by":"crossref","unstructured":"Lee, K., Kim, D., Ha, D., Rajput, U., & Oh, H.: On security and privacy issues of fog computing supported Internet of Things environment. In 2015 6th International Conference on the Network of the Future (NOF) (pp. 1\u20133). IEEE. (2015)","DOI":"10.1109\/NOF.2015.7333287"},{"issue":"1","key":"661_CR7","doi-asserted-by":"publisher","first-page":"601","DOI":"10.1109\/COMST.2017.2762345","volume":"20","author":"J Ni","year":"2017","unstructured":"Ni, J., Zhang, K., Lin, X., Shen, X.: Securing fog computing for Internet of things applications: challenges and solutions. IEEE Commun. Surv. Tutor. 20(1), 601\u2013628 (2017)","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"1","key":"661_CR8","first-page":"35","volume":"1","author":"V Rathod","year":"2011","unstructured":"Rathod, V., Mehta, M.: Security in wireless sensor network: a survey. Ganpat Univ. J. Eng. Technol. 1(1), 35\u201344 (2011)","journal-title":"Ganpat Univ. J. Eng. Technol."},{"issue":"1","key":"661_CR9","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1109\/TNSM.2019.2941869","volume":"17","author":"K Gu","year":"2019","unstructured":"Gu, K., Wu, N., Yin, B., Jia, W.: Secure data query framework for cloud and fog computing. IEEE Trans. Netw. Serv. Manage. 17(1), 332\u2013345 (2019)","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"key":"661_CR10","doi-asserted-by":"crossref","unstructured":"Raymond, J.F.: Traffic analysis: Protocols, attacks, design issues, and open problems. In: Designing privacy enhancing technologies (pp. 10\u201329). Springer, Berlin, Heidelberg. (2001)","DOI":"10.1007\/3-540-44702-4_2"},{"key":"661_CR11","doi-asserted-by":"publisher","first-page":"153123","DOI":"10.1109\/ACCESS.2019.2947542","volume":"7","author":"KH Abdulkareem","year":"2019","unstructured":"Abdulkareem, K.H., Mohammed, M.A., Gunasekaran, S.S., Al-Mhiqani, M.N., Mutlag, A.A., Mostafa, S.A., Ibrahim, D.A.: A review of fog computing and machine learning: concepts, applications, challenges, and open issues. IEEE Access 7, 153123\u2013153140 (2019)","journal-title":"IEEE Access"},{"issue":"4","key":"661_CR12","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/s40860-019-00081-2","volume":"5","author":"J Yakubu","year":"2019","unstructured":"Yakubu, J., Abdulhamid, S.I.M., Christopher, H.A., Chiroma, H., Abdullahi, M.: Security challenges in fog-computing environment: a systematic appraisal of current developments. J. Reliab. Intell. Environ. 5(4), 209\u2013233 (2019)","journal-title":"J. Reliab. Intell. Environ."},{"issue":"3","key":"661_CR13","doi-asserted-by":"publisher","first-page":"467","DOI":"10.1007\/s10776-020-00491-7","volume":"27","author":"J Kaur","year":"2020","unstructured":"Kaur, J., Agrawal, A., Khan, R.A.: Security issues in fog environment: a systematic literature review. Int. J. Wireless Inf. Netw. 27(3), 467\u2013483 (2020)","journal-title":"Int. J. Wireless Inf. Netw."},{"issue":"1","key":"661_CR14","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1007\/s10776-020-00499-z","volume":"28","author":"R Verma","year":"2021","unstructured":"Verma, R., Chandra, S.: A systematic survey on fog steered IoT: Architecture, prevalent threats and trust models. Int. J. Wireless Inf. Netw. 28(1), 116\u2013133 (2021)","journal-title":"Int. J. Wireless Inf. Netw."},{"key":"661_CR15","doi-asserted-by":"crossref","unstructured":"Kaur, J., Kumar, R., Agrawal, A., & Khan, R.A.: A neutrosophic AHP-based computational technique for security management in a fog computing network. J. Supercomput., Springer. (2022)","DOI":"10.1007\/s11227-022-04674-2"},{"key":"661_CR16","doi-asserted-by":"crossref","unstructured":"Yi, S., Qin, Z., & Li, Q.: Security and privacy issues of fog computing: A survey. In: International conference on wireless algorithms, systems, and applications (pp. 685\u2013695). Springer, Cham. (2015)","DOI":"10.1007\/978-3-319-21837-3_67"},{"key":"661_CR17","doi-asserted-by":"crossref","unstructured":"Puri, V., Kaur, P., & Sachdeva, S.: Data anonymization for privacy protection in fog-enhanced smart homes. In: 2020 6th International Conference on Signal Processing and Communication (ICSC) (pp. 201\u2013205). IEEE. (2020)","DOI":"10.1109\/ICSC48311.2020.9182761"},{"issue":"4","key":"661_CR18","doi-asserted-by":"publisher","first-page":"553","DOI":"10.1007\/s11235-017-0352-x","volume":"67","author":"I Ullah","year":"2018","unstructured":"Ullah, I., Shah, M.A., Wahid, A., Mehmood, A., Song, H.: ESOT: a new privacy model for preserving location privacy in the Internet of Things. Telecommun. Syst. 67(4), 553\u2013575 (2018)","journal-title":"Telecommun. Syst."},{"key":"661_CR19","doi-asserted-by":"crossref","unstructured":"Kaur, J., Agrawal, A., & Khan, R.A.: Encryfuscation: A model for preserving data and location privacy in fog based IoT scenario. Journal of King Saud University-Computer and Information Sciences. (2022)","DOI":"10.1016\/j.jksuci.2022.03.003"},{"key":"661_CR20","doi-asserted-by":"publisher","first-page":"102685","DOI":"10.1016\/j.adhoc.2021.102685","volume":"123","author":"P Sharma","year":"2021","unstructured":"Sharma, P., Jain, S., Gupta, S., Chamola, V.: Role of machine learning and deep learning in securing 5G-driven industrial IoT applications. Ad Hoc Netw. 123, 102685 (2021)","journal-title":"Ad Hoc Netw."},{"key":"661_CR21","doi-asserted-by":"crossref","unstructured":"Lahmadi, A., Duque, A., Heraief, N., & Francq, J.: MitM attack detection in BLE networks using reconstruction and classification machine learning techniques. In: Joint European Conference on Machine Learning and Knowledge Discovery in Databases (pp. 149\u2013164). Springer, Cham. (2020)","DOI":"10.1007\/978-3-030-65965-3_10"},{"issue":"3","key":"661_CR22","first-page":"384","volume":"12","author":"JJ Kponyo","year":"2020","unstructured":"Kponyo, J.J., Agyemang, J.O., Klogo, G.S.: Detecting End-Point (EP) Man-In-The-Middle (MITM) attack based on ARP analysis: a machine learning approach. Int. J. Commun. Netw. Inform. Secur. 12(3), 384\u2013388 (2020)","journal-title":"Int. J. Commun. Netw. Inform. Secur."},{"key":"661_CR23","unstructured":"Ashenafi, A.: A model to detect MiTM attack in IoT networks: a machine learning approach (doctoral dissertation, St. Mary's University). (2022)"},{"key":"661_CR24","doi-asserted-by":"crossref","unstructured":"Zhang, N., Jaafar, F., & Malik, Y.: Low-rate DoS attack detection using PSD based entropy and machine learning. In: 2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)\/2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom) (pp. 59\u201362). IEEE. (2019)","DOI":"10.1109\/CSCloud\/EdgeCom.2019.00020"},{"key":"661_CR25","doi-asserted-by":"crossref","unstructured":"Alsulaiman, L., & Al-Ahmadi, S.: Performance evaluation of machine learning techniques for DOS detection in wireless sensor network. (2021) arXiv preprint arXiv:2104.01963.","DOI":"10.5121\/ijnsa.2021.13202"},{"key":"661_CR26","doi-asserted-by":"crossref","unstructured":"Ullah, I., & Mahmoud, Q. H.: A scheme for generating a dataset for anomalous activity detection in iot networks. In: Canadian Conference on Artificial Intelligence (pp. 508\u2013520). Springer, Cham. (2020)","DOI":"10.1007\/978-3-030-47358-7_52"},{"key":"661_CR27","doi-asserted-by":"publisher","first-page":"102994","DOI":"10.1016\/j.scs.2021.102994","volume":"72","author":"N Moustafa","year":"2021","unstructured":"Moustafa, N.: A new distributed architecture for evaluating AI-based security systems at the edge: Network TON_IoT datasets. Sustain. Cities Soc. 72, 102994 (2021)","journal-title":"Sustain. Cities Soc."},{"issue":"3","key":"661_CR28","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1109\/MPRV.2018.03367731","volume":"17","author":"Y Meidan","year":"2018","unstructured":"Meidan, Y., Bohadana, M., Mathov, Y., Mirsky, Y., Shabtai, A., Breitenbacher, D., Elovici, Y.: N-baiot\u2014network-based detection of iot botnet attacks using deep autoencoders. IEEE Pervasive Comput. 17(3), 12\u201322 (2018)","journal-title":"IEEE Pervasive Comput."},{"key":"661_CR29","doi-asserted-by":"crossref","unstructured":"Moustafa, N., & Slay, J.: UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In: 2015 military communications and information systems conference (MilCIS) (pp. 1\u20136). IEEE. (2015)","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"661_CR30","doi-asserted-by":"crossref","unstructured":"Sharafaldin, I., Lashkari, A. H., Hakak, S., & Ghorbani, A. A.: Developing realistic distributed denial of service (DDoS) attack dataset and taxonomy. In: 2019 International Carnahan Conference on Security Technology (ICCST) (pp. 1\u20138). IEEE. (2019)","DOI":"10.1109\/CCST.2019.8888419"},{"issue":"3","key":"661_CR31","doi-asserted-by":"publisher","first-page":"52","DOI":"10.3390\/technologies9030052","volume":"9","author":"MM Ahsan","year":"2021","unstructured":"Ahsan, M.M., Mahmud, M.P., Saha, P.K., Gupta, K.D., Siddique, Z.: Effect of data scaling methods on machine learning algorithms and model performance. Technologies 9(3), 52 (2021)","journal-title":"Technologies"},{"key":"661_CR32","doi-asserted-by":"crossref","unstructured":"Prasad, A., & Chandra, S.:VMFCVD: An optimized framework to combat volumetric DDoS attacks using machine learning. Arab. J. Sci. Eng., 1\u201319. (2022)","DOI":"10.1007\/s13369-021-06484-9"},{"key":"661_CR33","unstructured":"Chornous, G., Pysanets, K., & Yakovenko, N.: A hybrid approach for feature selection in data mining modeling of credit scoring. In: ICTERI Workshops (pp. 256\u2013269). (2020)"},{"issue":"10","key":"661_CR34","doi-asserted-by":"publisher","first-page":"1348","DOI":"10.1002\/bjs.10895","volume":"105","author":"J Ranstam","year":"2018","unstructured":"Ranstam, J., Cook, J.A.: LASSO regression. J. Br. Surg. 105(10), 1348\u20131348 (2018)","journal-title":"J. Br. Surg."},{"issue":"1","key":"661_CR35","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1145\/507338.507355","volume":"31","author":"IH Witten","year":"2002","unstructured":"Witten, I.H., Frank, E.: Data mining: practical machine learning tools and techniques with Java implementations. ACM SIGMOD Rec. 31(1), 76\u201377 (2002)","journal-title":"ACM SIGMOD Rec."},{"key":"661_CR36","doi-asserted-by":"publisher","first-page":"113842","DOI":"10.1016\/j.eswa.2020.113842","volume":"164","author":"H Zhou","year":"2021","unstructured":"Zhou, H., Zhang, J., Zhou, Y., Guo, X., Ma, Y.: A feature selection algorithm of decision tree based on feature weight. Exp. Syst. Appl. 164, 113842 (2021)","journal-title":"Exp. Syst. Appl."},{"key":"661_CR37","doi-asserted-by":"publisher","first-page":"150960","DOI":"10.1109\/ACCESS.2019.2946980","volume":"7","author":"T Chen","year":"2019","unstructured":"Chen, T., Xu, J., Ying, H., Chen, X., Feng, R., Fang, X., Wu, J.: Prediction of extubation failure for intensive care unit patients using light gradient boosting machine. IEEE Access 7, 150960\u2013150968 (2019)","journal-title":"IEEE Access"},{"key":"661_CR38","doi-asserted-by":"crossref","unstructured":"Schapire, R.E.: Explaining adaboost. In: Empirical inference (pp. 37\u201352). Springer, Berlin, Heidelberg. (2013)","DOI":"10.1007\/978-3-642-41136-6_5"},{"issue":"9","key":"661_CR39","first-page":"955","volume":"53","author":"QQ Wang","year":"2019","unstructured":"Wang, Q.Q., Yu, S.C., Qi, X., Hu, Y.H., Zheng, W.J., Shi, J.X., Yao, H.Y.: Overview of logistic regression model analysis and application. Zhonghua yu fang yi xue za zhi [Chinese journal of preventive medicine] 53(9), 955\u2013960 (2019)","journal-title":"Zhonghua yu fang yi xue za zhi [Chinese journal of preventive medicine]"},{"key":"661_CR40","doi-asserted-by":"publisher","first-page":"240","DOI":"10.1016\/j.future.2022.01.026","volume":"131","author":"H Ding","year":"2022","unstructured":"Ding, H., Chen, L., Dong, L., Fu, Z., Cui, X.: Imbalanced data classification: a KNN and generative adversarial networks-based hybrid approach for intrusion detection. Futur. Gener. Comput. Syst. 131, 240\u2013254 (2022)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"661_CR41","first-page":"1","volume":"1","author":"T Chen","year":"2015","unstructured":"Chen, T., He, T., Benesty, M., Khotilovich, V., Tang, Y., Cho, H., Chen, K.: Xgboost: extreme gradient boosting. R package version 0.4-2 1, 1\u20134 (2015)","journal-title":"R package version 0.4-2"},{"key":"661_CR42","doi-asserted-by":"crossref","unstructured":"Kohavi, R., & John, G.H.: Automatic parameter selection by minimizing estimated error. In: Machine Learning Proceedings 1995 (pp. 304\u2013312). Morgan Kaufmann. (1995)","DOI":"10.1016\/B978-1-55860-377-6.50045-1"},{"key":"661_CR43","doi-asserted-by":"crossref","unstructured":"Feurer, M., & Hutter, F.: Hyperparameter optimization. In: Automated machine learning (pp. 3\u201333). Springer, Cham. (2019)","DOI":"10.1007\/978-3-030-05318-5_1"},{"key":"661_CR44","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1016\/j.future.2021.01.022","volume":"118","author":"SMSIAMARZAK ur RehmanKhaliqImtiazRasoolShafiqJa","year":"2021","unstructured":"ur RehmanKhaliqImtiazRasoolShafiqJavedJalilBashir, S.M.S.I.A.M.A.R.Z.A.K.: Diddos: An approach for detection and identification of distributed denial of service (ddos) cyberattacks using gated recurrent units (gru). Future Gen. Comput. Syst. 118, 453\u2013466 (2021)","journal-title":"Future Gen. Comput. Syst."},{"key":"661_CR45","doi-asserted-by":"publisher","first-page":"107694","DOI":"10.1016\/j.compeleceng.2022.107694","volume":"98","author":"CA de Souza","year":"2022","unstructured":"de Souza, C.A., Westphall, C.B., Machado, R.B.: Two-step ensemble approach for intrusion detection and identification in IoT and fog computing environments. Comput. Electr. Eng. 98, 107694 (2022)","journal-title":"Comput. Electr. Eng."},{"key":"661_CR46","doi-asserted-by":"crossref","unstructured":"Sarhan, M., Layeghy, S., Moustafa, N., & Portmann, M.: Netflow datasets for machine learning-based network intrusion detection systems. In Big Data Technologies and Applications (pp. 117\u2013135). Springer, Cham. (2020)","DOI":"10.1007\/978-3-030-72802-1_9"},{"issue":"11","key":"661_CR47","doi-asserted-by":"publisher","first-page":"1241","DOI":"10.3390\/electronics10111241","volume":"10","author":"TG Palla","year":"2021","unstructured":"Palla, T.G., Tayeb, S.: Intelligent Mirai malware detection for IoT nodes. Electronics 10(11), 1241 (2021)","journal-title":"Electronics"},{"key":"661_CR48","doi-asserted-by":"publisher","first-page":"194269","DOI":"10.1109\/ACCESS.2020.3033942","volume":"8","author":"HA Alamri","year":"2020","unstructured":"Alamri, H.A., Thayananthan, V.: Bandwidth control mechanism and extreme gradient boosting algorithm for protecting software-defined networks against DDoS attacks. IEEE Access 8, 194269\u2013194288 (2020)","journal-title":"IEEE Access"},{"key":"661_CR49","first-page":"102866","volume":"60","author":"DKK Reddy","year":"2021","unstructured":"Reddy, D.K.K., Behera, H.S., Nayak, J., Naik, B., Ghosh, U., Sharma, P.K.: Exact greedy algorithm based split finding approach for intrusion detection in fog-enabled IoT environment. J. Inform. Security and Appl. 60, 102866 (2021)","journal-title":"J. Inform. Security and Appl."},{"issue":"13","key":"661_CR50","doi-asserted-by":"publisher","first-page":"4926","DOI":"10.3390\/s22134926","volume":"22","author":"A Sarwar","year":"2022","unstructured":"Sarwar, A., Alnajim, A.M., Marwat, S.N.K., Ahmed, S., Alyahya, S., Khan, W.U.: Enhanced anomaly detection system for iot based on improved dynamic SBPSO. Sensors 22(13), 4926 (2022)","journal-title":"Sensors"},{"issue":"2","key":"661_CR51","doi-asserted-by":"publisher","first-page":"2727","DOI":"10.32604\/cmc.2022.020141","volume":"70","author":"WB Daoud","year":"2022","unstructured":"Daoud, W.B., Mahfoudhi, S.: SIMAD: secure intelligent method for IoT-fog environments attacks detection. Comput. Mater. Continua (CMC) 70(2), 2727\u20132742 (2022)","journal-title":"Comput. Mater. Continua (CMC)"},{"key":"661_CR52","doi-asserted-by":"crossref","unstructured":"Labiod, Y., Amara Korba, A., & Ghoualmi, N.: Fog computing-based intrusion detection architecture to protect IoT networks. Wireless Personal Commun., 1\u201329. (2022)","DOI":"10.1007\/s11277-022-09548-7"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/link.springer.com\/content\/pdf\/10.1007\/s10207-023-00661-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/link.springer.com\/article\/10.1007\/s10207-023-00661-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/link.springer.com\/content\/pdf\/10.1007\/s10207-023-00661-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,26]],"date-time":"2023-07-26T01:02:41Z","timestamp":1690333361000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/link.springer.com\/10.1007\/s10207-023-00661-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,18]]},"references-count":52,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2023,8]]}},"alternative-id":["661"],"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1007\/s10207-023-00661-7","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,1,18]]},"assertion":[{"value":"8 January 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 January 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}}]}}