{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T10:34:33Z","timestamp":1725878073136},"reference-count":54,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2021,6,13]],"date-time":"2021-06-13T00:00:00Z","timestamp":1623542400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,6,13]],"date-time":"2021-06-13T00:00:00Z","timestamp":1623542400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2021,8]]},"DOI":"10.1007\/s11276-021-02660-9","type":"journal-article","created":{"date-parts":[[2021,6,13]],"date-time":"2021-06-13T08:02:27Z","timestamp":1623571347000},"page":"3873-3894","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":44,"title":["Energy efficient secured K means based unequal fuzzy clustering algorithm for efficient reprogramming in wireless sensor networks"],"prefix":"10.1007","volume":"27","author":[{"given":"S. V. N.","family":"Santhosh Kumar","sequence":"first","affiliation":[]},{"given":"Yogesh","family":"Palanichamy","sequence":"additional","affiliation":[]},{"given":"M.","family":"Selvi","sequence":"additional","affiliation":[]},{"given":"Sannasi","family":"Ganapathy","sequence":"additional","affiliation":[]},{"given":"Arputharaj","family":"Kannan","sequence":"additional","affiliation":[]},{"given":"Sankar Pariserum","family":"Perumal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,6,13]]},"reference":[{"issue":"4","key":"2660_CR1","first-page":"1129","volume":"26","author":"D He","year":"2015","unstructured":"He, D., Chan, S., Tang, S., & Guizani, M. (2015). Secure and distributed data discovery and dissemination in wireless sensor networks. IEEE Transactions on Wireless Communications, 26(4), 1129\u20131139.","journal-title":"IEEE Transactions on Wireless Communications"},{"key":"2660_CR2","doi-asserted-by":"crossref","unstructured":"De, P., Liu, Y., & Das, S. K. (2008). ReMo: An energy efficient reprogramming protocol for mobile sensor networks. In: Proceedings of the 6th IEEE pervasive computing and communications (pp. 60\u201369)","DOI":"10.1109\/PERCOM.2008.89"},{"key":"2660_CR3","doi-asserted-by":"crossref","unstructured":"Panta, R. K., Khalil, I., & Bagchi, S. (2007). Stream: Low overhead wireless reprogramming for sensor networks. In Proceedings of the 26th IEEE INFOCOM (pp.928\u2013936).","DOI":"10.1109\/INFCOM.2007.113"},{"issue":"3","key":"2660_CR4","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1109\/MNET.2006.1637932","volume":"20","author":"Q Wang","year":"2006","unstructured":"Wang, Q., Zhu, Y., & Cheng, L. (2006). Reprogramming wireless sensor networks: Challenges and approaches. IEEE Network, 20(3), 48\u201355.","journal-title":"IEEE Network"},{"issue":"10","key":"2660_CR5","doi-asserted-by":"publisher","first-page":"1403","DOI":"10.1109\/TMC.2010.240","volume":"10","author":"W Dong","year":"2011","unstructured":"Dong, W., Chen, C., Liu, X., Bu, J., & Gao, Y. (2011). A light weight and density aware reprogramming protocols for wireless sensor networks. IEEE Transactions on Mobile Computing, 10(10), 1403\u20131415.","journal-title":"IEEE Transactions on Mobile Computing"},{"issue":"3","key":"2660_CR6","doi-asserted-by":"publisher","first-page":"3166","DOI":"10.1109\/TVT.2019.2963406","volume":"69","author":"W Zhang","year":"2020","unstructured":"Zhang, W., Han, G., Wang, X., Guizani, M., Fan, K., & Shu, L. (2020). A node location algorithm based on node movement prediction in underwater acoustic sensor networks. IEEE Transactions on Vehicular Technology, 69(3), 3166\u20133178.","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"2660_CR7","doi-asserted-by":"publisher","first-page":"697","DOI":"10.1016\/j.procs.2017.03.150","volume":"107","author":"H Li","year":"2017","unstructured":"Li, H., & Lin, Z. (2017). Study on location of wireless sensor network node in forest environment. Procedia Computer Science, 107, 697\u2013704.","journal-title":"Procedia Computer Science"},{"key":"2660_CR8","doi-asserted-by":"publisher","first-page":"3325","DOI":"10.1007\/s13369-017-2471-9","volume":"42","author":"S Arora","year":"2017","unstructured":"Arora, S., & Singh, S. (2017). Node localization in wireless sensor networks using butterfly optimization algorithm. Arabian Journal of Science and Engineering, 42, 3325\u20133335.","journal-title":"Arabian Journal of Science and Engineering"},{"issue":"11","key":"2660_CR9","doi-asserted-by":"publisher","first-page":"2664","DOI":"10.1016\/j.comnet.2012.04.007","volume":"56","author":"W Dong","year":"2012","unstructured":"Dong, W., Chen, C., Liu, X., Teng, G., Bu, J., & Liv, Y. (2012). Bulk data dissemination in wireless sensor networks: Modelling and analysis. Computer Networks, 56(11), 2664\u20132676.","journal-title":"Computer Networks"},{"key":"2660_CR10","first-page":"PP-1-18","volume":"2016","author":"W Farooq","year":"2016","unstructured":"Farooq, W., Ali Khan, M., & Rehman, S. (2016). A novel real time framework for cluster-based multicast communication in vehicular ad hoc networks. International Journal of Distributed Sensor Networks, 2016, PP-1-18.","journal-title":"International Journal of Distributed Sensor Networks"},{"key":"2660_CR11","first-page":"745","volume":"14","author":"Z Nayyar","year":"2016","unstructured":"Nayyar, Z., Khan, M. A., Bashir, F., Beard, C., Li, Z., & Mahmood, K. (2016). Two tier clustering technique in vehicular ad hoc networks in highways\u2019 scenarios. International Journal of Computer Science and Information Security, 14, 745.","journal-title":"International Journal of Computer Science and Information Security"},{"key":"2660_CR12","doi-asserted-by":"crossref","unstructured":"Saeed, A., Butt, W. H., Kazmi, F., Khan, M. A. (2018). Evaluation of clustering algorithms for wireless sensor and actor networks. In IBCAST 2018, 15th international Bhurban conference on applied sciences and technology.","DOI":"10.1109\/IBCAST.2018.8312331"},{"key":"2660_CR13","doi-asserted-by":"crossref","unstructured":"Farooq, W., Khan, M. A., Rehman, S., Saqib, N. A., & Abbas, M. (2017). AAGV: A cluster based multicast routing protocol for autonomous aerial and ground vehicles communication in VANET. In 15th international conference on frontiers of information technology (FIT 2017).","DOI":"10.1109\/FIT.2017.00063"},{"key":"2660_CR14","doi-asserted-by":"crossref","unstructured":"Khan M. A., Shah, G. A., Ahsan, M., & Sher, M. (2010). An efficient and reliable clustering algorithm for wireless sensor actor network (WSANs). In 53rd IEEE International Midwest Symposium on Circuits and System (MWSCAS 2010) Washington, USA.","DOI":"10.1109\/MWSCAS.2010.5548829"},{"issue":"5","key":"2660_CR15","doi-asserted-by":"publisher","first-page":"888","DOI":"10.1049\/iet-com.2019.0172","volume":"14","author":"P Nancy","year":"2020","unstructured":"Nancy, P., Muthurajkumar, S., Ganapathy, S., Santhosh Kumar, S. V. N., Selvi, M., & Arputharaj, K. (2020). Intrusion detection using dynamic feature selection and fuzzy temporal decision tree classification for wireless sensor networks. IET Communication, 14(5), 888\u2013895.","journal-title":"IET Communication"},{"issue":"1","key":"2660_CR16","doi-asserted-by":"publisher","first-page":"423","DOI":"10.1007\/s10586-018-2181-4","volume":"22","author":"R Rajendran","year":"2019","unstructured":"Rajendran, R., Santhosh Kumar, S. V. N., Palanichamy, Y., & Arputharaj, K. (2019). Detection of DoS attacks in cloud networks using intelligent rule based classification system. Cluster Computing, 22(1), 423\u2013434.","journal-title":"Cluster Computing"},{"issue":"21","key":"2660_CR17","doi-asserted-by":"publisher","first-page":"16483","DOI":"10.1007\/s00500-020-04955-z","volume":"24","author":"T Kalidoss","year":"2020","unstructured":"Kalidoss, T., Kulothungan, K., Indira Gandhi, S., Selvi, M., Santhosh Kumar, S. V. N., & Arputharaj, K. (2020). Intelligent fuzzy rule-based approach with outlier detection for secured routing in WSN. Soft Computing, 24(21), 16483\u201316497.","journal-title":"Soft Computing"},{"issue":"8","key":"2660_CR18","doi-asserted-by":"publisher","first-page":"4903","DOI":"10.1007\/s11276-019-02073-9","volume":"25","author":"S Viswanathan","year":"2019","unstructured":"Viswanathan, S., & Kannan, A. (2019). Elliptic key cryptography with Beta Gamma functions for secure routing in wireless sensor networks. Wireless Networks, 25(8), 4903\u20134914.","journal-title":"Wireless Networks"},{"issue":"5","key":"2660_CR19","doi-asserted-by":"publisher","first-page":"10839","DOI":"10.1007\/s10586-017-1191-y","volume":"22","author":"M Selvi","year":"2019","unstructured":"Selvi, M., Velvizhy, P., Ganapathy, S., Khanna Nehemiah, H., & Kannan, A. (2019). A rule based delay constrained energy efficient routing technique for wireless sensor networks. Cluster Computing, 22(5), 10839\u201310848.","journal-title":"Cluster Computing"},{"key":"2660_CR20","doi-asserted-by":"publisher","unstructured":"Kulkarni, S. S., & Wang, L. (2005). MNP: Multi-hop network reprogramming service for sensor networks. In Proceedings of the 25th IEEE international conference on distributed computing systems (ICDCS'05) (pp. 7\u201316). https:\/\/doi.org\/10.1109\/ICDCS.2005.50","DOI":"10.1109\/ICDCS.2005.50"},{"key":"2660_CR21","doi-asserted-by":"crossref","unstructured":"Hui, J. W., & Culler, D. (2004). The dynamic behavior of a data dissemination protocol for network programming at scale. In Proceedings of the 2nd international conference on embedded networked sensor systems (Sensys 04) (pp. 81\u201394) New York, NY, USA: ACM.","DOI":"10.1145\/1031495.1031506"},{"key":"2660_CR22","doi-asserted-by":"crossref","unstructured":"Hyun, S., Ning, P., Liu, A., & Du, W. (2008). Seluge: Secure and DoS-resistant code dissemination in wireless sensor networks. In Proceedings of the ACM\/IEEE international conference on information processing in sensor networks (pp. 445\u2013456).","DOI":"10.1109\/IPSN.2008.12"},{"key":"2660_CR23","unstructured":"Zhang, R., & Zhang, Y. (2008). LR-Seluge: Loss-resilient and secure code dissemination in wireless sensor networks. In International conference on distributed computing systems (pp. 497\u2013506)."},{"key":"2660_CR24","doi-asserted-by":"crossref","unstructured":"Naik, V., Arora, A., Sinha, P. & Zhang, H. (2005). Sprinkler: A reliable and energy efficient data dissemination service for wireless embedded devices. In Proceedings of the 26th IEEE international real-time systems symposium (RTSS) (pp. 1\u201310).","DOI":"10.1109\/RTSS.2005.37"},{"key":"2660_CR25","doi-asserted-by":"crossref","unstructured":"Huang, L., & Setia, S. (2008). CORD: Energy-efficient reliable bulk data dissemination in sensor. In Proceedings of international conference on computer communications, joint conference of the IEEE computer and communications societies (pp. 1\u20138).","DOI":"10.1109\/INFOCOM.2007.106"},{"key":"2660_CR26","doi-asserted-by":"crossref","unstructured":"Lin, K., & Levis, P. (2008). Data discovery and dissemination with dip. In Proceedings of the 2008 international conference on information processing in sensor networks (IPSN 2008) (pp. 433\u2013444) Washington, DC, USA.","DOI":"10.1109\/IPSN.2008.17"},{"key":"2660_CR27","doi-asserted-by":"crossref","unstructured":"Tolle, G., & Culler, D. (2005). Design of application cooperative management system for wireless sensor networks. In Proceedings of EWSW (pp. 121\u2013132).","DOI":"10.1109\/EWSN.2005.1462004"},{"key":"2660_CR28","unstructured":"Levis, P., Patel, N., Culler, D., & Shenker, S. (2004). Trickle: A self-regulating algorithm for code maintenance and propagation in wirelesssensor networks. In Proceedings of the 1st conference symposium on network systems design and implementation (pp. 15\u201328)."},{"key":"2660_CR29","doi-asserted-by":"crossref","unstructured":"Dang, T., Bulusu, N., Feng, W., & Park, S. (2009). DHV: A code consistency maintenance protocol for multi-hop wireless sensor networks. In Proceedings of the 6th European conference on wireless sensor networks (pp. 327\u2013342)","DOI":"10.1007\/978-3-642-00224-3_21"},{"issue":"9","key":"2660_CR30","doi-asserted-by":"publisher","first-page":"4638","DOI":"10.1109\/TWC.2013.090413.130072","volume":"12","author":"D He","year":"2013","unstructured":"He, D., Chan, S., Tang, S., & Guizani, M. (2013). Secure data discovery and dissemination based on hash tree for wireless sensor networks. IEEE Transactions on Wireless Communications, 12(9), 4638\u20134646.","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"5","key":"2660_CR31","doi-asserted-by":"publisher","first-page":"1235","DOI":"10.1007\/s11276-011-0345-8","volume":"17","author":"J Hur","year":"2011","unstructured":"Hur, J. (2011). Fine-grained data access control for distributed sensor networks. Wireless Networks, 17(5), 1235\u20131249.","journal-title":"Wireless Networks"},{"issue":"8","key":"2660_CR32","first-page":"1939","volume":"15","author":"J He","year":"2016","unstructured":"He, J., Cai, L., Cheng, P., & Pan, J. (2016). Delay minimization for data dissemination in large-scale VANETs with buses and taxis. IEEE Transactions on Vehicular Technology, 15(8), 1939\u20131950.","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"5","key":"2660_CR33","first-page":"4173","volume":"66","author":"S Wang","year":"2017","unstructured":"Wang, S., Wang, X., Cheng, X., Huang, J., Bie, R., & Zhao, F. (2017). Fundamental analysis on data dissemination in mobile opportunistic networks with Levy mobility. IEEE Transactions on Vehicular Technology, 66(5), 4173\u20134187.","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"3","key":"2660_CR34","first-page":"632","volume":"17","author":"J He","year":"2018","unstructured":"He, J., Ni, Y., Cai, L., Pan, J., & Chen, C. (2018). Optimal dropbox deployment algorithm for data dissemination in vehicular networks. IEEE Transactions on Vehicular Technology, 17(3), 632\u2013645.","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"2660_CR35","doi-asserted-by":"crossref","unstructured":"Ruj, S., Nayak, A., & Stojmenovic, I. (2011). Distributed fine-grained access control in wireless sensor networks. In Proceedings of the IEEE IPDPS (pp. 352\u2013362)","DOI":"10.1109\/IPDPS.2011.42"},{"issue":"7","key":"2660_CR36","doi-asserted-by":"publisher","first-page":"2723","DOI":"10.1007\/s11276-017-1497-y","volume":"24","author":"A Hawbani","year":"2018","unstructured":"Hawbani, A., Wang, X., Kuhlani, H., Karmoshi, S., Ghoul, R., Sharabi, Y., & Torbosh, E. (2018). Sink-oriented tree based data dissemination protocol for mobile sinks in wireless sensor networks. Wireless Networks, 24(7), 2723\u20132734.","journal-title":"Wireless Networks"},{"issue":"7","key":"2660_CR37","doi-asserted-by":"publisher","first-page":"1545","DOI":"10.1109\/TIFS.2017.2668062","volume":"12","author":"KA Ahim","year":"2017","unstructured":"Ahim, K. A. (2017). BASIS: A practical multi-user broadcast authentication scheme in wireless sensor networks. IEEE Transactions on Information Forensics and Security, 12(7), 1545\u20131553.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"2660_CR38","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1016\/j.comnet.2019.01.024","volume":"151","author":"K Thangaramya","year":"2019","unstructured":"Thangaramya, K., Kulothungan, K., Logambigai, R., Selvi, M., & Ganapathy, S. (2019). Energy aware cluster and neuro-fuzzy based routing algorithm for wireless sensor networks in IoT. Journal of Computer Networks, 151, 211\u2013223.","journal-title":"Journal of Computer Networks"},{"issue":"4","key":"2660_CR39","doi-asserted-by":"publisher","first-page":"1475","DOI":"10.1007\/s11277-019-06155-x","volume":"105","author":"M Selvi","year":"2019","unstructured":"Selvi, M., Thangaramya, K., Ganapathy, S., Kulothungan, K., Nehemiah, H. K., & Kannan, A. (2019). An energy aware trust based secure routing algorithm for effective communication in wireless sensor networks. Wireless Personal Communication, 105(4), 1475\u20131490.","journal-title":"Wireless Personal Communication"},{"issue":"3","key":"2660_CR40","doi-asserted-by":"publisher","first-page":"1953","DOI":"10.1007\/s11276-016-1269-0","volume":"23","author":"K Haseeb","year":"2017","unstructured":"Haseeb, K., Bakar, K. A., Abdullah, A. H., & Darwish, T. (2017). Adaptive energy aware cluster-based routing protocol for wireless sensor networks. Wireless Networks, 23(3), 1953\u20131966.","journal-title":"Wireless Networks"},{"key":"2660_CR41","unstructured":"Zhu, S. (2004). An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks. In IEEE symposium on security and privacy (pp. 12\u201320)."},{"key":"2660_CR42","unstructured":"Lee, H. W. (2007). A method to control the probability of attempts to verify a report in statistical en-route filtering networks. In 15th IEEE international conference on networks (pp. 32\u201339)."},{"issue":"2","key":"2660_CR43","doi-asserted-by":"publisher","first-page":"903","DOI":"10.1007\/s11277-016-3250-8","volume":"90","author":"E Golden Julie","year":"2016","unstructured":"Golden Julie, E., & Tamilselvi, S. (2016). CDS-fuzzy opportunistic routing protocol for WSN. Wireless Personal Communications, 90(2), 903\u2013922.","journal-title":"Wireless Personal Communications"},{"key":"2660_CR44","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1016\/j.compeleceng.2018.03.036","volume":"68","author":"R Logambigai","year":"2018","unstructured":"Logambigai, R., Ganapathy, S., & Kannan, A. (2018). Energy-efficient grid-based routing algorithm using intelligent fuzzy rules for wireless sensor networks. Computers & Electrical Engineering, 68, 62\u201375.","journal-title":"Computers & Electrical Engineering"},{"issue":"3","key":"2660_CR45","doi-asserted-by":"publisher","first-page":"945","DOI":"10.1007\/s11276-015-1013-1","volume":"22","author":"R Logambigai","year":"2015","unstructured":"Logambigai, R., & Kannan, A. (2015). Fuzzy logic based unequal clustering for wireless sensor networks. Wireless Networks, 22(3), 945\u2013957.","journal-title":"Wireless Networks"},{"key":"2660_CR46","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1016\/j.procs.2012.06.035","volume":"10","author":"R Mhemed","year":"2012","unstructured":"Mhemed, R., Aslam, N., Phillips, W., & Comeau, F. (2012). An energy-efficient fuzzy logic cluster formation protocol in wireless sensor networks. Procedia Computer Science, 10, 255\u2013262.","journal-title":"Procedia Computer Science"},{"key":"2660_CR47","unstructured":"Hsu, C.-M., (2003). A group digital signature technique for authentication. In Proceedings of the IEEE 37th annual 2003 international Carnahan conference on security technology (pp. 253\u2013256)."},{"issue":"1","key":"2660_CR48","first-page":"387","volume":"14","author":"D He","year":"2015","unstructured":"He, D. (2015). Accountable and privacy-enhanced access control in wireless sensor networks. IEEE Transactions on Wireless Communications, 14(1), 387\u2013397.","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"12","key":"2660_CR49","doi-asserted-by":"publisher","first-page":"561","DOI":"10.5958\/2249-7315.2016.01311.3","volume":"6","author":"SVN Santhosh Kumar","year":"2016","unstructured":"Santhosh Kumar, S. V. N., & Yogesh, P. (2016). Privacy-preserving with enhanced access control for distributed data dissemination in WSN. Asian Journal of Research in Social Sciences and Humanities, 6(12), 561\u2013577.","journal-title":"Asian Journal of Research in Social Sciences and Humanities"},{"issue":"4","key":"2660_CR50","doi-asserted-by":"publisher","first-page":"1343","DOI":"10.1007\/s11276-017-1549-3","volume":"24","author":"SVN Santhosh Kumar","year":"2017","unstructured":"Santhosh Kumar, S. V. N., & Palanichamy, Y. (2017). Energy efficient and secured distributed data dissemination using hop by hop authentication in WSN. Wireless Networks, 24(4), 1343\u20131360.","journal-title":"Wireless Networks"},{"issue":"10","key":"2660_CR51","doi-asserted-by":"publisher","first-page":"3472","DOI":"10.1109\/TWC.2011.072511.102283","volume":"10","author":"D He","year":"2011","unstructured":"He, D., Bu, J., Zhu, S., Chan, S., & Chen, C. (2011). Distributed access control with privacy support in wireless sensor networks. IEEE Transactions on Wireless Communications, 10(10), 3472\u20133481.","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"8","key":"2660_CR52","doi-asserted-by":"publisher","first-page":"1427","DOI":"10.1109\/TPDS.2011.299","volume":"23","author":"R Zhang","year":"2012","unstructured":"Zhang, R., Zhang, Y., & Ren, K. (2012). Distributed privacy-preserving access control in sensor networks. IEEE Transactions on Parallel and Distributed Systems, 23(8), 1427\u20131438.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"2660_CR53","doi-asserted-by":"crossref","unstructured":"Hu, Y. (2007). RAS: A robust authentication scheme for filtering false data in wireless sensor networks. In 15th IEEE international conference on networks (pp. 1\u20138).","DOI":"10.1109\/ICON.2007.4444086"},{"issue":"5","key":"2660_CR54","doi-asserted-by":"publisher","first-page":"1223","DOI":"10.1109\/TPDS.2013.119","volume":"25","author":"J Li","year":"2014","unstructured":"Li, J., & Ren, J. (2014). Hop by hop message authentication and source privacy in WSN. IEEE Transactions on Parallel and Distributed Systems, 25(5), 1223\u20131232.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-021-02660-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11276-021-02660-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-021-02660-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,19]],"date-time":"2021-08-19T08:49:40Z","timestamp":1629362980000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11276-021-02660-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,13]]},"references-count":54,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2021,8]]}},"alternative-id":["2660"],"URL":"http:\/\/dx.doi.org\/10.1007\/s11276-021-02660-9","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"value":"1022-0038","type":"print"},{"value":"1572-8196","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,6,13]]},"assertion":[{"value":"25 May 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 June 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}