{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T18:34:46Z","timestamp":1732041286098},"reference-count":56,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2022,3,3]],"date-time":"2022-03-03T00:00:00Z","timestamp":1646265600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,3,3]],"date-time":"2022-03-03T00:00:00Z","timestamp":1646265600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100000038","name":"Natural Sciences and Engineering Research Council of Canada","doi-asserted-by":"publisher","award":["Discovery Grant"],"id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100012114","name":"Defence Research and Development Canada","doi-asserted-by":"publisher","award":["Innovation for Defence Excellence and Security"],"id":[{"id":"10.13039\/100012114","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Auton Agent Multi-Agent Syst"],"published-print":{"date-parts":[[2022,4]]},"DOI":"10.1007\/s10458-021-09542-6","type":"journal-article","created":{"date-parts":[[2022,3,3]],"date-time":"2022-03-03T07:02:42Z","timestamp":1646290962000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":21,"title":["Formal verification of group and propagated trust in multi-agent systems"],"prefix":"10.1007","volume":"36","author":[{"given":"Nagat","family":"Drawel","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-3136-4849","authenticated-orcid":false,"given":"Jamal","family":"Bentahar","sequence":"additional","affiliation":[]},{"given":"Amine","family":"Laarej","sequence":"additional","affiliation":[]},{"given":"Gaith","family":"Rjoub","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,3]]},"reference":[{"key":"9542_CR1","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1016\/j.eswa.2015.08.019","volume":"43","author":"F Al-Saqqar","year":"2016","unstructured":"Al-Saqqar, F., Bentahar, J., & Sultan, K. (2016). On the soundness, completeness and applicability of the logic of knowledge and communicative commitments in multi-agent systems. Expert Systems with Applications, 43, 223\u2013236.","journal-title":"Expert Systems with Applications"},{"key":"9542_CR2","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.simpat.2014.11.003","volume":"51","author":"F Al-Saqqar","year":"2015","unstructured":"Al-Saqqar, F., Bentahar, J., Sultan, K., Wan, W., & Asl, E. K. (2015). Model checking temporal knowledge and commitments in multi-agent systems using reduction. Simulation Modelling Practice and Theory, 51, 45\u201368.","journal-title":"Simulation Modelling Practice and Theory"},{"key":"9542_CR3","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1016\/j.eswa.2016.12.031","volume":"74","author":"AS Bataineh","year":"2017","unstructured":"Bataineh, A. S., Bentahar, J., El Menshawy, M., & Dssouli, R. (2017). Specifying and verifying contract-driven service compositions using commitments and model checking. Expert Systems with Applications, 74, 151\u2013184.","journal-title":"Expert Systems with Applications"},{"key":"9542_CR4","unstructured":"Bentahar, J., Drawel, N., & Sadiki, A. (2022). Quantitative group trust: A two-stage verification approach. In The International Conference on Autonomous Agents and Multiagent Systems, (pp. 20\u201320)."},{"key":"9542_CR5","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1016\/j.knosys.2012.04.010","volume":"35","author":"J Bentahar","year":"2012","unstructured":"Bentahar, J., El-Menshawy, M., Qu, H., & Dssouli, R. (2012). Communicative commitments: Model checking and complexity analysis. Knowledge-Based Systems, 35, 21\u201334.","journal-title":"Knowledge-Based Systems"},{"key":"9542_CR6","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1007\/978-94-009-6259-0_4","volume-title":"Handbook of Philosophical Logic","author":"J Benthem","year":"1984","unstructured":"Benthem, J. (1984). Correspondence theory. In D. Gabbay & F. Guenthner (Eds.), Handbook of Philosophical Logic (Vol. 2, pp. 167\u2013247). Springer."},{"key":"9542_CR7","doi-asserted-by":"crossref","unstructured":"Castelfranchi, C., & Falcone, R. (1998). Principles of trust for MAS: cognitive anatomy, social importance, and quantification. In The Third International Conference on Multiagent Systems, ICMAS, (pp. 72\u201379).","DOI":"10.1109\/ICMAS.1998.699034"},{"key":"9542_CR8","doi-asserted-by":"publisher","first-page":"534","DOI":"10.1016\/j.protcy.2012.10.064","volume":"6","author":"PS Chakraborty","year":"2012","unstructured":"Chakraborty, P. S., & Karform, S. (2012). Designing trust propagation algorithms based on simple multiplicative strategy for social networks. Procedia Technology, 6, 534\u2013539.","journal-title":"Procedia Technology"},{"key":"9542_CR9","doi-asserted-by":"crossref","unstructured":"Christianson, B., & Harbison, W.S. (1996). Why isn\u2019t trust transitive? In International Workshop on Security Protocols, (pp. 171\u2013176). Springer.","DOI":"10.1007\/3-540-62494-5_16"},{"issue":"11","key":"9542_CR10","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1145\/1592761.1592781","volume":"52","author":"EM Clarke","year":"2009","unstructured":"Clarke, E. M., Emerson, A., & Sifakis, J. (2009). Model checking: Algorithmic verification and debugging. Communications of the ACM, 52(11), 74\u201384.","journal-title":"Communications of the ACM"},{"key":"9542_CR11","volume-title":"Model Checking","author":"EM Clarke","year":"1999","unstructured":"Clarke, E. M., Grumberg, O., & Peled, D. (1999). Model Checking. MIT Press."},{"issue":"2\u20133","key":"9542_CR12","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1016\/0004-3702(90)90055-5","volume":"42","author":"PR Cohen","year":"1990","unstructured":"Cohen, P. R., & Levesque, H. J. (1990). Intention is choice with commitment. Artificial Intelligence, 42(2\u20133), 213\u2013261.","journal-title":"Artificial Intelligence"},{"issue":"12","key":"9542_CR13","doi-asserted-by":"publisher","first-page":"1015","DOI":"10.1109\/TSE.2005.140","volume":"31","author":"N Desai","year":"2005","unstructured":"Desai, N., Mallya, A. U., Chopra, A. K., & Singh, M. P. (2005). Interaction protocols as design abstractions for business processes. IEEE Transactions on Software Engineering, 31(12), 1015\u20131027.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"9542_CR14","unstructured":"Drawel, N., Bentahar, J., El-Menshawy, M., & Laarej, A. (2018). Verifying temporal trust logic using CTL model checking. In The 20th International Trust Workshop co-located with AAMAS\/IJCAI\/ECAI\/ICML, (pp. 62\u201374)."},{"key":"9542_CR15","doi-asserted-by":"crossref","unstructured":"Drawel, N., Bentahar, J., & Shakshuki, E. (2017). Reasoning about trust and time in a system of agents. In The 8th International Conference on Ambient Systems, Networks and Technologies (ANT),Procedia Computer Science, (Vol. 109, pp. 632\u2013639).","DOI":"10.1016\/j.procs.2017.05.369"},{"key":"9542_CR16","doi-asserted-by":"publisher","first-page":"1047","DOI":"10.1016\/j.future.2018.01.040","volume":"107","author":"N Drawel","year":"2020","unstructured":"Drawel, N., Qu, H., Bentahar, J., & Shakshuki, E. M. (2020). Specification and automatic verification of trust-based multi-agent systems. Future Generation Computer Systems, 107, 1047\u20131060.","journal-title":"Future Generation Computer Systems"},{"issue":"16","key":"9542_CR17","doi-asserted-by":"publisher","first-page":"7478","DOI":"10.1016\/j.eswa.2014.05.046","volume":"41","author":"W El Kholy","year":"2014","unstructured":"El Kholy, W., Bentahar, J., El Menshawy, M., Qu, H., & Dssouli, R. (2014). Modeling and verifying choreographed multi-agent-based web service compositions regulated by commitment protocols. Expert Systems with Applications, 41(16), 7478\u20137494.","journal-title":"Expert Systems with Applications"},{"issue":"3","key":"9542_CR18","doi-asserted-by":"publisher","first-page":"223","DOI":"10.3233\/FI-2017-1519","volume":"152","author":"W El Kholy","year":"2017","unstructured":"El Kholy, W., Bentahar, J., El Menshawy, M., Qu, H., & Dssouli, R. (2017). SMC4AC: A new symbolic model checker for intelligent agent communication. Fundamenta Informaticae, 152(3), 223\u2013271.","journal-title":"Fundamenta Informaticae"},{"key":"9542_CR19","doi-asserted-by":"crossref","unstructured":"El-Menshawy, M., Bentahar, J., & Dssouli, R. (2010). Symbolic model checking commitment protocols using reduction. In The 8th International Workshop on Declarative Agent Languages and Technologies VIII, DALT. Lecture Notes in Computer Science, (Vol. 6619, pp. 185\u2013203).","DOI":"10.1007\/978-3-642-20715-0_11"},{"key":"9542_CR20","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1016\/j.jss.2017.12.042","volume":"138","author":"M El Menshawy","year":"2018","unstructured":"El Menshawy, M., Bentahar, J., El Kholy, W., & Laarej, A. (2018). Model checking real-time conditional commitment logic using transformation. Journal of Systems and Software, 138, 189\u2013205.","journal-title":"Journal of Systems and Software"},{"key":"9542_CR21","doi-asserted-by":"crossref","unstructured":"Emerson, A. (1990). Temporal and modal logic. In: Handbook of Theoretical Computer Science, Volume B: Formal Models and Sematics, (pp. 995\u20131072). MIT Press.","DOI":"10.1016\/B978-0-444-88074-1.50021-4"},{"issue":"1","key":"9542_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/0022-0000(85)90001-7","volume":"30","author":"A Emerson","year":"1985","unstructured":"Emerson, A., & Halpern, J. Y. (1985). Decision procedures and expressiveness in the temporal logic of branching time. Journal of Computer and System Sciences, 30(1), 1\u201324.","journal-title":"Journal of Computer and System Sciences"},{"key":"9542_CR23","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/5803.001.0001","volume-title":"Reasoning about knowledge","author":"R Fagin","year":"1995","unstructured":"Fagin, R., Halpern, J. Y., Vardi, M. Y., & Moses, Y. (1995). Reasoning about knowledge. MIT Press."},{"key":"9542_CR24","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/2516.001.0001","volume-title":"Dynamic logic","author":"D Harel","year":"2000","unstructured":"Harel, D., Kozen, D., & Tiuryn, J. (2000). Dynamic logic. MIT Press."},{"key":"9542_CR25","first-page":"407","volume-title":"The Goals of Cognition. Essays in Honour of Cristiano Castelfranchi, Tributes","author":"A Herzig","year":"2012","unstructured":"Herzig, A., Lorini, E., & Moisan, F. (2012). A simple logic of trust based on propositional assignments. In F. Paglieri, L. Tummolini, & R. Falcone (Eds.), The Goals of Cognition. Essays in Honour of Cristiano Castelfranchi, Tributes (pp. 407\u2013419). College Publications."},{"issue":"4","key":"9542_CR26","doi-asserted-by":"publisher","first-page":"21:1","DOI":"10.1145\/3329123","volume":"20","author":"X Huang","year":"2019","unstructured":"Huang, X., Kwiatkowska, M., & Olejnik, M. (2019). Reasoning about cognitive trust in stochastic multiagent systems. ACM Transactions on Computational Logic, 20(4), 21:1-21:64.","journal-title":"ACM Transactions on Computational Logic"},{"key":"9542_CR27","doi-asserted-by":"crossref","unstructured":"Jamali, M., & Ester, M. (2010). A matrix factorization technique with trust propagation for recommendation in social networks. In The ACM Conference on Recommender Systems, RecSys, (pp. 135\u2013142). ACM.","DOI":"10.1145\/1864708.1864736"},{"key":"9542_CR28","doi-asserted-by":"crossref","unstructured":"Kafal\u0131, O., Ajmeri, N., & Singh, M.P. (2017). Kont: Computing tradeoffs in normative multiagent systems. In Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence, (pp. 3006\u20133012). AAAI\u201917.","DOI":"10.1609\/aaai.v31i1.10706"},{"issue":"2","key":"9542_CR29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2685613","volume":"24","author":"WE Kholy","year":"2014","unstructured":"Kholy, W. E., Bentahar, J., Menshawy, M. E., Qu, H., & Dssouli, R. (2014). Conditional commitments: Reasoning and model checking. ACM Transactions on Software Engineering and Methodology (TOSEM), 24(2), 1\u201349.","journal-title":"ACM Transactions on Software Engineering and Methodology (TOSEM)"},{"key":"9542_CR30","doi-asserted-by":"crossref","unstructured":"Kong, J., & Lomuscio, A. (2017). Model checking multi-agent systems against LDLK specifications. In IJCAI, pp. 1138\u20131144.","DOI":"10.24963\/ijcai.2017\/158"},{"key":"9542_CR31","unstructured":"Kouvaros, P., Lomuscio, A., Pirovano, E., & Punchihewa, H. (2019). Formal verification of open multi-agent systems. In Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems, (pp. 179\u2013187)."},{"issue":"2","key":"9542_CR32","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1145\/333979.333987","volume":"47","author":"O Kupferman","year":"2000","unstructured":"Kupferman, O., Vardi, M. Y., & Wolper, P. (2000). An automata-theoretic approach to branching-time model checking. Journal of the ACM, 47(2), 312\u2013360.","journal-title":"Journal of the ACM"},{"key":"9542_CR33","doi-asserted-by":"crossref","unstructured":"Liu, F., & Lorini, E. (2017). Reasoning about belief, evidence and trust in a multi-agent setting. In International Conference on Principles and Practice of Multi-agent Systems, (pp. 71\u201389)","DOI":"10.1007\/978-3-319-69131-2_5"},{"key":"9542_CR34","unstructured":"Lomuscio, A., & Michaliszyn, J. (2016). Model checking multi-agent systems against epistemic HS specifications with regular expressions. In Fifteenth International Conference on the Principles of Knowledge Representation and Reasoning"},{"key":"9542_CR35","unstructured":"Lomuscio, A., & Michaliszyn, J. (2016). Verification of multi-agent systems via predicate abstraction against ATLK specifications. In AAMAS"},{"key":"9542_CR36","unstructured":"Lomuscio, A., Pecheur, C., & Raimondi, F. (2007). Automatic verification of knowledge and time with NuSMV. In Proceedings of the Twentieth International Joint Conference on Artificial Intelligence, (pp. 1384\u20131389). IJCAI\/AAAI Press."},{"key":"9542_CR37","unstructured":"Marsh, S. (1994). Formalising trust as a computational concept. Ph.D. thesis, University of Stirling"},{"key":"9542_CR38","doi-asserted-by":"crossref","unstructured":"Nayak, A., Chhogyal, K., Ghose, A., & Hoa, D. (2019). A value based trust assessment model for multi-agent systems. In 28th International Joint Conference on Artificial Intelligence, IJCAI.","DOI":"10.24963\/ijcai.2019\/28"},{"key":"9542_CR39","unstructured":"Parr, T. (2013). The Definitive ANTLR 4 Reference (1st ed.). The Pragmatic Programmers: The Pragmatic Bookshelf."},{"key":"9542_CR40","doi-asserted-by":"crossref","unstructured":"Parr, T., & Fisher, K. (2011). LL(*): The foundation of the ANTLR parser generator. In: M.W. Hall, D.A. Padua (eds.) In Proceedings of the 32nd ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI 2011, San Jose, CA, June 4\u20138, 2011, (pp. 425\u2013436). ACM","DOI":"10.1145\/1993316.1993548"},{"key":"9542_CR41","doi-asserted-by":"crossref","unstructured":"Parr, T., Harwell, S., & Fisher, K. (2014). Adaptive LL(*) parsing: The power of dynamic analysis. In: A.P. Black, T.D. Millstein (eds.) In: Proceedings of the 2014 ACM International Conference on Object Oriented Programming Systems Languages & Applications, OOPSLA 2014, part of SPLASH 2014, Portland October 20\u201324, 2014, (pp. 579\u2013598). ACM","DOI":"10.1145\/2660193.2660202"},{"issue":"2","key":"9542_CR42","first-page":"167","volume":"55","author":"W Penczek","year":"2003","unstructured":"Penczek, W., & Lomuscio, A. (2003). Verifying epistemic properties of multi-agent systems via bounded model checking. Fundamenta Informaticae, 55(2), 167\u2013185.","journal-title":"Fundamenta Informaticae"},{"key":"9542_CR43","doi-asserted-by":"crossref","unstructured":"Pnueli, A. (1977). The temporal logic of programs. In 18th Annual Symposium on Foundations of Computer Science, (pp. 46\u201357)","DOI":"10.1109\/SFCS.1977.32"},{"key":"9542_CR44","doi-asserted-by":"crossref","unstructured":"Primiero, G. (2016). A calculus for distrust and mistrust. In: Trust Management X-10th IFIP WG 11.11 International Conference, IFIPTM. IFIP Advances in Information and Communication Technology, (Vol. 473, pp. 183\u2013190).","DOI":"10.1007\/978-3-319-41354-9_15"},{"issue":"3","key":"9542_CR45","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1080\/11663081.2020.1789404","volume":"30","author":"G Primiero","year":"2020","unstructured":"Primiero, G. (2020). A logic of negative trust. Journal of Applied Non-Classical Logics, 30(3), 193\u2013222.","journal-title":"Journal of Applied Non-Classical Logics"},{"key":"9542_CR46","doi-asserted-by":"crossref","unstructured":"Primiero, G., & Raimondi, F. (2014). A typed natural deduction calculus to reason about secure trust. In Twelfth Annual International Conference on Privacy, Security and Trust, (pp. 379\u2013382). IEEE Computer Society.","DOI":"10.1109\/PST.2014.6890963"},{"issue":"4","key":"9542_CR47","doi-asserted-by":"publisher","first-page":"995","DOI":"10.1109\/TCSS.2018.2879510","volume":"5","author":"N Sardana","year":"2018","unstructured":"Sardana, N., Cohen, R., Zhang, J., & Chen, S. (2018). A Bayesian multiagent trust model for social networks. IEEE Transactions on Computational Social Systems, 5(4), 995\u20131008.","journal-title":"IEEE Transactions on Computational Social Systems"},{"key":"9542_CR48","unstructured":"Schnoebelen, P. (2002). The complexity of temporal logic model checking. In: The 4th conference on Advances in Modal Logic, (pp. 393\u2013436)."},{"key":"9542_CR49","unstructured":"Singh, M. P. (2008). Semantical considerations on dialectical and practical commitments. In: AAAI (Vol. 8, pp. 176\u2013181)."},{"key":"9542_CR50","unstructured":"Singh, M.P. (2008). Semantical considerations on dialectical and practical commitments. In: D.\u00a0Fox, C.P. Gomes (eds.) In Proceedings of the Twenty-Third AAAI Conference on Artificial Intelligence, AAAI, Chicago, July 13\u201317, (pp. 176\u2013181). AAAI Press."},{"key":"9542_CR51","unstructured":"Singh, M.P. (2011). Trust as dependence: A logical approach. In: The 10th International Conference on Autonomous Agents and Multiagent Systems, (pp. 863\u2013870)"},{"issue":"14","key":"9542_CR52","doi-asserted-by":"publisher","first-page":"6291","DOI":"10.1016\/j.eswa.2014.04.008","volume":"41","author":"K Sultan","year":"2014","unstructured":"Sultan, K., Bentahar, J., Wan, W., & Al-Saqqar, F. (2014). Modeling and verifying probabilistic multi-agent systems using knowledge and social commitments. Expert Systems with Applications, 41(14), 6291\u20136304.","journal-title":"Expert Systems with Applications"},{"issue":"11","key":"9542_CR53","doi-asserted-by":"publisher","first-page":"e0141202","DOI":"10.1371\/journal.pone.0141202","volume":"10","author":"PR Telang","year":"2015","unstructured":"Telang, P. R., Kalia, A. K., & Singh, M. P. (2015). Modeling healthcare processes using commitments: An empirical evaluation. PLoS ONE, 10(11), e0141202.","journal-title":"PLoS ONE"},{"issue":"3","key":"9542_CR54","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1007\/s10458-013-9229-x","volume":"28","author":"N Troquard","year":"2014","unstructured":"Troquard, N. (2014). Reasoning about coalitional agency and ability in the logics of \u201cbringing-it-about\u2019\u2019. Autonomous Agents and Multi-agent Systems, 28(3), 381\u2013407.","journal-title":"Autonomous Agents and Multi-agent Systems"},{"key":"9542_CR55","doi-asserted-by":"crossref","unstructured":"Vigan\u00f2, F., & Colombetti, M. (2009). Verifying organizations regulated by institutions. In V.\u00a0Dignum (ed.) Handbook of Research on Multi-Agent Systems-Semantics and Dynamics of Organizational Models, (pp. 367\u2013396). IGI Global.","DOI":"10.4018\/978-1-60566-256-5.ch015"},{"issue":"1","key":"9542_CR56","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1109\/TSC.2016.2549019","volume":"11","author":"OA Wahab","year":"2018","unstructured":"Wahab, O. A., Bentahar, J., Otrok, H., & Mourad, A. (2018). Towards trustworthy multi-cloud services communities: A trust-based hedonic coalitional game. IEEE Transactions on Services Computing, 11(1), 184\u2013201.","journal-title":"IEEE Transactions on Services Computing"}],"container-title":["Autonomous Agents and Multi-Agent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10458-021-09542-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10458-021-09542-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10458-021-09542-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,19]],"date-time":"2024-09-19T18:10:30Z","timestamp":1726769430000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10458-021-09542-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3,3]]},"references-count":56,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,4]]}},"alternative-id":["9542"],"URL":"https:\/\/doi.org\/10.1007\/s10458-021-09542-6","relation":{},"ISSN":["1387-2532","1573-7454"],"issn-type":[{"type":"print","value":"1387-2532"},{"type":"electronic","value":"1573-7454"}],"subject":[],"published":{"date-parts":[[2022,3,3]]},"assertion":[{"value":"21 December 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 March 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"19"}}