{"id":"https://openalex.org/W4417201640","doi":"https://doi.org/10.1109/access.2025.3642468","title":"A Web Protection Model Against Internationalized Domain Name Homograph Exploits","display_name":"A Web Protection Model Against Internationalized Domain Name Homograph Exploits","publication_year":2025,"publication_date":"2025-12-10","ids":{"openalex":"https://openalex.org/W4417201640","doi":"https://doi.org/10.1109/access.2025.3642468"},"language":null,"primary_location":{"id":"doi:10.1109/access.2025.3642468","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3642468","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/access.2025.3642468","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5053112378","display_name":"Sana Munir","orcid":"https://orcid.org/0000-0001-9188-8508"},"institutions":[{"id":"https://openalex.org/I174731842","display_name":"Islamia University of Bahawalpur","ror":"https://ror.org/002rc4w13","country_code":"PK","type":"education","lineage":["https://openalex.org/I174731842"]}],"countries":["PK"],"is_corresponding":true,"raw_author_name":"Sana Munir","raw_affiliation_strings":["Department of Computer Science, The Islamia University of Bahawalpur, Bahawalpur, Pakistan","Department of Computer Science, The Islamia University of Bahawalpur, Pakistan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, The Islamia University of Bahawalpur, Bahawalpur, Pakistan","institution_ids":["https://openalex.org/I174731842"]},{"raw_affiliation_string":"Department of Computer Science, The Islamia University of Bahawalpur, Pakistan","institution_ids":["https://openalex.org/I174731842"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056359162","display_name":"Akmal Khan","orcid":"https://orcid.org/0000-0003-3636-8053"},"institutions":[{"id":"https://openalex.org/I174731842","display_name":"Islamia University of Bahawalpur","ror":"https://ror.org/002rc4w13","country_code":"PK","type":"education","lineage":["https://openalex.org/I174731842"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Akmal Khan","raw_affiliation_strings":["Department of Computer Science, The Islamia University of Bahawalpur, Bahawalpur, Pakistan","Department of Computer Science, The Islamia University of Bahawalpur, Pakistan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, The Islamia University of Bahawalpur, Bahawalpur, Pakistan","institution_ids":["https://openalex.org/I174731842"]},{"raw_affiliation_string":"Department of Computer Science, The Islamia University of Bahawalpur, Pakistan","institution_ids":["https://openalex.org/I174731842"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5120179340","display_name":"Farkhanda Athar","orcid":null},"institutions":[{"id":"https://openalex.org/I174731842","display_name":"Islamia University of Bahawalpur","ror":"https://ror.org/002rc4w13","country_code":"PK","type":"education","lineage":["https://openalex.org/I174731842"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Farkhanda Athar","raw_affiliation_strings":["Department of Computer Science, The Islamia University of Bahawalpur, Bahawalpur, Pakistan","Department of Computer Science, The Islamia University of Bahawalpur, Pakistan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, The Islamia University of Bahawalpur, Bahawalpur, Pakistan","institution_ids":["https://openalex.org/I174731842"]},{"raw_affiliation_string":"Department of Computer Science, The Islamia University of Bahawalpur, Pakistan","institution_ids":["https://openalex.org/I174731842"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058324993","display_name":"Mansoor Qadir","orcid":"https://orcid.org/0000-0002-9047-9734"},"institutions":[{"id":"https://openalex.org/I4210112203","display_name":"CECOS University","ror":"https://ror.org/01xyxtp53","country_code":"PK","type":"education","lineage":["https://openalex.org/I4210112203"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Mohammad Mansoor Qadir","raw_affiliation_strings":["Department of Computer Science, CECOS University of Information Technology and Emerging Sciences, Peshawar, Pakistan","Department of Computer Science, CECOS University of IT &#x0026; Emerging Technologies, Pakistan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, CECOS University of Information Technology and Emerging Sciences, Peshawar, Pakistan","institution_ids":["https://openalex.org/I4210112203"]},{"raw_affiliation_string":"Department of Computer Science, CECOS University of IT &#x0026; Emerging Technologies, Pakistan","institution_ids":["https://openalex.org/I4210112203"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018141895","display_name":"Khalid J. Alzahrani","orcid":"https://orcid.org/0000-0002-6688-0106"},"institutions":[{"id":"https://openalex.org/I179331831","display_name":"Taif University","ror":"https://ror.org/014g1a453","country_code":"SA","type":"education","lineage":["https://openalex.org/I179331831"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Khalid J. Alzahrani","raw_affiliation_strings":["Department of Clinical Laboratories Sciences, College of Applied Medical Sciences, Taif University, Taif, Saudi Arabia","Department of Clinical Laboratories Sciences, College of Applied Medical Sciences, Taif University, P.O. Box 11099, Taif, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Clinical Laboratories Sciences, College of Applied Medical Sciences, Taif University, Taif, Saudi Arabia","institution_ids":["https://openalex.org/I179331831"]},{"raw_affiliation_string":"Department of Clinical Laboratories Sciences, College of Applied Medical Sciences, Taif University, P.O. Box 11099, Taif, Saudi Arabia","institution_ids":["https://openalex.org/I179331831"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089647750","display_name":"Akbayan Bekarystankyzy","orcid":"https://orcid.org/0000-0003-3984-2718"},"institutions":[{"id":"https://openalex.org/I3130577743","display_name":"Narxoz University","ror":"https://ror.org/0523w7v09","country_code":"KZ","type":"education","lineage":["https://openalex.org/I3130577743"]}],"countries":["KZ"],"is_corresponding":false,"raw_author_name":"Akbayan Bekarystankyzy","raw_affiliation_strings":["School of Digital Technologies, Narxoz University, Almaty, Kazakhstan","School of Digital Engineering, Narxoz University, Almaty, Kazakhstan"],"affiliations":[{"raw_affiliation_string":"School of Digital Technologies, Narxoz University, Almaty, Kazakhstan","institution_ids":["https://openalex.org/I3130577743"]},{"raw_affiliation_string":"School of Digital Engineering, Narxoz University, Almaty, Kazakhstan","institution_ids":["https://openalex.org/I3130577743"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5078354205","display_name":"Amal Al\u2010Rasheed","orcid":"https://orcid.org/0000-0002-4775-1798"},"institutions":[{"id":"https://openalex.org/I106778892","display_name":"Princess Nourah bint Abdulrahman University","ror":"https://ror.org/05b0cyh02","country_code":"SA","type":"education","lineage":["https://openalex.org/I106778892"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Amal Al-Rasheed","raw_affiliation_strings":["Department of Information Systems, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, P.O. Box 84428, Riyadh, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Information Systems, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, P.O. Box 84428, Riyadh, Saudi Arabia","institution_ids":["https://openalex.org/I106778892"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5053112378"],"corresponding_institution_ids":["https://openalex.org/I174731842"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.53563926,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"14","issue":null,"first_page":"1865","last_page":"1876"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.8744999766349792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.8744999766349792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.06199999898672104,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.009100000374019146,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/unicode","display_name":"Unicode","score":0.8274999856948853},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.7785000205039978},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.6504999995231628},{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.6434999704360962},{"id":"https://openalex.org/keywords/glyph","display_name":"Glyph (data visualization)","score":0.5978000164031982},{"id":"https://openalex.org/keywords/domain-name","display_name":"Domain name","score":0.5069000124931335},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.46720001101493835},{"id":"https://openalex.org/keywords/string-metric","display_name":"String metric","score":0.43970000743865967},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.40610000491142273}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8626999855041504},{"id":"https://openalex.org/C500551929","wikidata":"https://www.wikidata.org/wiki/Q8819","display_name":"Unicode","level":2,"score":0.8274999856948853},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.7785000205039978},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.6504999995231628},{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.6434999704360962},{"id":"https://openalex.org/C142816647","wikidata":"https://www.wikidata.org/wiki/Q5573018","display_name":"Glyph (data visualization)","level":3,"score":0.5978000164031982},{"id":"https://openalex.org/C2988987868","wikidata":"https://www.wikidata.org/wiki/Q32635","display_name":"Domain name","level":3,"score":0.5069000124931335},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.46720001101493835},{"id":"https://openalex.org/C22820288","wikidata":"https://www.wikidata.org/wiki/Q9050568","display_name":"String metric","level":4,"score":0.43970000743865967},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.40610000491142273},{"id":"https://openalex.org/C165064840","wikidata":"https://www.wikidata.org/wiki/Q1321061","display_name":"Matching (statistics)","level":2,"score":0.38940000534057617},{"id":"https://openalex.org/C35026560","wikidata":"https://www.wikidata.org/wiki/Q8767","display_name":"Domain Name System","level":3,"score":0.38769999146461487},{"id":"https://openalex.org/C118643609","wikidata":"https://www.wikidata.org/wiki/Q189210","display_name":"Web application","level":2,"score":0.353300005197525},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3366999924182892},{"id":"https://openalex.org/C170130773","wikidata":"https://www.wikidata.org/wiki/Q216378","display_name":"Usability","level":2,"score":0.3303000032901764},{"id":"https://openalex.org/C544833334","wikidata":"https://www.wikidata.org/wiki/Q2005","display_name":"JavaScript","level":2,"score":0.3287000060081482},{"id":"https://openalex.org/C103278499","wikidata":"https://www.wikidata.org/wiki/Q254465","display_name":"Similarity (geometry)","level":3,"score":0.32199999690055847},{"id":"https://openalex.org/C36464697","wikidata":"https://www.wikidata.org/wiki/Q451553","display_name":"Visualization","level":2,"score":0.31310001015663147},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2996000051498413},{"id":"https://openalex.org/C42629822","wikidata":"https://www.wikidata.org/wiki/Q1346408","display_name":"Geocoding","level":2,"score":0.29919999837875366},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.29269999265670776},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.28209999203681946},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.28189998865127563},{"id":"https://openalex.org/C2780264999","wikidata":"https://www.wikidata.org/wiki/Q7445032","display_name":"Security domain","level":2,"score":0.2741999924182892},{"id":"https://openalex.org/C75165309","wikidata":"https://www.wikidata.org/wiki/Q2258979","display_name":"Search engine indexing","level":2,"score":0.27239999175071716},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.26910001039505005},{"id":"https://openalex.org/C2780861071","wikidata":"https://www.wikidata.org/wiki/Q1062934","display_name":"Character (mathematics)","level":2,"score":0.26750001311302185},{"id":"https://openalex.org/C92548554","wikidata":"https://www.wikidata.org/wiki/Q2262868","display_name":"Domain model","level":3,"score":0.2667999863624573},{"id":"https://openalex.org/C157486923","wikidata":"https://www.wikidata.org/wiki/Q1376436","display_name":"String (physics)","level":2,"score":0.25920000672340393},{"id":"https://openalex.org/C2777515626","wikidata":"https://www.wikidata.org/wiki/Q496939","display_name":"Levenshtein distance","level":2,"score":0.2583000063896179},{"id":"https://openalex.org/C2779797433","wikidata":"https://www.wikidata.org/wiki/Q632959","display_name":"Blacklisting","level":2,"score":0.25279998779296875},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.2502000033855438}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/access.2025.3642468","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3642468","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1109/access.2025.3642468","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3642468","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W1657640485","https://openalex.org/W1984816986","https://openalex.org/W2083055907","https://openalex.org/W2292038309","https://openalex.org/W2617906157","https://openalex.org/W2744843959","https://openalex.org/W2765700956","https://openalex.org/W2806944993","https://openalex.org/W2883994809","https://openalex.org/W2902942389","https://openalex.org/W2922040758","https://openalex.org/W2963647121","https://openalex.org/W2980676478","https://openalex.org/W3031969710","https://openalex.org/W3039927772","https://openalex.org/W3093853059","https://openalex.org/W3180087342","https://openalex.org/W4224308024","https://openalex.org/W4281772378","https://openalex.org/W4306179547","https://openalex.org/W4362466625","https://openalex.org/W4390064474","https://openalex.org/W4394698403"],"related_works":[],"abstract_inverted_index":{"Internationalized":[0],"Domain":[1],"Names":[2],"(IDNs)":[3],"enhance":[4],"global":[5],"accessibility":[6],"by":[7,139],"supporting":[8],"Unicode":[9,141],"characters":[10,25],"in":[11,51,207,285],"web":[12,109,287],"addresses.":[13],"However,":[14],"this":[15,104],"capability":[16],"introduces":[17],"new":[18],"security":[19],"vulnerabilities,":[20],"particularly":[21],"through":[22,169],"homoglyphs\u2014visually":[23],"similar":[24],"such":[26,77,249],"as":[27,250],"the":[28,33,64,74,82,113,127,215,264,286],"Cyrillic":[29],"\u2018\u2019":[30],"(U+0435)":[31],"and":[32,71,116,144,162,189,209,243,253,276],"Latin":[34],"\u2018e\u2019":[35],"(U+0065)\u2014which":[36],"enable":[37],"attackers":[38],"to":[39,81,123,238,270],"craft":[40],"deceptive":[41],"domain":[42,72,181],"names.":[43],"These":[44],"IDN":[45,119,282],"homograph":[46,120,283],"exploits":[47,78,284],"are":[48,57],"increasingly":[49],"used":[50],"phishing":[52],"attacks,":[53,94],"creating":[54],"URLs":[55],"that":[56,135,193,259],"visually":[58],"indistinguishable":[59],"from":[60,184],"legitimate":[61],"sites.":[62],"As":[63],"adoption":[65],"of":[66,76,90,98,118,129,165,195,266],"IDNs":[67],"continues":[68],"across":[69],"browsers":[70],"registries,":[73],"risk":[75],"grows.":[79],"According":[80],"IDC":[83],"2023":[84],"Global":[85],"DNS":[86],"Threat":[87],"Report,":[88],"90%":[89],"organizations":[91],"faced":[92],"domain-based":[93],"with":[95,203],"average":[96],"losses":[97],"$1.1":[99],"million":[100,180],"per":[101],"incident.":[102],"In":[103],"study,":[105],"we":[106],"propose":[107],"a":[108,131,170,212,234,274],"protection":[110],"model":[111,125,176,216,261],"for":[112,226],"real-time":[114,227],"detection":[115,219,268],"mitigation":[117],"threats.":[121],"Central":[122],"our":[124,260],"is":[126],"construction":[128],"Unisimchar,":[130],"dynamic":[132],"homoglyph":[133,196,267],"database":[134],"extends":[136],"prior":[137],"work":[138],"incorporating":[140],"block-level":[142],"structures":[143],"performing":[145],"pixel-level":[146],"similarity":[147,241],"analysis":[148],"using":[149,246],"32\u00d732":[150],"glyph":[151],"images.":[152],"Unlike":[153],"static":[154],"or":[155],"manually":[156],"maintained":[157],"lists,":[158],"Unisimchar":[159],"enables":[160],"automated":[161],"scalable":[163],"identification":[164],"confusable":[166],"character":[167],"pairs":[168,197],"threshold-based":[171],"visual":[172,240],"matching":[173],"algorithm.":[174],"The":[175,230,256],"processes":[177],"over":[178],"1":[179],"names":[182],"sourced":[183],"Majestic":[185],"Million,":[186],"Zone":[187],"Files,":[188],"Daily":[190],"Domains,":[191],"revealing":[192],"80%":[194],"occur":[198],"within":[199,220],"high-traffic":[200],"domains":[201],"worldwide,":[202],"regional":[204],"concentrations":[205],"observed":[206],"Pakistan":[208],"Europe.":[210],"With":[211],"multithreaded":[213],"architecture,":[214],"achieves":[217],"domain-level":[218],"0.07":[221],"seconds,":[222],"making":[223],"it":[224],"suitable":[225],"threat":[228],"prevention.":[229],"comprehensive":[231],"evaluation":[232],"includes":[233],"human":[235],"perception":[236],"study":[237],"validate":[239],"thresholds":[242],"quantitative":[244],"experiments":[245],"standard":[247],"metrics":[248],"precision,":[251],"recall,":[252],"F1":[254],"score.":[255],"results":[257],"demonstrate":[258],"significantly":[262],"improves":[263],"accuracy":[265],"compared":[269],"existing":[271],"methods,":[272],"offering":[273],"practical":[275],"extensible":[277],"defense":[278],"mechanism":[279],"against":[280],"modern":[281],"ecosystem.":[288]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-12-10T00:00:00"}
