{"id":"https://openalex.org/W4210631110","doi":"https://doi.org/10.1155/2022/6401316","title":"Anomaly Detection of System Call Sequence Based on Dynamic Features and Relaxed-SVM","display_name":"Anomaly Detection of System Call Sequence Based on Dynamic Features and Relaxed-SVM","publication_year":2022,"publication_date":"2022-02-01","ids":{"openalex":"https://openalex.org/W4210631110","doi":"https://doi.org/10.1155/2022/6401316"},"language":"en","primary_location":{"id":"doi:10.1155/2022/6401316","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2022/6401316","pdf_url":"https://downloads.hindawi.com/journals/scn/2022/6401316.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://downloads.hindawi.com/journals/scn/2022/6401316.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5023302923","display_name":"Xiaoyao Liao","orcid":null},"institutions":[{"id":"https://openalex.org/I24185976","display_name":"Sichuan University","ror":"https://ror.org/011ashp19","country_code":"CN","type":"education","lineage":["https://openalex.org/I24185976"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaoyao Liao","raw_affiliation_strings":["School of Cyber Science and Engineering, Sichuan University, Chengdu 610065, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Sichuan University, Chengdu 610065, China","institution_ids":["https://openalex.org/I24185976"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055430968","display_name":"Wang Chang-zhi","orcid":"https://orcid.org/0000-0003-0491-8305"},"institutions":[{"id":"https://openalex.org/I24185976","display_name":"Sichuan University","ror":"https://ror.org/011ashp19","country_code":"CN","type":"education","lineage":["https://openalex.org/I24185976"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Changzhi Wang","raw_affiliation_strings":["School of Cyber Science and Engineering, Sichuan University, Chengdu 610065, China","Zhihuiyuntian Technology, Chengdu 610031, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Sichuan University, Chengdu 610065, China","institution_ids":["https://openalex.org/I24185976"]},{"raw_affiliation_string":"Zhihuiyuntian Technology, Chengdu 610031, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100344185","display_name":"Wen Chen","orcid":"https://orcid.org/0000-0003-0566-2495"},"institutions":[{"id":"https://openalex.org/I24185976","display_name":"Sichuan University","ror":"https://ror.org/011ashp19","country_code":"CN","type":"education","lineage":["https://openalex.org/I24185976"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wen Chen","raw_affiliation_strings":["School of Cyber Science and Engineering, Sichuan University, Chengdu 610065, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Sichuan University, Chengdu 610065, China","institution_ids":["https://openalex.org/I24185976"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5055430968"],"corresponding_institution_ids":["https://openalex.org/I24185976"],"apc_list":{"value":2100,"currency":"USD","value_usd":2100},"apc_paid":{"value":2100,"currency":"USD","value_usd":2100},"fwci":0.9959,"has_fulltext":true,"cited_by_count":7,"citation_normalized_percentile":{"value":0.76054141,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"2022","issue":null,"first_page":"1","last_page":"13"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/substring","display_name":"Substring","score":0.8409970998764038},{"id":"https://openalex.org/keywords/subsequence","display_name":"Subsequence","score":0.7575105428695679},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7364524602890015},{"id":"https://openalex.org/keywords/system-call","display_name":"System call","score":0.6451738476753235},{"id":"https://openalex.org/keywords/suffix-tree","display_name":"Suffix tree","score":0.6250908374786377},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.6181039810180664},{"id":"https://openalex.org/keywords/sequence","display_name":"Sequence (biology)","score":0.6048231720924377},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.5830883383750916},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.5634891390800476},{"id":"https://openalex.org/keywords/feature-vector","display_name":"Feature vector","score":0.4792742431163788},{"id":"https://openalex.org/keywords/tree","display_name":"Tree (set theory)","score":0.4578416049480438},{"id":"https://openalex.org/keywords/anomaly","display_name":"Anomaly (physics)","score":0.4361304044723511},{"id":"https://openalex.org/keywords/constant-false-alarm-rate","display_name":"Constant false alarm rate","score":0.4355800449848175},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4233812093734741},{"id":"https://openalex.org/keywords/generalized-suffix-tree","display_name":"Generalized suffix tree","score":0.42123234272003174},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.4174535274505615},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3524455428123474},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.21174469590187073},{"id":"https://openalex.org/keywords/combinatorics","display_name":"Combinatorics","score":0.17765238881111145},{"id":"https://openalex.org/keywords/data-structure","display_name":"Data structure","score":0.14177632331848145},{"id":"https://openalex.org/keywords/bounded-function","display_name":"Bounded function","score":0.09525874257087708}],"concepts":[{"id":"https://openalex.org/C182407805","wikidata":"https://www.wikidata.org/wiki/Q2626534","display_name":"Substring","level":3,"score":0.8409970998764038},{"id":"https://openalex.org/C137877099","wikidata":"https://www.wikidata.org/wiki/Q1332977","display_name":"Subsequence","level":3,"score":0.7575105428695679},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7364524602890015},{"id":"https://openalex.org/C2778579508","wikidata":"https://www.wikidata.org/wiki/Q722192","display_name":"System call","level":2,"score":0.6451738476753235},{"id":"https://openalex.org/C2781166958","wikidata":"https://www.wikidata.org/wiki/Q1426863","display_name":"Suffix tree","level":3,"score":0.6250908374786377},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.6181039810180664},{"id":"https://openalex.org/C2778112365","wikidata":"https://www.wikidata.org/wiki/Q3511065","display_name":"Sequence (biology)","level":2,"score":0.6048231720924377},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.5830883383750916},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.5634891390800476},{"id":"https://openalex.org/C83665646","wikidata":"https://www.wikidata.org/wiki/Q42139305","display_name":"Feature vector","level":2,"score":0.4792742431163788},{"id":"https://openalex.org/C113174947","wikidata":"https://www.wikidata.org/wiki/Q2859736","display_name":"Tree (set theory)","level":2,"score":0.4578416049480438},{"id":"https://openalex.org/C12997251","wikidata":"https://www.wikidata.org/wiki/Q567560","display_name":"Anomaly (physics)","level":2,"score":0.4361304044723511},{"id":"https://openalex.org/C77052588","wikidata":"https://www.wikidata.org/wiki/Q644307","display_name":"Constant false alarm rate","level":2,"score":0.4355800449848175},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4233812093734741},{"id":"https://openalex.org/C118146561","wikidata":"https://www.wikidata.org/wiki/Q5532514","display_name":"Generalized suffix tree","level":4,"score":0.42123234272003174},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.4174535274505615},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3524455428123474},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.21174469590187073},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.17765238881111145},{"id":"https://openalex.org/C162319229","wikidata":"https://www.wikidata.org/wiki/Q175263","display_name":"Data structure","level":2,"score":0.14177632331848145},{"id":"https://openalex.org/C34388435","wikidata":"https://www.wikidata.org/wiki/Q2267362","display_name":"Bounded function","level":2,"score":0.09525874257087708},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C26873012","wikidata":"https://www.wikidata.org/wiki/Q214781","display_name":"Condensed matter physics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C54355233","wikidata":"https://www.wikidata.org/wiki/Q7162","display_name":"Genetics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1155/2022/6401316","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2022/6401316","pdf_url":"https://downloads.hindawi.com/journals/scn/2022/6401316.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:32e37e8f79ab443a95f503def3af45f2","is_oa":true,"landing_page_url":"https://doaj.org/article/32e37e8f79ab443a95f503def3af45f2","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Security and Communication Networks, Vol 2022 (2022)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1155/2022/6401316","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2022/6401316","pdf_url":"https://downloads.hindawi.com/journals/scn/2022/6401316.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.5199999809265137}],"awards":[{"id":"https://openalex.org/G1001311788","display_name":null,"funder_award_id":"U1736212","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1121271761","display_name":null,"funder_award_id":"Program","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1151522064","display_name":null,"funder_award_id":"U19A2","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1258056322","display_name":null,"funder_award_id":"B18054","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3109554704","display_name":null,"funder_award_id":"020YFB1805405","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3569760950","display_name":null,"funder_award_id":"U1736212","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G3682514609","display_name":null,"funder_award_id":"U19A2068","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G391238517","display_name":null,"funder_award_id":", and","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4572080809","display_name":null,"funder_award_id":"61\u2009872\u2009255","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5271750175","display_name":null,"funder_award_id":"2019QY0800","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G5555541602","display_name":null,"funder_award_id":"B18054","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G5905106600","display_name":null,"funder_award_id":"2019QY0800","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G702592328","display_name":null,"funder_award_id":"2019QY","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G8070837167","display_name":null,"funder_award_id":"020YFB1805405","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G867414068","display_name":null,"funder_award_id":"U19A2068","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4210631110.pdf","grobid_xml":"https://content.openalex.org/works/W4210631110.grobid-xml"},"referenced_works_count":33,"referenced_works":["https://openalex.org/W6563103","https://openalex.org/W248959849","https://openalex.org/W1587265799","https://openalex.org/W1628129782","https://openalex.org/W1941427975","https://openalex.org/W1972544015","https://openalex.org/W1977264295","https://openalex.org/W1977838479","https://openalex.org/W1978394996","https://openalex.org/W1981738628","https://openalex.org/W2009803064","https://openalex.org/W2023358833","https://openalex.org/W2044670456","https://openalex.org/W2059513841","https://openalex.org/W2065641132","https://openalex.org/W2099964107","https://openalex.org/W2100495367","https://openalex.org/W2116846763","https://openalex.org/W2129860818","https://openalex.org/W2148121208","https://openalex.org/W2153157120","https://openalex.org/W2167240430","https://openalex.org/W2267339884","https://openalex.org/W2338128881","https://openalex.org/W2773153974","https://openalex.org/W3010323679","https://openalex.org/W3092977967","https://openalex.org/W3098878596","https://openalex.org/W3124203340","https://openalex.org/W3136767761","https://openalex.org/W3151784567","https://openalex.org/W3154196099","https://openalex.org/W6678985388"],"related_works":["https://openalex.org/W2102450363","https://openalex.org/W2070949798","https://openalex.org/W2053292606","https://openalex.org/W1590204465","https://openalex.org/W2067956663","https://openalex.org/W2560606564","https://openalex.org/W2586037276","https://openalex.org/W1608420182","https://openalex.org/W2162655434","https://openalex.org/W75168880"],"abstract_inverted_index":{"The":[0,96,145],"system":[1,61,77,107],"call":[2,28,62,78,108],"sequences":[3,29,63],"of":[4,30,47,75,93,98,131,159],"processes":[5],"are":[6,49,64,116],"important":[7],"for":[8],"host-based":[9],"anomaly":[10],"detection.":[11],"However,":[12],"the":[13,21,27,37,44,58,60,85,89,94,99,128,132,139,157,160,167],"detection":[14,38],"accuracy":[15],"can":[16,163],"be":[17,40],"seriously":[18],"degenerated":[19],"by":[20],"subsequences":[22,48,68,102],"which":[23,127],"simultaneously":[24],"appeared":[25,104],"in":[26,105,126],"both":[31],"normal":[32],"and":[33,121,153],"abnormal":[34],"processes.":[35],"Furthermore,":[36],"may":[39],"obstructed":[41],"especially":[42],"when":[43],"normal/abnormal":[45],"distributions":[46],"extremely":[50],"imbalanced":[51],"along":[52],"with":[53,69,142],"many":[54],"ambiguous":[55],"samples.":[56],"In":[57],"paper,":[59],"divided":[65],"into":[66,118],"weighted":[67],"fixed-length.":[70],"Secondly,":[71],"a":[72,119],"suffix":[73],"tree":[74],"each":[76,106],"sequence":[79,109],"is":[80,135,171],"constructed":[81],"to":[82],"automatically":[83],"extract":[84],"variable-length":[86,101],"subsequence":[87],"from":[88],"longest":[90],"repeated":[91],"substring":[92],"tree.":[95],"frequencies":[97],"fixed-and":[100],"that":[103,156],"constitute":[110],"its":[111],"feature":[112],"vector.":[113],"Finally,":[114],"vectors":[115],"input":[117],"cost-sensitive":[120],"relaxed":[122,133],"support":[123],"vector":[124],"machine,":[125],"penalty-free":[129],"slack":[130],"SVM":[134],"split":[136],"independently":[137],"between":[138],"two":[140,149],"classes":[141],"different":[143],"weights.":[144],"experimental":[146],"results":[147],"on":[148],"public":[150],"datasets":[151],"ADFA-LD":[152],"UNM":[154],"showed":[155],"AUC":[158],"proposed":[161],"method":[162],"reach":[164],"99%,":[165],"while":[166],"false":[168],"alarm":[169],"rate":[170],"only":[172],"2.4%.":[173]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":1}],"updated_date":"2026-03-18T14:38:29.013473","created_date":"2025-10-10T00:00:00"}
