{"id":"https://openalex.org/W7128311220","doi":"https://doi.org/10.3390/jcp6010028","title":"cyberSPADE: A Hierarchical Multi-Agent Architecture for Coordinated Cyberdefense","display_name":"cyberSPADE: A Hierarchical Multi-Agent Architecture for Coordinated Cyberdefense","publication_year":2026,"publication_date":"2026-02-08","ids":{"openalex":"https://openalex.org/W7128311220","doi":"https://doi.org/10.3390/jcp6010028"},"language":"en","primary_location":{"id":"doi:10.3390/jcp6010028","is_oa":true,"landing_page_url":"https://doi.org/10.3390/jcp6010028","pdf_url":"https://www.mdpi.com/2624-800X/6/1/28/pdf","source":{"id":"https://openalex.org/S4210232532","display_name":"Journal of Cybersecurity and Privacy","issn_l":"2624-800X","issn":["2624-800X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity and Privacy","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2624-800X/6/1/28/pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5125352889","display_name":"Luc\u00eda Alba Torres","orcid":null},"institutions":[{"id":"https://openalex.org/I60053951","display_name":"Universitat Polit\u00e8cnica de Val\u00e8ncia","ror":"https://ror.org/01460j859","country_code":"ES","type":"education","lineage":["https://openalex.org/I60053951"]}],"countries":["ES"],"is_corresponding":true,"raw_author_name":"Luc\u00eda Alba Torres","raw_affiliation_strings":["VRAIN\u2013Valencian Research Institute for Artificial Intelligence, Universitat Polit\u00e8cnica de Val\u00e8ncia, Cam\u00ed de Vera s/n, 46022 Val\u00e8ncia, Spain"],"raw_orcid":"https://orcid.org/0009-0000-5888-0870","affiliations":[{"raw_affiliation_string":"VRAIN\u2013Valencian Research Institute for Artificial Intelligence, Universitat Polit\u00e8cnica de Val\u00e8ncia, Cam\u00ed de Vera s/n, 46022 Val\u00e8ncia, Spain","institution_ids":["https://openalex.org/I60053951"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5125368510","display_name":"Miguel Rebollo","orcid":null},"institutions":[{"id":"https://openalex.org/I60053951","display_name":"Universitat Polit\u00e8cnica de Val\u00e8ncia","ror":"https://ror.org/01460j859","country_code":"ES","type":"education","lineage":["https://openalex.org/I60053951"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Miguel Rebollo","raw_affiliation_strings":["VRAIN\u2013Valencian Research Institute for Artificial Intelligence, Universitat Polit\u00e8cnica de Val\u00e8ncia, Cam\u00ed de Vera s/n, 46022 Val\u00e8ncia, Spain"],"raw_orcid":"https://orcid.org/0000-0002-5115-8751","affiliations":[{"raw_affiliation_string":"VRAIN\u2013Valencian Research Institute for Artificial Intelligence, Universitat Polit\u00e8cnica de Val\u00e8ncia, Cam\u00ed de Vera s/n, 46022 Val\u00e8ncia, Spain","institution_ids":["https://openalex.org/I60053951"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056346622","display_name":"Javier Palanca","orcid":"https://orcid.org/0000-0002-6209-9603"},"institutions":[{"id":"https://openalex.org/I60053951","display_name":"Universitat Polit\u00e8cnica de Val\u00e8ncia","ror":"https://ror.org/01460j859","country_code":"ES","type":"education","lineage":["https://openalex.org/I60053951"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Javier Palanca","raw_affiliation_strings":["VRAIN\u2013Valencian Research Institute for Artificial Intelligence, Universitat Polit\u00e8cnica de Val\u00e8ncia, Cam\u00ed de Vera s/n, 46022 Val\u00e8ncia, Spain"],"raw_orcid":"https://orcid.org/0000-0002-6209-9603","affiliations":[{"raw_affiliation_string":"VRAIN\u2013Valencian Research Institute for Artificial Intelligence, Universitat Polit\u00e8cnica de Val\u00e8ncia, Cam\u00ed de Vera s/n, 46022 Val\u00e8ncia, Spain","institution_ids":["https://openalex.org/I60053951"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5125357193","display_name":"Mario Aragon\u00e9s Lozano","orcid":null},"institutions":[{"id":"https://openalex.org/I60053951","display_name":"Universitat Polit\u00e8cnica de Val\u00e8ncia","ror":"https://ror.org/01460j859","country_code":"ES","type":"education","lineage":["https://openalex.org/I60053951"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Mario Aragon\u00e9s Lozano","raw_affiliation_strings":["Communications Department, Universitat Polit\u00e8cnica de Val\u00e8ncia, Cam\u00ed de Vera s/n, 46022 Val\u00e8ncia, Spain"],"raw_orcid":"https://orcid.org/0000-0002-8278-3947","affiliations":[{"raw_affiliation_string":"Communications Department, Universitat Polit\u00e8cnica de Val\u00e8ncia, Cam\u00ed de Vera s/n, 46022 Val\u00e8ncia, Spain","institution_ids":["https://openalex.org/I60053951"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5125352889"],"corresponding_institution_ids":["https://openalex.org/I60053951"],"apc_list":{"value":1000,"currency":"CHF","value_usd":1082},"apc_paid":{"value":1000,"currency":"CHF","value_usd":1082},"fwci":25.1028,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.98643597,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":98},"biblio":{"volume":"6","issue":"1","first_page":"28","last_page":"28"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.3422999978065491,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.3422999978065491,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.14079999923706055,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.10689999908208847,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.5767999887466431},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.5149999856948853},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.43540000915527344},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.4032999873161316},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.36890000104904175},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.36489999294281006},{"id":"https://openalex.org/keywords/python","display_name":"Python (programming language)","score":0.36070001125335693},{"id":"https://openalex.org/keywords/systems-architecture","display_name":"Systems architecture","score":0.35409998893737793},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.3450999855995178},{"id":"https://openalex.org/keywords/multithreading","display_name":"Multithreading","score":0.3447999954223633}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7468000054359436},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.6349999904632568},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.5767999887466431},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.5149999856948853},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4634999930858612},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.43540000915527344},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.4032999873161316},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.36890000104904175},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.36489999294281006},{"id":"https://openalex.org/C519991488","wikidata":"https://www.wikidata.org/wiki/Q28865","display_name":"Python (programming language)","level":2,"score":0.36070001125335693},{"id":"https://openalex.org/C98025372","wikidata":"https://www.wikidata.org/wiki/Q477538","display_name":"Systems architecture","level":3,"score":0.35409998893737793},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.3450999855995178},{"id":"https://openalex.org/C201410400","wikidata":"https://www.wikidata.org/wiki/Q1064412","display_name":"Multithreading","level":3,"score":0.3447999954223633},{"id":"https://openalex.org/C41550386","wikidata":"https://www.wikidata.org/wiki/Q529909","display_name":"Multi-agent system","level":2,"score":0.3384999930858612},{"id":"https://openalex.org/C82876162","wikidata":"https://www.wikidata.org/wiki/Q17096504","display_name":"Latency (audio)","level":2,"score":0.3237999975681305},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.3116999864578247},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.3091999888420105},{"id":"https://openalex.org/C206729178","wikidata":"https://www.wikidata.org/wiki/Q2271896","display_name":"Scheduling (production processes)","level":2,"score":0.30169999599456787},{"id":"https://openalex.org/C158156997","wikidata":"https://www.wikidata.org/wiki/Q1416645","display_name":"Models of communication","level":2,"score":0.3001999855041504},{"id":"https://openalex.org/C192126672","wikidata":"https://www.wikidata.org/wiki/Q1068715","display_name":"Telecommunications network","level":2,"score":0.2994000017642975},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.29809999465942383},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.29179999232292175},{"id":"https://openalex.org/C174348530","wikidata":"https://www.wikidata.org/wiki/Q188635","display_name":"Bridging (networking)","level":2,"score":0.29170000553131104},{"id":"https://openalex.org/C31139447","wikidata":"https://www.wikidata.org/wiki/Q5380386","display_name":"Enterprise information security architecture","level":2,"score":0.28780001401901245},{"id":"https://openalex.org/C53619493","wikidata":"https://www.wikidata.org/wiki/Q4787093","display_name":"Architecture framework","level":3,"score":0.28610000014305115},{"id":"https://openalex.org/C179733262","wikidata":"https://www.wikidata.org/wiki/Q6821765","display_name":"Message broker","level":2,"score":0.2770000100135803},{"id":"https://openalex.org/C32802771","wikidata":"https://www.wikidata.org/wiki/Q2443617","display_name":"Port (circuit theory)","level":2,"score":0.2750999927520752},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2736000120639801},{"id":"https://openalex.org/C510870077","wikidata":"https://www.wikidata.org/wiki/Q7444868","display_name":"Secure communication","level":3,"score":0.2630999982357025},{"id":"https://openalex.org/C77714075","wikidata":"https://www.wikidata.org/wiki/Q5452017","display_name":"Firewall (physics)","level":5,"score":0.2624000012874603},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.2619999945163727},{"id":"https://openalex.org/C181335050","wikidata":"https://www.wikidata.org/wiki/Q14915018","display_name":"Swarm behaviour","level":2,"score":0.2599000036716461},{"id":"https://openalex.org/C193415008","wikidata":"https://www.wikidata.org/wiki/Q639681","display_name":"Network architecture","level":2,"score":0.25589999556541443},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.2551000118255615},{"id":"https://openalex.org/C126831891","wikidata":"https://www.wikidata.org/wiki/Q221673","display_name":"Host (biology)","level":2,"score":0.25270000100135803}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3390/jcp6010028","is_oa":true,"landing_page_url":"https://doi.org/10.3390/jcp6010028","pdf_url":"https://www.mdpi.com/2624-800X/6/1/28/pdf","source":{"id":"https://openalex.org/S4210232532","display_name":"Journal of Cybersecurity and Privacy","issn_l":"2624-800X","issn":["2624-800X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity and Privacy","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:032c35ec87cb4edeb6cfaca78a6b8d6e","is_oa":false,"landing_page_url":"https://doaj.org/article/032c35ec87cb4edeb6cfaca78a6b8d6e","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Cybersecurity and Privacy, Vol 6, Iss 1, p 28 (2026)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/jcp6010028","is_oa":true,"landing_page_url":"https://doi.org/10.3390/jcp6010028","pdf_url":"https://www.mdpi.com/2624-800X/6/1/28/pdf","source":{"id":"https://openalex.org/S4210232532","display_name":"Journal of Cybersecurity and Privacy","issn_l":"2624-800X","issn":["2624-800X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity and Privacy","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1469702238","display_name":null,"funder_award_id":"PID2021-123673OB-C31","funder_id":"https://openalex.org/F4320335598","funder_display_name":"Agencia Estatal de Investigaci\u00f3n"},{"id":"https://openalex.org/G2262748287","display_name":null,"funder_award_id":"501100011033","funder_id":"https://openalex.org/F4320335598","funder_display_name":"Agencia Estatal de Investigaci\u00f3n"},{"id":"https://openalex.org/G2628159602","display_name":null,"funder_award_id":"PID2024-158227NB-C33","funder_id":"https://openalex.org/F4320335598","funder_display_name":"Agencia Estatal de Investigaci\u00f3n"},{"id":"https://openalex.org/G3480869486","display_name":null,"funder_award_id":"13039","funder_id":"https://openalex.org/F4320335598","funder_display_name":"Agencia Estatal de Investigaci\u00f3n"},{"id":"https://openalex.org/G586857820","display_name":null,"funder_award_id":"501100011033/FEDER","funder_id":"https://openalex.org/F4320335598","funder_display_name":"Agencia Estatal de Investigaci\u00f3n"},{"id":"https://openalex.org/G6071709581","display_name":null,"funder_award_id":"13039/501100011033/","funder_id":"https://openalex.org/F4320335598","funder_display_name":"Agencia Estatal de Investigaci\u00f3n"},{"id":"https://openalex.org/G6302341491","display_name":null,"funder_award_id":"CIPROM/2021/077","funder_id":"https://openalex.org/F4320321864","funder_display_name":"Generalitat Valenciana"},{"id":"https://openalex.org/G7084143925","display_name":null,"funder_award_id":"AEI/10","funder_id":"https://openalex.org/F4320335598","funder_display_name":"Agencia Estatal de Investigaci\u00f3n"},{"id":"https://openalex.org/G7266728691","display_name":null,"funder_award_id":"13039/501100011033","funder_id":"https://openalex.org/F4320335598","funder_display_name":"Agencia Estatal de Investigaci\u00f3n"}],"funders":[{"id":"https://openalex.org/F4320321864","display_name":"Generalitat Valenciana","ror":"https://ror.org/0097mvx21"},{"id":"https://openalex.org/F4320335598","display_name":"Agencia Estatal de Investigaci\u00f3n","ror":null}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7128311220.pdf","grobid_xml":"https://content.openalex.org/works/W7128311220.grobid-xml"},"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Modern":[0],"cyber":[1],"threats":[2],"demand":[3],"coordinated":[4,225],"defensive":[5,59,104],"strategies":[6],"that":[7,39,161,219],"extend":[8],"beyond":[9],"centralized":[10,54],"security":[11],"mechanisms.":[12],"However,":[13],"existing":[14],"multi-agent":[15,34,221],"platforms":[16],"exhibit":[17],"critical":[18],"limitations":[19,42],"in":[20,122],"explicit":[21],"communication":[22,46,84,112],"and":[23,47,81,88,99,101,115,146,197,226],"real-time":[24],"coordination":[25,142],"for":[26,36,235],"cyberdefense":[27,38,228],"operations.":[28],"This":[29],"work":[30],"proposes":[31],"a":[32,53,123,233],"hierarchical":[33],"architecture":[35,51,191],"autonomous":[37,103],"addresses":[40],"these":[41],"through":[43],"structured":[44],"inter-agent":[45],"distributed":[48],"coordination.":[49],"The":[50,118,136],"integrates":[52],"monitor":[55,114],"agent":[56,157,182,209],"with":[57,85],"specialized":[58,92],"swarms":[60],"deployed":[61],"across":[62,150,174],"operational":[63],"hosts.":[64],"It":[65],"is":[66],"implemented":[67],"using":[68,127],"SPADE":[69],"4.1":[70],"(Smart":[71],"Python":[72],"Agent":[73],"Development":[74],"Environment)":[75],"to":[76,207],"enable":[77],"XMPP-based":[78],"(Extensible":[79],"Messaging":[80],"Presence":[82],"Protocol)":[83],"low-latency":[86,193],"messaging":[87,144],"location":[89],"transparency.":[90],"Four":[91],"swarms\u2014Network":[93],"Defender,":[94,96],"Host":[95],"Anomaly":[97],"Detection,":[98],"Forensic":[100],"Recovery\u2014perform":[102],"tasks.":[105],"A":[106,155],"secure":[107],"authentication":[108],"mechanism":[109],"ensures":[110],"trusted":[111],"between":[113],"deployer":[116],"agents.":[117],"system":[119],"was":[120],"evaluated":[121],"controlled":[124],"virtualized":[125],"environment":[126],"the":[128,167,175,189],"Network":[129],"Defender":[130],"Swarm":[131],"as":[132,212,232],"an":[133],"illustrative":[134],"case.":[135],"experimental":[137,237],"results":[138],"focus":[139],"on":[140],"internal":[141],"behavior,":[143],"efficiency,":[145],"end-to-end":[147],"detection":[148],"time":[149],"increasing":[151],"levels":[152],"of":[153],"parallelism.":[154],"scan":[156],"scalability":[158],"analysis":[159],"shows":[160],"moderate":[162],"parallelism":[163],"(2\u201316":[164],"agents)":[165],"yields":[166],"lowest":[168],"Total":[169],"Detection":[170],"Time":[171],"(12.88":[172],"s":[173],"full":[176],"TCP":[177],"port":[178],"range),":[179],"while":[180,230],"excessive":[181],"counts":[183],"degrade":[184],"performance.":[185],"Results":[186],"demonstrate":[187],"how":[188],"proposed":[190],"supports":[192],"communication,":[194],"efficient":[195],"coordination,":[196],"parallel":[198],"task":[199],"execution.":[200],"Message":[201],"latency":[202],"benchmarks":[203],"show":[204],"improvements":[205],"compared":[206],"classical":[208],"frameworks":[210],"such":[211],"JADE.":[213],"These":[214],"findings":[215],"provide":[216],"initial":[217],"evidence":[218],"communication-centric":[220],"architectures":[222],"can":[223],"facilitate":[224],"adaptive":[227],"operations,":[229],"serving":[231],"platform":[234],"further":[236],"evaluation.":[238]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-05-21T06:26:12.895304","created_date":"2026-02-09T00:00:00"}
