{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T17:40:10Z","timestamp":1746380410767,"version":"3.40.4"},"reference-count":60,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2014,12,1]],"date-time":"2014-12-01T00:00:00Z","timestamp":1417392000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61300221","61471217"],"award-info":[{"award-number":["61300221","61471217"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Fundamental Research","award":["2014ZZ0038"],"award-info":[{"award-number":["2014ZZ0038"]}]},{"name":"Comprehensive Strategic Cooperation Project of Guangdong Province and Chinese Academy of Sciences","award":["2012B090400016"],"award-info":[{"award-number":["2012B090400016"]}]},{"name":"Technology Planning Project of Guangdong Province","award":["2012A011100005"],"award-info":[{"award-number":["2012A011100005"]}]},{"name":"High-Tech Research and Development Program of China","award":["SQ2015AAJY1595"],"award-info":[{"award-number":["SQ2015AAJY1595"]}]},{"name":"China Postdoctoral Science Fund","award":["2014M550735"],"award-info":[{"award-number":["2014M550735"]}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computer Networks"],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1016\/j.comnet.2014.08.015","type":"journal-article","created":{"date-parts":[[2014,9,16]],"date-time":"2014-09-16T12:24:34Z","timestamp":1410870274000},"page":"13-33","update-policy":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":4,"special_numbering":"PA","title":["PACOM: Parasitic anonymous communication in the BitTorrent network"],"prefix":"10.1016","volume":"74","author":[{"given":"Jianming","family":"Lv","sequence":"first","affiliation":[]},{"given":"Tieying","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Zhenhua","family":"Li","sequence":"additional","affiliation":[]},{"given":"Xueqi","family":"Cheng","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"2","key":"10.1016\/j.comnet.2014.08.015_b0005","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1145\/293411.293443","article-title":"Onion routing","volume":"42","author":"Goldschlag","year":"1999","journal-title":"Commun. ACM"},{"key":"10.1016\/j.comnet.2014.08.015_b0010","doi-asserted-by":"crossref","unstructured":"R. Dingledine, N. Mathewson, P. Syverson, Tor: the second generation onion router, in: Proc. 13th USENIX Security Symposium, vol. 13, 2004.","DOI":"10.21236\/ADA465464"},{"issue":"1","key":"10.1016\/j.comnet.2014.08.015_b0015","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1145\/290163.290168","article-title":"Crowds: anonymity for web transactions","volume":"1","author":"Reiter","year":"1998","journal-title":"ACM Trans. Inform. Syst. Sec."},{"key":"10.1016\/j.comnet.2014.08.015_b0020","doi-asserted-by":"crossref","unstructured":"M. Freedman, R. Morris, Tarzan: a peer-to-peer anonymizing network layer, in: Proc. 9th ACM Conf. Computer and Communications Security (CCS02), 2002, pp. 193\u2013206.","DOI":"10.1145\/586135.586137"},{"key":"10.1016\/j.comnet.2014.08.015_b0025","doi-asserted-by":"crossref","unstructured":"M. Rennhard, B. Plattner, Introducing morphmix: peer-to-peer based anonymous Internet usage with collusion detection, in: Proc. ACM Workshop on Privacy in the Electronic Society (WPES\u201902), 2002, pp. 91\u2013102.","DOI":"10.1145\/644527.644537"},{"key":"10.1016\/j.comnet.2014.08.015_b0030","doi-asserted-by":"crossref","unstructured":"A. Mislove, G. Oberoi, A. Post, C. Reis, P. Druschel, D. Wallach, Ap3: cooperative, decentralized anonymous communication, in: Proc. ACM SIGOPS European Workshop, 2004.","DOI":"10.1145\/1133572.1133578"},{"key":"10.1016\/j.comnet.2014.08.015_b0035","doi-asserted-by":"crossref","unstructured":"A. Panchenko, S. Richter, A. Rache, Nisan: network information service for anonymization networks, in: Proc. 16th ACM Conf. Computer and Communications Security (CCS09), 2009, pp.141\u2013150.","DOI":"10.1145\/1653662.1653681"},{"key":"10.1016\/j.comnet.2014.08.015_b0040","doi-asserted-by":"crossref","unstructured":"J. McLachlan, A. Tran, N. Hopper, Y. Kim, Scalable onion routing with torsk, in: Proc. 16th ACM Conf. Computer and Communications Security (CCS09), 2009, pp. 590\u2013599.","DOI":"10.1145\/1653662.1653733"},{"issue":"3","key":"10.1016\/j.comnet.2014.08.015_b0045","doi-asserted-by":"crossref","first-page":"464","DOI":"10.1109\/TPDS.2010.98","article-title":"Rumor riding: anonymizing unstructured peer-to-peer systems","volume":"22","author":"Liu","year":"2011","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"10.1016\/j.comnet.2014.08.015_b0050","doi-asserted-by":"crossref","unstructured":"A. Nambiar, M. Wright, Salsa: a structured approach to large-scale anonymity, in: Proc. 13th ACM Conf. Computer and Communications Security (CCS06), 2006, pp. 17\u201326.","DOI":"10.1145\/1180405.1180409"},{"key":"10.1016\/j.comnet.2014.08.015_b0055","doi-asserted-by":"crossref","unstructured":"P. Mittal, N. Borisov, Shadowwalker: peer-to-peer anonymous communication using redundant structured topologies, in: Proc. 16th ACM Conf. Computer and Communications Security (CCS09), 2009, pp. 161\u2013172.","DOI":"10.1145\/1653662.1653683"},{"issue":"4","key":"10.1016\/j.comnet.2014.08.015_b0060","doi-asserted-by":"crossref","first-page":"253","DOI":"10.1109\/3468.935042","article-title":"Netcamo: camouflaging network traffic for Qos guaranteed mission critical applications","volume":"31","author":"Guan","year":"2001","journal-title":"IEEE Trans. Syst., Man, Cybernet."},{"key":"10.1016\/j.comnet.2014.08.015_b0065","unstructured":"Y. Guan, C. Li, D. Xuan, R. Bettati, W. Zhao, Preventing traffic analysis for real-time communication networks, in: Proc. IEEE Military Communications Conference (MIL-COM99), 1999, pp. 744\u2013750."},{"key":"10.1016\/j.comnet.2014.08.015_b0070","doi-asserted-by":"crossref","unstructured":"B. Levine, M. Reiter, C. Wang, M. Wright, Timing attacks in low-latency mix systems, in: Proc. 8th Intl Conf. Financial Cryptography, 2004, pp. 251\u2013265.","DOI":"10.1007\/978-3-540-27809-2_25"},{"issue":"2","key":"10.1016\/j.comnet.2014.08.015_b0075","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1145\/358549.358563","article-title":"Untraceable electronic mail, return addresses, and digital pseudonyms","volume":"24","author":"Chaum","year":"1981","journal-title":"Commun. ACM"},{"key":"10.1016\/j.comnet.2014.08.015_b0080","doi-asserted-by":"crossref","unstructured":"G. Danezis, R. Dingledine, N. Mathewson, Maxminion: design of a type III anonymous remailer protocol, in: Proc. IEEE Symp. Security and Privacy, 2003, pp. 2\u201315.","DOI":"10.1109\/SECPRI.2003.1199323"},{"issue":"4","key":"10.1016\/j.comnet.2014.08.015_b0085","doi-asserted-by":"crossref","first-page":"495","DOI":"10.1109\/49.668973","article-title":"Real-time MIXes: a bandwidth-effcient anonymity protocol","volume":"16","author":"Jerichow","year":"1998","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"10.1016\/j.comnet.2014.08.015_b0090","doi-asserted-by":"crossref","unstructured":"A. Serjantov, R. Dingledine, P. Syverson, From a trickle to a flood: active attacks on several mix types, in: Proc. Information Hiding Workshop (IH 02), 2002, pp. 36\u201352.","DOI":"10.1007\/3-540-36415-3_3"},{"key":"10.1016\/j.comnet.2014.08.015_b0095","doi-asserted-by":"crossref","unstructured":"W. Wang, M. Motani, V. Srinivasan, Dependent link padding algorithms for low latency anonymity systems, in: Proc. 15th ACM Conference on Computer and Communications Security (CCS08), 2008, pp. 323\u2013332.","DOI":"10.1145\/1455770.1455812"},{"key":"10.1016\/j.comnet.2014.08.015_b0100","unstructured":"C. Wright, S. Coull, F. Monrose, Traffic morphing: an efficient defense against statistical traffic analysis, in: Proc. 16th Network and Distributed Security Symposium (NDSS\u201909), 2009, pp. 237\u2013250."},{"issue":"7","key":"10.1016\/j.comnet.2014.08.015_b0105","doi-asserted-by":"crossref","first-page":"954","DOI":"10.1109\/TPDS.2009.146","article-title":"Correlation-based traffic analysis attacks on anonymity networks","volume":"21","author":"Zhu","year":"2010","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"10.1016\/j.comnet.2014.08.015_b0110","doi-asserted-by":"crossref","unstructured":"X. Wang, S. Chen, S. Jajodia, Network flow watermarking attack on low-latency anonymous communication systems, in: Proc. IEEE Symp. Security and Privacy, 2007, pp. 116\u2013130.","DOI":"10.1109\/SP.2007.30"},{"key":"10.1016\/j.comnet.2014.08.015_b0115","doi-asserted-by":"crossref","unstructured":"S.J. Murdoch, G. Danezis, Low-cost traffic analysis of Tor, in: Proc. IEEE Symp. Security and Privacy, 2005, pp. 183\u2013195.","DOI":"10.1109\/SP.2005.12"},{"key":"10.1016\/j.comnet.2014.08.015_b0120","doi-asserted-by":"crossref","unstructured":"S. Chakravarty, A. Stavrou, A. Keromytis, Traffic analysis against low-latency anonymity networks using available bandwidth estimation, in: Proc. 15th European Symp. Research in Computer Security (ESORICS10), 2010, pp. 249\u2013267.","DOI":"10.1007\/978-3-642-15497-3_16"},{"key":"10.1016\/j.comnet.2014.08.015_b0125","unstructured":"BitTorrent Inc, uTorrent & BitTorrent Surge to 150 Million Monthly Users, 2012. <https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/torrentfreak.com\/bittorrent-surges-to-150-million-monthly-users-120109\/>."},{"key":"10.1016\/j.comnet.2014.08.015_b0130","unstructured":"Andrei Serjantov, George Danezis, Towards an information theoretic metric for anonymity, in: Proc. 2th Privacy Enhancing Technologies Symposium (PET02), vol. 2482, 2002, pp. 41\u201353."},{"key":"10.1016\/j.comnet.2014.08.015_b0135","unstructured":"U. Moller, L. Cottrell, P. Palfrader, L. Sassaman, Mixmaster Protocol Version 2, IETF Internet Draft, 2003."},{"key":"10.1016\/j.comnet.2014.08.015_b0140","unstructured":"A. Back, I. Goldberg, A. Shostack, Freedom Systems 2.1 Security Issues and Analysis, White Paper, Zero Knowledge Systems, Inc., 2001."},{"issue":"4","key":"10.1016\/j.comnet.2014.08.015_b0145","doi-asserted-by":"crossref","first-page":"489","DOI":"10.1145\/1042031.1042032","article-title":"The predecessor attack: an analysis of a threat to anonymous communications systems","volume":"7","author":"Wright","year":"2004","journal-title":"ACM Trans. Inform. Syst. Sec."},{"issue":"4","key":"10.1016\/j.comnet.2014.08.015_b0150","doi-asserted-by":"crossref","first-page":"869","DOI":"10.1016\/j.comnet.2012.11.005","article-title":"Protocol-level attacks against Tor","volume":"57","author":"Ling","year":"2013","journal-title":"Comput. Networks"},{"key":"10.1016\/j.comnet.2014.08.015_b0155","doi-asserted-by":"crossref","unstructured":"L. \u00d8verlier, P. Syverson, Locating hidden servers, in: Proc. IEEE Symp. Security and Privacy, 2006, pp. 100\u2013114.","DOI":"10.1109\/SP.2006.24"},{"key":"10.1016\/j.comnet.2014.08.015_b0160","doi-asserted-by":"crossref","unstructured":"A. Serjantov, P. Sewell, Passive attack analysis for connection-based anonymity systems, in: Proc. 8th European Symp. Research in Computer Security (ESORICS03), 2003, pp. 116\u2013131.","DOI":"10.1007\/978-3-540-39650-5_7"},{"key":"10.1016\/j.comnet.2014.08.015_b0165","unstructured":"G. Danezis, The traffic analysis of continuous-time mixes, in: Proc. Privacy Enhancing Technologies Workshop (PET04), vol. 3424, 2004, pp. 35\u201350."},{"key":"10.1016\/j.comnet.2014.08.015_b0170","doi-asserted-by":"crossref","unstructured":"C. Troncoso, G. Danezis, The Bayesian traffic analysis of mix networks, in: Proc. 16th ACM Conf. Computer and Communications Security (CCS09), 2009, pp. 369\u2013379.","DOI":"10.1145\/1653662.1653707"},{"key":"10.1016\/j.comnet.2014.08.015_b0175","unstructured":"D. Kesdogan, D. Agrawal, S. Penz, Limits of anonymity in open environments, in: Proc. Information Hiding Workshop (IH02), vol. 2578, 2002, pp. 53\u201369."},{"key":"10.1016\/j.comnet.2014.08.015_b0180","doi-asserted-by":"crossref","unstructured":"G. Danezis, Statistical disclosure attacks: traffic confirmation in open environments, in: Proc. Security and Privacy in the Age of Uncertainty (SEC03), 2003, pp. 421\u2013426.","DOI":"10.1007\/978-0-387-35691-4_40"},{"key":"10.1016\/j.comnet.2014.08.015_b0185","doi-asserted-by":"crossref","unstructured":"D. Kesdogan, D. Agrawal, V. Pham, D. Rautenbach, Fundamental limits on the anonymity provided by the MIX technique, in: Proc. IEEE Symp. Security and Privacy, 2006, pp. 86\u201399.","DOI":"10.1109\/SP.2006.17"},{"key":"10.1016\/j.comnet.2014.08.015_b0190","doi-asserted-by":"crossref","unstructured":"Q. Wang, P. Mittal, N. Borisov, In search of an anonymous and secure lookup, in: Proc. 17th ACM Conf. Computer and Communication Security (CCS 10), 2010, pp. 308\u2013318.","DOI":"10.1145\/1866307.1866343"},{"key":"10.1016\/j.comnet.2014.08.015_b0195","doi-asserted-by":"crossref","unstructured":"J. Feigenbaum, A. Johnson, P. Syverson, Preventing active timing attacks in low-latency anonymous communication, in: Proc. 10th Privacy Enhancing Technologies Symposium (PETS10), 2010, pp. 166\u2013183.","DOI":"10.1007\/978-3-642-14527-8_10"},{"issue":"15","key":"10.1016\/j.comnet.2014.08.015_b0200","doi-asserted-by":"crossref","first-page":"3469","DOI":"10.1016\/j.comnet.2011.07.009","article-title":"RAD: recipient-anonymous data delivery based on public routing proxies","volume":"55","author":"Kim","year":"2011","journal-title":"Comput. Networks"},{"key":"10.1016\/j.comnet.2014.08.015_b0205","unstructured":"Wikipedia, Comparison of BitTorrent Clients, 2012. <https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/en.wikipedia.org\/wiki\/Comparison_of_BitTorrent_clients>."},{"key":"10.1016\/j.comnet.2014.08.015_b0210","unstructured":"A. Loewenstern, DHT Protocol, 2008. <https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/www.bittorrent.org\/beps\/bep_0005.html>."},{"key":"10.1016\/j.comnet.2014.08.015_b0215","doi-asserted-by":"crossref","unstructured":"P. Maymounkov, D. Mazieres, Kademlia: a peer-to-peer information system based on the XOR metric, The Intl Workshop on Peer-to-Peer Systems, 2002, pp. 53\u201365.","DOI":"10.1007\/3-540-45748-8_5"},{"key":"10.1016\/j.comnet.2014.08.015_b0220","doi-asserted-by":"crossref","unstructured":"L. Guo, S. Chen, Z. Xiao, E. Tan, X. Ding, X. Zhang, Measurements, analysis, and modeling of BitTorrent-like systems, in: Proc. Internet Measurement Conf., 2005, pp. 35\u201348.","DOI":"10.1145\/1330107.1330113"},{"key":"10.1016\/j.comnet.2014.08.015_b0225","unstructured":"Theory.org, Bittorrent Protocol Specification v1.0, 2006. <https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/wiki.theory.org\/BitTorrentSpecification>."},{"key":"10.1016\/j.comnet.2014.08.015_b0235","doi-asserted-by":"crossref","unstructured":"F. Petitcolas, R. Anderson, M. Kuhn, Information hiding: a survey, in: Proc. of the IEEE, Special Issue on Protectionon Multimedia Content, vol. 87, no. 7, 1999, pp. 1062\u20131078.","DOI":"10.1109\/5.771065"},{"issue":"6","key":"10.1016\/j.comnet.2014.08.015_b0240","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","article-title":"New directions in cryptography","volume":"22","author":"Diffie","year":"1976","journal-title":"IEEE Trans. Inform. Theory"},{"issue":"5","key":"10.1016\/j.comnet.2014.08.015_b0250","doi-asserted-by":"crossref","first-page":"1197","DOI":"10.1016\/j.comnet.2010.11.011","article-title":"Characterization of BitTorrent swarms and their distribution in the Internet","volume":"55","author":"Ho\u00dffeld","year":"2011","journal-title":"Comput. Networks"},{"key":"10.1016\/j.comnet.2014.08.015_b0255","unstructured":"TATA Consultancy Services, WANem: The Wide Area Network Emulator. <https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/wanem.sourceforge.net\/>."},{"key":"10.1016\/j.comnet.2014.08.015_b0260","unstructured":"Java Bittorrent API. <https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/bitext.sourceforge.net\/>."},{"key":"10.1016\/j.comnet.2014.08.015_b0265","unstructured":"H. Moghaddam, B. Li, M. Derakhshani, I. Goldberg, SkypeMorph: Protocol obfuscation for Tor bridges, in: CCS, 2012."},{"key":"10.1016\/j.comnet.2014.08.015_b0270","doi-asserted-by":"crossref","unstructured":"Q. Wang, X. Gong, G. Nguyen, A. Houmansadr, N. Borisov, CensorSpoofer: asymmetric communication using IP spoofing for censorship-resistant web browsing, in: CCS, 2012.","DOI":"10.1145\/2382196.2382212"},{"key":"10.1016\/j.comnet.2014.08.015_b0275","doi-asserted-by":"crossref","unstructured":"Z. Weinberg, J. Wang, V. Yegneswaran, L. Briesemeister, S. Cheung, F. Wang, D. Boneh, StegoTorus: a camouflage proxy for the Tor anonymity system, in: CCS, 2012.","DOI":"10.1145\/2382196.2382211"},{"key":"10.1016\/j.comnet.2014.08.015_b0280","doi-asserted-by":"crossref","unstructured":"A. Houmansadr, C. Brubaker, V. Shmatikov. The parrot is dead: observing unobservable network communications, in: CCS, 2013.","DOI":"10.1109\/SP.2013.14"},{"key":"10.1016\/j.comnet.2014.08.015_b0285","series-title":"Privacy Enhancing Technologies","first-page":"56","article-title":"Vida: how to use Bayesian inference to de-anonymize persistent communications","author":"Danezis","year":"2009"},{"key":"10.1016\/j.comnet.2014.08.015_b0290","series-title":"Privacy Enhancing Technologies","first-page":"38","article-title":"Understanding statistical disclosure: a least squares approach","author":"Prez-Gonzlez","year":"2012"},{"key":"10.1016\/j.comnet.2014.08.015_b0295","doi-asserted-by":"crossref","unstructured":"J. Raymond, Traffic analysis: protocols, attacks, design issues, and open problems, in: Workshop on Designing Privacy Enhancing Technologies, 2001.","DOI":"10.1007\/3-540-44702-4_2"},{"issue":"2","key":"10.1016\/j.comnet.2014.08.015_b0300","first-page":"1062","article-title":"Passive-logging attacks against anonymous communications systems","volume":"11","author":"Wright","year":"2008","journal-title":"ACM Trans. Inform. Syst. Sec."},{"key":"10.1016\/j.comnet.2014.08.015_b0305","unstructured":"A. Bellissimo, B. Levine, P. Shenoy, Exploring the Use of BitTorrent as the Basis for a Large Trace Repository, Tech. Rep. 04-41, University of Massachusetts Amherst, June 2004."},{"key":"10.1016\/j.comnet.2014.08.015_b0310","unstructured":"UMass Trace Repository, May 17, 2014. <https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/traces.cs.umass.edu\/index.php\/Network\/Network>."}],"container-title":["Computer Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/api.elsevier.com\/content\/article\/PII:S138912861400303X?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/api.elsevier.com\/content\/article\/PII:S138912861400303X?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T17:15:57Z","timestamp":1746378957000},"score":1,"resource":{"primary":{"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/linkinghub.elsevier.com\/retrieve\/pii\/S138912861400303X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12]]},"references-count":60,"alternative-id":["S138912861400303X"],"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1016\/j.comnet.2014.08.015","relation":{},"ISSN":["1389-1286"],"issn-type":[{"type":"print","value":"1389-1286"}],"subject":[],"published":{"date-parts":[[2014,12]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"PACOM: Parasitic anonymous communication in the BitTorrent network","name":"articletitle","label":"Article Title"},{"value":"Computer Networks","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1016\/j.comnet.2014.08.015","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"Copyright \u00a9 2014 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}]}}