<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Organizational and technical support of cyber security using a virtual assistant</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Viktor Gnatyuk</string-name>
          <email>viktor.hnatiuk@npp.nau.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Oleh Batrak</string-name>
          <email>oleh.batrak@npp.nau.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Roman Hamretskyi</string-name>
          <email>hamretskyi@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Mykhailo Golovan</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>National Aviation University</institution>
          ,
          <addr-line>Liubomyra Huzara Ave. 1, Kyiv, 03058</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>State Scientific and Research Institute of Cybersecurity Technologies and Information Protection</institution>
          ,
          <addr-line>Maksym Zalizniak Str., 3/6, Kyiv, 03142</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>In today's digital world, where cyberattacks are becoming increasingly complex and widespread, the importance of effective organizational and technical support for cybersecurity is growing. In this context, the use of virtual assistants is a relevant and promising approach for enhancing cybersecurity levels and effectively responding to potential cyber threats. Considering this, the purpose of this work is to provide organizational and technical support for cybersecurity using a virtual assistant, which can significantly increase security levels in organizations and reduce the risks of cyberattacks. The work has developed a solution for organizational and technical support of cybersecurity using a virtual assistant. Key capabilities include cyber threat reporting, user training, monitoring of cybersecurity systems, responding to user inquiries about cybersecurity, reporting suspicious activity, and more.</p>
      </abstract>
      <kwd-group>
        <kwd>cyber security</kwd>
        <kwd>virtual assistant</kwd>
        <kwd>telegram bot</kwd>
        <kwd>artificial intelligence</kwd>
        <kwd>google apps script 1</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        In today's digital world, where cybersecurity (CS) threats are becoming increasingly complex and
widespread, the importance of effective organizational and technical CS support is growing. In this
context, the use of virtual assistants (VAs) (e.g., Telegram Bot) is a relevant and promising approach
for enhancing security levels and effectively responding to potential threats [
        <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
        ]. Key aspects that
highlight the relevance of this approach include:
      </p>
      <p>Suspicious activity notifications: VAs can analyze user and system activities, identify
suspicious behavior patterns, and provide alerts about possible threats, helping to prevent
serious security breaches.</p>
      <p>Given the above, the aim of this work is to provide organizational and technical CS support using
VAs, which can significantly enhance security levels in organizations and reduce the risk of
cyberattacks.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Analysis of modern scientific research</title>
      <p>
        The review of contemporary scientific literature on the use of VAs for organizational and technical
CS support allows identifying the following features: in works [
        <xref ref-type="bibr" rid="ref3 ref4">3, 4</xref>
        ], VAs are used for task
automation; scientific papers [
        <xref ref-type="bibr" rid="ref5 ref6">5, 6</xref>
        ] describe the use of VAs (Telegram Bot) for enhancing user
awareness; in works [
        <xref ref-type="bibr" rid="ref7 ref8">7, 8</xref>
        ], VAs are used for responding to cyber incidents. Based on the analysis
results, it is worth noting that the use of VAs for organizational and technical CS support is a relevant
scientific and technical task that enables task automation, improves user awareness, and automates
the response to cyber incidents. Therefore, further development of this topic is extremely important.
      </p>
      <p>However, besides the advantages of using VAs, there are several disadvantages, including:
•
•
•
•
•
•
•
•
•
•</p>
      <p>Vulnerability to cyberattacks: VAs can be compromised by hackers, leading to the theft of
confidential data, the spread of malware, and disruption of VA operations.</p>
      <p>Ineffectiveness: VAs may not always effectively identify cyber threats, such as phishing
attacks, fraud, and sophisticated cyberattacks.</p>
      <p>Functional limitations: VAs cannot perform complex CS tasks, such as cyber incident
investigation, data analysis, and CS policy development and implementation.</p>
      <p>Need for human oversight: VAs require human oversight for setup and configuration,
information updates, and problem resolution.</p>
      <p>Risk of abuse: VAs can be used for spreading misinformation, conducting cyberattacks, and
committing fraud.</p>
      <p>Imperfections of language models: The language models used in VAs can misinterpret user
requests, provide inaccurate or incomplete information, and generate texts that do not match
the context.</p>
      <p>Platform dependency: VAs depend on the platform they operate on (Telegram), which can
lead to operational failures, API changes, and platform shutdowns.</p>
      <p>Need for user training: Users need to be trained on how to properly use VAs, understand VA
limitations, and recognize fraud.</p>
      <p>Privacy issues: VAs collect user data, which can lead to data misuse, loss of privacy, and
unauthorized data access.</p>
      <p>High cost: The development and implementation of VAs can be costly, time-consuming, and
complex.</p>
      <p>Therefore, the use of VAs for organizational and technical CS support must take into account
their advantages and disadvantages.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Automation of organizational and technical cybersecurity support using VAs</title>
      <p>The description of VA functionality includes basic features and can also be further developed. Among
the main features are:
1. Cyber Threat Notifications: The bot can send notifications about the latest cyber threats and
inform users about new types of attacks or vulnerabilities that have been identified.
2. User Training: The bot can provide short instructions or tips on cybersecurity, helping users
avoid threats and protect their data.
3. CS System Monitoring: The bot can connect to cybersecurity monitoring systems and send
notifications about any anomalies or suspicious activities. These can be cybersecurity incident
detection systems (SIEM - Security Information and Event Management) that help detect and
track suspicious activities in computer systems and networks. Here are some examples:
•
•
•
•
•</p>
      <p>Splunk: Splunk is a SIEM platform that provides centralized collection, indexing, and analysis
of event logs from various sources, allowing the detection of cyber threats and utilizing
intelligent analytics to identify anomalies.</p>
      <p>IBM QRadar: IBM's QRadar is another SIEM platform that offers advanced threat detection
tools, including data flow analysis, event correlation, and vulnerability detection.
ArcSight: ArcSight from Micro Focus is another popular SIEM platform that enables
realtime analysis and response to cyber incidents, as well as incident logging and security
auditing.</p>
      <p>Elastic Security: Elastic Security (formerly known as Elastic SIEM) is an open and extensible
SIEM platform based on the well-known Elasticsearch system, providing an integrated set of
tools for detecting and tracking cyber incidents.</p>
      <p>LogRhythm: LogRhythm is another popular SIEM platform that provides comprehensive
event log analysis, anomaly detection, and automated response to cyber threats.
These systems offer a wide range of functionalities for detecting, analyzing, and responding
to cyber incidents, enabling organizations to maintain a high level of cybersecurity.
Connecting a Telegram bot to incident detection systems can be appropriate and useful, as it
improves communication and interaction with security personnel and other stakeholders.
Here are some advantages of this approach: rapid notification and response (the Telegram
bot can send notifications about detected cyber incidents or suspicious activities in real-time,
allowing prompt responses to threats and taking necessary security measures), convenient
access to information (security personnel can use the Telegram bot to access information
about the system's security status, event logs, and analytical data from anywhere with
internet access), personnel training (the Telegram bot can provide short training materials
and cybersecurity instructions, enhancing the awareness and competence of personnel in
cybersecurity), interactive interaction (personnel can use the Telegram bot to communicate
with the incident detection system, request additional information, or perform actions to
ensure effective analysis and response to incidents), mobility and flexibility (the Telegram bot
can be used from any device that supports the Telegram messenger, allowing security
personnel to stay informed about the security status even outside the office or in mobile
conditions).
4. Q&amp;A: The bot can answer user questions about cybersecurity and provide advice on
protecting personal information and devices.
5. Suspicious Activity Notifications: Users can send reports of any suspicious activities or
attacks to the bot, and the bot can provide appropriate recommendations for further actions.</p>
      <p>In summary, integrating a Telegram bot into incident detection systems can ease and improve the
processes of monitoring and responding to cyber threats, ensuring more effective and timely security
operations.</p>
    </sec>
    <sec id="sec-4">
      <title>4. Development of VA</title>
      <p>To develop a VA for automating organizational and technical cybersecurity support, it is necessary
to choose tools, a platform, and perform the following stages.</p>
      <sec id="sec-4-1">
        <title>4.1. Stage 1. Registration of VA</title>
        <p>
          This stage involves registering a Telegram bot and obtaining the necessary access and keys for
interacting with the Telegram API. To register a VA, it is necessary to choose a platform. Based on
the research in works [
          <xref ref-type="bibr" rid="ref10 ref11 ref9">9–11</xref>
          ], we will choose the Telegram instant messaging system as an example.
        </p>
      </sec>
      <sec id="sec-4-2">
        <title>4.2. Stage 2. Development of bot logic in Google Apps Script</title>
        <p>At this stage, the logic of the bot is developed using Google Apps Script (GAS), which will allow
processing user messages, interacting with external services, and sending responses to users. When
developing a Telegram bot, we will use Google Apps Script (GAS), which is a scripting platform
developed by Google for creating lightweight web applications on the Google Workspace platform
(Figure 1). GAS projects run on Google's server-side infrastructure. According to GAS, it "provides
easy ways to automate tasks across Google products and third-party services." GAS is also a tool for
writing extensions for Google Docs, Sheets, and Slides.</p>
        <p>On the GAS platform, create a new project where we define variables such as token (the Telegram
bot token used to communicate with the Telegram API), webAppUrl (the URL of the web application
used as a webhook (Figure 2) for receiving incoming messages from Telegram; a webhook is a
method of augmenting or extending the functionality of a webpage or web application with custom
callbacks), and apiKey (for connecting AI). Additional variables can be created as needed, for
example, spreadsheetId (the identifier of the Google Sheet where data will be stored), sheetName (the
name of the sheet in the Google Sheet where Telegram chat messages will be logged), etc.</p>
        <p>When developing the Telegram bot, we use the following functions:
•
•
doPost(e): This function handles incoming HTTP requests sent by the web application,
receives data about the incoming message from Telegram, parses it, and logs the necessary
data into a Google Sheet.</p>
        <p>KEYBOARD_1, KEYBOARD_2: Objects representing keyboards (Figure 3) for display in the
Telegram chat, containing rows and buttons that can be clicked to interact with the bot.</p>
      </sec>
      <sec id="sec-4-3">
        <title>4.3. Stage 3. Integration of artificial intelligence into a Cyber security bot</title>
        <p>
          At this stage, we integrate artificial intelligence, specifically GPT, to enhance the functionality of the
bot. For user assistance, we use GPT-3 (Generative Pre-trained Transformer 3), which is an
autoregressive language model that uses deep learning to generate human-like text (Figure 4). By
drawing from a large text dataset, Chat GPT uses this dataset to learn about language, grammar,
structure, and the meaning of words and sentences. This enables it to understand the context and
intent of user queries and generate appropriate responses. It is the third-generation language
prediction model in the GPT-n series, created by OpenAI, an AI research lab in San Francisco [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ].
It is also possible to perform pre-training of the AI based on documentation provided to Chat GPT.
        </p>
        <p>To use GPT to assist users in the Telegram bot and connect it to GAS, several steps need to be
taken:
1. Step 1. Integration of GPT. Obtain access to the service that provides GPT, such as OpenAI
GPT-3, and obtain an API key. Use the key in GAS to interact with GPT by sending requests
and receiving responses.
2. Step 2. Processing user messages and responses. After receiving a message from the user
through Telegram webhooks, process the message by extracting the necessary information.
3. Step 3. Sending requests to GPT and processing responses. Create a request to GPT, including
the user's message text or other necessary information. Receive the response from GPT and
process it for further use.
4. Step 4. Sending a response to the user. Develop the logic that will send the processed response
to the user in Telegram via the Bot API.</p>
      </sec>
      <sec id="sec-4-4">
        <title>4.4. Stage 4. Database formation</title>
        <p>To form the database, data will be recorded in Google Sheets (writeToGoogleSheet) using the
`writeToGoogleSheet` function, which is responsible for recording user data and their requests to
Google Sheets.</p>
        <p>Development scheme of AI-based VA for automating organizational and technical cybersecurity
support (Figure 5).</p>
        <p>General pseudocode of the software interacting with users through the Telegram bot, using GAS
to process messages, OpenAI GPT-3 to generate responses, and Google Sheets to store user chats.</p>
        <p>Listing 1: Google Apps Script pseudocode
const token = "TOKEN";
const apiKey = 'OPENAI_API_KEY';
const webAppUrl = "GOOGLE_APPS_SCRIPT_WEB_APP_URL";
function setWebhook() {</p>
        <p>// Call the Telegram API to set the webhook to the URL of our web app
}
async function generateGPT3Response(prompt, maxTokens) {
// Call the OpenAI GPT-3 API using the provided prompt and token count
// Receive and return the generated response
function sendText(chat_id, text, keyBoard) {</p>
        <p>// Call the Telegram API to send a message with the provided text and keyboard
function writeToGoogleSheet(chat_id, text) {
// Access the Google Sheet
// Log the chat with the user and the message in the Google Sheet
}
function doPost(e) {
// Receive the message from the user
// Process the received message and generate a response
// Send the generated response to the user
// Log the chat with the user and the message in the Google Sheet
}
setWebhook();</p>
        <p>This is the general logic of the program code that allows the bot to interact with the user via
Telegram, call the GPT-3.5 API to generate responses, and log information about users and their
queries in Google Sheets (Figure 5).</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>5. Conclusions</title>
      <p>Thus, the developed solution for organizational and technical cybersecurity support using a VA
includes the following main features: notifications about cyber threats, user training, CS system
monitoring, responses to user queries regarding CS, notifications about suspicious activities, and
more.</p>
      <p>These are the general features of the developed solution, which combines effective
communication with users through the VA, enhanced response generation capabilities using AI, and
efficient data management and analysis through GAS.</p>
    </sec>
    <sec id="sec-6">
      <title>Declaration on Generative AI</title>
      <p>The author(s) have not employed any Generative AI tools.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>A.</given-names>
            <surname>Zaporozhets</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Babak</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Isaienko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Babikova</surname>
          </string-name>
          ,
          <article-title>Analysis of the air pollution monitoring system in Ukraine, Studies in Systems, Decision and Control 298 (</article-title>
          <year>2020</year>
          )
          <fpage>85</fpage>
          -
          <lpage>110</lpage>
          . doi:
          <volume>10</volume>
          .1007/978- 3-
          <fpage>030</fpage>
          -48583-
          <issue>2</issue>
          _
          <fpage>6</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Averyanova</surname>
          </string-name>
          , et al.,
          <article-title>UAS cyber security hazards analysis and approach to qualitative assessment</article-title>
          , In: S. Shukla,
          <string-name>
            <given-names>A.</given-names>
            <surname>Unal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. Varghese</given-names>
            <surname>Kureethara</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.K.</given-names>
            <surname>Mishra</surname>
          </string-name>
          , D.S. Han (Eds.),
          <article-title>Data science and security</article-title>
          , volume
          <volume>290</volume>
          <source>of Lecture Notes in Networks and Systems</source>
          , Springer, Singapore,
          <year>2021</year>
          , pp.
          <fpage>258</fpage>
          -
          <lpage>265</lpage>
          . doi:
          <volume>10</volume>
          .1007/
          <fpage>978</fpage>
          -981-16-4486-3_
          <fpage>28</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>S.</given-names>
            <surname>Al-Riyami</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Al-Hinai</surname>
          </string-name>
          ,
          <article-title>A framework for automating cybersecurity tasks using telegram bots</article-title>
          ,
          <source>in: Proceedings of International Conference on Cyber Security and Protection of Digital Services</source>
          , Springer, Cham,
          <year>2020</year>
          , pp.
          <fpage>187</fpage>
          -
          <lpage>197</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>A. S.</given-names>
            <surname>Al-Hammadi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. A.</given-names>
            <surname>Al-Jarrah</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. A.</given-names>
            <surname>Al-Saffar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. H.</given-names>
            <surname>Al-Hammadi</surname>
          </string-name>
          ,
          <article-title>Cybersecurity awareness enhancement using telegram chatbot</article-title>
          ,
          <source>in: Proceedings of IEEE 10th International Conference on Information and Communication Systems (ICICS)</source>
          ,
          <year>2020</year>
          , pp.
          <fpage>188</fpage>
          -
          <lpage>193</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>B.</given-names>
            <surname>Gupta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Singhal</surname>
          </string-name>
          ,
          <article-title>Cybersecurity awareness enhancement through telegram bot</article-title>
          ,
          <source>in: Proceedings of Emerging Technologies in Computing and Communication</source>
          , Springer, Singapore,
          <year>2020</year>
          , pp.
          <fpage>43</fpage>
          -
          <lpage>52</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>S. R.</given-names>
            <surname>Chinnaswamy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. V.</given-names>
            <surname>Vasudevan</surname>
          </string-name>
          ,
          <article-title>A survey of chatbots for cybersecurity education</article-title>
          ,
          <source>in: Proceedings of International Conference on Emerging Trends in Information Technology and Engineering (ICETITE)</source>
          ,
          <year>2020</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>A.</given-names>
            <surname>Al-Safi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Al-Hinai</surname>
          </string-name>
          ,
          <article-title>A framework for responding to cyber incidents using telegram bots</article-title>
          ,
          <source>in: Proceedings of International Conference on Cyber Security and Protection of Digital Services</source>
          , Springer, Cham,
          <year>2021</year>
          , pp.
          <fpage>235</fpage>
          -
          <lpage>246</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>M. A.</given-names>
            <surname>Al-Hussein</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. A.</given-names>
            <surname>Al-Saffar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. H.</given-names>
            <surname>Al-Hammadi</surname>
          </string-name>
          ,
          <article-title>A framework for cybersecurity incident response using telegram chatbots</article-title>
          ,
          <source>in: Proceedings of 2nd International Conference on Computer Science and Artificial Intelligence (CSAI)</source>
          ,
          <year>2021</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>V. O.</given-names>
            <surname>Hnatyuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I. O.</given-names>
            <surname>Bondarenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I. S.</given-names>
            <surname>Kaplun</surname>
          </string-name>
          ,
          <article-title>Using instant messaging systems for automating the provision of advisory services</article-title>
          ,
          <source>Registration, Storage and Data Processing</source>
          <volume>23</volume>
          (
          <year>2021</year>
          )
          <fpage>58</fpage>
          -
          <lpage>67</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>V.O.</given-names>
            <surname>Hnatyuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.H.</given-names>
            <surname>Batrak</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.V.</given-names>
            <surname>Yarotskyi</surname>
          </string-name>
          ,
          <source>Automated Employee Location Registration System, Problems of Informatization and Management</source>
          <volume>2</volume>
          (
          <issue>74</issue>
          ) (
          <year>2023</year>
          )
          <fpage>14</fpage>
          -
          <lpage>20</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>V. O.</given-names>
            <surname>Hnatyuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O. H.</given-names>
            <surname>Batrak</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. A.</given-names>
            <surname>Skurativskyi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. O.</given-names>
            <surname>Kudrenko</surname>
          </string-name>
          ,
          <article-title>Method for optimizing the operation of a mass service system using a virtual assistant based on artificial intelligence</article-title>
          ,
          <source>Problems of Informatization and Management</source>
          <volume>3</volume>
          (
          <issue>75</issue>
          ) (
          <year>2023</year>
          )
          <fpage>21</fpage>
          -
          <lpage>28</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>S.</given-names>
            <surname>Shead</surname>
          </string-name>
          ,
          <article-title>Why everyone is talking about the A.I. text generator released by an Elon Musk-backed lab</article-title>
          ,
          <source>CNBC</source>
          ,
          <year>2023</year>
          . URL: https://ramaonhealthcare.com
          <article-title>/why-everyone-is-talking-about-the-a-itext-generator-released-by-an-elon-musk-backed-lab.</article-title>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>