{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:52:28Z","timestamp":1740099148194,"version":"3.37.3"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030000080"},{"type":"electronic","value":"9783030000097"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-00009-7_64","type":"book-chapter","created":{"date-parts":[[2018,9,20]],"date-time":"2018-09-20T17:20:42Z","timestamp":1537464042000},"page":"718-730","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Design and Verification of a Security Policy to Defense DDoS Attack for Cloud Robot"],"prefix":"10.1007","author":[{"given":"Boyi","family":"Liu","sequence":"first","affiliation":[]},{"given":"Xiangyan","family":"Tang","sequence":"additional","affiliation":[]},{"given":"Jieren","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"Jiquan","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,21]]},"reference":[{"key":"64_CR1","doi-asserted-by":"crossref","unstructured":"Kuffner, J.J., Lavalle, S.M.: Space-filling trees: a new perspective on incremental search for motion planning. In: International Conference on Intelligent Robots and Systems, pp. 2199\u20132206. IEEE, San Francisco (2011)","DOI":"10.1109\/IROS.2011.6048346"},{"issue":"2","key":"64_CR2","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1109\/MRA.2011.941632","volume":"18","author":"M Waibel","year":"2011","unstructured":"Waibel, M., Beetz, M., Civera, J., et al.: RoboEarth - a world wide web for robots. IEEE Robot. Autom. Mag. 18(2), 69\u201382 (2011)","journal-title":"IEEE Robot. Autom. Mag."},{"key":"64_CR3","doi-asserted-by":"crossref","unstructured":"Ravi, N., Mala, T., Srinivasan, M.K., et al.: Design and implementation of VOD (Video on Demand) SaaS framework for android platform on cloud environment. In: IEEE International Conference MDM 2, pp. 171\u2013176. IEEE, Milan (2013)","DOI":"10.1109\/MDM.2013.89"},{"key":"64_CR4","doi-asserted-by":"crossref","unstructured":"Turnbull, L., Samanta, B.: Cloud robotics: formation control of a multi robot system utilizing cloud infrastructure, Southeastcon. In: 2013 Proceedings of IEEE, pp. 1\u20134. IEEE, Jacksonville (2013)","DOI":"10.1109\/SECON.2013.6567422"},{"key":"64_CR5","doi-asserted-by":"crossref","unstructured":"Kehoe, B., Matsukawa, A., Candido, S., et al.: Cloud-based robot grasping with the google object recognition engine. In: IEEE International Conference on Robotics and Automation. pp. 4263\u20134270. IEEE, Karlsruhe (2013)","DOI":"10.1109\/ICRA.2013.6631180"},{"issue":"3","key":"64_CR6","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1109\/MSPEC.2011.5719709","volume":"48","author":"E Guizzo","year":"2011","unstructured":"Guizzo, E.: Robots with their heads in the clouds. IEEE Trans. Spectr. 48(3), 16\u201318 (2011)","journal-title":"IEEE Trans. Spectr."},{"key":"64_CR7","doi-asserted-by":"crossref","unstructured":"Furler, L., Nagrath, V., Malik, A.S., et al.: An auto-operated telepresence system for the Nao humanoid Robot. In: Communication Systems and Network Technologies (CSNT), pp. 262\u2013267. IEEE, Gwalior (2013)","DOI":"10.1109\/CSNT.2013.62"},{"issue":"3","key":"64_CR8","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1109\/MNET.2012.6201213","volume":"26","author":"K Kamei","year":"2012","unstructured":"Kamei, K., Nishio, S., Hagita, N., et al.: Cloud networked robotics. IEEE Netw. 26(3), 28\u201334 (2012)","journal-title":"IEEE Netw."},{"issue":"6293","key":"64_CR9","doi-asserted-by":"crossref","first-page":"1514","DOI":"10.1126\/science.aaf9534","volume":"352","author":"J Greene","year":"2016","unstructured":"Greene, J.: Our driverless dilemma. Science 352(6293), 1514\u20131515 (2016)","journal-title":"Science"},{"issue":"7676","key":"64_CR10","doi-asserted-by":"crossref","first-page":"336","DOI":"10.1038\/550336a","volume":"550","author":"S Singh","year":"2017","unstructured":"Singh, S., Okun, A., Jackson, A.: Artificial intelligence: learning to play Go from scratch. Nature 550(7676), 336 (2017)","journal-title":"Nature"},{"issue":"3","key":"64_CR11","first-page":"243","volume":"3","author":"N Ranjan","year":"2017","unstructured":"Ranjan, N., Ghouse, Z., Hiwrale, N.: A multi-function robot for military application. Imp. J. Interdiscip. Res. 3(3), 243\u2013244 (2017)","journal-title":"Imp. J. Interdiscip. Res."},{"issue":"1","key":"64_CR12","first-page":"6036","volume":"5","author":"A Sahi","year":"2017","unstructured":"Sahi, A., Lai, D., Li, Y., et al.: An efficient DDoS TCP flood attack detection and prevention system in a cloud environment. IEEE Access 5(1), 6036\u20136048 (2017)","journal-title":"IEEE Access"},{"key":"64_CR13","doi-asserted-by":"crossref","unstructured":"Rukavitsyn, A., Borisenko, K., Shorov, A.: Self-learning method for DDoS detection model in cloud computing. In: IEEE Young Researchers in Electrical and Electronic Engineering, pp. 544\u2013547. IEEE, St. Petersburg (2017)","DOI":"10.1109\/EIConRus.2017.7910612"},{"issue":"8","key":"64_CR14","doi-asserted-by":"crossref","first-page":"1801","DOI":"10.1109\/TIFS.2017.2688414","volume":"12","author":"H Luo","year":"2017","unstructured":"Luo, H., Chen, Z., Li, J., Vasilakos, A.V.: Preventing distributed denial-of-service flooding attacks with dynamic path identifiers. IEEE Trans. Inf. Forensics Secur. 12(8), 1801\u20131815 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"64_CR15","doi-asserted-by":"crossref","first-page":"769","DOI":"10.2298\/CSIS161217028H","volume":"14","author":"D Han","year":"2017","unstructured":"Han, D., Bi, K., Liu, H., Jia, J.: A ddos attack detection system based on spark framework. Comput. Sci. Inf. Syst. 14(3), 769\u2013788 (2017)","journal-title":"Comput. Sci. Inf. Syst."},{"issue":"7","key":"64_CR16","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1049\/el.2016.2234","volume":"53","author":"Q Yan","year":"2017","unstructured":"Yan, Q., Gong, Q., Yu, F.: Effective software-defied networking controller scheduling method to mitigate DDoS attacks. Electron. Lett. 53(7), 469\u2013471 (2017)","journal-title":"Electron. Lett."},{"issue":"2","key":"64_CR17","doi-asserted-by":"crossref","first-page":"398","DOI":"10.1109\/TASE.2014.2376492","volume":"12","author":"B Kehoe","year":"2015","unstructured":"Kehoe, B., Patil, S., Abbeel, P., et al.: A survey of research on cloud robotics and automation. IEEE Trans. Autom. Sci. Eng. 12(2), 398\u2013409 (2015)","journal-title":"IEEE Trans. Autom. Sci. Eng."},{"key":"64_CR18","doi-asserted-by":"crossref","unstructured":"Haight, F.A.: Handbook of poisson distribution. J. R. Stat. Soc. 18(4) (1967)","DOI":"10.2307\/3007702"},{"key":"64_CR19","volume-title":"Introduction to Probability Models","author":"MR Sheldon","year":"2014","unstructured":"Sheldon, M.R.: Introduction to Probability Models, 11th edn. Academic Press, New York (2014)","edition":"11"},{"key":"64_CR20","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1007\/978-981-10-2107-7_41","volume-title":"Proceedings of International Conference on Computer Vision and Image Processing","author":"A Mohanty","year":"2017","unstructured":"Mohanty, A., Rambhatla, S.S., Sahay, R.R.: Deep gesture: static hand gesture recognition using CNN. In: Raman, B., Kumar, S., Roy, P.P., Sen, D. (eds.) Proceedings of International Conference on Computer Vision and Image Processing. AISC, vol. 460, pp. 449\u2013461. Springer, Singapore (2017). https:\/\/doi.org\/10.1007\/978-981-10-2107-7_41"},{"issue":"10","key":"64_CR21","doi-asserted-by":"crossref","first-page":"961","DOI":"10.1109\/34.799904","volume":"21","author":"HK Lee","year":"1999","unstructured":"Lee, H.K., Kim, J.H.: An HMM-based threshold model approach for gesture recognition. IEEE Trans. Pattern Anal. Mach. Intell. 21(10), 961\u2013973 (1999)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"1","key":"64_CR22","first-page":"95","volume":"55","author":"J Cheng","year":"2018","unstructured":"Cheng, J., Xu, R., Tang, X., et al.: An abnormal network flow feature sequence prediction approach for DDoS attacks detection in big data environment. Comput. Mater. Contin. 55(1), 95\u2013119 (2018)","journal-title":"Comput. Mater. Contin."}],"container-title":["Lecture Notes in Computer Science","Cloud Computing and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-00009-7_64","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,24]],"date-time":"2019-10-24T09:47:37Z","timestamp":1571910457000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-00009-7_64"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030000080","9783030000097"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-00009-7_64","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"ICCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cloud Computing and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Haikou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 June 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 June 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icccsconf.org\/icccs2018.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}