{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T15:27:37Z","timestamp":1759332457774,"version":"3.37.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030047702"},{"type":"electronic","value":"9783030047719"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-04771-9_11","type":"book-chapter","created":{"date-parts":[[2018,12,5]],"date-time":"2018-12-05T22:02:53Z","timestamp":1544047373000},"page":"130-145","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Generating Synthetic Data for Real World Detection of DoS Attacks in the IoT"],"prefix":"10.1007","author":[{"given":"Luca","family":"Arnaboldi","sequence":"first","affiliation":[]},{"given":"Charles","family":"Morisset","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,6]]},"reference":[{"unstructured":"Farnell element14, calculating battery life in IoT applications (2017). http:\/\/uk.farnell.com\/calculating-battery-life-in-iot-applications","key":"11_CR1"},{"unstructured":"Hulk, web: server dos tool - confessions of a dangerous mind, February 2013. http:\/\/www.sectorix.com\/2012\/05\/17\/hulk-web-server-dos-tool\/","key":"11_CR2"},{"doi-asserted-by":"crossref","unstructured":"Andova, S.: Probabilistic process algebra. Technische Universiteit Eindhoven (2002)","key":"11_CR3","DOI":"10.1007\/3-540-45319-9_15"},{"doi-asserted-by":"crossref","unstructured":"Arnaboldi, L., Morisset, C.: Quantitative analysis of dos attacks and client puzzles in IoT systems. In: Security and Trust Management STM (2017)","key":"11_CR4","DOI":"10.1007\/978-3-319-68063-7_16"},{"key":"11_CR5","volume-title":"Principles of Model Checking","author":"C Baier","year":"2008","unstructured":"Baier, C., Katoen, J.P., Larsen, K.G.: Principles of Model Checking. MIT Press, Cambridge (2008)"},{"key":"11_CR6","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1109\/SURV.2013.052213.00046","volume":"16","author":"MH Bhuyan","year":"2014","unstructured":"Bhuyan, M.H., Bhattacharyya, D.K., Kalita, J.K.: Network anomaly detection: methods, systems and tools. IEEE Commun. Surv. Tutor. 16, 303\u2013336 (2014)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"11_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/978-3-642-17197-0_2","volume-title":"Decision and Game Theory for Security","author":"R B\u00f6hme","year":"2010","unstructured":"B\u00f6hme, R., F\u00e9legyh\u00e1zi, M.: Optimal information security investment with penetration testing. In: Alpcan, T., Butty\u00e1n, L., Baras, J.S. (eds.) GameSec 2010. LNCS, vol. 6442, pp. 21\u201337. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-17197-0_2"},{"doi-asserted-by":"crossref","unstructured":"Buennemeyer, T.K., Gora, M., Marchany, R.C., Tront, J.G.: Battery exhaustion attack detection with small handheld mobile computers. In: Portable Information Devices (2007)","key":"11_CR8","DOI":"10.1109\/PORTABLE.2007.35"},{"unstructured":"Fruth, M.: Formal methods for the analysis of wireless network protocols. Oxford University (2011)","key":"11_CR9"},{"key":"11_CR10","doi-asserted-by":"publisher","first-page":"1645","DOI":"10.1016\/j.future.2013.01.010","volume":"29","author":"J Gubbi","year":"2013","unstructured":"Gubbi, J., Buyya, R., Marusic, S., Palaniswami, M.: Internet of Things (IoT): a vision, architectural elements, and future directions. Futur. Gener. Comput. Syst. 29, 1645\u20131660 (2013)","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"2","key":"11_CR11","doi-asserted-by":"publisher","first-page":"94","DOI":"10.3390\/fi7020094","volume":"7","author":"E Guillen","year":"2015","unstructured":"Guillen, E., S\u00e1nchez, J., Paez, R.: Inefficiency of IDS static anomaly detectors in real-world networks. Future Internet 7(2), 94\u2013109 (2015)","journal-title":"Future Internet"},{"issue":"8","key":"11_CR12","doi-asserted-by":"publisher","first-page":"666","DOI":"10.1145\/359576.359585","volume":"21","author":"CAR Hoare","year":"1978","unstructured":"Hoare, C.A.R.: Communicating sequential processes. Commun. ACM 21(8), 666\u2013677 (1978)","journal-title":"Commun. ACM"},{"key":"11_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1007\/3-540-46029-2_13","volume-title":"Computer Performance Evaluation: Modelling Techniques and Tools","author":"M Kwiatkowska","year":"2002","unstructured":"Kwiatkowska, M., Norman, G., Parker, D.: PRISM: probabilistic symbolic model checker. In: Field, T., Harrison, P.G., Bradley, J., Harder, U. (eds.) TOOLS 2002. LNCS, vol. 2324, pp. 200\u2013204. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-46029-2_13"},{"doi-asserted-by":"crossref","unstructured":"Liang, L., Zheng, K., Sheng, Q., Huang, X.: A denial of service attack method for an IoT system. In: Information Technology in Medicine and Education, pp. 360\u2013364. IEEE (2016)","key":"11_CR14","DOI":"10.1109\/ITME.2016.0087"},{"doi-asserted-by":"crossref","unstructured":"Mell, P., Hu, V., Lippmann, R., Haines, J., Zissman, M.: An overview of issues in testing intrusion detection systems (2003)","key":"11_CR15","DOI":"10.6028\/NIST.IR.7007"},{"unstructured":"Mirkovic, J., Dietrich, S., Dittrich, D., Reiher, P.: Internet Denial of Service: Attack and Defense Mechanisms (Radia Perlman Computer Networking and Security). Prentice Hall PTR, Upper Saddle River (2004)","key":"11_CR16"},{"doi-asserted-by":"crossref","unstructured":"Mukkamala, S., Janoski, G., Sung, A.: Intrusion detection using neural networks and support vector machines. In: Proceedings of the 2002 International Joint Conference on Neural Networks, IJCNN 2002, vol. 2, pp. 1702\u20131707. IEEE (2002)","key":"11_CR17","DOI":"10.1109\/IJCNN.2002.1007774"},{"key":"11_CR18","first-page":"229","volume":"99","author":"M Roesch","year":"1999","unstructured":"Roesch, M., et al.: Snort: lightweight intrusion detection for networks. LISA 99, 229\u2013238 (1999)","journal-title":"LISA"},{"key":"11_CR19","doi-asserted-by":"publisher","first-page":"2266","DOI":"10.1016\/j.comnet.2012.12.018","volume":"57","author":"R Roman","year":"2013","unstructured":"Roman, R., Zhou, J., Lopez, J.: On the features and challenges of security and privacy in distributed internet of things. Comput. Netw. 57, 2266\u20132279 (2013)","journal-title":"Comput. Netw."},{"issue":"3","key":"11_CR20","doi-asserted-by":"publisher","first-page":"660","DOI":"10.1109\/21.97458","volume":"21","author":"SR Safavian","year":"1991","unstructured":"Safavian, S.R., Landgrebe, D.: A survey of decision tree classifier methodology. IEEE Trans. Syst. Man Cybern. 21(3), 660\u2013674 (1991)","journal-title":"IEEE Trans. Syst. Man Cybern."},{"unstructured":"Security, O.: Exploitdb: offensive security\u2019s exploit database. Archive (2009). https:\/\/www.exploit-db.com\/","key":"11_CR21"},{"doi-asserted-by":"crossref","unstructured":"Suo, H., Wan, J., Zou, C., Liu, J.: Security in the internet of things: a review, vol. 3, pp. 648\u2013651. IEEE (2012)","key":"11_CR22","DOI":"10.1109\/ICCSEE.2012.373"},{"unstructured":"Talpade, R., Madhani, S., Mouchtaris, P., Wong, L.: Mitigating denial of service attacks, 29 January 2003. US Patent App. 10\/353,527","key":"11_CR23"},{"issue":"4","key":"11_CR24","doi-asserted-by":"publisher","first-page":"451","DOI":"10.1109\/5326.897072","volume":"30","author":"GP Zhang","year":"2000","unstructured":"Zhang, G.P.: Neural networks for classification: a survey. IEEE Trans. Syst. Man Cybern. Part C (Appl. Rev.) 30(4), 451\u2013462 (2000)","journal-title":"IEEE Trans. Syst. Man Cybern. Part C (Appl. Rev.)"}],"container-title":["Lecture Notes in Computer Science","Software Technologies: Applications and Foundations"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-04771-9_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,7]],"date-time":"2022-09-07T18:07:18Z","timestamp":1662574038000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-04771-9_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030047702","9783030047719"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-04771-9_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"STAF","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Federation of International Conferences on Software Technologies: Applications and Foundations","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Toulouse","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 June 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 June 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"staf2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.staf2018.fr\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}