{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T11:16:47Z","timestamp":1774610207769,"version":"3.50.1"},"publisher-location":"Cham","reference-count":54,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030222765","type":"print"},{"value":"9783030222772","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-22277-2_15","type":"book-chapter","created":{"date-parts":[[2019,12,31]],"date-time":"2019-12-31T12:02:28Z","timestamp":1577793748000},"page":"389-419","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":22,"title":["Survey on DDoS Attack Techniques and Solutions in Software-Defined Network"],"prefix":"10.1007","author":[{"given":"Tushar","family":"Ubale","sequence":"first","affiliation":[]},{"given":"Ankit Kumar","family":"Jain","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,1]]},"reference":[{"key":"15_CR1","doi-asserted-by":"publisher","unstructured":"Tewari, A., & Gupta, B. B. (2018). Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework. Future Generation Computer Systems. https:\/\/doi.org\/10.1016\/j.future.2018.04.027 .","DOI":"10.1016\/j.future.2018.04.027"},{"key":"15_CR2","doi-asserted-by":"publisher","first-page":"964","DOI":"10.1016\/j.future.2016.11.031","volume":"78","author":"C Stergiou","year":"2018","unstructured":"Stergiou, C., Psannis, K. E., Kim, B. G., & Gupta, B. B. (2018). Secure integration of IoT and cloud computing. Future Generation Computer Systems, 78, 964\u2013975.","journal-title":"Future Generation Computer Systems"},{"key":"15_CR3","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-5225-0105-3","volume-title":"Handbook of research on modern cryptographic solutions for computer and cyber security","author":"B Gupta","year":"2016","unstructured":"Gupta, B., & Agrawal, D. P. (2016). In S. Yamaguchi (Ed.), Handbook of research on modern cryptographic solutions for computer and cyber security. Hershey, PA: IGI Global."},{"issue":"2","key":"15_CR4","doi-asserted-by":"publisher","first-page":"1402","DOI":"10.1109\/JIOT.2018.2844727","volume":"6","author":"L Wang","year":"2018","unstructured":"Wang, L., Li, L., Li, J., Li, J., Gupta, B. B., & Liu, X. (2018). Compressive sensing of medical images with confidentially homomorphic aggregations. IEEE Internet of Things Journal, 6(2), 1402\u20131409.","journal-title":"IEEE Internet of Things Journal"},{"key":"15_CR5","volume-title":"Computer and cyber security: Principles, algorithm, applications, and perspectives","year":"2018","unstructured":"Gupta, B. B. (Ed.). (2018). Computer and cyber security: Principles, algorithm, applications, and perspectives. Boca Raton, FL: CRC Press."},{"issue":"3","key":"15_CR6","doi-asserted-by":"publisher","first-page":"573","DOI":"10.1007\/s10922-017-9432-1","volume":"26","author":"SM Mousavi","year":"2018","unstructured":"Mousavi, S. M., & St-Hilaire, M. (2018). Early detection of DDoS attacks against software defined network controllers. Journal of Network and Systems Management, 26(3), 573\u2013591.","journal-title":"Journal of Network and Systems Management"},{"issue":"2","key":"15_CR7","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1109\/MCOM.2013.6461195","volume":"51","author":"H Kim","year":"2013","unstructured":"Kim, H., & Feamster, N. (2013). Improving network management with software defined networking. IEEE Communications Magazine, 51(2), 114\u2013119.","journal-title":"IEEE Communications Magazine"},{"issue":"3","key":"15_CR8","doi-asserted-by":"publisher","first-page":"628","DOI":"10.1109\/JSAC.2018.2815442","volume":"36","author":"L Zhu","year":"2018","unstructured":"Zhu, L., Tang, X., Shen, M., Du, X., & Guizani, M. (2018). Privacy-preserving DDoS attack detection using cross-domain traffic in software defined networks. IEEE Journal on Selected Areas in Communications, 36(3), 628\u2013643.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"5","key":"15_CR9","first-page":"1","volume":"10","author":"K Bhushan","year":"2018","unstructured":"Bhushan, K., & Gupta, B. (2018). Distributed denial of service (DDoS) attack mitigation in software defined network (SDN)-based cloud computing environment. Journal of Ambient Intelligence and Humanized Computing, 10(5), 1\u201313.","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"key":"15_CR10","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/j.comnet.2018.03.025","volume":"138","author":"D Hausheer","year":"2018","unstructured":"Hausheer, D., Hohlfeld, O., Schmid, S., & Gu, G. (2018). Security and performance of software-defined networks and functions virtualization. Computer Networks, 138, 15\u201317.","journal-title":"Computer Networks"},{"key":"15_CR11","unstructured":"Open Networking Foundation [Online]. Retrieved January, 2018, from https:\/\/www.opennetworking.org"},{"key":"15_CR12","unstructured":"Doria, A., Salim, J. H., Haas, R., Khosravi, H., Wang, W., Dong, L., et al. (2010, March). Forwarding and control element separation (ForCES) protocol specification. Internet Engineering Task Force [Online]. Retrieved from http:\/\/www.ietf.org\/rfc\/rfc5810.txt"},{"key":"15_CR13","unstructured":"ITU Telecommunication Standardization Sector\u2019s SDN Portal [Online]. Retrieved January, 2018, from www.itu.int\/en\/ITU-T\/about\/Pages\/default.aspx"},{"key":"15_CR14","first-page":"1","volume-title":"OSDI","author":"T Koponen","year":"2010","unstructured":"Koponen, T., Casado, M., Gude, N., Stribling, J., Poutievski, L., Zhu, M., et al. (2010). Onix: A distributed control platform for large-scale production networks. In OSDI (Vol. 10, pp. 1\u20136). Berkeley, CA: International Computer Science Institute."},{"key":"15_CR15","first-page":"3","volume-title":"Proceedings of the 2010 Internet Network Management Conference on Research on Enterprise Networking","author":"A Tootoonchian","year":"2010","unstructured":"Tootoonchian, A., & Ganjali, Y. (2010). HyperFlow: A distributed control plane for OpenFlow. In Proceedings of the 2010 Internet Network Management Conference on Research on Enterprise Networking (pp. 3\u20133). Berkeley, CA: USENIX Association."},{"key":"15_CR16","unstructured":"OpenFlow Switch Specification [Online]. Retrieved February, 2018, from https:\/\/www.opennetworking.org\/software-defined-standards\/specifications\/"},{"issue":"1","key":"15_CR17","doi-asserted-by":"publisher","first-page":"602","DOI":"10.1109\/COMST.2015.2487361","volume":"18","author":"Q Yan","year":"2016","unstructured":"Yan, Q., Yu, F. R., Gong, Q., & Li, J. (2016). Software-defined networking (SDN) and distributed denial of service (DDoS) attacks in cloud computing environments: A survey, some research issues, and challenges. IEEE Communications Surveys & Tutorials, 18(1), 602\u2013622.","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"15_CR18","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1145\/2491185.2491220","volume-title":"Proceedings of the second ACM SIGCOMM workshop on hot topics in software defined networking","author":"S Shin","year":"2013","unstructured":"Shin, S., & Gu, G. (2013). Attacking software-defined networks: A first feasibility study. In Proceedings of the second ACM SIGCOMM workshop on hot topics in software defined networking (pp. 165\u2013166). New York: ACM."},{"issue":"3","key":"15_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/IJCAC.2017070101","volume":"7","author":"S Gupta","year":"2017","unstructured":"Gupta, S., & Gupta, B. B. (2017). Detection, avoidance, and attack pattern mechanisms in modern web application vulnerabilities: Present and future challenges. International Journal of Cloud Applications and Computing (IJCAC), 7(3), 1\u201343.","journal-title":"International Journal of Cloud Applications and Computing (IJCAC)"},{"issue":"4","key":"15_CR20","doi-asserted-by":"publisher","first-page":"2046","DOI":"10.1109\/SURV.2013.031413.00127","volume":"15","author":"ST Zargar","year":"2013","unstructured":"Zargar, S. T., Joshi, J., & Tipper, D. (2013). A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks. IEEE Communications Surveys & Tutorials, 15(4), 2046\u20132069.","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"15_CR21","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1145\/2808062.2808073","volume-title":"Proceedings of the 4th Annual ACM Conference on Research in Information Technology","author":"M Brooks","year":"2015","unstructured":"Brooks, M., & Yang, B. (2015). A Man-in-the-Middle attack against OpenDayLight SDN controller. In Proceedings of the 4th Annual ACM Conference on Research in Information Technology (pp. 45\u201349). New York: ACM."},{"issue":"4","key":"15_CR22","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/MCOM.2015.7081073","volume":"53","author":"A Akhunzada","year":"2015","unstructured":"Akhunzada, A., Ahmed, E., Gani, A., Khan, M. K., Imran, M., & Guizani, S. (2015). Securing software defined networks: Taxonomy, requirements, and open issues. IEEE Communications Magazine, 53(4), 36\u201344.","journal-title":"IEEE Communications Magazine"},{"key":"15_CR23","volume-title":"Proceedings of the ACM second ACM SIGCOMM workshop on Hottopicsin software defined networking","author":"X Wen","year":"2013","unstructured":"Wen, X. (2013). Towards a secure controller platform for open flow applications. In Proceedings of the ACM second ACM SIGCOMM workshop on Hottopicsin software defined networking. New York: ACM."},{"key":"15_CR24","first-page":"1","volume":"10","author":"AK Jain","year":"2018","unstructured":"Jain, A. K., & Gupta, B. B. (2018). A machine learning based approach for phishing detection using hyperlinks information. Journal of Ambient Intelligence and Humanized Computing, 10, 1\u201314.","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"key":"15_CR25","doi-asserted-by":"publisher","first-page":"956","DOI":"10.1109\/ICECA.2018.8474561","volume-title":"2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA)","author":"T Ubale","year":"2018","unstructured":"Ubale, T., & Jain, A. K. (2018). SRL: An TCP SYNFLOOD DDoS mitigation approach in software-defined networks. In 2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA) (pp. 956\u2013962). Piscataway, NJ: IEEE."},{"key":"15_CR26","unstructured":"Nadeau, T. (2011, September 31). Software driven networks problem statement. Network Working Group Internet-Draft [Online]. Retrieved from https:\/\/tools.ietf.org\/html\/draft-nadeau-sdn-problem-statement-00"},{"key":"15_CR27","first-page":"8","volume-title":"NDSS","author":"S Hong","year":"2015","unstructured":"Hong, S., Xu, L., Wang, H., & Gu, G. (2015). Poisoning network visibility in software-defined networks: New attacks and countermeasures. In NDSS (Vol. 15, pp. 8\u201311). Ottawa: Health Canada."},{"key":"15_CR28","volume-title":"NDSS","author":"M Dhawan","year":"2015","unstructured":"Dhawan, M., Poddar, R., Mahajan, K., & Mann, V. (2015). SPHINX: Detecting security attacks in software-defined networks. In NDSS. Ottawa: Health Canada."},{"key":"15_CR29","volume-title":"IETF draft (draft-Hartman-sdnsec-requirements)","author":"S Hartman","year":"2013","unstructured":"Hartman, S., Wasserman, M., & Zhang, D. (2013). Security requirements in the software defined networking model. In IETF draft (draft-Hartman-sdnsec-requirements). Shenzhen: Huawei Technologies Ltd."},{"issue":"7","key":"15_CR30","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/MCOM.2013.6553676","volume":"51","author":"S Sezer","year":"2013","unstructured":"Sezer, S., Scott-Hayward, S., Chouhan, P. K., Fraser, B., Lake, D., Finnegan, J., et al. (2013). Are we ready for SDN? Implementation challenges for software-defined networks. IEEE Communications Magazine, 51(7), 36\u201343.","journal-title":"IEEE Communications Magazine"},{"key":"15_CR31","first-page":"1","volume-title":"Vehicular Technology Conference (VTC fall)","author":"M Liyanage","year":"2012","unstructured":"Liyanage, M., & Gurtov, A. (2012). Secured VPN models for LTE backhaul networks. In Vehicular Technology Conference (VTC fall) (pp. 1\u20135). Piscataway, NJ: IEEE."},{"key":"15_CR32","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1016\/j.comnet.2015.02.014","volume":"81","author":"H Farhady","year":"2015","unstructured":"Farhady, H., Lee, H., & Nakao, A. (2015). Software-defined networking: A survey. Computer Networks, 81, 79\u201395.","journal-title":"Computer Networks"},{"key":"15_CR33","first-page":"543","volume-title":"ISCA PDCS","author":"SM Specht","year":"2004","unstructured":"Specht, S. M., & Lee, R. B. (2004). Distributed denial of service: Taxonomies of attacks, tools, and countermeasures. In ISCA PDCS (pp. 543\u2013550). Raleigh, NC: ISCA."},{"key":"15_CR34","unstructured":"Akamai Solutions [Online] Retrieved January, 2018, from https:\/\/www.akamai.com"},{"key":"15_CR35","doi-asserted-by":"crossref","first-page":"403","DOI":"10.1145\/2674005.2675002","volume-title":"Proceedings of the 10th ACM International on Conference on emerging Networking Experiments and Technologies","author":"A Wang","year":"2014","unstructured":"Wang, A., Guo, Y., Hao, F., Lakshman, T. V., & Chen, S. (2014). Scotch: Elastically scaling up sdn control-plane using vswitch based overlay. In Proceedings of the 10th ACM International on Conference on emerging Networking Experiments and Technologies (pp. 403\u2013414). New York: ACM."},{"key":"15_CR36","first-page":"278","volume-title":"International Conference on Futuristic Trends in Network and Communication Technologies","author":"T Ubale","year":"2018","unstructured":"Ubale, T., & Jain, A. K. (2018). Taxonomy of DDoS attacks in software-defined networking environment. In International Conference on Futuristic Trends in Network and Communication Technologies (pp. 278\u2013291). Singapore: Springer."},{"key":"15_CR37","doi-asserted-by":"publisher","first-page":"310","DOI":"10.1109\/Trustcom.2015.389","volume-title":"Trustcom\/BigDataSE\/ISPA, 2015 IEEE","author":"R Wang","year":"2015","unstructured":"Wang, R., Jia, Z., & Ju, L. (2015). An entropy-based distributed DDoS detection mechanism in software-defined networking. In Trustcom\/BigDataSE\/ISPA, 2015 IEEE (Vol. 1, pp. 310\u2013317). Los Alamitos, CA: Conference Publishing Services, IEEE Computer Society."},{"key":"15_CR38","first-page":"77","volume-title":"Computing, Networking and Communications (ICNC), 2015 \u2217International Conference on IEEE","author":"SM Mousavi","year":"2015","unstructured":"Mousavi, S. M., & St-Hilaire, M. (2015). Early detection of DDoS attacks against SDN controllers. In Computing, Networking and Communications (ICNC), 2015 \u2217International Conference on IEEE (pp. 77\u201381). Piscataway, NJ: IEEE."},{"key":"15_CR39","doi-asserted-by":"publisher","first-page":"1322","DOI":"10.1109\/INM.2015.7140489","volume-title":"Integrated Network Management (IM), 2015 IFIP\/IEEE International Symposium on IEEE","author":"R Kandoi","year":"2015","unstructured":"Kandoi, R., & Antikainen, M. (2015). Denial-of-service attacks in OpenFlow SDN networks. In Integrated Network Management (IM), 2015 IFIP\/IEEE International Symposium on IEEE (pp. 1322\u20131326). Piscataway, NJ: IEEE."},{"key":"15_CR40","first-page":"309","volume-title":"Information Networking (ICOIN), 2015 International Conference on IEEE","author":"NN Dao","year":"2015","unstructured":"Dao, N. N., Park, J., Park, M., & Cho, S. (2015). A feasible method to combat against DDoS attack in SDN network. In Information Networking (ICOIN), 2015 International Conference on IEEE (pp. 309\u2013311). Piscataway, NJ: IEEE."},{"issue":"1","key":"15_CR41","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1504\/IJSCN.2016.077044","volume":"1","author":"W You","year":"2016","unstructured":"You, W., Qian, K., & Qian, Y. (2016). Software-defined network flow table overflow attacks and countermeasures. International Journal of Soft Computing and Networking, 1(1), 70\u201381.","journal-title":"International Journal of Soft Computing and Networking"},{"issue":"2","key":"15_CR42","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1109\/TSC.2016.2602861","volume":"12","author":"B Yuan","year":"2016","unstructured":"Yuan, B., Zou, D., Yu, S., Jin, H., Qiang, W., & Shen, J. (2016). Defending against flow table overloading attack in software-defined networks. IEEE Transactions on Services Computing, 12(2), 231\u2013246.","journal-title":"IEEE Transactions on Services Computing"},{"key":"15_CR43","doi-asserted-by":"crossref","first-page":"413","DOI":"10.1145\/2508859.2516684","volume-title":"Proceedings of the 2013 ACM SIGSAC conference on Computer & Communications Security","author":"S Shin","year":"2013","unstructured":"Shin, S., Yegneswaran, V., Porras, P., & Gu, G. (2013). Avant-guard: Scalable and vigilant switch flow management in software-defined networks. In Proceedings of the 2013 ACM SIGSAC conference on Computer & Communications Security (pp. 413\u2013424). New York: ACM."},{"key":"15_CR44","first-page":"1","volume-title":"Global Information Infrastructure and Networking Symposium (GIIS), IEEE","author":"AFM Piedrahita","year":"2015","unstructured":"Piedrahita, A. F. M., Rueda, S., Mattos, D. M., & Duarte, O. C. M. (2015). FlowFence: A denial of service defense system for software defined networking. In Global Information Infrastructure and Networking Symposium (GIIS), IEEE (pp. 1\u20136). Piscataway, NJ: IEEE."},{"key":"15_CR45","first-page":"1","volume-title":"INFOCOM 2017-IEEE Conference on Computer Communications","author":"G Shang","year":"2017","unstructured":"Shang, G., Zhe, P., Bin, X., Aiqun, H., & Kui, R. (2017). FloodDefender: Protecting data and control plane resources under SDN-aimed DoS attacks. In INFOCOM 2017-IEEE Conference on Computer Communications (pp. 1\u20139). Piscataway, NJ: IEEE."},{"key":"15_CR46","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1109\/DSN.2015.27","volume-title":"Dependable Systems and Networks (DSN), 2015 45th Annual IEEE\/IFIP International Conference on IEEE","author":"H Wang","year":"2015","unstructured":"Wang, H., Xu, L., & Gu, G. (2015). Floodguard: A dos attack prevention extension in software-defined networks. In Dependable Systems and Networks (DSN), 2015 45th Annual IEEE\/IFIP International Conference on IEEE (pp. 239\u2013250). Piscataway, NJ: IEEE."},{"key":"15_CR47","first-page":"1","volume-title":"Networking, Architecture and Storage (NAS), 2016 IEEE International Conference on IEEE","author":"M Kuerban","year":"2016","unstructured":"Kuerban, M., Tian, Y., Yang, Q., Jia, Y., Huebert, B., & Poss, D. (2016). FlowSec: DOS attack mitigation strategy on SDN controller. In Networking, Architecture and Storage (NAS), 2016 IEEE International Conference on IEEE (pp. 1\u20132)."},{"issue":"6","key":"15_CR48","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/MNET.2016.1600109NM","volume":"30","author":"P Zhang","year":"2016","unstructured":"Zhang, P., Wang, H., Hu, C., & Lin, C. (2016). On denial of service attacks in software defined networks. IEEE Network, 30(6), 28\u201333.","journal-title":"IEEE Network"},{"key":"15_CR49","doi-asserted-by":"publisher","first-page":"498","DOI":"10.1109\/CLUSTER.2015.81","volume-title":"Cluster Computing (CLUSTER), 2015 IEEE International Conference on IEEE","author":"SW Hsu","year":"2015","unstructured":"Hsu, S. W., Chen, T. Y., Chang, Y. C., Chen, S. H., Chao, H. C., Lin, T. Y., & Shih, W. K. (2015). Design a hash-based control mechanism in vswitch for software-defined networking environment. In Cluster Computing (CLUSTER), 2015 IEEE International Conference on IEEE (pp. 498\u2013499). Piscataway, NJ: IEEE."},{"key":"15_CR50","doi-asserted-by":"publisher","first-page":"5254","DOI":"10.1109\/ICC.2015.7249158","volume-title":"Communications (ICC), 2015 IEEE International Conference on IEEE","author":"L Wei","year":"2015","unstructured":"Wei, L., & Fung, C. (2015). FlowRanger: A request prioritizing algorithm for controller DoS attacks in software defined networks. In Communications (ICC), 2015 IEEE International Conference on IEEE (pp. 5254\u20135259). Piscataway, NJ: IEEE."},{"key":"15_CR51","first-page":"408","volume-title":"Local Computer Networks (LCN), 2010 IEEE 35th Conference on IEEE","author":"R Braga","year":"2010","unstructured":"Braga, R., Mota, E., & Passito, A. (2010). Lightweight DDoS flooding attack detection using NOX\/OpenFlow. In Local Computer Networks (LCN), 2010 IEEE 35th Conference on IEEE (pp. 408\u2013415). Piscataway, NJ: IEEE."},{"issue":"6","key":"15_CR52","first-page":"1","volume":"9","author":"AK Jain","year":"2017","unstructured":"Jain, A. K., & Gupta, B. B. (2017). Two-level authentication approach to protect from phishing attacks in real time. Journal of Ambient Intelligence and Humanized Computing, 9(6), 1\u201314.","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"issue":"19","key":"15_CR53","doi-asserted-by":"publisher","first-page":"e4218","DOI":"10.1002\/cpe.4218","volume":"29","author":"B He","year":"2017","unstructured":"He, B., Dong, L., Xu, T., Fei, S., Zhang, H., & Wang, W. (2017). Research on network programming language and policy conflicts for SDN. Concurrency and Computation: Practice and Experience, 29(19), e4218.","journal-title":"Concurrency and Computation: Practice and Experience"},{"key":"15_CR54","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1145\/2660267.2660353","volume-title":"Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security","author":"S Shin","year":"2014","unstructured":"Shin, S., Song, Y., Lee, T., Lee, S., Chung, J., Porras, P., et al. (2014). Rosemary: A robust, secure, and high-performance network operating system. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (pp. 78\u201389). New York: ACM."}],"container-title":["Handbook of Computer Networks and Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-22277-2_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,24]],"date-time":"2023-09-24T14:18:29Z","timestamp":1695565109000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-22277-2_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030222765","9783030222772"],"references-count":54,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-22277-2_15","relation":{},"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"1 January 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}