{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T05:29:34Z","timestamp":1743053374931,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031440830"},{"type":"electronic","value":"9783031440847"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-44084-7_30","type":"book-chapter","created":{"date-parts":[[2023,9,23]],"date-time":"2023-09-23T09:02:09Z","timestamp":1695459729000},"page":"319-329","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Detecting the Attacks Using Blockchain-Based Decentralized Security Architecture in IoT Environment"],"prefix":"10.1007","author":[{"given":"M. Rudra","family":"Kumar","sequence":"first","affiliation":[]},{"given":"R. V. S. S. S. Tarun","family":"Teja","sequence":"additional","affiliation":[]},{"given":"A. Venkata Rakesh","family":"Reddy","sequence":"additional","affiliation":[]},{"given":"S. Vamshi","family":"Krishna","sequence":"additional","affiliation":[]},{"given":"P. Venkata","family":"Koushik","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,9,24]]},"reference":[{"issue":"2","key":"30_CR1","doi-asserted-by":"publisher","first-page":"1353","DOI":"10.1007\/s13369-021-05947-3","volume":"47","author":"V Gaur","year":"2022","unstructured":"Gaur, V., Kumar, R.: Analysis of machine learning classifiers for early detection of DDoS attacks on IoT devices. Arab. J. Sci. Eng. 47(2), 1353\u20131374 (2022)","journal-title":"Arab. J. Sci. Eng."},{"issue":"5","key":"30_CR2","first-page":"2164","volume":"18","author":"K Doshi","year":"2021","unstructured":"Doshi, K., Yilmaz, Y., Uludag, S.: Timely detection and mitigation of stealthy DDoS attacks via IoT networks. IEEE Trans. Dependable Secure Comput. 18(5), 2164\u20132176 (2021)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"1","key":"30_CR3","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/s11277-021-08890-6","volume":"122","author":"P Kumar","year":"2022","unstructured":"Kumar, P., Bagga, H., Netam, B.S., Uduthalapally, V.: Sad-IoT: Security analysis of DDoS attacks in IoT networks. Wirel. Pers. Commun. 122(1), 87\u2013108 (2022)","journal-title":"Wirel. Pers. Commun."},{"issue":"3","key":"30_CR4","doi-asserted-by":"publisher","first-page":"494","DOI":"10.3390\/electronics11030494","volume":"11","author":"MH Ali","year":"2022","unstructured":"Ali, M.H., et al.: Threat analysis and distributed denial of service (DDoS) attack recognition in the internet of things (IoT). Electronics 11(3), 494 (2022)","journal-title":"Electronics"},{"key":"30_CR5","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/j.procs.2021.02.003","volume":"182","author":"MA Lawal","year":"2021","unstructured":"Lawal, M.A., Shaikh, R.A., Hassan, S.R.: A DDoS attack mitigation framework for IoT networks using fog computing. Procedia Comput. Sci. 182, 13\u201320 (2021)","journal-title":"Procedia Comput. Sci."},{"issue":"5","key":"30_CR6","doi-asserted-by":"publisher","first-page":"3612","DOI":"10.1109\/JIOT.2021.3098029","volume":"9","author":"J Bhayo","year":"2021","unstructured":"Bhayo, J., Jafaq, R., Ahmed, A., Hameed, S., Shah, S.A.: A time-efficient approach toward DDoS attack detection in IoT network using SDN. IEEE Internet Things J. 9(5), 3612\u20133630 (2021)","journal-title":"IEEE Internet Things J."},{"issue":"1","key":"30_CR7","doi-asserted-by":"publisher","first-page":"3061","DOI":"10.1149\/10701.3061ecst","volume":"107","author":"RR Papalkar","year":"2022","unstructured":"Papalkar, R.R., Alvi, A.S.: Analysis of defense techniques for DDos attacks in IoT\u2013A review. ECS Trans. 107(1), 3061 (2022)","journal-title":"ECS Trans."},{"key":"30_CR8","doi-asserted-by":"publisher","first-page":"107726","DOI":"10.1016\/j.compeleceng.2022.107726","volume":"98","author":"BB Gupta","year":"2022","unstructured":"Gupta, B.B., Chaudhary, P., Chang, X., Nedjah, N.: Smart defense against distributed Denial of service attack in IoT networks using supervised learning classifiers. Comput. Electr. Eng. 98, 107726 (2022)","journal-title":"Comput. Electr. Eng."},{"key":"30_CR9","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1016\/j.jpdc.2022.01.030","volume":"164","author":"R Kumar","year":"2022","unstructured":"Kumar, R., Kumar, P., Tripathi, R., Gupta, G.P., Garg, S., Hassan, M.M.: A distributed intrusion detection system to detect DDoS attacks in blockchain-enabled IoT network. J. Parallel Distrib. Comput. 164, 55\u201368 (2022)","journal-title":"J. Parallel Distrib. Comput."},{"issue":"4","key":"30_CR10","doi-asserted-by":"publisher","first-page":"1847","DOI":"10.3390\/app11041847","volume":"11","author":"L Huraj","year":"2021","unstructured":"Huraj, L., Horak, T., Strelec, P., Tanuska, P.: Mitigation against DDoS attacks on an IoT-based production line using machine learning. Appl. Sci. 11(4), 1847 (2021)","journal-title":"Appl. Sci."},{"issue":"6","key":"30_CR11","doi-asserted-by":"publisher","first-page":"e4112","DOI":"10.1002\/ett.4112","volume":"32","author":"P Kumar","year":"2021","unstructured":"Kumar, P., Kumar, R., Gupta, G.P., Tripathi, R.: A distributed framework for detecting DDoS attacks in smart contract-based Blockchain-IoT Systems by leveraging Fog computing. Trans. Emerg. Telecommun. Technol. 32(6), e4112 (2021)","journal-title":"Trans. Emerg. Telecommun. Technol."},{"unstructured":"Machaka, P., Ajayi, O., Maluleke, H., Kahenga, F., Bagula, A., Kyamakya, K.: Modelling DDoS attacks in IoT networks using machine learning (2021). arXiv preprint arXiv:2112.05477","key":"30_CR12"},{"key":"30_CR13","doi-asserted-by":"publisher","first-page":"26739","DOI":"10.1007\/s11042-021-10640-6","volume":"81","author":"R Gopi","year":"2021","unstructured":"Gopi, R., et al.: Enhanced method of ANN based model for detection of DDoS attacks on multimedia internet of things. Multimedia Tools Appl. 81, 26739\u201326757 (2021)","journal-title":"Multimedia Tools Appl."},{"key":"30_CR14","doi-asserted-by":"publisher","first-page":"102603","DOI":"10.1016\/j.adhoc.2021.102603","volume":"121","author":"DK Sharma","year":"2021","unstructured":"Sharma, D.K., et al.: Anomaly detection framework to prevent DDoS attack in fog empowered IoT networks. Ad Hoc Netw. 121, 102603 (2021)","journal-title":"Ad Hoc Netw."},{"key":"30_CR15","doi-asserted-by":"publisher","first-page":"103801","DOI":"10.1016\/j.compind.2022.103801","volume":"144","author":"A Yazdinejad","year":"2023","unstructured":"Yazdinejad, A., Dehghantanha, A., Parizi, R.M., Srivastava, G., Karimipour, H.: Secure intelligent fuzzy Blockchain framework: effective threat detection in IoT networks. Comput. Ind. 144, 103801 (2023)","journal-title":"Comput. Ind."},{"key":"30_CR16","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1016\/j.comcom.2023.03.017","volume":"204","author":"AB Masood","year":"2023","unstructured":"Masood, A.B., Hasan, A., Vassiliou, V., Lestas, M.: A Blockchain-based data-driven fault-tolerant control system for smart factories in industry 4.0. Comput. Commun. 204, 158\u2013171 (2023)","journal-title":"Comput. Commun."},{"key":"30_CR17","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1016\/j.comcom.2022.10.010","volume":"197","author":"A Mitra","year":"2023","unstructured":"Mitra, A., Bera, B., Das, A.K., Jamal, S.S., You, I.: Impact on Blockchain-based AI\/ML-enabled big data analytics for cognitive internet of things environment. Comput. Commun. 197, 173\u2013185 (2023)","journal-title":"Comput. Commun."},{"issue":"2","key":"30_CR18","first-page":"726","volume":"35","author":"OA Khashan","year":"2023","unstructured":"Khashan, O.A., Khafajah, N.M.: Efficient hybrid centralized and Blockchain-based authentication architecture for heterogeneous IoT systems. J. King Saud Univ.-Comput. Inf. Sci. 35(2), 726\u2013739 (2023)","journal-title":"J. King Saud Univ.-Comput. Inf. Sci."},{"issue":"4","key":"30_CR19","doi-asserted-by":"publisher","first-page":"3922","DOI":"10.1109\/TITS.2022.3233801","volume":"24","author":"K Ramana","year":"2023","unstructured":"Ramana, K., et al.: A vision transformer approach for traffic congestion prediction in urban areas. IEEE Trans. Intell. Transp. Syst. 24(4), 3922\u20133934 (2023). https:\/\/doi.org\/10.1109\/TITS.2022.3233801","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"doi-asserted-by":"publisher","unstructured":"Chalapathi, M.M., Kumar, M.R., Sharma, N., Shitharth, S.: Ensemble learning by high-dimensional acoustic features for emotion recognition from speech audio signal. Secur. Commun. Netw. 2022, Article ID 8777026, 10 pages (2022). https:\/\/doi.org\/10.1155\/2022\/8777026","key":"30_CR20","DOI":"10.1155\/2022\/8777026"},{"key":"30_CR21","doi-asserted-by":"publisher","first-page":"103093","DOI":"10.1016\/j.adhoc.2023.103093","volume":"142","author":"S Ayed","year":"2023","unstructured":"Ayed, S., Hbaieb, A., Chaari, L.: Blockchain and trust-based clustering scheme for the IoV. Ad Hoc Network. 142, 103093 (2023)","journal-title":"Ad Hoc Network."},{"issue":"2","key":"30_CR22","doi-asserted-by":"publisher","first-page":"418","DOI":"10.3390\/math11020418","volume":"11","author":"H Shah","year":"2023","unstructured":"Shah, H., et al.: Deep learning-based malicious smart contract and intrusion detection system for IoT environment. Mathematics 11(2), 418 (2023)","journal-title":"Mathematics"},{"issue":"15","key":"30_CR23","doi-asserted-by":"publisher","first-page":"2240004","DOI":"10.1142\/S0218126622400047","volume":"31","author":"K Ramana","year":"2022","unstructured":"Ramana, K., et al.: Leaf disease classification in smart agriculture using deep neural network architecture and IoT. J. Circuits Syst. Comput. 31(15), 2240004 (2022). https:\/\/doi.org\/10.1142\/S0218126622400047","journal-title":"J. Circuits Syst. Comput."},{"doi-asserted-by":"publisher","unstructured":"Kumar, V.A.K., et al.: Dynamic wavelength scheduling by multiobjectives in OBS networks. J. Math. 2022, 10 Article ID 3806018     (2022). https:\/\/doi.org\/10.1155\/2022\/380601","key":"30_CR24","DOI":"10.1155\/2022\/380601"}],"container-title":["Lecture Notes in Computer Science","Mining Intelligence and Knowledge Exploration"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-44084-7_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,23]],"date-time":"2023-09-23T09:06:02Z","timestamp":1695459962000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-44084-7_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031440830","9783031440847"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-44084-7_30","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"24 September 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MIKE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Mining Intelligence and Knowledge Exploration","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kristiansand","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Norway","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 June 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 June 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"mike2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.mike.org.in\/2023\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"87","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"22","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"16","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"25% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3-4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}