{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T00:12:04Z","timestamp":1742947924201,"version":"3.40.3"},"publisher-location":"Cham","reference-count":8,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319270715"},{"type":"electronic","value":"9783319270722"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-27072-2_29","type":"book-chapter","created":{"date-parts":[[2015,12,29]],"date-time":"2015-12-29T07:40:18Z","timestamp":1451374818000},"page":"226-232","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Performance Analysis of Wireless Sensor Networks Under DDoS Attack"],"prefix":"10.1007","author":[{"given":"Marija","family":"Bubinska","sequence":"first","affiliation":[]},{"given":"Aleksandar","family":"Risteski","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,30]]},"reference":[{"key":"29_CR1","unstructured":"Sahu, S.S., Pandey, M.: Distributed Denial of Service Attacks: A Review (2014)"},{"key":"29_CR2","doi-asserted-by":"crossref","unstructured":"Sharma, K., Mittal, N., Rathi, P.: Comparative analysis of routing protocols in ad-hoc networks (2014)","DOI":"10.14257\/ijast.2014.69.01"},{"key":"29_CR3","unstructured":"Aamir, M., Arif, M.: Study and performance evaluation on recent ddos trends of attack & defense"},{"key":"29_CR4","unstructured":"Baig, Z.A.: Distributed Denial of Service Attack Detection in Wireless Sensor Networks, January 2008"},{"key":"29_CR5","unstructured":"Chaitanya, D.K., Arindam, G.: Analysis of Denial-of-Service attacks on Wireless Sensor Networks Using Simulation"},{"key":"29_CR6","unstructured":"Wood, A.D., Stankovic, J.A.: A Taxonomy for Denial-of-Service Attacks in Wireless Sensor Networks"},{"key":"29_CR7","unstructured":"Farooq, N., Zahoor, I., Mandal, S., Gulzar, T.: Systematic Analysis of DoS Attacks in Wireless Sensor Networks with Wormhole Injection"},{"key":"29_CR8","unstructured":"Qualnet v5.2. \n                    http:\/\/web.scalable-networks.com\/content\/qualnet"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Future Access Enablers for Ubiquitous and Intelligent Infrastructures"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-27072-2_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T02:25:56Z","timestamp":1559355956000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-27072-2_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319270715","9783319270722"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-27072-2_29","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"30 December 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}