{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T15:47:52Z","timestamp":1772725672134,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":3,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642044915","type":"print"},{"value":"9783642044922","type":"electronic"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04492-2_66","type":"book-chapter","created":{"date-parts":[[2009,9,15]],"date-time":"2009-09-15T04:01:51Z","timestamp":1252987311000},"page":"515-518","source":"Crossref","is-referenced-by-count":25,"title":["Attack Model and Detection Scheme for Botnet on 6LoWPAN"],"prefix":"10.1007","author":[{"given":"Eung Jun","family":"Cho","sequence":"first","affiliation":[]},{"given":"Jin Ho","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Choong Seon","family":"Hong","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"66_CR1","unstructured":"Puri, R.: Bots & Botnet: An Overview, https:\/\/cours.ift.ulaval.ca\/fileadmin\/cours\/20064_2772A\/public\/Botnet.pdf (August 2003)"},{"key":"66_CR2","unstructured":"Holz, T., Steiner, M., Dahl, F., Biersack, E., Freiling, F.: Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm, April 9 (2008)"},{"key":"66_CR3","doi-asserted-by":"crossref","unstructured":"Kushalnagar, N., Montenegro, G., Schumacher, C.: IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs): Overview, Assumptions, Problem Statement, and Goals, IETF RFC 4919 (August 2007)","DOI":"10.17487\/rfc4919"}],"container-title":["Lecture Notes in Computer Science","Management Enabling the Future Internet for Changing Business and New Computing Services"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04492-2_66","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,22]],"date-time":"2019-05-22T15:42:46Z","timestamp":1558539766000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04492-2_66"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642044915","9783642044922"],"references-count":3,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04492-2_66","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009]]}}}