{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T18:44:55Z","timestamp":1775069095235,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":6,"publisher":"Springer Singapore","isbn-type":[{"value":"9789811050404","type":"print"},{"value":"9789811050411","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-981-10-5041-1_43","type":"book-chapter","created":{"date-parts":[[2017,5,13]],"date-time":"2017-05-13T03:14:39Z","timestamp":1494645279000},"page":"252-257","source":"Crossref","is-referenced-by-count":9,"title":["Assessing the Impact of DoS Attacks on IoT Gateway"],"prefix":"10.1007","author":[{"given":"Yungee","family":"Lee","sequence":"first","affiliation":[]},{"given":"Wangkwang","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Giwon","family":"Shin","sequence":"additional","affiliation":[]},{"given":"Kyungbaek","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,14]]},"reference":[{"key":"43_CR1","unstructured":"ETNEWS: IoT devices are used for DDoS attack (2014). \nhttp:\/\/www.etnews.com\/20141029000125"},{"key":"43_CR2","unstructured":"OpenWRT: What is OpenWRT? \nhttps:\/\/openwrt.org"},{"key":"43_CR3","doi-asserted-by":"crossref","unstructured":"Rudman, L., Irwin, B.: Characterization and analysis of NTP amplification based DDoS attacks. In: Information Security for South Africa (ISSA), 12 August 2015, pp. 1\u20135. IEEE (2015)","DOI":"10.1109\/ISSA.2015.7335069"},{"issue":"8","key":"43_CR4","doi-asserted-by":"crossref","first-page":"2661","DOI":"10.1016\/j.adhoc.2013.04.014","volume":"11","author":"S Raza","year":"2013","unstructured":"Raza, S., Wallgren, L., Voigt, T.: SVELTE: real-time intrusion detection in the internet of things. Ad Hoc Netw. 11(8), 2661\u20132674 (2013)","journal-title":"Ad Hoc Netw."},{"key":"43_CR5","unstructured":"Lee, Y., Kim, S., Vu, D.T., Kim, K.: Sampling based network flooding attack detection\/prevention system for SDN. KISM Smart Media J. pp. 24\u201332, 31 December 2015"},{"key":"43_CR6","unstructured":"Vu, D.T., Kim, K.: Evaluation of network flooding attack detection\/prevention system for SDN in KOREN network. In: Proceedings of 2016 KISM, April 29\u201330, 2016. Silla University, Busan (2016)"}],"container-title":["Lecture Notes in Electrical Engineering","Advanced Multimedia and Ubiquitous Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-5041-1_43","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,5,13]],"date-time":"2017-05-13T03:24:39Z","timestamp":1494645879000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-5041-1_43"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9789811050404","9789811050411"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-5041-1_43","relation":{},"ISSN":["1876-1100","1876-1119"],"issn-type":[{"value":"1876-1100","type":"print"},{"value":"1876-1119","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]}}}