{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T22:50:29Z","timestamp":1742943029763,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":45,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819922321"},{"type":"electronic","value":"9789819922338"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-981-99-2233-8_11","type":"book-chapter","created":{"date-parts":[[2023,4,30]],"date-time":"2023-04-30T03:18:45Z","timestamp":1682824725000},"page":"155-165","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A Novel Approach of\u00a0Securing Medical Cyber Physical Systems (MCPS) from\u00a0DDoS Attacks"],"prefix":"10.1007","author":[{"given":"Brij. B.","family":"Gupta","sequence":"first","affiliation":[]},{"given":"Kwok Tai","family":"Chui","sequence":"additional","affiliation":[]},{"given":"Varsha","family":"Arya","sequence":"additional","affiliation":[]},{"given":"Akshat","family":"Gaurav","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,5,1]]},"reference":[{"issue":"3","key":"11_CR1","doi-asserted-by":"publisher","first-page":"423","DOI":"10.1007\/s11235-017-0345-9","volume":"67","author":"V Adat","year":"2018","unstructured":"Adat, V., Gupta, B.: Security in internet of things: issues, challenges, taxonomy, and architecture. Telecommun. Syst. 67(3), 423\u2013441 (2018)","journal-title":"Telecommun. Syst."},{"issue":"4","key":"11_CR2","doi-asserted-by":"publisher","first-page":"3769","DOI":"10.1109\/COMST.2019.2934468","volume":"21","author":"N Agrawal","year":"2019","unstructured":"Agrawal, N., Tapaswi, S.: Defense mechanisms against DDOs attacks in a cloud computing environment: state-of-the-art and research challenges. IEEE Commun. Surv. Tutorials 21(4), 3769\u20133795 (2019)","journal-title":"IEEE Commun. Surv. Tutorials"},{"issue":"3","key":"11_CR3","first-page":"61","volume":"5","author":"KD Ahmed","year":"2021","unstructured":"Ahmed, K.D., Askar, S., et al.: Deep learning models for cyber security in IoT networks: a review. Int. J. Sci. Bus. 5(3), 61\u201370 (2021)","journal-title":"Int. J. Sci. Bus."},{"key":"11_CR4","doi-asserted-by":"publisher","first-page":"42236","DOI":"10.1109\/ACCESS.2021.3062909","volume":"9","author":"A Aljuhani","year":"2021","unstructured":"Aljuhani, A.: Machine learning approaches for combating distributed denial of service attacks in modern networking environments. IEEE Access 9, 42236\u201342264 (2021)","journal-title":"IEEE Access"},{"issue":"4","key":"11_CR5","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1109\/TCE.2020.3018543","volume":"66","author":"I Bernab\u00e9-S\u00e1nchez","year":"2020","unstructured":"Bernab\u00e9-S\u00e1nchez, I., D\u00edaz-S\u00e1nchez, D., Mu\u00f1oz-Organero, M.: Specification and unattended deployment of home networks at the edge of the network. IEEE Trans. Consum. Electron. 66(4), 279\u2013288 (2020). https:\/\/doi.org\/10.1109\/TCE.2020.3018543","journal-title":"IEEE Trans. Consum. Electron."},{"key":"11_CR6","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1016\/j.compeleceng.2018.11.004","volume":"73","author":"P Bojovi\u0107","year":"2019","unstructured":"Bojovi\u0107, P., Ba\u0161i\u010devi\u0107, I., Ocovaj, S., Popovi\u0107, M.: A practical approach to detection of distributed denial-of-service attacks using a hybrid detection method. Comput. Electr. Eng. 73, 84\u201396 (2019)","journal-title":"Comput. Electr. Eng."},{"issue":"3","key":"11_CR7","doi-asserted-by":"publisher","first-page":"61","DOI":"10.4018\/IJESMA.2018070104","volume":"10","author":"D Chaudhary","year":"2018","unstructured":"Chaudhary, D., Bhushan, K., Gupta, B.B.: Survey on DDOs attacks and defense mechanisms in cloud and fog computing. Int. J. E-Serv. Mob. Appl. (IJESMA) 10(3), 61\u201383 (2018)","journal-title":"Int. J. E-Serv. Mob. Appl. (IJESMA)"},{"key":"11_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/978-3-030-00018-9_15","volume-title":"Cloud Computing and Security","author":"J Cui","year":"2018","unstructured":"Cui, J., Long, J., Min, E., Liu, Q., Li, Q.: Comparative study of CNN and RNN for deep learning based intrusion detection system. In: Sun, X., Pan, Z., Bertino, E. (eds.) ICCCS 2018. LNCS, vol. 11067, pp. 159\u2013170. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-00018-9_15"},{"key":"11_CR9","first-page":"2164","volume":"18","author":"K Doshi","year":"2021","unstructured":"Doshi, K., Yilmaz, Y., Uludag, S.: Timely detection and mitigation of stealthy DDOs attacks via IoT networks. IEEE Trans. Dependable Secure Comput. 18, 2164\u20132176 (2021)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"11_CR10","doi-asserted-by":"crossref","unstructured":"Doshi, R., Apthorpe, N., Feamster, N.: Machine learning DDOs detection for consumer internet of things devices. In: 2018 IEEE Security and Privacy Workshops (SPW), pp. 29\u201335. IEEE (2018)","DOI":"10.1109\/SPW.2018.00013"},{"issue":"5","key":"11_CR11","first-page":"601","volume":"10","author":"F Fang","year":"2016","unstructured":"Fang, F., Cai, Z., Zhao, Q., Lin, J., Zhu, M.: Adaptive technique for real-time DDOs detection and defense using spark streaming. J. Frontiers Comput. Sci. Technol. 10(5), 601\u2013611 (2016)","journal-title":"J. Frontiers Comput. Sci. Technol."},{"issue":"1","key":"11_CR12","first-page":"225","volume":"4","author":"L Gao","year":"2016","unstructured":"Gao, L., Luan, T.H., Yu, S., Zhou, W., Liu, B.: FogRoute: DTN-based data dissemination model in fog computing. IEEE Internet Things J. 4(1), 225\u2013235 (2016)","journal-title":"IEEE Internet Things J."},{"issue":"12","key":"11_CR13","doi-asserted-by":"publisher","first-page":"1877","DOI":"10.1109\/JAS.2021.1004003","volume":"8","author":"BB Gupta","year":"2021","unstructured":"Gupta, B.B., Li, K.C., Leung, V.C., Psannis, K.E., Yamaguchi, S., et al.: Blockchain-assisted secure fine-grained searchable encryption for a cloud-based healthcare cyber-physical system. IEEE\/CAA J. Automatica Sinica 8(12), 1877\u20131890 (2021)","journal-title":"IEEE\/CAA J. Automatica Sinica"},{"issue":"4","key":"11_CR14","doi-asserted-by":"publisher","first-page":"801","DOI":"10.1016\/j.tele.2017.12.010","volume":"35","author":"R Haraty","year":"2018","unstructured":"Haraty, R., Kaddoura, S., Zekri, A.: Recovery of business intelligence systems: towards guaranteed continuity of patient centric healthcare systems through a matrix-based recovery approach. Telematics Inform. 35(4), 801\u2013814 (2018). https:\/\/doi.org\/10.1016\/j.tele.2017.12.010","journal-title":"Telematics Inform."},{"key":"11_CR15","doi-asserted-by":"crossref","unstructured":"Herrera, H.A., Rivas, W.R., Kumar, S.: Evaluation of internet connectivity under distributed denial of service attacks from botnets of varying magnitudes. In: 2018 1st International Conference on Data Intelligence and Security (ICDIS), pp. 123\u2013126. IEEE (2018)","DOI":"10.1109\/ICDIS.2018.00026"},{"issue":"10","key":"11_CR16","doi-asserted-by":"publisher","first-page":"9552","DOI":"10.1109\/JIOT.2020.2993782","volume":"7","author":"Y Jia","year":"2020","unstructured":"Jia, Y., Zhong, F., Alrawais, A., Gong, B., Cheng, X.: Flowguard: an intelligent edge defense mechanism against IoT DDOs attacks. IEEE Internet Things J. 7(10), 9552\u20139562 (2020)","journal-title":"IEEE Internet Things J."},{"issue":"4","key":"11_CR17","doi-asserted-by":"publisher","first-page":"90","DOI":"10.3390\/fi13040090","volume":"13","author":"S Kaddoura","year":"2021","unstructured":"Kaddoura, S., Haraty, R., Al Kontar, K., Alfandi, O.: A parallelized database damage assessment approach after cyberattack for healthcare systems. Future Internet 13(4), 90 (2021). https:\/\/doi.org\/10.3390\/fi13040090","journal-title":"Future Internet"},{"issue":"10","key":"11_CR18","doi-asserted-by":"publisher","first-page":"2358","DOI":"10.1109\/JSAC.2018.2869997","volume":"36","author":"K Kalkan","year":"2018","unstructured":"Kalkan, K., Altay, L., G\u00fcr, G., Alag\u00f6z, F.: JESS: joint entropy-based DDOs defense scheme in SDN. IEEE J. Sel. Areas Commun. 36(10), 2358\u20132372 (2018)","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"1","key":"11_CR19","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1109\/TCE.2018.2880338","volume":"65","author":"WZ Khan","year":"2019","unstructured":"Khan, W.Z., Aalsalem, M.Y., Khan, M.K.: Communal acts of IoT consumers: a potential threat to security and privacy. IEEE Trans. Consum. Electron. 65(1), 64\u201372 (2019). https:\/\/doi.org\/10.1109\/TCE.2018.2880338","journal-title":"IEEE Trans. Consum. Electron."},{"key":"11_CR20","doi-asserted-by":"crossref","unstructured":"Koay, A., Chen, A., Welch, I., Seah, W.K.: A new multi classifier system using entropy-based features in DDOs attack detection. In: 2018 International Conference on Information Networking (ICOIN), pp. 162\u2013167. IEEE (2018)","DOI":"10.1109\/ICOIN.2018.8343104"},{"issue":"4","key":"11_CR21","doi-asserted-by":"publisher","first-page":"1545","DOI":"10.1109\/TNSM.2018.2861741","volume":"15","author":"P Kumar","year":"2018","unstructured":"Kumar, P., Tripathi, M., Nehra, A., Conti, M., Lal, C.: SAFETY: early detection and mitigation of TCP SYN flood utilizing entropy in SDN. IEEE Trans. Netw. Serv. Manage. 15(4), 1545\u20131559 (2018)","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"key":"11_CR22","doi-asserted-by":"publisher","first-page":"2463","DOI":"10.1109\/TPAMI.2020.2970410","volume":"43","author":"MN Kurt","year":"2020","unstructured":"Kurt, M.N., Yilmaz, Y., Wang, X.: Real-time nonparametric anomaly detection in high-dimensional settings. IEEE Trans. Pattern Anal. Mach. Intell. 43, 2463\u20132479 (2020)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"11_CR23","doi-asserted-by":"publisher","first-page":"36191","DOI":"10.1109\/ACCESS.2020.2974293","volume":"8","author":"J Li","year":"2020","unstructured":"Li, J., Liu, M., Xue, Z., Fan, X., He, X.: RTVD: A real-time volumetric detection scheme for DDOs in the internet of things. IEEE Access 8, 36191\u201336201 (2020)","journal-title":"IEEE Access"},{"key":"11_CR24","doi-asserted-by":"crossref","unstructured":"Li, J., Xue, Z.: Distributed threat intelligence sharing system: a new sight of p2p botnet detection. In: 2019 2nd International Conference on Computer Applications & Information Security (ICCAIS), pp. 1\u20136. IEEE (2019)","DOI":"10.1109\/CAIS.2019.8769511"},{"issue":"3","key":"11_CR25","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1109\/MCE.2019.2892220","volume":"8","author":"M Liu","year":"2019","unstructured":"Liu, M., Xue, Z., He, X., Chen, J.: Cyberthreat-intelligence information sharing: enhancing collaborative security. IEEE Consum. Electron. Mag. 8(3), 17\u201322 (2019)","journal-title":"IEEE Consum. Electron. Mag."},{"issue":"2","key":"11_CR26","doi-asserted-by":"publisher","first-page":"986","DOI":"10.1109\/JIOT.2019.2947659","volume":"7","author":"T Mahjabin","year":"2019","unstructured":"Mahjabin, T., Xiao, Y., Li, T., Chen, C.P.: Load distributed and benign-bot mitigation methods for IoT DNS flood attacks. IEEE Internet Things J. 7(2), 986\u20131000 (2019)","journal-title":"IEEE Internet Things J."},{"key":"11_CR27","series-title":"Internet of Things","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1007\/978-981-10-5861-5_5","volume-title":"Internet of Everything","author":"R Mahmud","year":"2018","unstructured":"Mahmud, R., Kotagiri, R., Buyya, R.: Fog computing: a taxonomy, survey and future directions. In: Di Martino, B., Li, K.-C., Yang, L.T., Esposito, A. (eds.) Internet of Everything. IT, pp. 103\u2013130. Springer, Singapore (2018). https:\/\/doi.org\/10.1007\/978-981-10-5861-5_5"},{"issue":"3","key":"11_CR28","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1109\/MPRV.2018.03367731","volume":"17","author":"Y Meidan","year":"2018","unstructured":"Meidan, Y., et al.: N-BAIOT-network-based detection of IoT botnet attacks using deep autoencoders. IEEE Pervasive Comput. 17(3), 12\u201322 (2018)","journal-title":"IEEE Pervasive Comput."},{"key":"11_CR29","doi-asserted-by":"crossref","unstructured":"Min, E., Long, J., Liu, Q., Cui, J., Chen, W.: TR-IDS: anomaly-based intrusion detection through text-convolutional neural network and random forest. Secur. Commun. Netw. 2018 (2018)","DOI":"10.1155\/2018\/4943509"},{"key":"11_CR30","doi-asserted-by":"crossref","unstructured":"Mustapha, H., Alghamdi, A.M.: DDOs attacks on the internet of things and their prevention methods. In: Proceedings of the 2nd International Conference on Future Networks and Distributed Systems, pp. 1\u20135 (2018)","DOI":"10.1145\/3231053.3231057"},{"key":"11_CR31","doi-asserted-by":"publisher","first-page":"47980","DOI":"10.1109\/ACCESS.2018.2866491","volume":"6","author":"RK Naha","year":"2018","unstructured":"Naha, R.K., et al.: Fog computing: survey of trends, architectures, requirements, and research directions. IEEE Access 6, 47980\u201348009 (2018). https:\/\/doi.org\/10.1109\/ACCESS.2018.2866491","journal-title":"IEEE Access"},{"key":"11_CR32","doi-asserted-by":"crossref","unstructured":"N\u00f5mm, S., Bah\u015fi, H.: Unsupervised anomaly based botnet detection in IoT networks. In: 2018 17th IEEE international conference on machine learning and applications (ICMLA), pp. 1048\u20131053. IEEE (2018)","DOI":"10.1109\/ICMLA.2018.00171"},{"issue":"1","key":"11_CR33","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/BF02831726","volume":"11","author":"W Qing-Tao","year":"2006","unstructured":"Qing-Tao, W., Zhi-qing, S.: Detecting DDOs attacks against web server using time series analysis. Wuhan Univ. J. Nat. Sci. 11(1), 175\u2013180 (2006)","journal-title":"Wuhan Univ. J. Nat. Sci."},{"issue":"4","key":"11_CR34","doi-asserted-by":"publisher","first-page":"464","DOI":"10.1109\/TCE.2019.2939494","volume":"65","author":"PP Ray","year":"2019","unstructured":"Ray, P.P., Thapa, N., Dash, D.: Implementation and performance analysis of interoperable and heterogeneous IoT-edge gateway for pervasive wellness care. IEEE Trans. Consum. Electron. 65(4), 464\u2013473 (2019). https:\/\/doi.org\/10.1109\/TCE.2019.2939494","journal-title":"IEEE Trans. Consum. Electron."},{"key":"11_CR35","first-page":"1","volume":"23","author":"KC Roy","year":"2020","unstructured":"Roy, K.C., Chen, Q.: DeepRan: attention-based BiLSTM and CRF for ransomware early detection and classification. Inf. Syst. Frontiers 23, 1\u201317 (2020)","journal-title":"Inf. Syst. Frontiers"},{"key":"11_CR36","series-title":"Lecture Notes in Electrical Engineering","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1007\/978-981-13-2622-6_31","volume-title":"Computational Science and Technology","author":"SBI Shah","year":"2019","unstructured":"Shah, S.B.I., Anbar, M., Al-Ani, A., Al-Ani, A.K.: Hybridizing entropy based mechanism with adaptive threshold algorithm to detect RA flooding attack in IPv6 networks. In: Computational Science and Technology. LNEE, vol. 481, pp. 315\u2013323. Springer, Singapore (2019). https:\/\/doi.org\/10.1007\/978-981-13-2622-6_31"},{"issue":"1","key":"11_CR37","first-page":"13","volume":"9","author":"C She","year":"2017","unstructured":"She, C., Wen, W., Lin, Z., Zheng, K.: Application-layer DDOs detection based on a one-class support vector machine. Int. J. Netw. Secur. Appl. (IJNSA) 9(1), 13\u201324 (2017)","journal-title":"Int. J. Netw. Secur. Appl. (IJNSA)"},{"issue":"3","key":"11_CR38","doi-asserted-by":"publisher","first-page":"20","DOI":"10.4018\/IJSWIS.2020070102","volume":"16","author":"A Tewari","year":"2020","unstructured":"Tewari, A., Gupta, B.B.: Secure timestamp-based mutual authentication protocol for IoT devices using RFID tags. Int. J. Semant. Web Inf. Syst. (IJSWIS) 16(3), 20\u201334 (2020)","journal-title":"Int. J. Semant. Web Inf. Syst. (IJSWIS)"},{"key":"11_CR39","doi-asserted-by":"publisher","unstructured":"Varga, A., Hornig, R.: An Overview of the OMNeT++ Simulation Environment (2008). https:\/\/doi.org\/10.1145\/1416222.1416290","DOI":"10.1145\/1416222.1416290"},{"key":"11_CR40","doi-asserted-by":"crossref","unstructured":"Vishwakarma, R., Jain, A.K.: A honeypot with machine learning based detection framework for defending IoT based botnet DDOs attacks. In: 2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI), pp. 1019\u20131024. IEEE (2019)","DOI":"10.1109\/ICOEI.2019.8862720"},{"issue":"1","key":"11_CR41","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1109\/TSC.2017.2694426","volume":"13","author":"O Wahab","year":"2020","unstructured":"Wahab, O., Bentahar, J., Otrok, H., Mourad, A.: Optimal load distribution for the detection of VM-based DDOs attacks in the cloud. IEEE Trans. Serv. Comput. 13(1), 114\u2013129 (2020). https:\/\/doi.org\/10.1109\/TSC.2017.2694426","journal-title":"IEEE Trans. Serv. Comput."},{"key":"11_CR42","doi-asserted-by":"crossref","unstructured":"Yilmaz, Y.: Online nonparametric anomaly detection based on geometric entropy minimization. In: 2017 IEEE International Symposium on Information Theory (ISIT), pp. 3010\u20133014. IEEE (2017)","DOI":"10.1109\/ISIT.2017.8007082"},{"key":"11_CR43","unstructured":"Yunis, M., Markarian, C., El-Kassar, A.N.: A conceptual model for sustainable adoption of ehealth: role of digital transformation culture and healthcare provider\u2019s readiness, vol. 2, pp. 179\u2013184 (2020)"},{"key":"11_CR44","doi-asserted-by":"publisher","first-page":"300926","DOI":"10.1016\/j.fsidi.2020.300926","volume":"32","author":"X Zhang","year":"2020","unstructured":"Zhang, X., Upton, O., Beebe, N.L., Choo, K.K.R.: Iot botnet forensics: a comprehensive digital forensic case study on mirai botnet servers. Forensic Sci. Int. Digit. Investig. 32, 300926 (2020)","journal-title":"Forensic Sci. Int. Digit. Investig."},{"key":"11_CR45","doi-asserted-by":"crossref","unstructured":"Zhao, Y., Zhang, W., Feng, Y., Yu, B.: A classification detection algorithm based on joint entropy vector against application-layer DDOs attack. Secur. Commun. Netw. 2018 (2018)","DOI":"10.1155\/2018\/9463653"}],"container-title":["Lecture Notes in Computer Science","Big Data Intelligence and Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-99-2233-8_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,30]],"date-time":"2023-04-30T03:20:45Z","timestamp":1682824845000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-99-2233-8_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9789819922321","9789819922338"],"references-count":45,"URL":"https:\/\/doi.org\/10.1007\/978-981-99-2233-8_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"1 May 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DataCom","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Big Data Intelligence and Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Denarau","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Fiji","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 December 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 December 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"datacom2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}