{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T09:22:21Z","timestamp":1762507341285},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"S6","license":[{"start":{"date-parts":[[2018,3,20]],"date-time":"2018-03-20T00:00:00Z","timestamp":1521504000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2019,11]]},"DOI":"10.1007\/s10586-018-2288-7","type":"journal-article","created":{"date-parts":[[2018,3,20]],"date-time":"2018-03-20T11:50:58Z","timestamp":1521546658000},"page":"14299-14310","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Integrated quantum flow and hidden Markov chain approach for resisting DDoS attack and C-Worm"],"prefix":"10.1007","volume":"22","author":[{"given":"R.","family":"Saranya","sequence":"first","affiliation":[]},{"given":"S. Senthamarai","family":"Kannan","sequence":"additional","affiliation":[]},{"given":"S. Meenakshi","family":"Sundaram","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,3,20]]},"reference":[{"issue":"5","key":"2288_CR1","doi-asserted-by":"publisher","first-page":"1463","DOI":"10.1109\/TNET.2013.2281614","volume":"22","author":"M Antikainen","year":"2014","unstructured":"Antikainen, M., Aura, T., S\u00e4rel\u00e4, M.: Denial-of-service attacks in bloom-filter-based forwarding. IEEE\/ACM Trans. Networ. 22(5), 1463\u20131476 (2014)","journal-title":"IEEE\/ACM Trans. Networ."},{"issue":"6","key":"2288_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TNET.2012.2194508","volume":"20","author":"J Francois","year":"2012","unstructured":"Francois, J., Aib, I., Boutaba, R.: FireCol: a collaborative protection network for the detection of flooding DDoS attacks. IEEE\/ACM Trans. Networking 20(6), 1\u201314 (2012)","journal-title":"IEEE\/ACM Trans. Networking"},{"issue":"1","key":"2288_CR3","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1109\/TDSC.2014.2316795","volume":"12","author":"Z Lu","year":"2015","unstructured":"Lu, Z., Wang, W., Wang, C.: Camouflage traffic: minimizing message delay for smart grid applications under jamming. IEEE Trans. Dependable Secure Comput. 12(1), 31\u201344 (2015)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"3","key":"2288_CR4","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1109\/TDSC.2014.2315198","volume":"11","author":"A Merlo","year":"2014","unstructured":"Merlo, A., Migliardi, M., Gobbo, N., Palmieri, F., Castiglione, A.: A denial of service attack to UMTS networks using SIM-less devices. IEEE Trans. Dependable Secure Comput. 11(3), 280\u2013291 (2014)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"2288_CR5","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1016\/j.comcom.2014.09.002","volume":"56","author":"Harkeerat Bedi","year":"2015","unstructured":"Bedi, Harkeerat, Roy, Sankardas, Shiva, Sajjan: Mitigating congestion based DoS attacks with an enhanced AQM 4 technique. Comput. Commun. 56, 60\u201373 (2015)","journal-title":"Comput. Commun."},{"key":"2288_CR6","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1016\/j.neucom.2015.04.101","volume":"172","author":"A Saied","year":"2016","unstructured":"Saied, A., Overill, R.E., Radzik, T.: Detection of known and unknown DDoS attacks using artificial neural networks. Neurocomputing 172, 385\u2013393 (2016)","journal-title":"Neurocomputing"},{"issue":"5","key":"2288_CR7","doi-asserted-by":"publisher","first-page":"1101","DOI":"10.1109\/TPDS.2013.179","volume":"25","author":"K Xu","year":"2014","unstructured":"Xu, K., Shen, M., Cui, Y., Ye, M., Zhong, Y.: A model approach to the estimation of peer-to-peer traffic matrices. IEEE Trans. Parall. Distrib. Syst. 25(5), 1101\u20131111 (2014)","journal-title":"IEEE Trans. Parall. Distrib. Syst."},{"key":"2288_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2014\/838623","volume":"2014","author":"PF Ho","year":"2014","unstructured":"Ho, P.F., Kam, Y.H.S., Wee, M.C., Chong, Y.N., Por, L.Y.: Preventing shoulder-surfing attack with the concept of concealing the password objects\u2019 information. Sci. World J. 2014, 1\u201312 (2014)","journal-title":"Sci. World J."},{"key":"2288_CR9","doi-asserted-by":"publisher","first-page":"437","DOI":"10.1016\/j.procs.2016.05.072","volume":"86","author":"Saksit Jantila","year":"2016","unstructured":"Jantila, Saksit, Chaipah, Kornchawal: A security analysis of a hybrid mechanism to defend DDoS attacks in SDN. Proc. Comput. Sci. 86, 437\u2013440 (2016)","journal-title":"Proc. Comput. Sci."},{"key":"2288_CR10","first-page":"1","volume":"2015","author":"L Feng","year":"2015","unstructured":"Feng, L., Song, L., Zhao, Q., Wang, H.: Modeling and stability analysis of worm propagation in wireless sensor network. Math. Prob. Eng. 2015, 1\u20138 (2015)","journal-title":"Math. Prob. Eng."},{"issue":"2","key":"2288_CR11","first-page":"1767","volume":"2","author":"DA Patel","year":"2014","unstructured":"Patel, D.A., Patel, H.: Detection and mitigation of DDOS attack against web server. Int. Journal of Eng. Dev. Res. 2(2), 1767\u20131776 (2014)","journal-title":"Int. Journal of Eng. Dev. Res."},{"key":"2288_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2016\/5017248","volume":"2016","author":"K Mazur","year":"2016","unstructured":"Mazur, K., Ksiezopolski, B., Nielek, R.: Multilevel modeling of distributed denial of service attacks in wireless sensor networks. J. Sensors 2016, 1\u201313 (2016)","journal-title":"J. Sensors"},{"key":"2288_CR13","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1016\/j.cose.2014.10.013","volume":"48","author":"Ilker Ozcelik","year":"2015","unstructured":"Ozcelik, Ilker, Brooks, Richard R.: Deceiving entropy based DoS detection. Comput. Secur. 48, 234\u2013245 (2015)","journal-title":"Comput. Secur."},{"key":"2288_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2015\/238230","volume":"2015","author":"MA Saleh","year":"2014","unstructured":"Saleh, M.A., Manaf, A.A.: A novel protective framework for defeating HTTP-based denial of service and distributed denial of service attacks. Sci. World J. 2015, 1\u201319 (2014)","journal-title":"Sci. World J."},{"issue":"8","key":"2288_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1371\/journal.pone.0160375","volume":"11","author":"NN Dao","year":"2016","unstructured":"Dao, N.N., Kim, J., Park, M., Cho, S.: Adaptive suspicious prevention for defending DoS attacks in SDN-based convergent networks. PLoS ONE J. 11(8), 1\u201324 (2016)","journal-title":"PLoS ONE J."},{"key":"2288_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2014\/206867","volume":"2014","author":"D Selvaraj","year":"2014","unstructured":"Selvaraj, D., Ganapathi, P.: Packet payload monitoring for internet worm content detection using deterministic finite automaton with delayed dictionary compression. J. Comput. Netw. Commun. 2014, 1\u20139 (2014)","journal-title":"J. Comput. Netw. Commun."},{"key":"2288_CR17","first-page":"1","volume":"2015","author":"L Lu","year":"2015","unstructured":"Lu, L., Hussain, M.J., Luo, G., Han, Z.: Pworm: passive and real-time wormhole detection scheme for WSNs. Int. J. Distributed Sensor Netw. 2015, 1\u201317 (2015)","journal-title":"Int. J. Distributed Sensor Netw."},{"key":"2288_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1002\/sec.1639","volume":"9","author":"RK Deka","year":"2016","unstructured":"Deka, R.K., Bhattacharyya, D.K.: Self-similarity based DDoS attack detection using Hurst parameter. Secur. Commun. Netw. 9, 1\u201314 (2016)","journal-title":"Secur. Commun. Netw."},{"key":"2288_CR19","doi-asserted-by":"publisher","first-page":"4103","DOI":"10.1016\/j.apm.2012.09.025","volume":"37","author":"BK Mishra","year":"2013","unstructured":"Mishra, B.K., Keshri, N.: Mathematical model on the transmission of worms in wireless sensor network. Appl. Math. Model. 37, 4103\u20134111 (2013)","journal-title":"Appl. Math. Model."},{"issue":"3","key":"2288_CR20","first-page":"73","volume":"11","author":"T Nagulancha","year":"2014","unstructured":"Nagulancha, T., Kurma, L.: On modelling of camouflaging worm. Int. J. Emerg. Technol. Comput. Sci. Electr. 11(3), 73\u201377 (2014)","journal-title":"Int. J. Emerg. Technol. Comput. Sci. Electr."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-018-2288-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10586-018-2288-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-018-2288-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,26]],"date-time":"2019-11-26T12:27:50Z","timestamp":1574771270000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10586-018-2288-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3,20]]},"references-count":20,"journal-issue":{"issue":"S6","published-print":{"date-parts":[[2019,11]]}},"alternative-id":["2288"],"URL":"https:\/\/doi.org\/10.1007\/s10586-018-2288-7","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,3,20]]},"assertion":[{"value":"26 December 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 February 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 February 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 March 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}