{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T14:42:32Z","timestamp":1775745752037,"version":"3.50.1"},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2016,5,17]],"date-time":"2016-05-17T00:00:00Z","timestamp":1463443200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100011665","name":"Deanship of Scientific Research.","doi-asserted-by":"crossref","award":["RG-1435-048."],"award-info":[{"award-number":["RG-1435-048."]}],"id":[{"id":"10.13039\/501100011665","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Med Syst"],"published-print":{"date-parts":[[2016,7]]},"DOI":"10.1007\/s10916-016-0515-4","type":"journal-article","created":{"date-parts":[[2016,5,17]],"date-time":"2016-05-17T07:44:37Z","timestamp":1463471077000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Distributed Denial of Service Attack Source Detection Using Efficient Traceback Technique (ETT) in Cloud-Assisted Healthcare Environment"],"prefix":"10.1007","volume":"40","author":[{"given":"Rabia","family":"Latif","sequence":"first","affiliation":[]},{"given":"Haider","family":"Abbas","sequence":"additional","affiliation":[]},{"given":"Seemab","family":"Latif","sequence":"additional","affiliation":[]},{"given":"Ashraf","family":"Masood","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,5,17]]},"reference":[{"issue":"128","key":"515_CR1","first-page":"1","volume":"38","author":"R Latif","year":"2014","unstructured":"Latif, R., Abbas, H., and Assar, S., Distributed denial of service (DDoS) attack in cloud-assisted wireless body area networks: a systematic literature review. J. Med. Syst. (Springer) 38(128):1\u201310, 2014.","journal-title":"J. Med. Syst. (Springer)"},{"key":"515_CR2","doi-asserted-by":"crossref","first-page":"511","DOI":"10.1016\/j.procs.2014.07.058","volume":"34","author":"FA Khan","year":"2014","unstructured":"Khan, F. A., Ali, A., Abbas, H., and Haider, N., A cloud-based healthcare framework for security and patients\u2019 data privacy using wireless body area networks. Procedia Comput. Sci. 34:511\u2013517, 2014.","journal-title":"Procedia Comput. Sci."},{"key":"515_CR3","doi-asserted-by":"crossref","unstructured":"Latif, R., Abbas, H., Latif, S., Masood, A. EVFDT: an enhanced very fast decision tree algorithm for detecting distributed denial of service attack in cloud-assisted wireless body area network. Mob. Inf. Syst. 2015, Article ID 260594:1\u201313, 2015.","DOI":"10.1155\/2015\/260594"},{"key":"515_CR4","doi-asserted-by":"crossref","unstructured":"Latif, R., Abbas, H., Latif, S, Masood, A. Performance Evaluation of Enhanced Very Fast Decision Tree (EVFDT) Mechanism for distributed denial of service attack detection in healthcare systems. healthcare on smart and mobile devices. Ann. Telecommun.:1\u201311, 2015.","DOI":"10.1155\/2015\/260594"},{"key":"515_CR5","unstructured":"Latif, R. Distributed denial of service (DDoS) Attack detection and prevention mechanisms for cloud- assisted Wireless Body Area Networks (WBANs). Doctoral Thesis, National University of Sciences and Technology, NUST, Pakistan."},{"key":"515_CR6","doi-asserted-by":"crossref","unstructured":"Irum, S., Ali, A., Khan, F. A., Abbas, H. A hybrid security mechanism for intra-WBAN and inter-WBAN communications. Int. J. Distrib. Sens. Netw. 2013, Article ID 842608:1\u201311, 2013.","DOI":"10.1155\/2013\/842608"},{"issue":"1","key":"515_CR7","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1016\/j.jnca.2012.09.001","volume":"36","author":"A Waqar","year":"2013","unstructured":"Waqar, A., Raza, A., Abbas, H., and Khurram Khan, M., A framework for preservation of cloud users\u2019 data privacy using dynamic reconstruction of metadata. J. Netw. Comput. Appl. 36(1):235\u2013248, 2013. doi: 10.1016\/j.jnca.2012.09.001 .","journal-title":"J. Netw. Comput. Appl."},{"key":"515_CR8","unstructured":"Bellovin, S.M. ICMP Traceback Messages. Internet Draft: draft-ietf-itrace-04.txt, expires. 2003."},{"key":"515_CR9","doi-asserted-by":"crossref","unstructured":"Snoeren, A. C., Partridge, C., Sanchez, L.A., Jones, C. E. Hash-Based IP Traceback. In: Proceeding in ACM. SIGCOMM, pp 3\u201314, 2001.","DOI":"10.1145\/383059.383060"},{"key":"515_CR10","doi-asserted-by":"crossref","unstructured":"Savage, S., Wetherall, D., Karlin, A., Anderson, T. Practical network support for IP traceback. In: Proceeding in ACM SIGCOMM, pp 295\u2013306, 2000.","DOI":"10.1145\/347059.347560"},{"key":"515_CR11","doi-asserted-by":"crossref","unstructured":"Andrey, B., Nirwan, A. IP Traceback with deterministic packet marking. IEEE Commun. Lett. 7(4), 2003.","DOI":"10.1109\/LCOMM.2003.811200"},{"key":"515_CR12","first-page":"9","volume":"2006","author":"X Jin","year":"2006","unstructured":"Jin, X., Zhang, Y., Pan, Y., Zhou, Y., and ZSBT, A novel algorithm for tracing DoS attacker in MANETs. EURASIP J. Wireless Commun. Netw. 2006:9, 2006.","journal-title":"EURASIP J. Wireless Commun. Netw."},{"key":"515_CR13","doi-asserted-by":"crossref","unstructured":"Sy, D., Bao, L. CAPTRA: coordinated packet traceback. In Proceedings of the 5th International Conference on Information Processing in Sensor Networks (IPSN), pp 152\u2013159, 2006.","DOI":"10.1145\/1127777.1127803"},{"issue":"1","key":"515_CR14","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1108\/09685221111115836","volume":"19","author":"H Abbas","year":"2011","unstructured":"Abbas, H., Magnusson, C., Yngstrom, L., and Hemani, A., Addressing dynamic issues in information security management. Info. Manag. Comp. Secur. 19(1):5\u201324, 2011. doi: 10.1108\/09685221111115836 .","journal-title":"Info. Manag. Comp. Secur."},{"issue":"2","key":"515_CR15","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1002\/sec.88","volume":"2","author":"C Bo-Chao","year":"2009","unstructured":"Bo-Chao, C., Huan, C., and Guo-Tan, L., FBT: an efficient traceback scheme in hierarchical wireless sensor network. Secur Commun. Netw. 2(2):133\u2013144, 2009.","journal-title":"Secur Commun. Netw."},{"key":"515_CR16","doi-asserted-by":"crossref","unstructured":"Thing, V. L. L., Lee, H. C. J., Sloman, M., Zhou, J. Enhanced ICMP traceback with cumulative path. In proceedings of 61st IEEE Vehicular Technology Conference. (VTC 2005), Vol. 4, Sweden, pp. 2415\u20132419, 2005.","DOI":"10.1109\/VETECS.2005.1543768"},{"issue":"3","key":"515_CR17","doi-asserted-by":"crossref","first-page":"866","DOI":"10.1016\/j.comnet.2006.06.009","volume":"51","author":"J Liu","year":"2007","unstructured":"Liu, J., Lee, Z., and Chung, Y., Dynamic probabilistic packet marking for efficient IP traceback. Comput. Netw.: Int. J. Comput. Telecommun. Netw. 51(3):866\u2013882, 2007.","journal-title":"Comput. Netw.: Int. J. Comput. Telecommun. Netw."},{"key":"515_CR18","unstructured":"Park, K., Lee, H. On the On the Effectiveness of Probabilistic Packet Marking for IP Traceback Under Denial of Service Attack. In Proceedings of 2001 I.E. INFOCOM Conference, 2001."}],"container-title":["Journal of Medical Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-016-0515-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10916-016-0515-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-016-0515-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,16]],"date-time":"2020-05-16T21:16:01Z","timestamp":1589663761000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10916-016-0515-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5,17]]},"references-count":18,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2016,7]]}},"alternative-id":["515"],"URL":"https:\/\/doi.org\/10.1007\/s10916-016-0515-4","relation":{},"ISSN":["0148-5598","1573-689X"],"issn-type":[{"value":"0148-5598","type":"print"},{"value":"1573-689X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,5,17]]},"article-number":"161"}}