{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T05:49:53Z","timestamp":1725256193217},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2018,8,6]],"date-time":"2018-08-06T00:00:00Z","timestamp":1533513600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1007\/s11227-018-2506-3","type":"journal-article","created":{"date-parts":[[2018,8,6]],"date-time":"2018-08-06T15:41:56Z","timestamp":1533570116000},"page":"6988-7002","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Utilizing a lightweight PKI mechanism to guarantee a secure service in a cloud environment"],"prefix":"10.1007","volume":"74","author":[{"given":"Sangho","family":"Park","sequence":"first","affiliation":[]},{"given":"Hyunjin","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Jaecheol","family":"Ryou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,8,6]]},"reference":[{"key":"2506_CR1","unstructured":"ETSI. DGS\/NFV-MAN001 Network Functions Virtualisation (NFV) Management and orchestration, Sophia Antipolis (2014)"},{"key":"2506_CR2","unstructured":"Lopez DR (2014) Network functions virtualization: Beyond carrier-grade clouds, Optical Fiber Communications Conference and Exhibition (OFC), San Francisco"},{"key":"2506_CR3","unstructured":"Seo Sin-seok, Won Young J (2011) James Won-Ki Hong. Witnessing Distributed Denial-of-Service traffic from an attackers network, Network and Service Management(CNSM), pp 241\u2013247"},{"key":"2506_CR4","first-page":"392","volume":"13","author":"SK Nayak","year":"2017","unstructured":"Nayak SK, Mohanty S, Majhi B (2017) CLB-ECC: certificateless blind signature using ECC. J Inform Process Syst (JIPS) 13:392\u2013397","journal-title":"J Inform Process Syst (JIPS)"},{"issue":"2","key":"2506_CR5","doi-asserted-by":"publisher","first-page":"120126","DOI":"10.1145\/359340.359342","volume":"21","author":"RL Rivest","year":"1978","unstructured":"Rivest RL, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21(2):120126","journal-title":"Commun ACM"},{"key":"2506_CR6","unstructured":"Bellare Mihir, Desai Anand, Pointcheval David (1998) Phillip Rogaway. Lecture Notes in Computer Science, CRYPTO: Annual International Cryptology Conference 1462:26\u201345"},{"issue":"3","key":"2506_CR7","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1109\/TSC.2012.1","volume":"6","author":"K-W Park","year":"2013","unstructured":"Park K-W, Han J, Chun JW, Park KH (2013) THEMIS: a mutually verifiable billing system for the cloud computing environment. IEEE Trans Serv Comput 6(3):300\u2013313","journal-title":"IEEE Trans Serv Comput"},{"issue":"3","key":"2506_CR8","first-page":"68","volume":"18","author":"S Acharya","year":"2016","unstructured":"Acharya S, Tiwari N (2016) Survey of DDoS attacks based on TCP\/IP protocol vulnerabilities. IOSR J Comput Eng (IOSR-JCE) 18(3):68\u201376","journal-title":"IOSR J Comput Eng (IOSR-JCE)"},{"key":"2506_CR9","doi-asserted-by":"crossref","unstructured":"Kang Won Min, Moon Seo Yeon, Park Jong Hyuk (2017) An enhanced security framework for home applicances in smart home, Human-centric Computing and Information Sciences(HCIS), Volume 7. Issue. 6","DOI":"10.1186\/s13673-017-0087-4"},{"key":"2506_CR10","doi-asserted-by":"crossref","unstructured":"Das R, Karabade A, Tuna G (2015) Common network attack types and defense mechanisms, Signal Processing and Communications Applications Conference (SIU), pp 658\u2013661","DOI":"10.1109\/SIU.2015.7130435"},{"key":"2506_CR11","unstructured":"Hussain Syed Mujtiba, Beigh Ghulam Rasool (2013) Impact of DDoS attack (UDP Flooding) on queuing models. In: 4th International Conference on Computer and Communication Technology (ICCCT) pp 210\u2013216"},{"key":"2506_CR12","unstructured":"Gupta Neha, Jain Ankur, Saini Pranav, Vaibhav Gupta (2016) DDoS attack algorithm using ICMP flood, Computing for Sustainable Global Development (INDIACom), pp 4082\u20134084"},{"key":"2506_CR13","doi-asserted-by":"crossref","unstructured":"Moustis D, Kotzanikolaou P (2013) Evaluating security controls against HTTP-based DDoS attacks. In: 4th International Conference on Information Intelligence, Systems and Applications (IISA)","DOI":"10.1109\/IISA.2013.6623707"},{"key":"2506_CR14","unstructured":"Chen W, Yeung D-Y (2006) Defending against TCP SYN flooding attacks under different types of IP spoofing, networking. In: International Conference on Systems and International Conference on Mobile Communications and Learning Technologies"},{"key":"2506_CR15","doi-asserted-by":"crossref","unstructured":"Guenane F, Nogueira M, Serhrouchni A (2015) DDOS Mitigation Cloud-Based Service, IEEE Trustcom\/BigDataSE\/ISPA pp 1363\u20131368","DOI":"10.1109\/Trustcom.2015.531"},{"issue":"2","key":"2506_CR16","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/997150.997156","volume":"34","author":"J Mirkovic","year":"2004","unstructured":"Mirkovic J, Reiher P (2004) A taxonomy of DDoS attack and DDoS defense mechanisms. ACM SIGCOMM Comput Commun Rev 34(2):39\u201353","journal-title":"ACM SIGCOMM Comput Commun Rev"},{"key":"2506_CR17","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1186\/s13673-016-0076-z","volume":"6","author":"N Keegan","year":"2016","unstructured":"Keegan N, Ji S-Y, Chaudhary A, Yu B (2016) A survey of cloud-based network intrusion detection ana. Human-Cent Comput Info Sci 6:19","journal-title":"Human-Cent Comput Info Sci"},{"issue":"12","key":"2506_CR18","doi-asserted-by":"publisher","first-page":"1650","DOI":"10.1109\/TPAMI.2002.1114856","volume":"24","author":"U Maulik","year":"2002","unstructured":"Maulik U, Bandyopadhyay S (2002) Performance evaluation of some clustering algorithms and validity indices. IEEE Trans Pattern Anal Mach Intell 24(12):1650\u20131654","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"2506_CR19","first-page":"3074","volume":"5","author":"G Sehgal","year":"2014","unstructured":"Sehgal G, Garg DK (2014) Comparison of various clustering algorithms. IJCSIT 5:3074\u20133076","journal-title":"IJCSIT"},{"key":"2506_CR20","doi-asserted-by":"crossref","unstructured":"Saralajew S, Villmann T (2016) Adaptive tangent distances in generalized learning vector quantization for transformation and distortion invariant classification learning, IJCNN, pp 2672\u20132679","DOI":"10.1109\/IJCNN.2016.7727534"},{"key":"2506_CR21","doi-asserted-by":"crossref","unstructured":"Sharmila, Kumar M (2013) An optimized farthest first clustering algorithm. In: Nirma University International Conference on Engineering (NUiCONE)","DOI":"10.1109\/NUiCONE.2013.6780070"},{"key":"2506_CR22","first-page":"1713","volume":"3","author":"S Bandyopadhyay","year":"2003","unstructured":"Bandyopadhyay S, Coyle EJ (2003) An energy efficient hierarchical clustering algorithm for wireless sensor networks. INFOCOM 3:1713\u20131723","journal-title":"INFOCOM"},{"key":"2506_CR23","first-page":"1497","volume":"3","author":"R Inokuchi","year":"2004","unstructured":"Inokuchi R, Miyamoto S (2004) LVQ clustering and SOM using a kernel function. Int Conf Fuzzy Syst 3:1497\u20131500","journal-title":"Int Conf Fuzzy Syst"},{"key":"2506_CR24","unstructured":"Seo S-S, Won YJ, James W-KH(2011) Witnessing distributed denial-of-service traffic from an attackers network, Network and Service Management(CNSM), pp 241\u2013247"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11227-018-2506-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-018-2506-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-018-2506-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,5]],"date-time":"2019-08-05T23:07:19Z","timestamp":1565046439000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11227-018-2506-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8,6]]},"references-count":24,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2018,12]]}},"alternative-id":["2506"],"URL":"https:\/\/doi.org\/10.1007\/s11227-018-2506-3","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,8,6]]},"assertion":[{"value":"6 August 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}