{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T15:08:41Z","timestamp":1759072121298,"version":"3.40.3"},"publisher-location":"Cham","reference-count":7,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319188010"},{"type":"electronic","value":"9783319188027"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-18802-7_13","type":"book-chapter","created":{"date-parts":[[2015,5,20]],"date-time":"2015-05-20T01:41:04Z","timestamp":1432086064000},"page":"91-96","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Analysis of the Impact of Denial of Service Attacks on Centralized Control in Smart Cities"],"prefix":"10.1007","author":[{"given":"Evariste","family":"Logota","sequence":"first","affiliation":[]},{"given":"Georgios","family":"Mantas","sequence":"additional","affiliation":[]},{"given":"Jonathan","family":"Rodriguez","sequence":"additional","affiliation":[]},{"given":"Hugo","family":"Marques","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,5,21]]},"reference":[{"key":"13_CR1","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1016\/S1353-4858(13)70058-8","volume":"5","author":"S McGregory","year":"2013","unstructured":"McGregory, S.: Preparing for the next DDoS attack. Netw. Secur. 5, 5\u20136 (2013)","journal-title":"Netw. Secur."},{"issue":"4","key":"13_CR2","doi-asserted-by":"publisher","first-page":"2046","DOI":"10.1109\/SURV.2013.031413.00127","volume":"15","author":"ST Zargar","year":"2013","unstructured":"Zargar, S.T., Joshi, J., Tipper, D.: A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks. IEEE Commun. Surv. Tutorials. 15(4), 2046\u20132069 (2013)","journal-title":"IEEE Commun. Surv. Tutorials."},{"key":"13_CR3","unstructured":"ACCUS (Adaptive Cooperative Control in Urban (sub) Systems). http:\/\/projectaccus.eu"},{"key":"13_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1007\/11555827_19","volume-title":"Computer Security \u2013 ESORICS 2005","author":"FC Freiling","year":"2005","unstructured":"Freiling, F.C., Holz, T., Wicherski, G.: Botnet tracking: exploring a root-cause methodology to prevent distributed denial-of-service attacks. In: di de Capitani di Vimercati, S., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol. 3679, pp. 319\u2013335. Springer, Heidelberg (2005)"},{"key":"13_CR5","unstructured":"Specht, S.M., Lee, R.B.: Distributed denial of service: taxonomies of attacks, tools and countermeasures. In: 17th International Conference on Parallel and Distributed Computing Systems, San Francisco, California, USA, pp. 543\u2013550 (2004)"},{"key":"13_CR6","unstructured":"Zukerman, M.: Introduction to Queueing Theory and Stochastic Teletraffic Models (2014). http:\/\/arxiv.org\/pdf\/1307.2968.pdf"},{"key":"13_CR7","unstructured":"Sztrik, J.: Basic Queueing Theory (2012). http:\/\/irh.inf.unideb.hu\/~jsztrik\/education\/16\/SOR_Main_Angol.pdf"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Wireless Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-18802-7_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,10]],"date-time":"2023-02-10T09:17:43Z","timestamp":1676020663000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-18802-7_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319188010","9783319188027"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-18802-7_13","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"21 May 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}