{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T17:04:18Z","timestamp":1774631058156,"version":"3.50.1"},"reference-count":37,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T00:00:00Z","timestamp":1725667200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T00:00:00Z","timestamp":1725667200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,9,7]]},"DOI":"10.1109\/aibthings63359.2024.10863359","type":"proceedings-article","created":{"date-parts":[[2025,2,7]],"date-time":"2025-02-07T18:38:03Z","timestamp":1738953483000},"page":"1-5","source":"Crossref","is-referenced-by-count":2,"title":["Detection of DoS and DDoS Attacks Using Machine Learning and Blockchain in IoMT Networks"],"prefix":"10.1109","author":[{"given":"Atul","family":"Agrawal","sequence":"first","affiliation":[{"name":"ITS Engineering College,Department of Computer Science and Engineering,Greater Noida,India"}]},{"given":"Pashupati","family":"Baniya","sequence":"additional","affiliation":[{"name":"IEC College of Engineering and Technology,Department of Computer Science and Engineering,Greater Noida,India"}]},{"given":"Esraa Mohammed","family":"Alazzawi","sequence":"additional","affiliation":[{"name":"University of Baghdad,Department of Computer Engineering,Al-Jadriya,Baghdad,Iraq,10071"}]},{"given":"Nitin","family":"Rakesh","sequence":"additional","affiliation":[{"name":"Symbiosis Institute of Technology, Nagpur Campus Symbiosis International (Deemed University),Pune,India"}]},{"given":"Bharat","family":"Bhushan","sequence":"additional","affiliation":[{"name":"Sharda University,Department of Computer Science and Engineering,Greater Noida,India"}]},{"given":"Akhtar","family":"Jamil","sequence":"additional","affiliation":[{"name":"National University of Computer and Emerging Sciences,Department of Computer Science,Islamabad,Pakistan"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/icict55121.2022.10064554"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.52098\/acj.202112"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/stcr55312.2022.10009222"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-2693-0_11"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.4236\/ait.2022.121001"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.3233\/THC-213571"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3561954.3561957"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1080\/03772063.2023.2208549"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.3390\/sym14122556"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/8060333"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.3390\/app12126150"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3022963"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1080\/02564602.2016.1192964"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s10517-018-4051-8"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.3390\/s23136176"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1002\/eng2.12697"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.30880\/jscdm.2023.04.01.006"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/InCACCT57535.2023.10141815"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICNWC57852.2023.10127537"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.22214\/ijraset.2023.49565"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICAIIHI57871.2023.10489491"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1108\/DLP-08-2021-0065"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1108\/JGOSS-01-2022-0005"},{"key":"ref24","doi-asserted-by":"crossref","DOI":"10.1007\/978-981-99-0639-0_12","article-title":"Leveraging Blockchain Technology in Industry 4.0 and Industrial Internet of Things (IIoT) Scenarios","volume-title":"Low Power Architectures for IoT Applications. Springer Tracts in Electrical and Electronics Engineering","author":"Pandey"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICSCSS57650.2023.10169487"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4729"},{"key":"ref27","article-title":"The role of Blockchain in DDoS attacks mitigation: techniques, open challenges and future directions","author":"Chaganti","year":"2022","journal-title":"arXiv: arXiv:2202.03617"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.5121\/csit.2024.140412"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.54254\/2755-2721\/29\/20230972"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2023.03.103"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12143103"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.22214\/ijraset.2024.57949"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.3934\/nhm.2023061"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/IPRECON55716.2022.10059561"},{"key":"ref35","doi-asserted-by":"crossref","DOI":"10.1109\/SMART59791.2023.10428656","article-title":"A review of detecting ddos attacks based on entropy computation","volume-title":"2023 12th International Conference on System Modeling &amp; Advancement in Research Trends (SMART)","author":"Agrawal"},{"key":"ref36","doi-asserted-by":"crossref","DOI":"10.1145\/3633598.3633611","article-title":"Blockchain based security framework for internet of medical things (IOMT) applications","volume-title":"Proceedings of the 2023 7th International Conference on Advances in Artificial Intelligence","author":"Baniya"},{"key":"ref37","doi-asserted-by":"crossref","first-page":"2987","DOI":"10.1007\/s11276-024-03714-4","article-title":"Recent Lightweight cryptography (LWC) based security advances for resource-constrained IoT networks","volume":"30","author":"Pandey","year":"2024","journal-title":"Wireless Netw"}],"event":{"name":"2024 IEEE 2nd International Conference on Artificial Intelligence, Blockchain, and Internet of Things (AIBThings)","location":"Mt Pleasant, MI, USA","start":{"date-parts":[[2024,9,7]]},"end":{"date-parts":[[2024,9,8]]}},"container-title":["2024 2nd International Conference on Artificial Intelligence, Blockchain, and Internet of Things (AIBThings)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10860733\/10861884\/10863359.pdf?arnumber=10863359","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,8]],"date-time":"2025-02-08T05:36:46Z","timestamp":1738993006000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10863359\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,7]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/aibthings63359.2024.10863359","relation":{},"subject":[],"published":{"date-parts":[[2024,9,7]]}}}