{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T12:48:04Z","timestamp":1730206084777,"version":"3.28.0"},"reference-count":32,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T00:00:00Z","timestamp":1556668800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T00:00:00Z","timestamp":1556668800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T00:00:00Z","timestamp":1556668800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,5]]},"DOI":"10.1109\/cfec.2019.8733144","type":"proceedings-article","created":{"date-parts":[[2019,6,11]],"date-time":"2019-06-11T02:05:19Z","timestamp":1560218719000},"page":"1-6","source":"Crossref","is-referenced-by-count":6,"title":["Combining AntibIoTic with Fog Computing: AntibIoTic 2.0"],"prefix":"10.1109","author":[{"given":"Michele","family":"De Donno","sequence":"first","affiliation":[]},{"given":"Nicola","family":"Dragoni","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref32","doi-asserted-by":"crossref","first-page":"1628","DOI":"10.1016\/j.comnet.2008.07.016","article-title":"A Self-Protecting and Self-Healing Framework for Negotiating Services and Trust in Autonomic Communication Systems","volume":"53","author":"dragoni","year":"2009","journal-title":"Computer Networks"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.09.002"},{"key":"ref30","article-title":"Securing Fog Computing for Internet of Things Applications: Challenges and Solutions","author":"ni","year":"2017","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"ref10","article-title":"Summer 2018 State of the Internet-Security: Web Attack Report","author":"akamai","year":"2018","journal-title":"Tech Rep"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2342509.2342513"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2018.8319238"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCNT.2018.8494060"},{"key":"ref14","article-title":"Manufacturer Usage Description Specification","author":"lear","year":"2018","journal-title":"IETF Draft"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3109761.3158413"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3230833.3232802"},{"article-title":"DIoT: A Crowdsourced Self-learning Approach for Detecting Compromised IoT Devices","year":"2018","author":"nguyen","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1002\/spe.2420"},{"year":"2013","key":"ref19","article-title":"Directive of the European Parliament and of the Council of 12 August 2013 on Attacks Against Information Systems and Replacing Council Framework Decision 2005\/222\/JHA"},{"article-title":"Glossary of Terms Related to Fog Computing","year":"2018","author":"consortium","key":"ref28"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2851613.2851685"},{"key":"ref27","article-title":"Fog Computing Conceptual Model - Recc","author":"iorga","year":"2018","journal-title":"Tech Rep"},{"key":"ref3","first-page":"129","article-title":"The Internet of Hackable Things","author":"dragoni","year":"2017","journal-title":"Proceedings of the 5th International Conference in Software Engineering for Defence Applications"},{"key":"ref6","first-page":"807","article-title":"Analysis of DDoS-Capable IoT Malwares","author":"de donno","year":"2017","journal-title":"Proceedings of the Federated Conference on Computer Science and Information Systems (FedCSIS)"},{"key":"ref29","article-title":"Open-Fog Reference Architecture for Fog Computing","volume":"20817","year":"2017","journal-title":"OPFRA001"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-14687-0_6"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/7178164"},{"key":"ref7","article-title":"Dyn Statement on 10\/21\/2016 DDoS Attack","author":"york","year":"2016","journal-title":"Dyn Blog"},{"journal-title":"Tech Rep","article-title":"Cisco Visual Networking Index: Forecast and Trends, 2017-2022","year":"2018","key":"ref2"},{"key":"ref9","article-title":"Q2 2017 State of the Internet-Security Report","volume":"2","author":"akamai","year":"2017","journal-title":"Tech Rep"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70578-1_7"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.15439\/2014F503"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/HotWeb.2015.22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2757384.2757397"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2677046.2677052"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2584538"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1002\/9781119187202"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2017.39"}],"event":{"name":"2019 IEEE 3rd International Conference on Fog and Edge Computing (ICFEC)","start":{"date-parts":[[2019,5,14]]},"location":"Larnaca, Cyprus","end":{"date-parts":[[2019,5,17]]}},"container-title":["2019 IEEE 3rd International Conference on Fog and Edge Computing (ICFEC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8730889\/8733137\/08733144.pdf?arnumber=8733144","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,15]],"date-time":"2022-07-15T03:09:55Z","timestamp":1657854595000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8733144\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/cfec.2019.8733144","relation":{},"subject":[],"published":{"date-parts":[[2019,5]]}}}