{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,30]],"date-time":"2025-08-30T06:10:22Z","timestamp":1756534222684,"version":"3.44.0"},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T00:00:00Z","timestamp":1754265600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T00:00:00Z","timestamp":1754265600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,8,4]]},"DOI":"10.1109\/icccn65249.2025.11133718","type":"proceedings-article","created":{"date-parts":[[2025,8,29]],"date-time":"2025-08-29T17:39:20Z","timestamp":1756489160000},"page":"1-9","source":"Crossref","is-referenced-by-count":0,"title":["On the relevance of Blockchains for DDoS Mitigation: a Methodological Assessment and Performance Evaluation of Hyperledger Fabric"],"prefix":"10.1109","author":[{"given":"Constant","family":"Rohmer","sequence":"first","affiliation":[{"name":"Rennes University,SOTERN - IRISA (UMR CNRS 6074)"}]},{"given":"Pierre","family":"Alain","sequence":"additional","affiliation":[{"name":"Rennes University,SOTERN - IRISA (UMR CNRS 6074)"}]},{"given":"Mohamed-Aymen","family":"Chalouf","sequence":"additional","affiliation":[{"name":"Rennes University,SOTERN - IRISA (UMR CNRS 6074)"}]},{"given":"Guillaume","family":"Doyen","sequence":"additional","affiliation":[{"name":"IMT Atlantique,SOTERN - IRISA (UMR CNRS 6074)"}]}],"member":"263","reference":[{"article-title":"Welcome to the Era of Autonomous Security","year":"2022","author":"Zuk","key":"ref1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2003.1160055"},{"article-title":"Collaborative Cybersecurity Using Blockchain: A Survey","year":"2024","author":"Miller","key":"ref3"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CVCBT.2018.00011"},{"article-title":"Bitcoin: A Peer-to-Peer Electronic Cash System","year":"2008","author":"Nakamoto","key":"ref5"},{"article-title":"Ethereum: A Next-Generation Smart Contract and Decentralized Application Platform","year":"2014","author":"Buterin","key":"ref6"},{"article-title":"Practical Byzantine Fault Tolerance","volume-title":"USENIX Association, vol. 3rd Symposium on Operating Systems Design and Implementation (OSDI 99)","author":"Castro","key":"ref7"},{"author":"Ongaro","key":"ref8","article-title":"In Search of an Understandable Consensus Algorithm"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICBC51069.2021.9461099"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-60774-0_2"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.23919\/apnoms.2019.8892947"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1017\/S0269888920000259"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3342280.3342300"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/Ubi-Media.2019.00010"},{"article-title":"Evaluating a Blockchain-based Cooperative Defense","year":"2019","author":"Rodrigues","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2020.2976113"},{"journal-title":"IEEE ICBC","key":"ref17","article-title":"SC-FLARE: Cooperative DDoS Signaling based on Smart Contracts"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2930715"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3347492"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/NetSoft48620.2020.9165396"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/iccworkshops50388.2021.9473586"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3176121"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ibcast.2019.8667147"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/1194899"},{"article-title":"IPFS - Content Addressed, Versioned, P2P File System","year":"2014","author":"Benet","key":"ref25"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICIMP.2007.26"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/MNET004.2300008"}],"event":{"name":"2025 34th International Conference on Computer Communications and Networks (ICCCN)","start":{"date-parts":[[2025,8,4]]},"location":"Tokyo, Japan","end":{"date-parts":[[2025,8,7]]}},"container-title":["2025 34th International Conference on Computer Communications and Networks (ICCCN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11133715\/11133717\/11133718.pdf?arnumber=11133718","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,30]],"date-time":"2025-08-30T05:31:22Z","timestamp":1756531882000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11133718\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,4]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/icccn65249.2025.11133718","relation":{},"subject":[],"published":{"date-parts":[[2025,8,4]]}}}