{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T20:27:03Z","timestamp":1730233623984,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,7]]},"DOI":"10.1109\/icccnt.2018.8494060","type":"proceedings-article","created":{"date-parts":[[2018,11,6]],"date-time":"2018-11-06T02:36:24Z","timestamp":1541471784000},"page":"1-7","source":"Crossref","is-referenced-by-count":10,"title":["Fog Computing as a Defensive Approach Against Distributed Denial of Service (DDoS): A Proposed Architecture"],"prefix":"10.1109","author":[{"given":"Bhumika","family":"Paharia","sequence":"first","affiliation":[]},{"given":"Kriti","family":"Bhushan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"393","article-title":"SecureCloud: Towards a Comprehensive Security Framework for Cloud computing Environments","author":"hassan","year":"2010","journal-title":"2010 IEEE 34th Annual Computer Software and Applications Conference Workshops (COMPSACW)"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1109\/MSP.2010.186","article-title":"Security and Privacy Challenges in Cloud Computing Environments","volume":"8","author":"hassan","year":"2010","journal-title":"IEEE Security & Privacy"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2015.09.031"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/NCM.2009.218"},{"key":"ref14","first-page":"364","article-title":"Collaboration-Based Cloud Computing Security Management Framework","author":"mohemed","year":"2011","journal-title":"2011 IEEE International Conference on Cloud Computing (CLOUD)"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jnca.2010.07.006","article-title":"A survey on security issues in service delivery models of cloud computing","volume":"34","author":"subashini","year":"2011","journal-title":"Journal of Network and Computer Applications"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2010.12.006"},{"key":"ref17","first-page":"1","article-title":"IP Spoofing","volume":"10","author":"ali","year":"2007","journal-title":"The Internet Protocol Journal"},{"key":"ref18","first-page":"1","article-title":"Cisco IP Version 4 Source Guard draft-baker-sava-cisco-ip-source-guard-00","author":"baker","year":"0","journal-title":"Cisco IP version 4 Souce Guard"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1980022.1980086"},{"journal-title":"Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing MCC '12","first-page":"13","year":"2012","key":"ref4"},{"article-title":"Fog Computing and Its Role in the Internet of Things","year":"0","author":"bonomi","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2016.7721750"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2584538"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"1","DOI":"10.15439\/2014F503","article-title":"The Fog computing paradigm: Scenarios and security issues","volume":"2","author":"van stojmenovic","year":"2014","journal-title":"2014 Federated Conference on Computer Science and Information Systems FedCSIS"},{"year":"0","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2014.2321168"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2017.09.011"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2012.2211870"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2013.08.001"},{"key":"ref22","first-page":"308","article-title":"DDoS attack mitigation and resource provisioning in cloud using fog computing","year":"2017","journal-title":"2017 International Conference On Smart Technologies For Smart Nation (SmartTechCon)"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/997150.997156"},{"key":"ref23","first-page":"534","article-title":"DDoS attack defense framework for cloud using fog computing. In Recent Trends in Electronics","year":"2017","journal-title":"Information & Communication Technology (RTEICT) 2017 2nd IEEE International Conference on"}],"event":{"name":"2018 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT)","start":{"date-parts":[[2018,7,10]]},"location":"Bangalore","end":{"date-parts":[[2018,7,12]]}},"container-title":["2018 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8476666\/8493493\/08494060.pdf?arnumber=8494060","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T05:21:54Z","timestamp":1598246514000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8494060\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/icccnt.2018.8494060","relation":{},"subject":[],"published":{"date-parts":[[2018,7]]}}}