{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T19:07:09Z","timestamp":1760123229812,"version":"3.28.0"},"reference-count":38,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,7,25]],"date-time":"2022-07-25T00:00:00Z","timestamp":1658707200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,7,25]],"date-time":"2022-07-25T00:00:00Z","timestamp":1658707200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,7,25]]},"DOI":"10.1109\/indin51773.2022.9976172","type":"proceedings-article","created":{"date-parts":[[2022,12,15]],"date-time":"2022-12-15T20:05:02Z","timestamp":1671134702000},"page":"214-219","source":"Crossref","is-referenced-by-count":4,"title":["DDoS Attacks on Smart Manufacturing Systems: A Cross-Domain Taxonomy and Attack Vectors"],"prefix":"10.1109","author":[{"given":"Farzana","family":"Zahid","sequence":"first","affiliation":[{"name":"Auckland University of Technology,Computer Science and Software Engineering Department,Auckland,New Zealand"}]},{"given":"Gustavo","family":"Funchal","sequence":"additional","affiliation":[{"name":"Instituto Politecnico de Braganca,Research Centre in Digitalization and Intelligent Robotics (CeDRI),Braganca,Portugal,5300-253"}]},{"given":"Victoria","family":"Melo","sequence":"additional","affiliation":[{"name":"Instituto Politecnico de Braganca,Research Centre in Digitalization and Intelligent Robotics (CeDRI),Braganca,Portugal,5300-253"}]},{"given":"Matthew M. Y.","family":"Kuo","sequence":"additional","affiliation":[{"name":"Auckland University of Technology,Computer Science and Software Engineering Department,Auckland,New Zealand"}]},{"given":"Paulo","family":"Leitao","sequence":"additional","affiliation":[{"name":"Instituto Politecnico de Braganca,Research Centre in Digitalization and Intelligent Robotics (CeDRI),Braganca,Portugal,5300-253"}]},{"given":"Roopak","family":"Sinha","sequence":"additional","affiliation":[{"name":"Auckland University of Technology,Computer Science and Software Engineering Department,Auckland,New Zealand"}]}],"member":"263","reference":[{"key":"ref38","first-page":"1","article-title":"Ddos attacks and countermeasures in cyberspace","author":"zeb","year":"2015","journal-title":"2015 2nd World Symposium on Web Applications and Networking (WSWAN)"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1115\/IMECE2018-86091"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2017.09.050"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5062"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"143","DOI":"10.23883\/IJRTER.2017.3549.ZAF08","article-title":"Simple service discovery protocol based distributed reflective denial of service attack","volume":"3","author":"singh","year":"2017","journal-title":"International Journal of recent trends in engineering & research"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.031413.00127"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/PST52912.2021.9647782"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2018.12.006"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2020.103201"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.15446\/ing.investig.v38n1.65453"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.12783\/dtcse\/cnsce2017\/8885"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s11633-015-0923-9"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1177\/1687814018784192"},{"key":"ref14","article-title":"Cybersecurity of industrial cyber-physical systems: a review","author":"kayan","year":"2021","journal-title":"ACM Computing Surveys (CSUR)"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-394397-2.00016-7"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098842"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.mfglet.2014.12.001"},{"key":"ref18","first-page":"171","article-title":"Self-organized Cyber-Physical Conveyor System using Multi-agent Systems","volume":"18","author":"leit\u00e3o","year":"2020","journal-title":"International Journal of Artificial Intelligence"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1177\/1550147717741463"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-019-02945-z"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2977423"},{"key":"ref27","article-title":"Datagram transport layer security version 1.3","author":"rescorla","year":"2022","journal-title":"RFC 9147"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SCOPES.2016.7955549"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CQR.2015.7129084"},{"journal-title":"Understanding and stopping multi-vector ddos attacks","year":"0","author":"sean","key":"ref29"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2018.07.017"},{"key":"ref8","first-page":"66","article-title":"Denial of service attack techniques: analysis, implementation and comparison","volume":"3","author":"elleithy","year":"2005","journal-title":"Journal of Systemics Cybernetics and Informatics"},{"article-title":"Library Flaw Could Crash HART-Based ICS Field Devices","year":"0","author":"eduard","key":"ref7"},{"article-title":"DDoS attacks in Q4 2021","year":"0","author":"alexander","key":"ref2"},{"key":"ref1","first-page":"448","article-title":"Evolution of 3C cyber-physical systems architecture for Industry 4.0","author":"ahmadi","year":"2018","journal-title":"International Workshop on Service Orientation in Holonic and Multi-Agent Manufacturing"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2014.2303233"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.7"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3277570.3277575"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.17487\/rfc7384"},{"key":"ref24","article-title":"A mechanism for prevention of flooding based ddos attack","volume":"13","author":"patani","year":"2017","journal-title":"International Journal of Computational Intelligence Research"},{"journal-title":"DDoS Attack Trends for Q4 2021","year":"0","author":"omer","key":"ref23"},{"key":"ref26","article-title":"Smac protocol vulnerabilities to dos attacks","author":"quentin","year":"2015","journal-title":"Technical report Technical report Creative common zeros 1 universal licence"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICPS48405.2020.9274739"}],"event":{"name":"2022 IEEE 20th International Conference on Industrial Informatics (INDIN)","start":{"date-parts":[[2022,7,25]]},"location":"Perth, Australia","end":{"date-parts":[[2022,7,28]]}},"container-title":["2022 IEEE 20th International Conference on Industrial Informatics (INDIN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9975846\/9976066\/09976172.pdf?arnumber=9976172","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,16]],"date-time":"2023-01-16T19:31:56Z","timestamp":1673897516000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9976172\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,25]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/indin51773.2022.9976172","relation":{},"subject":[],"published":{"date-parts":[[2022,7,25]]}}}