{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,2]],"date-time":"2025-11-02T13:55:03Z","timestamp":1762091703611,"version":"build-2065373602"},"reference-count":17,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,6,19]],"date-time":"2023-06-19T00:00:00Z","timestamp":1687132800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,6,19]],"date-time":"2023-06-19T00:00:00Z","timestamp":1687132800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,6,19]]},"DOI":"10.1109\/iwcmc58020.2023.10183010","type":"proceedings-article","created":{"date-parts":[[2023,7,21]],"date-time":"2023-07-21T17:20:43Z","timestamp":1689960043000},"page":"1666-1671","source":"Crossref","is-referenced-by-count":3,"title":["Impact Of Availability Attacks On Enabling IoT Based Healthcare Applications"],"prefix":"10.1109","author":[{"given":"Abdullah Ali Jawad","family":"Al-Abadi","sequence":"first","affiliation":[{"name":"University of Sfax, National School of Engineers of Sfax (ENIS),Laboratory of signals, systems, artificial intelligence and networks (SM&#x0040;RTS), Digital Research Center of Sfax (CRNS),Sfax,Tunisia"}]},{"given":"Mbarka Belhaj","family":"Mohamed","sequence":"additional","affiliation":[{"name":"University of Sfax, National School of Engineers of Gabes (ENIG),Laboratory of signals, systems, artificial intelligence and networks (SM&#x0040;RTS), Digital Research Center of Sfax (CRNS),Gabes,Tunisia"}]},{"given":"Ahmed","family":"Fakhfakh","sequence":"additional","affiliation":[{"name":"University of Sfax, Engineering School of Electronics and Telecommunications of Sfax (ENET&#x2019;com),Laboratory of signals, systems, artificial intelligence and networks (SM&#x0040;RTS), Digital Research Center of Sfax (CRNS),Sfax,Tunisia"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-3242-9_10"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10121375"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-020-07250-0"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.3390\/s21093025"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3000421"},{"key":"ref10","first-page":"297","article-title":"DoS\/DDoS Detection for E-Healthcare in Internet of Things","volume":"9","author":"ul sami","year":"2018","journal-title":"Int J Adv Comput Sci Appl"},{"key":"ref2","first-page":"32","article-title":"Security Attacks in IoT: A Survey","author":"jyoti","year":"2017","journal-title":"2017 International Conference on I-SMAC (IoT in Social Mobile Analytics and Cloud) (I-SMAC) I-SMAC"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2874978"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.3390\/fi14080240"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM42002.2020.9322472"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.12.028"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-021-08657-z"},{"key":"ref9","first-page":"3993e","volume":"32","author":"kumar","year":"2021","journal-title":"Design of secure session key using unique addressing and identification scheme for smart home Internet of Things network&#x2014;transactions on Emerging Telecommunications Technologies"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2848284"},{"key":"ref3","first-page":"4049e","article-title":"A survey on security threats and countermeasures on the internet of medical things (IoMT)","author":"papaioannou","year":"2020","journal-title":"Transactions on Emerging Telecommunications Technologies"},{"journal-title":"Crashtest Security","article-title":"What is Denial of Service, and How to Prevent DoS Attacks","year":"2021","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.3390\/s20174828"}],"event":{"name":"2023 International Wireless Communications and Mobile Computing (IWCMC)","start":{"date-parts":[[2023,6,19]]},"location":"Marrakesh, Morocco","end":{"date-parts":[[2023,6,23]]}},"container-title":["2023 International Wireless Communications and Mobile Computing (IWCMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10182387\/10182368\/10183010.pdf?arnumber=10183010","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,7]],"date-time":"2023-08-07T17:51:37Z","timestamp":1691430697000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10183010\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,19]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/iwcmc58020.2023.10183010","relation":{},"subject":[],"published":{"date-parts":[[2023,6,19]]}}}