{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T15:31:53Z","timestamp":1772724713343,"version":"3.50.1"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,10,6]],"date-time":"2022-10-06T00:00:00Z","timestamp":1665014400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,10,6]],"date-time":"2022-10-06T00:00:00Z","timestamp":1665014400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,10,6]]},"DOI":"10.1109\/nextcomp55567.2022.9932172","type":"proceedings-article","created":{"date-parts":[[2022,11,3]],"date-time":"2022-11-03T21:25:05Z","timestamp":1667510705000},"page":"1-6","source":"Crossref","is-referenced-by-count":12,"title":["Cyber Deception against DDoS attack using Moving Target Defence Framework in SDN IOT-EDGE Networks"],"prefix":"10.1109","author":[{"given":"Haula","family":"Galadima","sequence":"first","affiliation":[{"name":"Middlesex University Flic en Flac,School of Digital Technologies,Mauritius"}]},{"given":"Amar","family":"Seeam","sequence":"additional","affiliation":[{"name":"Middlesex University Flic en Flac,School of Digital Technologies,Mauritius"}]},{"given":"Visham","family":"Ramsurrun","sequence":"additional","affiliation":[{"name":"Middlesex University Flic en Flac,School of Digital Technologies,Mauritius"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1002\/9781119711148.ch6"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3301614"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2927512"},{"key":"ref4","first-page":"1","volume-title":"Fog computing: Current research and future challenges. 1. GI\/ITG KuVS fachgespr\u00e4che fog computing","author":"Gedeon","year":"2018"},{"key":"ref5","volume-title":"Software-defined networking based moving target defenses","author":"Sharma","year":"2020"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.2978425"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2326417"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICISC.2018.8399028"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29387-0_48"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSNT.2016.8070208"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2922196"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2021.03.011"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600970"},{"key":"ref14","article-title":"National cyber leap year summit 2009: Co-chairs\u2019 report","volume-title":"NITRD Program","author":"Chong","year":"2009"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2663474.2663479"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2017.32"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2963791"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2021.103093"},{"key":"ref19","first-page":"463","article-title":"Defending blind ddos attack on sdn based on moving target defense","volume-title":"International Conference on Security and Privacy in Communication Networks","author":"Ma"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2016.108"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3338468.3356824"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/DSN-S.2019.00013"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.4108\/eai.1-6-2021.170011"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101976"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ComComAp46287.2019.9018775"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICCITECHN.2017.8281814"}],"event":{"name":"2022 3rd International Conference on Next Generation Computing Applications (NextComp)","location":"Flic-en-Flac, Mauritius","start":{"date-parts":[[2022,10,6]]},"end":{"date-parts":[[2022,10,8]]}},"container-title":["2022 3rd International Conference on Next Generation Computing Applications (NextComp)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9932132\/9932159\/09932172.pdf?arnumber=9932172","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,24]],"date-time":"2024-01-24T01:26:23Z","timestamp":1706059583000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9932172\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,6]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/nextcomp55567.2022.9932172","relation":{},"subject":[],"published":{"date-parts":[[2022,10,6]]}}}