{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T14:45:22Z","timestamp":1730299522812,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,4,15]],"date-time":"2021-04-15T00:00:00Z","timestamp":1618444800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,4,15]],"date-time":"2021-04-15T00:00:00Z","timestamp":1618444800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,4,15]],"date-time":"2021-04-15T00:00:00Z","timestamp":1618444800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,4,15]]},"DOI":"10.1109\/syscon48628.2021.9447145","type":"proceedings-article","created":{"date-parts":[[2021,6,9]],"date-time":"2021-06-09T21:20:08Z","timestamp":1623273608000},"page":"1-8","source":"Crossref","is-referenced-by-count":3,"title":["Impact Evaluation of DDoS Attacks Using IoT Devices"],"prefix":"10.1109","author":[{"given":"Ronierison","family":"Maciel","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jean","family":"Araujo","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Carlos","family":"Melo","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Paulo","family":"Pereira","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jamilson","family":"Dantas","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Julio","family":"Mendonca","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Paulo","family":"Maciel","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2019.01.017"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SYSCON.2018.8369611"},{"key":"ref12","article-title":"10 2010","volume":"30","author":"owasp","year":"2010","journal-title":"The Ten Most Critical Web Application Security Risks"},{"journal-title":"Malware Fighting Malicious Code","year":"2004","author":"skoudis","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.09.004"},{"key":"ref15","first-page":"363","article-title":"The proposal of fuzzy observation and detection of massive data ddos attack threat","volume":"1081","author":"ewald","year":"2018","journal-title":"Uncertainty and Imprecision in Decision Making and Decision Support New Challenges Solutions and Perspectives Selected Papers from BOS-2018"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CCWC.2017.7868464"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2647881"},{"key":"ref18","article-title":"Internet of things-from research and innovation to market deployment","volume":"29","author":"vermesan","year":"2014","journal-title":"River Publishers Aalborg"},{"journal-title":"Internet of Things Market Size iot industry report","year":"2020","key":"ref19"},{"key":"ref28","article-title":"Amenaza demos","author":"ingoldsby","year":"2010","journal-title":"Amenaza Technologies Limited"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SMC.2018.00420"},{"key":"ref27","article-title":"Benefits, risks and recommendations for information security","author":"enisa","year":"2012","journal-title":"European Network and Information Security"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2017.02.039"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.12.002"},{"journal-title":"Mirai ddos attack against krebsonsecurity cost device owners $300 000","year":"2019","key":"ref5"},{"journal-title":"The Hunt for IoT multi-purpose attack thing-bots threaten internet stability and human life","year":"2019","key":"ref8"},{"journal-title":"Cybercrime to cost the world $10 5 trillion annually by 2025","year":"2020","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.10.012"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.04.065"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1016\/j.adhoc.2018.10.024","article-title":"Cost-aware securing of iot systems using attack graphs","volume":"86","author":"yi?it","year":"2019","journal-title":"Ad Hoc Networks"},{"key":"ref20","first-page":"1","article-title":"Towards a definition of the internet of things (iot)","volume":"1","author":"minerva","year":"2015","journal-title":"The Internet-II initiative"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/SMC.2018.00420"},{"key":"ref21","article-title":"Distributed denial of service attacks: A survey","volume":"3","author":"suhasaria","year":"2017","journal-title":"Imperial Journal of Interdisciplinary Research"},{"key":"ref24","first-page":"3","article-title":"Attack tree-based threat risk analysis","author":"ingoldsby","year":"2010","journal-title":"Amenaza Technologies Limited"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2006.302512"},{"key":"ref26","first-page":"21","article-title":"Attack trees","volume":"24","author":"schneier","year":"1999","journal-title":"Dr Dobb&#x2019;s J"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/icc.2011.5962947"}],"event":{"name":"2021 IEEE International Systems Conference (SysCon)","start":{"date-parts":[[2021,4,15]]},"location":"Vancouver, BC, Canada","end":{"date-parts":[[2021,5,15]]}},"container-title":["2021 IEEE International Systems Conference (SysCon)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9447020\/9447051\/09447145.pdf?arnumber=9447145","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T15:42:06Z","timestamp":1652197326000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9447145\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,15]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/syscon48628.2021.9447145","relation":{},"subject":[],"published":{"date-parts":[[2021,4,15]]}}}