{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,8]],"date-time":"2026-05-08T16:28:20Z","timestamp":1778257700746,"version":"3.51.4"},"reference-count":54,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2022,7,1]],"date-time":"2022-07-01T00:00:00Z","timestamp":1656633600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,7,1]],"date-time":"2022-07-01T00:00:00Z","timestamp":1656633600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,7,1]],"date-time":"2022-07-01T00:00:00Z","timestamp":1656633600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"ARC Discovery","award":["DP180100212"],"award-info":[{"award-number":["DP180100212"]}]},{"name":"ARC Discovery","award":["DP200102491"],"award-info":[{"award-number":["DP200102491"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61402210"],"award-info":[{"award-number":["61402210"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2022,7,1]]},"DOI":"10.1109\/tdsc.2021.3055559","type":"journal-article","created":{"date-parts":[[2021,1,29]],"date-time":"2021-01-29T20:58:06Z","timestamp":1611953886000},"page":"2333-2348","source":"Crossref","is-referenced-by-count":128,"title":["A Game-Theoretical Approach for Mitigating Edge DDoS Attack"],"prefix":"10.1109","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2607-4556","authenticated-orcid":false,"given":"Qiang","family":"He","sequence":"first","affiliation":[{"name":"School of Software and Electrical Engineering, Swinburne University of Technology, Melbourne, VIC, Australia"}]},{"given":"Cheng","family":"Wang","sequence":"additional","affiliation":[{"name":"Intelligent and Distributed Computing Laboratory, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, Hubei, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8334-6263","authenticated-orcid":false,"given":"Guangming","family":"Cui","sequence":"additional","affiliation":[{"name":"School of Software and Electrical Engineering, Swinburne University of Technology, Melbourne, VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3226-388X","authenticated-orcid":false,"given":"Bo","family":"Li","sequence":"additional","affiliation":[{"name":"School of Software and Electrical Engineering, Swinburne University of Technology, Melbourne, VIC, Australia"}]},{"given":"Rui","family":"Zhou","sequence":"additional","affiliation":[{"name":"School of Information Science &amp; Engineering, Lanzhou University, Lanzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8054-5446","authenticated-orcid":false,"given":"Qingguo","family":"Zhou","sequence":"additional","affiliation":[{"name":"School of Information Science &amp; Engineering, Lanzhou University, Lanzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5252-0831","authenticated-orcid":false,"given":"Yang","family":"Xiang","sequence":"additional","affiliation":[{"name":"School of Software and Electrical Engineering, Swinburne University of Technology, Melbourne, VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3934-7605","authenticated-orcid":false,"given":"Hai","family":"Jin","sequence":"additional","affiliation":[{"name":"Services Computing Technology and System Lab, Big Data Technology and System Lab, Cluster and Grid Computing Lab, School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan, Hubei, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7868-5471","authenticated-orcid":false,"given":"Yun","family":"Yang","sequence":"additional","affiliation":[{"name":"School of Software and Electrical Engineering, Swinburne University of Technology, Melbourne, VIC, Australia"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Ericsson mobility report","author":"Jonsson","year":"2019"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2745201"},{"issue":"11","key":"ref3","first-page":"1","article-title":"Mobile edge computing\u2014A key technology towards 5G","volume":"11","author":"Hu","year":"2015","journal-title":"ETSI White Paper"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-03596-9_15"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2018.2869954"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2682318"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS47774.2020.00036"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2019.2938944"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-33702-5_37"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS49710.2020.00033"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.11.009"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.031413.00127"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2855563"},{"key":"ref14","article-title":"You can now rent a Mirai Botnet of 400,000 bots","author":"Cimpanu","year":"2016"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2017.2760478"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.181"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.01.001"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2008.925628"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2018.2841758"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2790421"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2016.7524340"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2016.7422408"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2018.2826544"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2017.2699660"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2015.2487344"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2016.2537809"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.2307\/j.ctvjsf522"},{"key":"ref28","volume-title":"A Course in Game Theory","author":"Osborne","year":"1994"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0308738101"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1006\/game.1996.0044"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2009.2017273"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2008.2010885"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2014.2316834"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.21236\/ada637949"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/icc.2011.5963024"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2018.2874896"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2015.2487344"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/CCGrid49817.2020.00-85"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2020.3008440"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2020.3010521"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2020.3016344"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2020.3015316"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD49709.2020.00037"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8057010"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2011.262"},{"key":"ref46","article-title":"Towards IoT-DDoS prevention using edge computing","volume-title":"Proc. USENIX Workshop Hot Topics Edge Comput.","author":"Bhardwaj"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ICNS.2007.5"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/CIT.2017.61"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2018.03367731"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2014.2325045"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2579198"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/2342509.2342513"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.201"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2750180"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8858\/9821019\/09340552.pdf?arnumber=9340552","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,9]],"date-time":"2024-01-09T22:42:44Z","timestamp":1704840164000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9340552\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,1]]},"references-count":54,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2021.3055559","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"value":"1545-5971","type":"print"},{"value":"1941-0018","type":"electronic"},{"value":"2160-9209","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,7,1]]}}}