{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T15:44:53Z","timestamp":1775144693790,"version":"3.50.1"},"reference-count":55,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundations of China","doi-asserted-by":"publisher","award":["62341113"],"award-info":[{"award-number":["62341113"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundations of China","doi-asserted-by":"publisher","award":["62173315"],"award-info":[{"award-number":["62173315"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundations of China","doi-asserted-by":"publisher","award":["62101525"],"award-info":[{"award-number":["62101525"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundations of China","doi-asserted-by":"publisher","award":["62201543"],"award-info":[{"award-number":["62201543"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundations of China","doi-asserted-by":"publisher","award":["62021001"],"award-info":[{"award-number":["62021001"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundations of China","doi-asserted-by":"publisher","award":["U23A20275"],"award-info":[{"award-number":["U23A20275"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002367","name":"Youth Innovation Promotion Association CAS","doi-asserted-by":"publisher","award":["2020450"],"award-info":[{"award-number":["2020450"]}],"id":[{"id":"10.13039\/501100002367","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["2023M733422"],"award-info":[{"award-number":["2023M733422"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Anhui Provincial Major Science and Technology Project","award":["202103a05020024"],"award-info":[{"award-number":["202103a05020024"]}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"name":"China Environment for Network Innovations"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Serv. Manage."],"published-print":{"date-parts":[[2024,6]]},"DOI":"10.1109\/tnsm.2024.3357660","type":"journal-article","created":{"date-parts":[[2024,1,23]],"date-time":"2024-01-23T20:48:34Z","timestamp":1706042914000},"page":"3537-3554","source":"Crossref","is-referenced-by-count":12,"title":["Credible Link Flooding Attack Detection and Mitigation: A Blockchain-Based Approach"],"prefix":"10.1109","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7595-2397","authenticated-orcid":false,"given":"Xiaofeng","family":"Jiang","sequence":"first","affiliation":[{"name":"Department of Automation, University of Science and Technology of China, Hefei, China"}]},{"given":"Qianbao","family":"Shi","sequence":"additional","affiliation":[{"name":"Department of Automation, University of Science and Technology of China, Hefei, China"}]},{"given":"Hengkun","family":"Miao","sequence":"additional","affiliation":[{"name":"Department of Automation, University of Science and Technology of China, Hefei, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-4030-8417","authenticated-orcid":false,"given":"Wanqin","family":"Cao","sequence":"additional","affiliation":[{"name":"Department of Automation, University of Science and Technology of China, Hefei, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9963-019X","authenticated-orcid":false,"given":"Huasen","family":"He","sequence":"additional","affiliation":[{"name":"Department of Automation, University of Science and Technology of China, Hefei, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2817-9738","authenticated-orcid":false,"given":"Shuangwu","family":"Chen","sequence":"additional","affiliation":[{"name":"Department of Automation, University of Science and Technology of China, Hefei, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7329-4738","authenticated-orcid":false,"given":"Jian","family":"Yang","sequence":"additional","affiliation":[{"name":"Department of Automation, University of Science and Technology of China, Hefei, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2022.3147511"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2950121"},{"key":"ref3","article-title":"February 28th DDoS incident report.","author":"Kottler","year":"2018"},{"key":"ref4","volume-title":"AWS said it mitigated a 2.3 Tbps DDoS attack, the largest ever","author":"Cimpanu","year":"2020"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2013.55"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC47284.2019.8969595"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04444-1_3"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.19"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660299"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2016.7524507"},{"key":"ref11","volume-title":"DDoS impact survey reveals the actual cost of DDoS attacks","year":"2015"},{"key":"ref12","volume-title":"The DDoS that knocked spamhaus offline (and how we mitigated it)","author":"Prince","year":"2013"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2815555"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.09.021"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2016.7543772"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2016.108"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2535372.2535398"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2015.7368594"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2006.1599387"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23147"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2016.0038"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2805600"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC\/SmartCity\/DSS.2019.00080"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.031413.00127"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3072849"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2022.3205643"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2018.2816299"},{"key":"ref28","volume-title":"Bitcoin: A peer-to-peer electronic cash system","author":"Nakamoto","year":"2008"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/IMCET.2018.8603029"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/FAS-W.2016.53"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3106355"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2020.2963840"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/Blockchain.2019.00076"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ISC2.2018.8656694"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2013.2271537"},{"key":"ref36","volume-title":"Ethereum: A secure decentralised generalised transaction ledger","author":"Wood","year":"2013"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3190508.3190538"},{"key":"ref38","first-page":"173","article-title":"Practical Byzantine fault tolerance","volume-title":"Proc. OSDI","author":"Castro"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3636553"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3293611.3331591"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3464298.3484503"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/3492321.3519594"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2799854"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-99843-5_10"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-60774-0_2"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/Ubi-Media.2019.00010"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2930715"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM38437.2019.9013542"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/INISTA.2018.8466327"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.23919\/APNOMS.2019.8892947"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/1298306.1298329"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/CBD.2019.00041"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.2997734"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2822275"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2996590"}],"container-title":["IEEE Transactions on Network and Service Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4275028\/10599562\/10413217.pdf?arnumber=10413217","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,19]],"date-time":"2024-07-19T05:56:47Z","timestamp":1721368607000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10413217\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6]]},"references-count":55,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tnsm.2024.3357660","relation":{},"ISSN":["1932-4537","2373-7379"],"issn-type":[{"value":"1932-4537","type":"electronic"},{"value":"2373-7379","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,6]]}}}