{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T06:58:47Z","timestamp":1775199527700,"version":"3.50.1"},"reference-count":142,"publisher":"SAGE Publications","issue":"12","license":[{"start":{"date-parts":[[2017,12,1]],"date-time":"2017-12-01T00:00:00Z","timestamp":1512086400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1177\/1550147717741463","type":"journal-article","created":{"date-parts":[[2017,12,13]],"date-time":"2017-12-13T10:16:55Z","timestamp":1513160215000},"page":"155014771774146","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":245,"title":["A survey of distributed denial-of-service attack, prevention, and mitigation techniques"],"prefix":"10.1177","volume":"13","author":[{"given":"Tasnuva","family":"Mahjabin","sequence":"first","affiliation":[{"name":"Department of Computer Science, The University of Alabama, Tuscaloosa, AL, USA"}]},{"given":"Yang","family":"Xiao","sequence":"additional","affiliation":[{"name":"Department of Computer Science, The University of Alabama, Tuscaloosa, AL, USA"}]},{"given":"Guang","family":"Sun","sequence":"additional","affiliation":[{"name":"Hunan University of Finance and Economics, Changsha, China"}]},{"given":"Wangdong","family":"Jiang","sequence":"additional","affiliation":[{"name":"Hunan University of Finance and Economics, Changsha, China"}]}],"member":"179","published-online":{"date-parts":[[2017,12,13]]},"reference":[{"key":"bibr3-1550147717741463","doi-asserted-by":"publisher","DOI":"10.1504\/IJSNET.2015.068184"},{"key":"bibr4-1550147717741463","doi-asserted-by":"publisher","DOI":"10.1145\/1216370.1216373"},{"key":"bibr5-1550147717741463","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2010.037666"},{"key":"bibr6-1550147717741463","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2006.011776"},{"key":"bibr8-1550147717741463","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2010.030718"},{"key":"bibr9-1550147717741463","volume-title":"Internet Denial of service: attack and defense mechanisms","author":"Mirkovic J","year":"2004"},{"issue":"4","key":"bibr10-1550147717741463","first-page":"543","volume":"11","author":"Yue S","year":"2010","journal-title":"J Internet Technol"},{"key":"bibr11-1550147717741463","volume-title":"Proceedings of the 1st GENI research and educational experiment workshop (GREE12), in conjunction with GENI GEC 13","author":"Gao J"},{"key":"bibr12-1550147717741463","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2015.071834"},{"key":"bibr13-1550147717741463","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(08)70086-2"},{"key":"bibr15-1550147717741463","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.031413.00127"},{"key":"bibr16-1550147717741463","first-page":"163","volume-title":"The virtual battlefield: perspectives on cyber warfare","author":"Nazario J.","year":"2009"},{"key":"bibr19-1550147717741463","first-page":"692654-1","volume":"2009","author":"Liu J","year":"2009","journal-title":"EURASIP J Wirel Comm"},{"key":"bibr20-1550147717741463","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2003.10.003"},{"key":"bibr21-1550147717741463","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2009.04.003"},{"key":"bibr22-1550147717741463","first-page":"14","volume-title":"Proceedings of the 11th USENIX security symposium","volume":"2","author":"Staniford S"},{"key":"bibr23-1550147717741463","doi-asserted-by":"publisher","DOI":"10.1145\/997150.997156"},{"issue":"4","key":"bibr24-1550147717741463","first-page":"13","volume":"7","author":"Patrikakis C","year":"2004","journal-title":"Internet Protocol J"},{"key":"bibr25-1550147717741463","volume-title":"Potential strategies for high speed active worms: a worst case analysis","author":"Weaver N.","year":"2002"},{"key":"bibr27-1550147717741463","first-page":"273","volume-title":"Proceedings of the 2nd ACM SIGCOMM workshop on Internet measurement","author":"Moore D"},{"key":"bibr29-1550147717741463","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2007.012826"},{"key":"bibr30-1550147717741463","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2016.079276"},{"key":"bibr31-1550147717741463","volume-title":"Trends in denial of service attack technology","author":"Long N","year":"2001"},{"key":"bibr32-1550147717741463","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(11)70128-3"},{"key":"bibr33-1550147717741463","first-page":"543","volume-title":"Proceedings of the ISCA 17th international conference on parallel and distributed computing systems (PDCS 2004), international workshop on security in parallel and distributed systems","author":"Specht SM"},{"key":"bibr34-1550147717741463","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24037-9_57"},{"key":"bibr41-1550147717741463","first-page":"60","volume-title":"Proceedings of the 2014 international symposium on information theory and its applications (ISITA)","author":"Park J"},{"key":"bibr45-1550147717741463","volume-title":"Proceedings of SPIE defense security and sensing 2010","author":"Deng J"},{"key":"bibr46-1550147717741463","first-page":"1653","volume-title":"Proceedings of the IEEE international conference on communications 2008 (ICC \u201908)","author":"Du X"},{"key":"bibr53-1550147717741463","volume-title":"Understanding and mitigating NTP-based DDoS attacks","volume":"9","author":"Graham-Cumming J.","year":"2014"},{"key":"bibr64-1550147717741463","unstructured":"Abliz M. Internet denial of service: attacks and defense mechanisms. Technical report no. TR-11-178, March2011, pp.1\u201350. Pittsburgh, PA: Department of Computer Science, University of Pittsburgh."},{"key":"bibr65-1550147717741463","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2016.2602848."},{"key":"bibr66-1550147717741463","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2012.050028"},{"key":"bibr67-1550147717741463","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2005-13601"},{"key":"bibr70-1550147717741463","doi-asserted-by":"publisher","DOI":"10.1145\/964723.383061"},{"key":"bibr71-1550147717741463","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2007.70224"},{"key":"bibr72-1550147717741463","first-page":"1557","volume-title":"Proceedings of the 21st annual joint conference of the IEEE computer and communications societies (INFOCOM 2002)","volume":"3","author":"Li J"},{"key":"bibr73-1550147717741463","first-page":"30","volume-title":"Proceedings of the 10th ACM conference on computer and communications security","author":"Jin C"},{"key":"bibr74-1550147717741463","doi-asserted-by":"crossref","first-page":"482","DOI":"10.1109\/ICC.2003.1204223","volume-title":"Proceedings of the IEEE international conference on communications, 2003 (ICC \u201903)","volume":"1","author":"Peng T"},{"key":"bibr75-1550147717741463","first-page":"93","volume-title":"Proceedings of the 2003 symposium on security and privacy","author":"Yaar A"},{"key":"bibr76-1550147717741463","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2006.877138"},{"key":"bibr77-1550147717741463","first-page":"356","volume-title":"Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference","author":"Beverly R"},{"key":"bibr78-1550147717741463","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2006.25"},{"key":"bibr79-1550147717741463","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2016.08.023"},{"key":"bibr81-1550147717741463","doi-asserted-by":"publisher","DOI":"10.1145\/964725.633032"},{"key":"bibr82-1550147717741463","first-page":"615","volume-title":"Proceedings of the international workshop on recent advances in intrusion detection","author":"Kr\u00e4mer L"},{"key":"bibr83-1550147717741463","first-page":"109","volume-title":"Proceedings of the 11th IEEE international workshops on enabling technologies: infrastructure for collaborative enterprises, 2002 (WET ICE 2002)","author":"Weiler N"},{"key":"bibr85-1550147717741463","doi-asserted-by":"publisher","DOI":"10.1109\/6294.869381"},{"key":"bibr86-1550147717741463","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2012.053461"},{"key":"bibr87-1550147717741463","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2007.4396943"},{"key":"bibr88-1550147717741463","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(99)00112-7"},{"key":"bibr89-1550147717741463","first-page":"609","volume-title":"Proceedings of the 2001 IEEE\/IFIP international symposium on integrated network management","author":"Cabrera JB"},{"key":"bibr90-1550147717741463","volume-title":"Proceedings of the 13th USENIX conference on system administration","author":"Roesch M"},{"key":"bibr91-1550147717741463","doi-asserted-by":"crossref","first-page":"2143","DOI":"10.1109\/GLOCOM.2002.1189011","volume-title":"Proceedings of the IEEE global telecommunications conference, 2002 (GLOBECOM\u201902)","volume":"3","author":"Cheng CM"},{"key":"bibr92-1550147717741463","first-page":"99","volume-title":"Proceedings of the 2003 conference on applications, technologies, architectures, and protocols for computer communications","author":"Hussain A"},{"key":"bibr93-1550147717741463","first-page":"1","volume-title":"Proceedings of the 25th IEEE international conference on computer communications (INFOCOM 2006)","author":"Hussain A"},{"key":"bibr94-1550147717741463","doi-asserted-by":"publisher","DOI":"10.1504\/IJSNET.2017.083410"},{"key":"bibr95-1550147717741463","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2007.901875"},{"key":"bibr96-1550147717741463","first-page":"23","volume-title":"Proceedings of the 10th conference on USENIX security symposium","author":"Gil TM"},{"key":"bibr97-1550147717741463","first-page":"1353","volume-title":"Proceedings of the IEEE global telecommunications conference, 2003 (GLOBECOM\u201903)","volume":"3","author":"Abdelsayed S"},{"key":"bibr98-1550147717741463","first-page":"312","volume-title":"Proceedings of the 10th IEEE international conference on network protocols","author":"Mirkovic J"},{"key":"bibr99-1550147717741463","first-page":"71","volume-title":"Proceedings of the 2nd ACM SIGCOMM workshop on Internet measurement","author":"Barford P"},{"key":"bibr100-1550147717741463","first-page":"490","volume-title":"Proceedings of the 10th international conference on computer communications and networks","author":"Huang Y"},{"key":"bibr101-1550147717741463","doi-asserted-by":"publisher","DOI":"10.21236\/ADA401496"},{"key":"bibr102-1550147717741463","first-page":"442","volume-title":"Proceedings of the IEEE international symposium on IEEE computers and communications","author":"Talpade R"},{"key":"bibr103-1550147717741463","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2008.923716"},{"key":"bibr104-1550147717741463","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2107320"},{"key":"bibr105-1550147717741463","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2013.09.014"},{"key":"bibr106-1550147717741463","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2013.112613.132275"},{"key":"bibr107-1550147717741463","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1530"},{"key":"bibr108-1550147717741463","first-page":"587","volume-title":"Proceedings of the 2016 29th international conference on VLSI design and 2016 15th international conference on embedded systems (VLSID)","author":"Jyothi V"},{"key":"bibr109-1550147717741463","doi-asserted-by":"publisher","DOI":"10.1145\/347057.347560"},{"key":"bibr110-1550147717741463","volume-title":"Track: a novel approach for defending against distributed denial-of-service attacks","author":"Chen R","year":"2005"},{"key":"bibr111-1550147717741463","doi-asserted-by":"publisher","DOI":"10.1145\/505586.505588"},{"key":"bibr112-1550147717741463","first-page":"878","volume-title":"Proceedings of the 20th annual joint conference of the IEEE computer and communications societies (INFOCOM 2001)","volume":"2","author":"Song DX"},{"key":"bibr113-1550147717741463","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2005.114"},{"key":"bibr114-1550147717741463","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2007.910594"},{"key":"bibr115-1550147717741463","first-page":"137","volume-title":"Proceedings of the 2010 2nd international conference on evolving internet (INTERNET)","author":"Tian H"},{"key":"bibr116-1550147717741463","first-page":"697","volume-title":"Proceedings of the 2nd international networking conference on networking technologies, services, and protocols; performance of computer and communication networks; mobile and wireless communications (NETWORKING 2002)","author":"Peng T"},{"key":"bibr118-1550147717741463","first-page":"1","volume-title":"Proceedings of the 2014 world congress on computer applications and information systems (WCCAIS)","author":"Fadlallah A"},{"key":"bibr119-1550147717741463","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-9491-1"},{"key":"bibr120-1550147717741463","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2003.811200"},{"key":"bibr121-1550147717741463","first-page":"49","volume-title":"Proceedings of the 2003 IEEE Pacific rim conference on communications, computers and signal processing, 2003 (PACRIM)","volume":"1","author":"Belenky A"},{"key":"bibr122-1550147717741463","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2006.1603385"},{"key":"bibr123-1550147717741463","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2008.132"},{"key":"bibr124-1550147717741463","first-page":"729","volume-title":"Proceedings of the 2013 IEEE global communications conference (GLOBECOM)","author":"Yu S"},{"key":"bibr125-1550147717741463","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2015.2439287"},{"key":"bibr127-1550147717741463","first-page":"124","volume-title":"Proceedings of the international conference on information and communications security","author":"Lee HC"},{"key":"bibr128-1550147717741463","first-page":"441","volume-title":"Proceedings of the international conference on advanced computing and communications, 2007 (ADCOM 2007)","author":"Izaddoost A"},{"key":"bibr129-1550147717741463","first-page":"159","volume-title":"Proceedings of the 10th international conference on computer communications and networks","author":"Mankin A"},{"key":"bibr130-1550147717741463","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2014.01.003"},{"key":"bibr131-1550147717741463","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2381873"},{"key":"bibr132-1550147717741463","doi-asserted-by":"publisher","DOI":"10.1145\/1402946.1402981"},{"key":"bibr133-1550147717741463","doi-asserted-by":"publisher","DOI":"10.1145\/571697.571724"},{"key":"bibr134-1550147717741463","first-page":"130","volume-title":"Proceedings of the 2004 IEEE symposium on security and privacy","author":"Yaar A"},{"key":"bibr135-1550147717741463","doi-asserted-by":"publisher","DOI":"10.1145\/1090191.1080120"},{"key":"bibr136-1550147717741463","doi-asserted-by":"publisher","DOI":"10.1504\/IJSNET.2015.069873"},{"key":"bibr137-1550147717741463","doi-asserted-by":"publisher","DOI":"10.1145\/1090191.1080124"},{"key":"bibr138-1550147717741463","doi-asserted-by":"publisher","DOI":"10.1145\/1851275.1851214"},{"key":"bibr139-1550147717741463","doi-asserted-by":"publisher","DOI":"10.1145\/1151659.1159925"},{"key":"bibr140-1550147717741463","doi-asserted-by":"publisher","DOI":"10.1504\/IJSNET.2016.080202"},{"key":"bibr141-1550147717741463","doi-asserted-by":"publisher","DOI":"10.1145\/1035570.1035573"},{"key":"bibr142-1550147717741463","volume-title":"Proceedings of the ISW, Wollongong","volume":"2000","author":"Yan J"},{"key":"bibr144-1550147717741463","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2017.03.010"},{"key":"bibr145-1550147717741463","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.060912.00182"},{"issue":"3","key":"bibr146-1550147717741463","first-page":"453","volume":"16","author":"Fu Z","year":"2015","journal-title":"J Internet Technol"},{"key":"bibr147-1550147717741463","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2590944"},{"key":"bibr148-1550147717741463","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2596138"},{"key":"bibr149-1550147717741463","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2692728"},{"key":"bibr150-1550147717741463","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2016.2622697."},{"key":"bibr151-1550147717741463","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2017.03.013"},{"key":"bibr153-1550147717741463","first-page":"67","volume-title":"Proceedings of the 2013 international conference on information society (i-Society)","author":"Darwish M"},{"key":"bibr154-1550147717741463","first-page":"1167","volume-title":"Proceedings of the 2012 IEEE 11th international conference on trust, security and privacy in computing and communications (TrustCom)","author":"Al-Haidari F"},{"key":"bibr155-1550147717741463","first-page":"1","volume-title":"Proceedings of the 2012 IEEE students\u2019 conference on electrical, electronics and computer science (SCEECS)","author":"Karnwal T"},{"key":"bibr156-1550147717741463","first-page":"49","volume-title":"Proceedings of the 2011 4th IEEE international conference on utility and cloud computing (UCC)","author":"Sqalli MH"},{"key":"bibr157-1550147717741463","first-page":"264","volume-title":"Proceedings of the 2014 44th annual IEEE\/IFIP international conference on dependable systems and networks (DSN)","author":"Jia Q"},{"key":"bibr158-1550147717741463","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2014.03.009"},{"key":"bibr159-1550147717741463","first-page":"346","volume-title":"Proceedings of the 2013 international conference on cloud computing and big data (CloudCom-Asia)","author":"Baig ZA"},{"key":"bibr160-1550147717741463","first-page":"382","volume-title":"Proceedings of the SNDS: international conference on security in computer networks and distributed systems","author":"Saini B"},{"key":"bibr161-1550147717741463","first-page":"61","volume-title":"Proceedings of the 3rd ACM workshop on cloud computing security workshop","author":"Idziorek J"},{"key":"bibr162-1550147717741463","first-page":"36","volume-title":"Proceedings of the 7th international conference on ubiquitous information management and communication","author":"Ismail MN"},{"key":"bibr163-1550147717741463","first-page":"127","volume-title":"Proceedings of the future Internet assembly","author":"Latanicki J"},{"key":"bibr164-1550147717741463","first-page":"203","volume-title":"Proceedings of the 6th international conference on applications and techniques in information security","author":"Li B"},{"key":"bibr165-1550147717741463","first-page":"5331","volume-title":"Proceedings of the 2015 48th Hawaii international conference on system sciences (HICSS)","author":"Alqahtani S"},{"key":"bibr166-1550147717741463","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.181"},{"key":"bibr167-1550147717741463","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2015.02.026"},{"key":"bibr168-1550147717741463","first-page":"115","volume-title":"Proceedings of the 2015 9th international conference on frontier of computer science and technology (FCST)","author":"Wang X"},{"key":"bibr169-1550147717741463","doi-asserted-by":"publisher","DOI":"10.12720\/sgce.1.1.1-6"},{"key":"bibr170-1550147717741463","first-page":"1830","volume-title":"Proceedings of the military communications conference 2010 (MILCOM 2010)","author":"Lu Z"},{"key":"bibr171-1550147717741463","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.12.017"},{"key":"bibr172-1550147717741463","unstructured":"Locke G, Gallagher PD. Nist framework and roadmap for smart grid interoperability standards (release 1.0). Gaithersburg, MD: National Institute of Standards and Technology, 2010, p.33."},{"key":"bibr173-1550147717741463","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.122111.00145"},{"key":"bibr174-1550147717741463","first-page":"1768","volume-title":"Proceedings of the 27th conference on computer communications (INFOCOM 2008)","author":"Sheng Y"},{"key":"bibr175-1550147717741463","first-page":"46","volume-title":"Proceedings of the 6th ACM international symposium on mobile ad hoc networking and computing","author":"Xu W"},{"key":"bibr176-1550147717741463","first-page":"1307","volume-title":"Proceedings of the 26th IEEE international conference on computer communications (INFOCOM 2007)","author":"Li M"},{"key":"bibr180-1550147717741463","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45402-2_97"},{"key":"bibr183-1550147717741463","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-011-0385-5"},{"key":"bibr184-1550147717741463","volume-title":"ITU Internet reports 2005: the Internet of Things","author":"Strategy I","year":"2005"},{"key":"bibr191-1550147717741463","first-page":"161","volume-title":"The impact of control technology","volume":"12","author":"Baheti R","year":"2011"},{"key":"bibr192-1550147717741463","first-page":"731","volume-title":"Proceedings of the 47th design automation conference","author":"Rajkumar RR"},{"key":"bibr193-1550147717741463","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2009.5274919"},{"key":"bibr194-1550147717741463","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2705620"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1550147717741463","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/1550147717741463","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1550147717741463","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,12,13]],"date-time":"2017-12-13T10:17:50Z","timestamp":1513160270000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1177\/1550147717741463"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12]]},"references-count":142,"journal-issue":{"issue":"12","published-online":{"date-parts":[[2017,12,13]]},"published-print":{"date-parts":[[2017,12]]}},"alternative-id":["10.1177\/1550147717741463"],"URL":"https:\/\/doi.org\/10.1177\/1550147717741463","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"value":"1550-1477","type":"print"},{"value":"1550-1477","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,12]]}}}