{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:17:15Z","timestamp":1740100635195,"version":"3.37.3"},"reference-count":9,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,2,13]],"date-time":"2022-02-13T00:00:00Z","timestamp":1644710400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,2,13]],"date-time":"2022-02-13T00:00:00Z","timestamp":1644710400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100010187","name":"Universiti Sains Islam Malaysia","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100010187","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,2,13]]},"DOI":"10.23919\/icact53585.2022.9728902","type":"proceedings-article","created":{"date-parts":[[2022,3,11]],"date-time":"2022-03-11T20:27:02Z","timestamp":1647030422000},"page":"285-291","source":"Crossref","is-referenced-by-count":0,"title":["Lightweight Denial of Service (DOS) Detection System Algorithm (LIDSA)"],"prefix":"10.23919","author":[{"given":"Abdul Fuad Abdul","family":"Rahman","sequence":"first","affiliation":[{"name":"CyberSecurity Malaysia,MyVAC Department,Cyberjaya,Malaysia"}]},{"given":"Azni Ab","family":"Halim","sequence":"additional","affiliation":[{"name":"Universiti Sains Islam Malaysia (USIM),Faculty of Science and Technology,Malaysia"}]},{"given":"Shazwani","family":"Salleh","sequence":"additional","affiliation":[{"name":"CyberSecurity Malaysia,MyVAC Department,Cyberjaya,Malaysia"}]},{"given":"Nur Farahin","family":"Jamaludin","sequence":"additional","affiliation":[{"name":"CyberSecurity Malaysia,MyVAC Department,Cyberjaya,Malaysia"}]},{"given":"Nurul Syazwani","family":"Kamarulzaman","sequence":"additional","affiliation":[{"name":"CyberSecurity Malaysia,MyVAC Department,Cyberjaya,Malaysia"}]},{"given":"Madihah Zulfa","family":"Mohamad","sequence":"additional","affiliation":[{"name":"CyberSecurity Malaysia,MyVAC Department,Cyberjaya,Malaysia"}]}],"member":"263","reference":[{"journal-title":"Arduino - Memory (n d ) Arduino","year":"0","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/INFOMAN.2018.8392848"},{"key":"ref6","first-page":"549","article-title":"Comparison on Scorecard and Dashboard in Smart Water Monitoring Application","author":"syamsul kamal","year":"2018","journal-title":"In Proceedings of the 23rd Conference of Open Innovations Association FRUCT (FRUCT&#x2019;23)"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39637-3_15"},{"key":"ref8","first-page":"2","article-title":"A Graph Clustering Algorithm Based on Adaptive Neighbors Connectivity","volume":"9","author":"hadi","year":"2018","journal-title":"J Telecommunication Electronic and Computer Engineering"},{"key":"ref7","doi-asserted-by":"crossref","DOI":"10.1038\/srep08665","article-title":"Understanding the influence of all nodes in a network","volume":"5","author":"lawyer","year":"2015","journal-title":"Scientific Reports"},{"key":"ref2","first-page":"26","article-title":"Development of Denial of Service (DoS) Mitigation for Internet of Things (IoT) Sensor Node","volume":"4","author":"rahman","year":"2019","journal-title":"Global Journal of Engineering and Technology Review Vol 4 (2) April-June 2019 Global Journal of Engineering and Technology Review"},{"key":"ref9","first-page":"876","article-title":"On the use of atmospheric plasmas as electromagnetic reflectors","volume":"21","author":"vidmar","year":"1992","journal-title":"IEEE Trans Plasma Sci"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3234664.3234672"}],"event":{"name":"2022 24th International Conference on Advanced Communication Technology (ICACT)","start":{"date-parts":[[2022,2,13]]},"location":"PyeongChang Kwangwoon_Do, Korea, Republic of","end":{"date-parts":[[2022,2,16]]}},"container-title":["2022 24th International Conference on Advanced Communication Technology (ICACT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9728250\/9728768\/09728902.pdf?arnumber=9728902","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,23]],"date-time":"2022-05-23T21:29:27Z","timestamp":1653341367000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9728902\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2,13]]},"references-count":9,"URL":"https:\/\/doi.org\/10.23919\/icact53585.2022.9728902","relation":{},"subject":[],"published":{"date-parts":[[2022,2,13]]}}}