{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T11:38:20Z","timestamp":1730201900023,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,9]]},"DOI":"10.1109\/camad.2019.8858484","type":"proceedings-article","created":{"date-parts":[[2019,10,7]],"date-time":"2019-10-07T20:07:46Z","timestamp":1570478866000},"page":"1-6","source":"Crossref","is-referenced-by-count":32,"title":["Protecting IoTs from Mirai Botnet Attacks Using Blockchains"],"prefix":"10.1109","author":[{"given":"Zohaib","family":"Ahmed","sequence":"first","affiliation":[]},{"given":"Syed Muhammad","family":"Danish","sequence":"additional","affiliation":[]},{"given":"Hassaan Khaliq","family":"Qureshi","sequence":"additional","affiliation":[]},{"given":"Marios","family":"Lestas","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"33","article-title":"Protecting IoT from Mirai botnets: IoT device hardening","volume":"11","author":"frank","year":"2018","journal-title":"Journal of Information Systems Applied Research"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2018.8489489"},{"key":"ref12","first-page":"224","article-title":"Detection of Mirai by Syntactic and Behavioral Analysis","author":"said","year":"2018","journal-title":"IEEE International Symposium on Software Reliability Engineering"},{"article-title":"Early Detection of Mirai-Like IoT Bots in Large-Scale Networks through Sub-Sampled Packet Traffic Analysis","year":"2019","author":"kumar","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2018.8554643"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.11.022"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-95189-8_9"},{"key":"ref17","article-title":"Enabling a Cooperative, Multi-domain DDoS Defense by a Blockchain Signaling System (BloSS)","author":"rodrigues","year":"2017","journal-title":"42nd IEEE Conference on Local Computer Networks"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CIC.2018.00-46"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/Cybermatics_2018.2018.00219"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2017.8170867"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.06.004"},{"key":"ref6","first-page":"31","article-title":"The Road to Scalable Blockchain Designs","volume":"42","author":"bano","year":"2017","journal-title":"USENIX"},{"key":"ref5","first-page":"1093","article-title":"Understanding the Mirai Botnet","author":"antonakakis","year":"2017","journal-title":"Proceedings of the 26th USENIX Conference on Security Symposium SEC’17"},{"article-title":"IoTChain: A Three-Tier Blockchain-based IoT Security Architecture","year":"2018","author":"bao","key":"ref8"},{"journal-title":"Medium","article-title":"Blockchain technology — a very special kind of Distributed Database","year":"2018","key":"ref7"},{"journal-title":"en wikipedia org","article-title":"Internet of things","year":"2018","key":"ref2"},{"journal-title":"Technical Report","article-title":"Gartner says by 2020, more than half of major new business processes and systems will incorporate some element of the internet of things","year":"2016","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.5220\/0006246600470058"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3211933.3211946"},{"journal-title":"Etherscan io","article-title":"Ethereum Average BlockSize Chart","year":"2018","key":"ref22"},{"key":"ref21","first-page":"16","article-title":"A Blockchain-Based Architecture for Collaborative DDoS Mitigation with Smart Contracts","author":"rodrigues","year":"2018","journal-title":"Security of Networks and Services in an All-Connected World"},{"journal-title":"Solidity readthedocs io","article-title":"Types—Solidity 0.4.24 documentation","year":"2018","key":"ref23"}],"event":{"name":"2019 IEEE 24th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)","start":{"date-parts":[[2019,9,11]]},"location":"Limassol, Cyprus","end":{"date-parts":[[2019,9,13]]}},"container-title":["2019 IEEE 24th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8847248\/8858161\/08858484.pdf?arnumber=8858484","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,19]],"date-time":"2022-07-19T16:24:21Z","timestamp":1658247861000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8858484\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/camad.2019.8858484","relation":{},"subject":[],"published":{"date-parts":[[2019,9]]}}}