Analysis and Detection of various DDoS attacks on Internet of Things Network Article Swipe
YOU?
·
· 2022
· Open Access
·
· DOI: https://doi.org/10.5815/ijwmt.2022.03.02
Internet of Things is used for those devices, which are connected over a network, once the devices are connected to the internet they are known as smart devices.These devices share information and communicate with each other to influence our day to day lives.Due to the rise in these devices, security is compromised.Malware is malicious software that can damage the computer, server, or network intentionally.Malware can also exploit the confidentiality, integrity, availability (CIA) triad.Rather than the traditional malware, IoT malware can damage different internet connected devices such as routers, DVRs, CCTV, or many internets connected devices.The IoT devices are more vulnerable due to weak passwords, missing authentication schemes, backdoor entries, lack of high-security algorithms, and plug and play services.There is no widespread survey available about IoT malware in an efficiently organized manner, publicly.In this article, we have classified the IoT malware according to their release and provide on the basis of their functionalities, growth, revolution, and their detection mechanism.We perform DDoS attack on Raspberry PI to hamper the home automation system.We employ Wireshark to monitor network traffic and demonstrate the service unavailability.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.5815/ijwmt.2022.03.02
- http://www.mecs-press.org/ijwmt/ijwmt-v12-n3/IJWMT-V12-N3-2.pdf
- OA Status
- diamond
- Cited By
- 4
- References
- 25
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4319779440
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4319779440Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.5815/ijwmt.2022.03.02Digital Object Identifier
- Title
-
Analysis and Detection of various DDoS attacks on Internet of Things NetworkWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2022Year of publication
- Publication date
-
2022-06-08Full publication date if available
- Authors
-
Atika Bansal, Divya Kapil, Anupriya, Sagar Agarwal, Vishan Kumar GuptaList of authors in order
- Landing page
-
https://doi.org/10.5815/ijwmt.2022.03.02Publisher landing page
- PDF URL
-
https://www.mecs-press.org/ijwmt/ijwmt-v12-n3/IJWMT-V12-N3-2.pdfDirect link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
diamondOpen access status per OpenAlex
- OA URL
-
https://www.mecs-press.org/ijwmt/ijwmt-v12-n3/IJWMT-V12-N3-2.pdfDirect OA link when available
- Concepts
-
Denial-of-service attack, Computer security, Application layer DDoS attack, Trinoo, Internet of Things, Computer science, Internet privacy, The Internet, World Wide WebTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
4Total citation count in OpenAlex
- Citations by year (recent)
-
2023: 4Per-year citation counts (last 5 years)
- References (count)
-
25Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4319779440 |
|---|---|
| doi | https://doi.org/10.5815/ijwmt.2022.03.02 |
| ids.doi | https://doi.org/10.5815/ijwmt.2022.03.02 |
| ids.openalex | https://openalex.org/W4319779440 |
| fwci | 0.85696698 |
| type | article |
| title | Analysis and Detection of various DDoS attacks on Internet of Things Network |
| biblio.issue | 3 |
| biblio.volume | 12 |
| biblio.last_page | 32 |
| biblio.first_page | 18 |
| topics[0].id | https://openalex.org/T10400 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9613999724388123 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1705 |
| topics[0].subfield.display_name | Computer Networks and Communications |
| topics[0].display_name | Network Security and Intrusion Detection |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C38822068 |
| concepts[0].level | 3 |
| concepts[0].score | 0.8461669087409973 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q131406 |
| concepts[0].display_name | Denial-of-service attack |
| concepts[1].id | https://openalex.org/C38652104 |
| concepts[1].level | 1 |
| concepts[1].score | 0.5832170248031616 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[1].display_name | Computer security |
| concepts[2].id | https://openalex.org/C120865594 |
| concepts[2].level | 4 |
| concepts[2].score | 0.5411556959152222 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q131406 |
| concepts[2].display_name | Application layer DDoS attack |
| concepts[3].id | https://openalex.org/C43639116 |
| concepts[3].level | 5 |
| concepts[3].score | 0.5317596197128296 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q7843050 |
| concepts[3].display_name | Trinoo |
| concepts[4].id | https://openalex.org/C81860439 |
| concepts[4].level | 2 |
| concepts[4].score | 0.4906245768070221 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q251212 |
| concepts[4].display_name | Internet of Things |
| concepts[5].id | https://openalex.org/C41008148 |
| concepts[5].level | 0 |
| concepts[5].score | 0.48125335574150085 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[5].display_name | Computer science |
| concepts[6].id | https://openalex.org/C108827166 |
| concepts[6].level | 1 |
| concepts[6].score | 0.42988884449005127 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q175975 |
| concepts[6].display_name | Internet privacy |
| concepts[7].id | https://openalex.org/C110875604 |
| concepts[7].level | 2 |
| concepts[7].score | 0.3216291666030884 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q75 |
| concepts[7].display_name | The Internet |
| concepts[8].id | https://openalex.org/C136764020 |
| concepts[8].level | 1 |
| concepts[8].score | 0.16689381003379822 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q466 |
| concepts[8].display_name | World Wide Web |
| keywords[0].id | https://openalex.org/keywords/denial-of-service-attack |
| keywords[0].score | 0.8461669087409973 |
| keywords[0].display_name | Denial-of-service attack |
| keywords[1].id | https://openalex.org/keywords/computer-security |
| keywords[1].score | 0.5832170248031616 |
| keywords[1].display_name | Computer security |
| keywords[2].id | https://openalex.org/keywords/application-layer-ddos-attack |
| keywords[2].score | 0.5411556959152222 |
| keywords[2].display_name | Application layer DDoS attack |
| keywords[3].id | https://openalex.org/keywords/trinoo |
| keywords[3].score | 0.5317596197128296 |
| keywords[3].display_name | Trinoo |
| keywords[4].id | https://openalex.org/keywords/internet-of-things |
| keywords[4].score | 0.4906245768070221 |
| keywords[4].display_name | Internet of Things |
| keywords[5].id | https://openalex.org/keywords/computer-science |
| keywords[5].score | 0.48125335574150085 |
| keywords[5].display_name | Computer science |
| keywords[6].id | https://openalex.org/keywords/internet-privacy |
| keywords[6].score | 0.42988884449005127 |
| keywords[6].display_name | Internet privacy |
| keywords[7].id | https://openalex.org/keywords/the-internet |
| keywords[7].score | 0.3216291666030884 |
| keywords[7].display_name | The Internet |
| keywords[8].id | https://openalex.org/keywords/world-wide-web |
| keywords[8].score | 0.16689381003379822 |
| keywords[8].display_name | World Wide Web |
| language | en |
| locations[0].id | doi:10.5815/ijwmt.2022.03.02 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S2506422076 |
| locations[0].source.issn | 2076-1449, 2076-9539 |
| locations[0].source.type | journal |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | 2076-1449 |
| locations[0].source.is_core | True |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | International Journal of Wireless and Microwave Technologies |
| locations[0].source.host_organization | |
| locations[0].source.host_organization_name | |
| locations[0].license | |
| locations[0].pdf_url | http://www.mecs-press.org/ijwmt/ijwmt-v12-n3/IJWMT-V12-N3-2.pdf |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | International Journal of Wireless and Microwave Technologies |
| locations[0].landing_page_url | https://doi.org/10.5815/ijwmt.2022.03.02 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5041617395 |
| authorships[0].author.orcid | |
| authorships[0].author.display_name | Atika Bansal |
| authorships[0].countries | IN |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I60054993 |
| authorships[0].affiliations[0].raw_affiliation_string | School of Computing, Graphic Era Hill University, Dehradun, Uttarakhand, India |
| authorships[0].institutions[0].id | https://openalex.org/I60054993 |
| authorships[0].institutions[0].ror | https://ror.org/03wqgqd89 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I60054993 |
| authorships[0].institutions[0].country_code | IN |
| authorships[0].institutions[0].display_name | Graphic Era University |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Atika Bansal |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | School of Computing, Graphic Era Hill University, Dehradun, Uttarakhand, India |
| authorships[1].author.id | https://openalex.org/A5063079399 |
| authorships[1].author.orcid | https://orcid.org/0000-0003-3107-6721 |
| authorships[1].author.display_name | Divya Kapil |
| authorships[1].countries | IN |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I60054993 |
| authorships[1].affiliations[0].raw_affiliation_string | School of Computing, Graphic Era Hill University, Dehradun, Uttarakhand, India |
| authorships[1].institutions[0].id | https://openalex.org/I60054993 |
| authorships[1].institutions[0].ror | https://ror.org/03wqgqd89 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I60054993 |
| authorships[1].institutions[0].country_code | IN |
| authorships[1].institutions[0].display_name | Graphic Era University |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Divya Kapil |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | School of Computing, Graphic Era Hill University, Dehradun, Uttarakhand, India |
| authorships[2].author.id | https://openalex.org/A5108742628 |
| authorships[2].author.orcid | |
| authorships[2].author.display_name | Anupriya |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | None Anupriya |
| authorships[2].is_corresponding | False |
| authorships[3].author.id | https://openalex.org/A5101194766 |
| authorships[3].author.orcid | |
| authorships[3].author.display_name | Sagar Agarwal |
| authorships[3].countries | IN |
| authorships[3].affiliations[0].institution_ids | https://openalex.org/I60054993 |
| authorships[3].affiliations[0].raw_affiliation_string | School of Computing, Graphic Era Hill University, Dehradun, Uttarakhand, India |
| authorships[3].institutions[0].id | https://openalex.org/I60054993 |
| authorships[3].institutions[0].ror | https://ror.org/03wqgqd89 |
| authorships[3].institutions[0].type | education |
| authorships[3].institutions[0].lineage | https://openalex.org/I60054993 |
| authorships[3].institutions[0].country_code | IN |
| authorships[3].institutions[0].display_name | Graphic Era University |
| authorships[3].author_position | middle |
| authorships[3].raw_author_name | Sagar Agarwal |
| authorships[3].is_corresponding | False |
| authorships[3].raw_affiliation_strings | School of Computing, Graphic Era Hill University, Dehradun, Uttarakhand, India |
| authorships[4].author.id | https://openalex.org/A5081414393 |
| authorships[4].author.orcid | https://orcid.org/0000-0001-7245-3824 |
| authorships[4].author.display_name | Vishan Kumar Gupta |
| authorships[4].countries | IN |
| authorships[4].affiliations[0].institution_ids | https://openalex.org/I60054993 |
| authorships[4].affiliations[0].raw_affiliation_string | Dept. of Computer Science and Engineering, Graphic Era Deemed to be University, Dehradun, Uttarakhand, India |
| authorships[4].institutions[0].id | https://openalex.org/I60054993 |
| authorships[4].institutions[0].ror | https://ror.org/03wqgqd89 |
| authorships[4].institutions[0].type | education |
| authorships[4].institutions[0].lineage | https://openalex.org/I60054993 |
| authorships[4].institutions[0].country_code | IN |
| authorships[4].institutions[0].display_name | Graphic Era University |
| authorships[4].author_position | last |
| authorships[4].raw_author_name | Vishan Kumar Gupta |
| authorships[4].is_corresponding | False |
| authorships[4].raw_affiliation_strings | Dept. of Computer Science and Engineering, Graphic Era Deemed to be University, Dehradun, Uttarakhand, India |
| has_content.pdf | True |
| has_content.grobid_xml | True |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | http://www.mecs-press.org/ijwmt/ijwmt-v12-n3/IJWMT-V12-N3-2.pdf |
| open_access.oa_status | diamond |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Analysis and Detection of various DDoS attacks on Internet of Things Network |
| has_fulltext | True |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T10400 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9613999724388123 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1705 |
| primary_topic.subfield.display_name | Computer Networks and Communications |
| primary_topic.display_name | Network Security and Intrusion Detection |
| related_works | https://openalex.org/W2783466926, https://openalex.org/W4286539397, https://openalex.org/W1968168724, https://openalex.org/W2204131204, https://openalex.org/W2754163055, https://openalex.org/W4256682929, https://openalex.org/W4322008378, https://openalex.org/W2383770723, https://openalex.org/W2186749541, https://openalex.org/W2360429410 |
| cited_by_count | 4 |
| counts_by_year[0].year | 2023 |
| counts_by_year[0].cited_by_count | 4 |
| locations_count | 1 |
| best_oa_location.id | doi:10.5815/ijwmt.2022.03.02 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S2506422076 |
| best_oa_location.source.issn | 2076-1449, 2076-9539 |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | 2076-1449 |
| best_oa_location.source.is_core | True |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | International Journal of Wireless and Microwave Technologies |
| best_oa_location.source.host_organization | |
| best_oa_location.source.host_organization_name | |
| best_oa_location.license | |
| best_oa_location.pdf_url | http://www.mecs-press.org/ijwmt/ijwmt-v12-n3/IJWMT-V12-N3-2.pdf |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | International Journal of Wireless and Microwave Technologies |
| best_oa_location.landing_page_url | https://doi.org/10.5815/ijwmt.2022.03.02 |
| primary_location.id | doi:10.5815/ijwmt.2022.03.02 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S2506422076 |
| primary_location.source.issn | 2076-1449, 2076-9539 |
| primary_location.source.type | journal |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | 2076-1449 |
| primary_location.source.is_core | True |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | International Journal of Wireless and Microwave Technologies |
| primary_location.source.host_organization | |
| primary_location.source.host_organization_name | |
| primary_location.license | |
| primary_location.pdf_url | http://www.mecs-press.org/ijwmt/ijwmt-v12-n3/IJWMT-V12-N3-2.pdf |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | International Journal of Wireless and Microwave Technologies |
| primary_location.landing_page_url | https://doi.org/10.5815/ijwmt.2022.03.02 |
| publication_date | 2022-06-08 |
| publication_year | 2022 |
| referenced_works | https://openalex.org/W6777444127, https://openalex.org/W2944636189, https://openalex.org/W2788455797, https://openalex.org/W2767430271, https://openalex.org/W1967561194, https://openalex.org/W2748266636, https://openalex.org/W6756447108, https://openalex.org/W2913259440, https://openalex.org/W2912747059, https://openalex.org/W2798334860, https://openalex.org/W2514791705, https://openalex.org/W2896694594, https://openalex.org/W6750762285, https://openalex.org/W2461373307, https://openalex.org/W2767647836, https://openalex.org/W3095773778, https://openalex.org/W3080622597, https://openalex.org/W3113737798, https://openalex.org/W2901508923, https://openalex.org/W1548644355, https://openalex.org/W2748868501, https://openalex.org/W3130826665, https://openalex.org/W2799784398, https://openalex.org/W3023992901, https://openalex.org/W3104526589 |
| referenced_works_count | 25 |
| abstract_inverted_index.a | 12 |
| abstract_inverted_index.PI | 163 |
| abstract_inverted_index.an | 127 |
| abstract_inverted_index.as | 25, 86 |
| abstract_inverted_index.in | 46, 126 |
| abstract_inverted_index.is | 3, 50, 52, 118 |
| abstract_inverted_index.no | 119 |
| abstract_inverted_index.of | 1, 110, 149 |
| abstract_inverted_index.on | 146, 161 |
| abstract_inverted_index.or | 61, 90 |
| abstract_inverted_index.to | 19, 36, 40, 43, 101, 141, 164, 172 |
| abstract_inverted_index.we | 134 |
| abstract_inverted_index.IoT | 77, 95, 124, 138 |
| abstract_inverted_index.and | 31, 113, 115, 144, 154, 176 |
| abstract_inverted_index.are | 9, 17, 23, 97 |
| abstract_inverted_index.can | 56, 64, 79 |
| abstract_inverted_index.day | 39, 41 |
| abstract_inverted_index.due | 100 |
| abstract_inverted_index.for | 5 |
| abstract_inverted_index.our | 38 |
| abstract_inverted_index.the | 15, 20, 44, 58, 67, 74, 137, 147, 166, 178 |
| abstract_inverted_index.DDoS | 159 |
| abstract_inverted_index.also | 65 |
| abstract_inverted_index.each | 34 |
| abstract_inverted_index.have | 135 |
| abstract_inverted_index.home | 167 |
| abstract_inverted_index.lack | 109 |
| abstract_inverted_index.many | 91 |
| abstract_inverted_index.more | 98 |
| abstract_inverted_index.once | 14 |
| abstract_inverted_index.over | 11 |
| abstract_inverted_index.play | 116 |
| abstract_inverted_index.plug | 114 |
| abstract_inverted_index.rise | 45 |
| abstract_inverted_index.such | 85 |
| abstract_inverted_index.than | 73 |
| abstract_inverted_index.that | 55 |
| abstract_inverted_index.they | 22 |
| abstract_inverted_index.this | 132 |
| abstract_inverted_index.used | 4 |
| abstract_inverted_index.weak | 102 |
| abstract_inverted_index.with | 33 |
| abstract_inverted_index.(CIA) | 71 |
| abstract_inverted_index.CCTV, | 89 |
| abstract_inverted_index.DVRs, | 88 |
| abstract_inverted_index.about | 123 |
| abstract_inverted_index.basis | 148 |
| abstract_inverted_index.known | 24 |
| abstract_inverted_index.other | 35 |
| abstract_inverted_index.share | 29 |
| abstract_inverted_index.smart | 26 |
| abstract_inverted_index.their | 142, 150, 155 |
| abstract_inverted_index.these | 47 |
| abstract_inverted_index.those | 6 |
| abstract_inverted_index.which | 8 |
| abstract_inverted_index.Things | 2 |
| abstract_inverted_index.attack | 160 |
| abstract_inverted_index.damage | 57, 80 |
| abstract_inverted_index.employ | 170 |
| abstract_inverted_index.hamper | 165 |
| abstract_inverted_index.survey | 121 |
| abstract_inverted_index.devices | 16, 28, 84, 96 |
| abstract_inverted_index.exploit | 66 |
| abstract_inverted_index.growth, | 152 |
| abstract_inverted_index.malware | 78, 125, 139 |
| abstract_inverted_index.manner, | 130 |
| abstract_inverted_index.missing | 104 |
| abstract_inverted_index.monitor | 173 |
| abstract_inverted_index.network | 62, 174 |
| abstract_inverted_index.perform | 158 |
| abstract_inverted_index.provide | 145 |
| abstract_inverted_index.release | 143 |
| abstract_inverted_index.server, | 60 |
| abstract_inverted_index.service | 179 |
| abstract_inverted_index.traffic | 175 |
| abstract_inverted_index.Internet | 0 |
| abstract_inverted_index.article, | 133 |
| abstract_inverted_index.backdoor | 107 |
| abstract_inverted_index.devices, | 7, 48 |
| abstract_inverted_index.entries, | 108 |
| abstract_inverted_index.internet | 21, 82 |
| abstract_inverted_index.malware, | 76 |
| abstract_inverted_index.network, | 13 |
| abstract_inverted_index.routers, | 87 |
| abstract_inverted_index.schemes, | 106 |
| abstract_inverted_index.security | 49 |
| abstract_inverted_index.software | 54 |
| abstract_inverted_index.Raspberry | 162 |
| abstract_inverted_index.Wireshark | 171 |
| abstract_inverted_index.according | 140 |
| abstract_inverted_index.available | 122 |
| abstract_inverted_index.computer, | 59 |
| abstract_inverted_index.connected | 10, 18, 83, 93 |
| abstract_inverted_index.detection | 156 |
| abstract_inverted_index.different | 81 |
| abstract_inverted_index.influence | 37 |
| abstract_inverted_index.internets | 92 |
| abstract_inverted_index.lives.Due | 42 |
| abstract_inverted_index.malicious | 53 |
| abstract_inverted_index.organized | 129 |
| abstract_inverted_index.system.We | 169 |
| abstract_inverted_index.automation | 168 |
| abstract_inverted_index.classified | 136 |
| abstract_inverted_index.integrity, | 69 |
| abstract_inverted_index.passwords, | 103 |
| abstract_inverted_index.vulnerable | 99 |
| abstract_inverted_index.widespread | 120 |
| abstract_inverted_index.algorithms, | 112 |
| abstract_inverted_index.communicate | 32 |
| abstract_inverted_index.demonstrate | 177 |
| abstract_inverted_index.devices.The | 94 |
| abstract_inverted_index.efficiently | 128 |
| abstract_inverted_index.information | 30 |
| abstract_inverted_index.publicly.In | 131 |
| abstract_inverted_index.revolution, | 153 |
| abstract_inverted_index.traditional | 75 |
| abstract_inverted_index.availability | 70 |
| abstract_inverted_index.mechanism.We | 157 |
| abstract_inverted_index.triad.Rather | 72 |
| abstract_inverted_index.devices.These | 27 |
| abstract_inverted_index.high-security | 111 |
| abstract_inverted_index.authentication | 105 |
| abstract_inverted_index.services.There | 117 |
| abstract_inverted_index.unavailability. | 180 |
| abstract_inverted_index.confidentiality, | 68 |
| abstract_inverted_index.functionalities, | 151 |
| abstract_inverted_index.compromised.Malware | 51 |
| abstract_inverted_index.intentionally.Malware | 63 |
| cited_by_percentile_year.max | 97 |
| cited_by_percentile_year.min | 96 |
| countries_distinct_count | 1 |
| institutions_distinct_count | 5 |
| citation_normalized_percentile.value | 0.70515321 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | False |