Design of distributed denial-of-service attack prevention mechanism for IoT-driven data fusion system Article Swipe
Siddhant Thapliyal
,
Mohammad Wazid
,
Deepinder Singh
·
YOU?
·
· 2025
· Open Access
·
· DOI: https://doi.org/10.1016/j.csa.2025.100092
YOU?
·
· 2025
· Open Access
·
· DOI: https://doi.org/10.1016/j.csa.2025.100092
Related Topics
Concepts
Metadata
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.1016/j.csa.2025.100092
- OA Status
- diamond
- Cited By
- 1
- References
- 19
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4409256986
All OpenAlex metadata
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4409256986Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.1016/j.csa.2025.100092Digital Object Identifier
- Title
-
Design of distributed denial-of-service attack prevention mechanism for IoT-driven data fusion systemWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2025Year of publication
- Publication date
-
2025-04-08Full publication date if available
- Authors
-
Siddhant Thapliyal, Mohammad Wazid, Deepinder SinghList of authors in order
- Landing page
-
https://doi.org/10.1016/j.csa.2025.100092Publisher landing page
- Open access
-
YesWhether a free full text is available
- OA status
-
diamondOpen access status per OpenAlex
- OA URL
-
https://doi.org/10.1016/j.csa.2025.100092Direct OA link when available
- Concepts
-
Denial-of-service attack, Computer science, Mechanism (biology), Internet of Things, Distributed computing, Fusion, Computer security, Embedded system, Operating system, The Internet, Philosophy, Linguistics, EpistemologyTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
1Total citation count in OpenAlex
- Citations by year (recent)
-
2025: 1Per-year citation counts (last 5 years)
- References (count)
-
19Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4409256986 |
|---|---|
| doi | https://doi.org/10.1016/j.csa.2025.100092 |
| ids.doi | https://doi.org/10.1016/j.csa.2025.100092 |
| ids.openalex | https://openalex.org/W4409256986 |
| fwci | 5.16502407 |
| type | article |
| title | Design of distributed denial-of-service attack prevention mechanism for IoT-driven data fusion system |
| biblio.issue | |
| biblio.volume | 3 |
| biblio.last_page | 100092 |
| biblio.first_page | 100092 |
| topics[0].id | https://openalex.org/T10400 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9957000017166138 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1705 |
| topics[0].subfield.display_name | Computer Networks and Communications |
| topics[0].display_name | Network Security and Intrusion Detection |
| topics[1].id | https://openalex.org/T10917 |
| topics[1].field.id | https://openalex.org/fields/22 |
| topics[1].field.display_name | Engineering |
| topics[1].score | 0.9352999925613403 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/2207 |
| topics[1].subfield.display_name | Control and Systems Engineering |
| topics[1].display_name | Smart Grid Security and Resilience |
| topics[2].id | https://openalex.org/T11512 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9351999759674072 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1702 |
| topics[2].subfield.display_name | Artificial Intelligence |
| topics[2].display_name | Anomaly Detection Techniques and Applications |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C38822068 |
| concepts[0].level | 3 |
| concepts[0].score | 0.7310184240341187 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q131406 |
| concepts[0].display_name | Denial-of-service attack |
| concepts[1].id | https://openalex.org/C41008148 |
| concepts[1].level | 0 |
| concepts[1].score | 0.6371055245399475 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[1].display_name | Computer science |
| concepts[2].id | https://openalex.org/C89611455 |
| concepts[2].level | 2 |
| concepts[2].score | 0.5992016196250916 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q6804646 |
| concepts[2].display_name | Mechanism (biology) |
| concepts[3].id | https://openalex.org/C81860439 |
| concepts[3].level | 2 |
| concepts[3].score | 0.5776237845420837 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q251212 |
| concepts[3].display_name | Internet of Things |
| concepts[4].id | https://openalex.org/C120314980 |
| concepts[4].level | 1 |
| concepts[4].score | 0.4445793628692627 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q180634 |
| concepts[4].display_name | Distributed computing |
| concepts[5].id | https://openalex.org/C158525013 |
| concepts[5].level | 2 |
| concepts[5].score | 0.4207227826118469 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q2593739 |
| concepts[5].display_name | Fusion |
| concepts[6].id | https://openalex.org/C38652104 |
| concepts[6].level | 1 |
| concepts[6].score | 0.3593760132789612 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[6].display_name | Computer security |
| concepts[7].id | https://openalex.org/C149635348 |
| concepts[7].level | 1 |
| concepts[7].score | 0.32478854060173035 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q193040 |
| concepts[7].display_name | Embedded system |
| concepts[8].id | https://openalex.org/C111919701 |
| concepts[8].level | 1 |
| concepts[8].score | 0.15822118520736694 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q9135 |
| concepts[8].display_name | Operating system |
| concepts[9].id | https://openalex.org/C110875604 |
| concepts[9].level | 2 |
| concepts[9].score | 0.0663510262966156 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q75 |
| concepts[9].display_name | The Internet |
| concepts[10].id | https://openalex.org/C138885662 |
| concepts[10].level | 0 |
| concepts[10].score | 0.0 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q5891 |
| concepts[10].display_name | Philosophy |
| concepts[11].id | https://openalex.org/C41895202 |
| concepts[11].level | 1 |
| concepts[11].score | 0.0 |
| concepts[11].wikidata | https://www.wikidata.org/wiki/Q8162 |
| concepts[11].display_name | Linguistics |
| concepts[12].id | https://openalex.org/C111472728 |
| concepts[12].level | 1 |
| concepts[12].score | 0.0 |
| concepts[12].wikidata | https://www.wikidata.org/wiki/Q9471 |
| concepts[12].display_name | Epistemology |
| keywords[0].id | https://openalex.org/keywords/denial-of-service-attack |
| keywords[0].score | 0.7310184240341187 |
| keywords[0].display_name | Denial-of-service attack |
| keywords[1].id | https://openalex.org/keywords/computer-science |
| keywords[1].score | 0.6371055245399475 |
| keywords[1].display_name | Computer science |
| keywords[2].id | https://openalex.org/keywords/mechanism |
| keywords[2].score | 0.5992016196250916 |
| keywords[2].display_name | Mechanism (biology) |
| keywords[3].id | https://openalex.org/keywords/internet-of-things |
| keywords[3].score | 0.5776237845420837 |
| keywords[3].display_name | Internet of Things |
| keywords[4].id | https://openalex.org/keywords/distributed-computing |
| keywords[4].score | 0.4445793628692627 |
| keywords[4].display_name | Distributed computing |
| keywords[5].id | https://openalex.org/keywords/fusion |
| keywords[5].score | 0.4207227826118469 |
| keywords[5].display_name | Fusion |
| keywords[6].id | https://openalex.org/keywords/computer-security |
| keywords[6].score | 0.3593760132789612 |
| keywords[6].display_name | Computer security |
| keywords[7].id | https://openalex.org/keywords/embedded-system |
| keywords[7].score | 0.32478854060173035 |
| keywords[7].display_name | Embedded system |
| keywords[8].id | https://openalex.org/keywords/operating-system |
| keywords[8].score | 0.15822118520736694 |
| keywords[8].display_name | Operating system |
| keywords[9].id | https://openalex.org/keywords/the-internet |
| keywords[9].score | 0.0663510262966156 |
| keywords[9].display_name | The Internet |
| language | en |
| locations[0].id | doi:10.1016/j.csa.2025.100092 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S4387281872 |
| locations[0].source.issn | 2772-9184 |
| locations[0].source.type | journal |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | 2772-9184 |
| locations[0].source.is_core | True |
| locations[0].source.is_in_doaj | True |
| locations[0].source.display_name | Cyber Security and Applications |
| locations[0].source.host_organization | https://openalex.org/P4310320990 |
| locations[0].source.host_organization_name | Elsevier BV |
| locations[0].source.host_organization_lineage | https://openalex.org/P4310320990 |
| locations[0].source.host_organization_lineage_names | Elsevier BV |
| locations[0].license | |
| locations[0].pdf_url | |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | Cyber Security and Applications |
| locations[0].landing_page_url | https://doi.org/10.1016/j.csa.2025.100092 |
| indexed_in | crossref, doaj |
| authorships[0].author.id | https://openalex.org/A5085109031 |
| authorships[0].author.orcid | https://orcid.org/0000-0002-0850-7370 |
| authorships[0].author.display_name | Siddhant Thapliyal |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Siddhant Thapliyal |
| authorships[0].is_corresponding | False |
| authorships[1].author.id | https://openalex.org/A5004320904 |
| authorships[1].author.orcid | https://orcid.org/0000-0001-9898-0921 |
| authorships[1].author.display_name | Mohammad Wazid |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Mohammad Wazid |
| authorships[1].is_corresponding | False |
| authorships[2].author.id | https://openalex.org/A5104076772 |
| authorships[2].author.orcid | https://orcid.org/0009-0004-7028-4835 |
| authorships[2].author.display_name | Deepinder Singh |
| authorships[2].author_position | last |
| authorships[2].raw_author_name | D.P Singh |
| authorships[2].is_corresponding | False |
| has_content.pdf | False |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://doi.org/10.1016/j.csa.2025.100092 |
| open_access.oa_status | diamond |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-04-09T00:00:00 |
| display_name | Design of distributed denial-of-service attack prevention mechanism for IoT-driven data fusion system |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T10400 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9957000017166138 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1705 |
| primary_topic.subfield.display_name | Computer Networks and Communications |
| primary_topic.display_name | Network Security and Intrusion Detection |
| related_works | https://openalex.org/W2765763546, https://openalex.org/W4386482731, https://openalex.org/W4385302085, https://openalex.org/W2360429410, https://openalex.org/W4390188535, https://openalex.org/W4256682929, https://openalex.org/W335511927, https://openalex.org/W2471811227, https://openalex.org/W2217591390, https://openalex.org/W2157496457 |
| cited_by_count | 1 |
| counts_by_year[0].year | 2025 |
| counts_by_year[0].cited_by_count | 1 |
| locations_count | 1 |
| best_oa_location.id | doi:10.1016/j.csa.2025.100092 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S4387281872 |
| best_oa_location.source.issn | 2772-9184 |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | 2772-9184 |
| best_oa_location.source.is_core | True |
| best_oa_location.source.is_in_doaj | True |
| best_oa_location.source.display_name | Cyber Security and Applications |
| best_oa_location.source.host_organization | https://openalex.org/P4310320990 |
| best_oa_location.source.host_organization_name | Elsevier BV |
| best_oa_location.source.host_organization_lineage | https://openalex.org/P4310320990 |
| best_oa_location.source.host_organization_lineage_names | Elsevier BV |
| best_oa_location.license | |
| best_oa_location.pdf_url | |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | Cyber Security and Applications |
| best_oa_location.landing_page_url | https://doi.org/10.1016/j.csa.2025.100092 |
| primary_location.id | doi:10.1016/j.csa.2025.100092 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S4387281872 |
| primary_location.source.issn | 2772-9184 |
| primary_location.source.type | journal |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | 2772-9184 |
| primary_location.source.is_core | True |
| primary_location.source.is_in_doaj | True |
| primary_location.source.display_name | Cyber Security and Applications |
| primary_location.source.host_organization | https://openalex.org/P4310320990 |
| primary_location.source.host_organization_name | Elsevier BV |
| primary_location.source.host_organization_lineage | https://openalex.org/P4310320990 |
| primary_location.source.host_organization_lineage_names | Elsevier BV |
| primary_location.license | |
| primary_location.pdf_url | |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | Cyber Security and Applications |
| primary_location.landing_page_url | https://doi.org/10.1016/j.csa.2025.100092 |
| publication_date | 2025-04-08 |
| publication_year | 2025 |
| referenced_works | https://openalex.org/W3120153504, https://openalex.org/W4403711848, https://openalex.org/W6873079721, https://openalex.org/W4404031727, https://openalex.org/W4402945788, https://openalex.org/W3036749504, https://openalex.org/W4313213566, https://openalex.org/W6779081269, https://openalex.org/W6785944882, https://openalex.org/W4212990994, https://openalex.org/W4362639200, https://openalex.org/W3210854102, https://openalex.org/W3168873038, https://openalex.org/W3139242523, https://openalex.org/W3116027269, https://openalex.org/W4395961536, https://openalex.org/W3034273612, https://openalex.org/W3102953301, https://openalex.org/W4402735413 |
| referenced_works_count | 19 |
| abstract_inverted_index | |
| cited_by_percentile_year.max | 95 |
| cited_by_percentile_year.min | 91 |
| countries_distinct_count | 0 |
| institutions_distinct_count | 3 |
| citation_normalized_percentile.value | 0.87442508 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | True |