{"id":"https://openalex.org/W2810768461","doi":"https://doi.org/10.1155/2018/7264269","title":"ABS\u2010DDoS: An Agent\u2010Based Simulator about Strategies of Both DDoS Attacks and Their Defenses, to Achieve Efficient Data Forwarding in Sensor Networks and IoT Devices","display_name":"ABS\u2010DDoS: An Agent\u2010Based Simulator about Strategies of Both DDoS Attacks and Their Defenses, to Achieve Efficient Data Forwarding in Sensor Networks and IoT Devices","publication_year":2018,"publication_date":"2018-01-01","ids":{"openalex":"https://openalex.org/W2810768461","doi":"https://doi.org/10.1155/2018/7264269","mag":"2810768461"},"language":"en","primary_location":{"id":"doi:10.1155/2018/7264269","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2018/7264269","pdf_url":"https://downloads.hindawi.com/journals/wcmc/2018/7264269.pdf","source":{"id":"https://openalex.org/S235346","display_name":"Wireless Communications and Mobile Computing","issn_l":"1530-8669","issn":["1530-8669","1530-8677"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Wireless Communications and Mobile Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://downloads.hindawi.com/journals/wcmc/2018/7264269.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5071308937","display_name":"Franks Gonz\u00e1lez-Landero","orcid":"https://orcid.org/0000-0002-9327-980X"},"institutions":[{"id":"https://openalex.org/I4210120772","display_name":"Edison (Italy)","ror":"https://ror.org/02c3ywg26","country_code":"IT","type":"company","lineage":["https://openalex.org/I4210120772"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Franks Gonz\u00e1lez-Landero","raw_affiliation_strings":["Edison Desarrollos, Teruel 44002"],"affiliations":[{"raw_affiliation_string":"Edison Desarrollos, Teruel 44002","institution_ids":["https://openalex.org/I4210120772"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036757387","display_name":"Iv\u00e1n Garc\u00eda\u2010Magari\u00f1o","orcid":"https://orcid.org/0000-0002-2726-6760"},"institutions":[{"id":"https://openalex.org/I255234318","display_name":"Universidad de Zaragoza","ror":"https://ror.org/012a91z28","country_code":"ES","type":"education","lineage":["https://openalex.org/I255234318"]},{"id":"https://openalex.org/I4210136512","display_name":"Instituto de Investigaci\u00f3n Sanitaria Arag\u00f3n","ror":"https://ror.org/03njn4610","country_code":"ES","type":"other","lineage":["https://openalex.org/I4210136512"]}],"countries":["ES"],"is_corresponding":true,"raw_author_name":"Iv\u00e1n Garc\u00eda-Magari\u00f1o","raw_affiliation_strings":["Department of Computer Science and Engineering of Systems, University of Zaragoza, Teruel 44003","Instituto de Investigaci\u00f3n Sanitaria Arag\u00f3n, Zaragoza"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering of Systems, University of Zaragoza, Teruel 44003","institution_ids":["https://openalex.org/I255234318"]},{"raw_affiliation_string":"Instituto de Investigaci\u00f3n Sanitaria Arag\u00f3n, Zaragoza","institution_ids":["https://openalex.org/I4210136512"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035343234","display_name":"Raquel Lacuesta","orcid":"https://orcid.org/0000-0002-4773-4904"},"institutions":[{"id":"https://openalex.org/I255234318","display_name":"Universidad de Zaragoza","ror":"https://ror.org/012a91z28","country_code":"ES","type":"education","lineage":["https://openalex.org/I255234318"]},{"id":"https://openalex.org/I4210136512","display_name":"Instituto de Investigaci\u00f3n Sanitaria Arag\u00f3n","ror":"https://ror.org/03njn4610","country_code":"ES","type":"other","lineage":["https://openalex.org/I4210136512"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Raquel Lacuesta","raw_affiliation_strings":["Department of Computer Science and Engineering of Systems, University of Zaragoza, Teruel 44003, Spain","Instituto de Investigacin Sanitaria Aragn, Zaragoza, Spain","Instituto de Investigaci\u00f3n Sanitaria Arag\u00f3n, Zaragoza","Department of Computer Science and Engineering of Systems, University of Zaragoza, Teruel 44003"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering of Systems, University of Zaragoza, Teruel 44003, Spain","institution_ids":["https://openalex.org/I255234318"]},{"raw_affiliation_string":"Instituto de Investigacin Sanitaria Aragn, Zaragoza, Spain","institution_ids":["https://openalex.org/I4210136512"]},{"raw_affiliation_string":"Instituto de Investigaci\u00f3n Sanitaria Arag\u00f3n, Zaragoza","institution_ids":["https://openalex.org/I4210136512"]},{"raw_affiliation_string":"Department of Computer Science and Engineering of Systems, University of Zaragoza, Teruel 44003","institution_ids":["https://openalex.org/I255234318"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5061267204","display_name":"Jaime Lloret","orcid":"https://orcid.org/0000-0002-0862-0533"},"institutions":[{"id":"https://openalex.org/I60053951","display_name":"Universitat Polit\u00e8cnica de Val\u00e8ncia","ror":"https://ror.org/01460j859","country_code":"ES","type":"education","lineage":["https://openalex.org/I60053951"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Jaime Lloret","raw_affiliation_strings":["Instituto de Investigacin para la Gestin Integrada de Zonas Costeras, Universitat Politecnica de Valencia, Valencia, Spain","Instituto de Investigaci\u00f3n para la Gesti\u00f3n Integrada de Zonas Costeras, Universitat Politecnica de Valencia, Valencia"],"affiliations":[{"raw_affiliation_string":"Instituto de Investigacin para la Gestin Integrada de Zonas Costeras, Universitat Politecnica de Valencia, Valencia, Spain","institution_ids":["https://openalex.org/I60053951"]},{"raw_affiliation_string":"Instituto de Investigaci\u00f3n para la Gesti\u00f3n Integrada de Zonas Costeras, Universitat Politecnica de Valencia, Valencia","institution_ids":["https://openalex.org/I60053951"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5036757387"],"corresponding_institution_ids":["https://openalex.org/I255234318","https://openalex.org/I4210136512"],"apc_list":{"value":2300,"currency":"USD","value_usd":2300},"apc_paid":{"value":2300,"currency":"USD","value_usd":2300},"fwci":0.3908,"has_fulltext":true,"cited_by_count":6,"citation_normalized_percentile":{"value":0.65499428,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":"2018","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.9041506052017212},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.8987647294998169},{"id":"https://openalex.org/keywords/trinoo","display_name":"Trinoo","score":0.7905912399291992},{"id":"https://openalex.org/keywords/application-layer-ddos-attack","display_name":"Application layer DDoS attack","score":0.7875379920005798},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.5733942985534668},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5068452954292297},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3297293186187744},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.11864989995956421},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.11292383074760437}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.9041506052017212},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.8987647294998169},{"id":"https://openalex.org/C43639116","wikidata":"https://www.wikidata.org/wiki/Q7843050","display_name":"Trinoo","level":5,"score":0.7905912399291992},{"id":"https://openalex.org/C120865594","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Application layer DDoS attack","level":4,"score":0.7875379920005798},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.5733942985534668},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5068452954292297},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3297293186187744},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.11864989995956421},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.11292383074760437}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1155/2018/7264269","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2018/7264269","pdf_url":"https://downloads.hindawi.com/journals/wcmc/2018/7264269.pdf","source":{"id":"https://openalex.org/S235346","display_name":"Wireless Communications and Mobile Computing","issn_l":"1530-8669","issn":["1530-8669","1530-8677"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Wireless Communications and Mobile Computing","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:bfdce4a265ac47579723cfabbd090fcb","is_oa":true,"landing_page_url":"https://doaj.org/article/bfdce4a265ac47579723cfabbd090fcb","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Wireless Communications and Mobile Computing, Vol 2018 (2018)","raw_type":"article"},{"id":"pmh:oai:riunet.upv.es:10251/142684","is_oa":true,"landing_page_url":"http://hdl.handle.net/10251/142684","pdf_url":null,"source":{"id":"https://openalex.org/S4306401500","display_name":"RiuNet (Politechnical University of Valencia)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I60053951","host_organization_name":"Universitat Polit\u00e8cnica de Val\u00e8ncia","host_organization_lineage":["https://openalex.org/I60053951"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/article"},{"id":"pmh:oai:zaguan.unizar.es:74996","is_oa":true,"landing_page_url":"http://zaguan.unizar.es/record/74996","pdf_url":null,"source":{"id":"https://openalex.org/S4306401812","display_name":"Zaguan (University of Zaragoza Repository)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I255234318","host_organization_name":"Universidad de Zaragoza","host_organization_lineage":["https://openalex.org/I255234318"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/article"}],"best_oa_location":{"id":"doi:10.1155/2018/7264269","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2018/7264269","pdf_url":"https://downloads.hindawi.com/journals/wcmc/2018/7264269.pdf","source":{"id":"https://openalex.org/S235346","display_name":"Wireless Communications and Mobile Computing","issn_l":"1530-8669","issn":["1530-8669","1530-8677"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Wireless Communications and Mobile Computing","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/2","display_name":"Zero hunger","score":0.7200000286102295}],"awards":[{"id":"https://openalex.org/G2255902358","display_name":null,"funder_award_id":"JIUZ-2017-TEC-03","funder_id":"https://openalex.org/F4320324111","funder_display_name":"Universidad de Zaragoza"},{"id":"https://openalex.org/G4016030755","display_name":null,"funder_award_id":"CAS17/00005","funder_id":"https://openalex.org/F4320321764","funder_display_name":"Ministerio de Educaci\u00f3n, Cultura y Deporte"}],"funders":[{"id":"https://openalex.org/F4320321764","display_name":"Ministerio de Educaci\u00f3n, Cultura y Deporte","ror":"https://ror.org/03nc27g21"},{"id":"https://openalex.org/F4320321837","display_name":"Ministerio de Econom\u00eda y Competitividad","ror":"https://ror.org/034900433"},{"id":"https://openalex.org/F4320324111","display_name":"Universidad de Zaragoza","ror":"https://ror.org/012a91z28"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2810768461.pdf","grobid_xml":"https://content.openalex.org/works/W2810768461.grobid-xml"},"referenced_works_count":18,"referenced_works":["https://openalex.org/W1669806660","https://openalex.org/W1774907667","https://openalex.org/W1778890668","https://openalex.org/W2094926523","https://openalex.org/W2097156747","https://openalex.org/W2114717587","https://openalex.org/W2124480468","https://openalex.org/W2276629685","https://openalex.org/W2620762937","https://openalex.org/W2742840809","https://openalex.org/W2766072649","https://openalex.org/W2770885666","https://openalex.org/W2783435484","https://openalex.org/W2786472730","https://openalex.org/W2789580363","https://openalex.org/W3099736358","https://openalex.org/W6637397297","https://openalex.org/W6748616714"],"related_works":["https://openalex.org/W2783466926","https://openalex.org/W4286539397","https://openalex.org/W1968168724","https://openalex.org/W2204131204","https://openalex.org/W2754163055","https://openalex.org/W4322008378","https://openalex.org/W2383770723","https://openalex.org/W2186749541","https://openalex.org/W2360429410","https://openalex.org/W4256682929"],"abstract_inverted_index":{"Sensor":[0],"networks":[1,74,120],"and":[2,26,32,42,50,57,75,121,137,150],"Internet":[3],"of":[4,67,109,144],"Things":[5],"(IoT)":[6],"are":[7],"useful":[8,132],"for":[9,29,89,92,133],"many":[10],"purposes":[11],"such":[12,62],"as":[13,63],"military":[14],"defense,":[15],"sensing":[16],"in":[17,24,107,118],"smart":[18],"homes,":[19],"precision":[20],"agriculture,":[21],"underwater":[22],"monitoring":[23],"aquaculture,":[25],"ambient\u2010assisted":[27],"living":[28],"healthcare.":[30],"Efficient":[31],"secure":[33],"data":[34],"forwarding":[35],"is":[36],"essential":[37],"to":[38,43],"maintain":[39],"seamless":[40],"communications":[41],"provide":[44],"fast":[45],"services.":[46],"However,":[47],"IoT":[48,76,122],"devices":[49],"sensors":[51],"usually":[52],"have":[53],"low":[54,157],"processing":[55,110],"capabilities":[56],"vulnerabilities.":[58],"For":[59],"example,":[60],"attacks":[61],"the":[64,81,129,142],"Distributed":[65],"Denial":[66],"Service":[68],"(DDoS)":[69],"can":[70,115],"easily":[71],"hinder":[72],"sensor":[73,119],"devices.":[77,123],"In":[78],"this":[79],"context,":[80],"current":[82,99],"approach":[83],"presents":[84],"an":[85],"agent\u2010based":[86],"simulation":[87],"solution":[88],"exploring":[90],"strategies":[91,106,146,155],"defending":[93],"from":[94],"different":[95],"DDoS":[96],"attacks.":[97],"The":[98,124],"work":[100],"focuses":[101],"on":[102],"obtaining":[103],"low\u2010consuming":[104],"defense":[105,136,145,154],"terms":[108],"capabilities,":[111],"so":[112],"that":[113,128],"these":[114],"be":[116],"applied":[117],"experimental":[125],"results":[126],"show":[127],"simulator":[130],"was":[131],"(a)":[134],"defining":[135,152],"attack":[138,148],"strategies,":[139],"(b)":[140],"assessing":[141],"effectiveness":[143],"against":[147],"ones,":[149],"(c)":[151],"efficient":[153],"with":[156],"response":[158],"times.":[159]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":2}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
