{“状态”:“确定”,“消息类型”:“工作”,“信息版本”:“1.0.0”,“讯息”:{“索引”:{“日期-部件”:[[2024,6,24]],“日期-时间”:“2024-06-24T09:13:45Z”,“时间戳”:1719220425179},“参考-计数”:24,“出版商”:“电气与电子工程师学会(IEEE)”,“发行”:“1”,“许可证”:[{“开始”:{-日期-部件“:[2020,1]],”日期-时间我”:“2020-01-01T00:00:00Z”,“timestamp”:1577836800000},“content-version”:“vor”,“delay-in-days”:0,“URL”:“https:\/\/ieeexplore.iee.org\/Xplorehelp\/downloads\/license-information\/ieee.html”},{“start”:{“date-parts”:[[2020,1,1]],“date-time”:“2020-1-01T00:00:00Z”,”timestamp“:1577836580000},”content-vers ion“:”stm-asf“,”delay-in-days“:0,”URL“:“https:\/\/doi.org\/10.15223\/policy-029”},{“start”:{“date-parts”:[[2020,1,1]],“date-time”:“2020-01-01T00:00:00Z”,“timestamp”:1577836800000},“content-version”:“stm-asf”,“delay-in-days”:0,“URL”:“http:\/\/doi.org\/10.15223\/policy-037”}],“出资人”:[{“doi”:“10.13039 \/501100001809“,“name”:“国家自然科学基金”,“doi-asserted-by”:“publisher”,“award”:[“61872195”,“61572262”]}],“content-domain”:{“domain”:[],“crossmark-restriction”:false},“short-container-title”:[”IEEE Trans.Ind.Inf.“],“published-print”:{“date-parts”:[[2020,1]]},”doi“10.1109\/tii.2019.2917912”,“type”:“journal-article”,“created”:{-“date-ports”:[[2019,5,20]],“日期时间”:“2019-05-20T19:39:33Z”,“timestamp”:1558381173000},“page”:“648-657”,“source”:”Crossref“,”is-referenced-by-count“:76,“title”:[“An SDN-Enabled Pseudo-Honeypot Strategy for Distributed Denial of Service Attacks in Industrial Internet of Things”],“prefix”:“10.1109”,“volume”:“16”,“author”:[{“give”:“苗”,“family”:“杜”,“sequence”:“first”,“affiliation”:[]},{“ORCID”:“http://\/ORCID.org\/00000-0002-9099-2781”,“authenticated-ORCID”:false,“given”:”Kun“,”family“:”Wang“,”sequence“:”additional“,”affiliation“:[]{],”member“:”263“,”reference“:[{”key“:”ref10“,”doi-asserted-by“:“doi-asserted-by”:“publisher”,“doi”:“10.1109\/SURV.2013.081313.00105”},{“key”:“ref12”,“doi-asserted-by”:“publisher”,“doi”:“10.1109\/MWC.2017.1600187WC”}ted-by“:”publisher“,”doi“:”10.1016\/j.jpdc.2006.04.012“},{”key“:”ref16“,“doi-asserted-by”:“publisher”,“doi”:“10.1145\/1731060.1731063”},{“key”:“ref17”,“doo-asserted-by”:”publisher“,”doi“:”10.1504\/IJICS.2010.031858“},“key“:”ref18“,”doi-assert-by doi“:”10.1109\/TIFS.2017.2708693“},{“key”:“ref4”,“doi-asserted-by”:“publisher”,“DOI”:“10.1109\/TIFS.2018.2805600”},{“key”:“ref3”,“DOI-asserted-by”:“publicher”,“DOI”:”10.1109\/JIOT.2016.2547994“},“key“:”ref6“,”DOI-assert-by“:”publisher“,”DOI“:”10.109\/MNET.2016.600113NM“}\/COMST.2014.2326417“},{“key”:“ref8”,“DOI-asserted-by”:“publisher”,“DOI”:“10.1109\/TSG.2017.2670144”},{“key”:“ref7”,“doi-asserted-by”:“publisher”,“doi”:“10.109\/MSP.2018.1870870”},{“key”:“ref9”,“doi-asserted-by”:“publisher”,“doi”:“10.1109\/TNSM.2015.2419975”},{“key”:“ref20”,“doi-asserted-by”:“publisher”,“doi”:“10.1109\/TIFS.2014.2321034”},{“key”:”ref22“,”doi-assert-by“:”publisher“,”doi“:”10.1109\/LCOMM.2014.2328587“},”key“:”ref21“,”doi-asserted-by“;”publishers“,”DI:”10.1145\/2886100“}”,{”key:“ref24”,““publisher”,“doi”:“10.1109\/COMST.2015.2487361”},{“key”:“ref23”,“doi-asserted-by”:“publisher”,“DOI”:“10.1109\/MCOM.2015.7081075”}],“container-title”:[“IEEE Transactions on Industrial Informatics”],“原始标题”:[],“链接”:[{“URL”:“http://\/xplorestaging.IEEE.org\/ielx7\/9424\/8952812\/08718537.pdf?arnumber=8718537”,“content-type”:“未指定”,“内容版本”:“vor”,“intended-application”:“相似性检查”}],“存放”用法:{“date-parts”:[[2022,4,27]],“date-time”:“2022-04-27T16:55:26Z”,“timestamp”:1651078526000},“score”:1,“resource”:{主要用户“:{”URL“:”https:\/\/ieeexplore.ieee.org\/document\/8718537\/“}},”副标题:[],“shorttitle”:[],“issued”:{“date-ports”:[2020,1]]}、“references-count”:24,“journal”al-issue“:{”issue“:”1“},”URL“:“http://\/dx.doi.org\/10.109\/tii.2019.2917912”,“关系”:{},“ISSN”:[“1551-3203”,“1941-0050”],“ISSN-type”:[{“value”:“1551-3023”,”type“:”print“},{“value”:“1941-050”,“type”:“electronic”}],“subject”:【】,“published”:{“date-parts”:【2020,1】}}}}