ConnectionScore: a statistical technique to resist application-layer DDoS attacks View Full Text


Ontology type: schema:ScholarlyArticle     


Article Info

DATE

2014-06

AUTHORS

Hakem Beitollahi, Geert Deconinck

ABSTRACT

In an application-layer distributed denial of service (DDoS) attack, zombie machines send a large number of legitimate requests to the victim server. Since these requests have legitimate formats and are sent through normal TCP connections, intrusion detection systems cannot detect them. In these attacks, an adversary does not saturate the bandwidth of the victim server through inbound traffic, but through outbound traffic. The next aim of the adversary is to consume and exhaust computational resources (e.g., CPU cycles), memory resources, TCP/IP stack, resources of input/output devices, etc. This paper proposes a novel scheme which is called ConnectionScore to resist such DDoS attacks. During the attack time, any connection is scored based on history and statistical analysis which has been done during the normal condition. The bottleneck resources are retaken from those connections which take lower scores. Our analysis shows that connections established by the adversary give low scores. In fact, the ConnectionScore technique can estimate legitimacy of connections with high probability. The rate of suspicious connections being dropped is adjusted based on the current level of overload of the server and a threshold-level of free resources. To evaluate the performance of the scheme, we perform experiments in the Emulab environment using real traceroute data of the ClarkNet WWW server (http://ita.ee.lbl.gov/html/contrib/ClarkNet-HTTP.html). More... »

PAGES

425-442

References to SciGraph publications

  • 2006. Enhanced CAPTCHAs: Using Animation to Tell Humans and Computers Apart in COMMUNICATIONS AND MULTIMEDIA SECURITY
  • 2013-04. Preserving quality of service for normal users against DDoS attacks by using Double Check Priority Queues in JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING
  • Identifiers

    URI

    http://scigraph.springernature.com/pub.10.1007/s12652-013-0196-5

    DOI

    http://dx.doi.org/10.1007/s12652-013-0196-5

    DIMENSIONS

    https://app.dimensions.ai/details/publication/pub.1051725491


    Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
    Incoming Citations Browse incoming citations for this publication using opencitations.net

    JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "about": [
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0801", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Artificial Intelligence and Image Processing", 
            "type": "DefinedTerm"
          }, 
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Information and Computing Sciences", 
            "type": "DefinedTerm"
          }
        ], 
        "author": [
          {
            "affiliation": {
              "alternateName": "Soran University", 
              "id": "https://www.grid.ac/institutes/grid.449301.b", 
              "name": [
                "Soran University, Kurdistan Region, Soran, Iraq"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Beitollahi", 
            "givenName": "Hakem", 
            "id": "sg:person.014160110027.06", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014160110027.06"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "KU Leuven", 
              "id": "https://www.grid.ac/institutes/grid.5596.f", 
              "name": [
                "Electrical Engineering Department, University of Leuven, Kasteelpark Arenberg 10, Leuven, Belgium"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Deconinck", 
            "givenName": "Geert", 
            "id": "sg:person.01022745130.75", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.01022745130.75"
            ], 
            "type": "Person"
          }
        ], 
        "citation": [
          {
            "id": "https://doi.org/10.1145/1216370.1216373", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1008453551"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1016/j.comcom.2012.04.008", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1008509147"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/997150.997156", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1020238858"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/1059513.1059517", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1021060330"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s12652-011-0091-x", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1021122170", 
              "https://doi.org/10.1007/s12652-011-0091-x"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/637201.637210", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1024279033"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/11909033_9", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1034173570", 
              "https://doi.org/10.1007/11909033_9"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/11909033_9", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1034173570", 
              "https://doi.org/10.1007/11909033_9"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/948109.948114", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1053280172"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/90.929847", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1061247592"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/jsac.2003.818778", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1061316500"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/tdsc.2008.13", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1061585172"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/tnet.2004.842221", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1061714510"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/tnet.2008.923716", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1061715032"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/tpds.2007.1014", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1061753058"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/iccias.2006.295444", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1093238444"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/icc.2009.5199191", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1093512027"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/infcomw.2011.5928950", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1093792229"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/infocom.2006.127", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1094040068"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/cvpr.2003.1211347", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1094946979"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/icc.2011.5963009", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1095002109"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/icnsc.2007.372823", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1095097734"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/pacrim.2007.4313218", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1095156541"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/iccsit.2010.5564874", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1095255201"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/781027.781067", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1098892941"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://app.dimensions.ai/details/publication/pub.1109387615", 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://app.dimensions.ai/details/publication/pub.1109387615", 
            "type": "CreativeWork"
          }
        ], 
        "datePublished": "2014-06", 
        "datePublishedReg": "2014-06-01", 
        "description": "In an application-layer distributed denial of service (DDoS) attack, zombie machines send a large number of legitimate requests to the victim server. Since these requests have legitimate formats and are sent through normal TCP connections, intrusion detection systems cannot detect them. In these attacks, an adversary does not saturate the bandwidth of the victim server through inbound traffic, but through outbound traffic. The next aim of the adversary is to consume and exhaust computational resources (e.g., CPU cycles), memory resources, TCP/IP stack, resources of input/output devices, etc. This paper proposes a novel scheme which is called ConnectionScore to resist such DDoS attacks. During the attack time, any connection is scored based on history and statistical analysis which has been done during the normal condition. The bottleneck resources are retaken from those connections which take lower scores. Our analysis shows that connections established by the adversary give low scores. In fact, the ConnectionScore technique can estimate legitimacy of connections with high probability. The rate of suspicious connections being dropped is adjusted based on the current level of overload of the server and a threshold-level of free resources. To evaluate the performance of the scheme, we perform experiments in the Emulab environment using real traceroute data of the ClarkNet WWW server (http://ita.ee.lbl.gov/html/contrib/ClarkNet-HTTP.html).", 
        "genre": "research_article", 
        "id": "sg:pub.10.1007/s12652-013-0196-5", 
        "inLanguage": [
          "en"
        ], 
        "isAccessibleForFree": false, 
        "isPartOf": [
          {
            "id": "sg:journal.1043999", 
            "issn": [
              "1868-5137", 
              "1868-5145"
            ], 
            "name": "Journal of Ambient Intelligence and Humanized Computing", 
            "type": "Periodical"
          }, 
          {
            "issueNumber": "3", 
            "type": "PublicationIssue"
          }, 
          {
            "type": "PublicationVolume", 
            "volumeNumber": "5"
          }
        ], 
        "name": "ConnectionScore: a statistical technique to resist application-layer DDoS attacks", 
        "pagination": "425-442", 
        "productId": [
          {
            "name": "readcube_id", 
            "type": "PropertyValue", 
            "value": [
              "f664c006094666d9e29b368f30d96a6d7ffe843b34f342349064e0b064401c4a"
            ]
          }, 
          {
            "name": "doi", 
            "type": "PropertyValue", 
            "value": [
              "10.1007/s12652-013-0196-5"
            ]
          }, 
          {
            "name": "dimensions_id", 
            "type": "PropertyValue", 
            "value": [
              "pub.1051725491"
            ]
          }
        ], 
        "sameAs": [
          "https://doi.org/10.1007/s12652-013-0196-5", 
          "https://app.dimensions.ai/details/publication/pub.1051725491"
        ], 
        "sdDataset": "articles", 
        "sdDatePublished": "2019-04-10T16:04", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000001_0000000264/records_8664_00000595.jsonl", 
        "type": "ScholarlyArticle", 
        "url": "http://link.springer.com/10.1007%2Fs12652-013-0196-5"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/s12652-013-0196-5'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/s12652-013-0196-5'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/s12652-013-0196-5'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/s12652-013-0196-5'


     

    This table displays all metadata directly associated to this object as RDF triples.

    147 TRIPLES      21 PREDICATES      52 URIs      19 LITERALS      7 BLANK NODES

    Subject Predicate Object
    1 sg:pub.10.1007/s12652-013-0196-5 schema:about anzsrc-for:08
    2 anzsrc-for:0801
    3 schema:author Na6d089a8c00146529bcaab54fb34b072
    4 schema:citation sg:pub.10.1007/11909033_9
    5 sg:pub.10.1007/s12652-011-0091-x
    6 https://app.dimensions.ai/details/publication/pub.1109387615
    7 https://doi.org/10.1016/j.comcom.2012.04.008
    8 https://doi.org/10.1109/90.929847
    9 https://doi.org/10.1109/cvpr.2003.1211347
    10 https://doi.org/10.1109/icc.2009.5199191
    11 https://doi.org/10.1109/icc.2011.5963009
    12 https://doi.org/10.1109/iccias.2006.295444
    13 https://doi.org/10.1109/iccsit.2010.5564874
    14 https://doi.org/10.1109/icnsc.2007.372823
    15 https://doi.org/10.1109/infcomw.2011.5928950
    16 https://doi.org/10.1109/infocom.2006.127
    17 https://doi.org/10.1109/jsac.2003.818778
    18 https://doi.org/10.1109/pacrim.2007.4313218
    19 https://doi.org/10.1109/tdsc.2008.13
    20 https://doi.org/10.1109/tnet.2004.842221
    21 https://doi.org/10.1109/tnet.2008.923716
    22 https://doi.org/10.1109/tpds.2007.1014
    23 https://doi.org/10.1145/1059513.1059517
    24 https://doi.org/10.1145/1216370.1216373
    25 https://doi.org/10.1145/637201.637210
    26 https://doi.org/10.1145/781027.781067
    27 https://doi.org/10.1145/948109.948114
    28 https://doi.org/10.1145/997150.997156
    29 schema:datePublished 2014-06
    30 schema:datePublishedReg 2014-06-01
    31 schema:description In an application-layer distributed denial of service (DDoS) attack, zombie machines send a large number of legitimate requests to the victim server. Since these requests have legitimate formats and are sent through normal TCP connections, intrusion detection systems cannot detect them. In these attacks, an adversary does not saturate the bandwidth of the victim server through inbound traffic, but through outbound traffic. The next aim of the adversary is to consume and exhaust computational resources (e.g., CPU cycles), memory resources, TCP/IP stack, resources of input/output devices, etc. This paper proposes a novel scheme which is called ConnectionScore to resist such DDoS attacks. During the attack time, any connection is scored based on history and statistical analysis which has been done during the normal condition. The bottleneck resources are retaken from those connections which take lower scores. Our analysis shows that connections established by the adversary give low scores. In fact, the ConnectionScore technique can estimate legitimacy of connections with high probability. The rate of suspicious connections being dropped is adjusted based on the current level of overload of the server and a threshold-level of free resources. To evaluate the performance of the scheme, we perform experiments in the Emulab environment using real traceroute data of the ClarkNet WWW server (http://ita.ee.lbl.gov/html/contrib/ClarkNet-HTTP.html).
    32 schema:genre research_article
    33 schema:inLanguage en
    34 schema:isAccessibleForFree false
    35 schema:isPartOf N4a56c03d5c4c4d66962fa3b2fff57cd1
    36 N731b98e62934405d86ca33f46476db86
    37 sg:journal.1043999
    38 schema:name ConnectionScore: a statistical technique to resist application-layer DDoS attacks
    39 schema:pagination 425-442
    40 schema:productId N0e7a227659354b06a0f160c5b73637aa
    41 N2e76e10cc3bc42e19ebf2516f87800b1
    42 N4873ebb0532b4dd28c1e05dcf4e73c8f
    43 schema:sameAs https://app.dimensions.ai/details/publication/pub.1051725491
    44 https://doi.org/10.1007/s12652-013-0196-5
    45 schema:sdDatePublished 2019-04-10T16:04
    46 schema:sdLicense https://scigraph.springernature.com/explorer/license/
    47 schema:sdPublisher N554e8ac62d6a4422850291bf379e5211
    48 schema:url http://link.springer.com/10.1007%2Fs12652-013-0196-5
    49 sgo:license sg:explorer/license/
    50 sgo:sdDataset articles
    51 rdf:type schema:ScholarlyArticle
    52 N0e7a227659354b06a0f160c5b73637aa schema:name dimensions_id
    53 schema:value pub.1051725491
    54 rdf:type schema:PropertyValue
    55 N2e76e10cc3bc42e19ebf2516f87800b1 schema:name doi
    56 schema:value 10.1007/s12652-013-0196-5
    57 rdf:type schema:PropertyValue
    58 N4873ebb0532b4dd28c1e05dcf4e73c8f schema:name readcube_id
    59 schema:value f664c006094666d9e29b368f30d96a6d7ffe843b34f342349064e0b064401c4a
    60 rdf:type schema:PropertyValue
    61 N4a56c03d5c4c4d66962fa3b2fff57cd1 schema:volumeNumber 5
    62 rdf:type schema:PublicationVolume
    63 N554e8ac62d6a4422850291bf379e5211 schema:name Springer Nature - SN SciGraph project
    64 rdf:type schema:Organization
    65 N731b98e62934405d86ca33f46476db86 schema:issueNumber 3
    66 rdf:type schema:PublicationIssue
    67 Na6d089a8c00146529bcaab54fb34b072 rdf:first sg:person.014160110027.06
    68 rdf:rest Nab0eb00e94cb41d189711d4f888e58dd
    69 Nab0eb00e94cb41d189711d4f888e58dd rdf:first sg:person.01022745130.75
    70 rdf:rest rdf:nil
    71 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
    72 schema:name Information and Computing Sciences
    73 rdf:type schema:DefinedTerm
    74 anzsrc-for:0801 schema:inDefinedTermSet anzsrc-for:
    75 schema:name Artificial Intelligence and Image Processing
    76 rdf:type schema:DefinedTerm
    77 sg:journal.1043999 schema:issn 1868-5137
    78 1868-5145
    79 schema:name Journal of Ambient Intelligence and Humanized Computing
    80 rdf:type schema:Periodical
    81 sg:person.01022745130.75 schema:affiliation https://www.grid.ac/institutes/grid.5596.f
    82 schema:familyName Deconinck
    83 schema:givenName Geert
    84 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.01022745130.75
    85 rdf:type schema:Person
    86 sg:person.014160110027.06 schema:affiliation https://www.grid.ac/institutes/grid.449301.b
    87 schema:familyName Beitollahi
    88 schema:givenName Hakem
    89 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014160110027.06
    90 rdf:type schema:Person
    91 sg:pub.10.1007/11909033_9 schema:sameAs https://app.dimensions.ai/details/publication/pub.1034173570
    92 https://doi.org/10.1007/11909033_9
    93 rdf:type schema:CreativeWork
    94 sg:pub.10.1007/s12652-011-0091-x schema:sameAs https://app.dimensions.ai/details/publication/pub.1021122170
    95 https://doi.org/10.1007/s12652-011-0091-x
    96 rdf:type schema:CreativeWork
    97 https://app.dimensions.ai/details/publication/pub.1109387615 schema:CreativeWork
    98 https://doi.org/10.1016/j.comcom.2012.04.008 schema:sameAs https://app.dimensions.ai/details/publication/pub.1008509147
    99 rdf:type schema:CreativeWork
    100 https://doi.org/10.1109/90.929847 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061247592
    101 rdf:type schema:CreativeWork
    102 https://doi.org/10.1109/cvpr.2003.1211347 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094946979
    103 rdf:type schema:CreativeWork
    104 https://doi.org/10.1109/icc.2009.5199191 schema:sameAs https://app.dimensions.ai/details/publication/pub.1093512027
    105 rdf:type schema:CreativeWork
    106 https://doi.org/10.1109/icc.2011.5963009 schema:sameAs https://app.dimensions.ai/details/publication/pub.1095002109
    107 rdf:type schema:CreativeWork
    108 https://doi.org/10.1109/iccias.2006.295444 schema:sameAs https://app.dimensions.ai/details/publication/pub.1093238444
    109 rdf:type schema:CreativeWork
    110 https://doi.org/10.1109/iccsit.2010.5564874 schema:sameAs https://app.dimensions.ai/details/publication/pub.1095255201
    111 rdf:type schema:CreativeWork
    112 https://doi.org/10.1109/icnsc.2007.372823 schema:sameAs https://app.dimensions.ai/details/publication/pub.1095097734
    113 rdf:type schema:CreativeWork
    114 https://doi.org/10.1109/infcomw.2011.5928950 schema:sameAs https://app.dimensions.ai/details/publication/pub.1093792229
    115 rdf:type schema:CreativeWork
    116 https://doi.org/10.1109/infocom.2006.127 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094040068
    117 rdf:type schema:CreativeWork
    118 https://doi.org/10.1109/jsac.2003.818778 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061316500
    119 rdf:type schema:CreativeWork
    120 https://doi.org/10.1109/pacrim.2007.4313218 schema:sameAs https://app.dimensions.ai/details/publication/pub.1095156541
    121 rdf:type schema:CreativeWork
    122 https://doi.org/10.1109/tdsc.2008.13 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061585172
    123 rdf:type schema:CreativeWork
    124 https://doi.org/10.1109/tnet.2004.842221 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061714510
    125 rdf:type schema:CreativeWork
    126 https://doi.org/10.1109/tnet.2008.923716 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061715032
    127 rdf:type schema:CreativeWork
    128 https://doi.org/10.1109/tpds.2007.1014 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061753058
    129 rdf:type schema:CreativeWork
    130 https://doi.org/10.1145/1059513.1059517 schema:sameAs https://app.dimensions.ai/details/publication/pub.1021060330
    131 rdf:type schema:CreativeWork
    132 https://doi.org/10.1145/1216370.1216373 schema:sameAs https://app.dimensions.ai/details/publication/pub.1008453551
    133 rdf:type schema:CreativeWork
    134 https://doi.org/10.1145/637201.637210 schema:sameAs https://app.dimensions.ai/details/publication/pub.1024279033
    135 rdf:type schema:CreativeWork
    136 https://doi.org/10.1145/781027.781067 schema:sameAs https://app.dimensions.ai/details/publication/pub.1098892941
    137 rdf:type schema:CreativeWork
    138 https://doi.org/10.1145/948109.948114 schema:sameAs https://app.dimensions.ai/details/publication/pub.1053280172
    139 rdf:type schema:CreativeWork
    140 https://doi.org/10.1145/997150.997156 schema:sameAs https://app.dimensions.ai/details/publication/pub.1020238858
    141 rdf:type schema:CreativeWork
    142 https://www.grid.ac/institutes/grid.449301.b schema:alternateName Soran University
    143 schema:name Soran University, Kurdistan Region, Soran, Iraq
    144 rdf:type schema:Organization
    145 https://www.grid.ac/institutes/grid.5596.f schema:alternateName KU Leuven
    146 schema:name Electrical Engineering Department, University of Leuven, Kasteelpark Arenberg 10, Leuven, Belgium
    147 rdf:type schema:Organization
     




    Preview window. Press ESC to close (or click here)


    ...