ConnectionScore: a statistical technique to resist application-layer DDoS attacks View Full Text


Ontology type: schema:ScholarlyArticle     


Article Info

DATE

2014-06

AUTHORS

Hakem Beitollahi, Geert Deconinck

ABSTRACT

In an application-layer distributed denial of service (DDoS) attack, zombie machines send a large number of legitimate requests to the victim server. Since these requests have legitimate formats and are sent through normal TCP connections, intrusion detection systems cannot detect them. In these attacks, an adversary does not saturate the bandwidth of the victim server through inbound traffic, but through outbound traffic. The next aim of the adversary is to consume and exhaust computational resources (e.g., CPU cycles), memory resources, TCP/IP stack, resources of input/output devices, etc. This paper proposes a novel scheme which is called ConnectionScore to resist such DDoS attacks. During the attack time, any connection is scored based on history and statistical analysis which has been done during the normal condition. The bottleneck resources are retaken from those connections which take lower scores. Our analysis shows that connections established by the adversary give low scores. In fact, the ConnectionScore technique can estimate legitimacy of connections with high probability. The rate of suspicious connections being dropped is adjusted based on the current level of overload of the server and a threshold-level of free resources. To evaluate the performance of the scheme, we perform experiments in the Emulab environment using real traceroute data of the ClarkNet WWW server (http://ita.ee.lbl.gov/html/contrib/ClarkNet-HTTP.html). More... »

PAGES

425-442

References to SciGraph publications

  • 2006. Enhanced CAPTCHAs: Using Animation to Tell Humans and Computers Apart in COMMUNICATIONS AND MULTIMEDIA SECURITY
  • 2013-04. Preserving quality of service for normal users against DDoS attacks by using Double Check Priority Queues in JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING
  • Identifiers

    URI

    http://scigraph.springernature.com/pub.10.1007/s12652-013-0196-5

    DOI

    http://dx.doi.org/10.1007/s12652-013-0196-5

    DIMENSIONS

    https://app.dimensions.ai/details/publication/pub.1051725491


    Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
    Incoming Citations Browse incoming citations for this publication using opencitations.net

    JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "about": [
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0801", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Artificial Intelligence and Image Processing", 
            "type": "DefinedTerm"
          }, 
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Information and Computing Sciences", 
            "type": "DefinedTerm"
          }
        ], 
        "author": [
          {
            "affiliation": {
              "alternateName": "Soran University", 
              "id": "https://www.grid.ac/institutes/grid.449301.b", 
              "name": [
                "Soran University, Kurdistan Region, Soran, Iraq"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Beitollahi", 
            "givenName": "Hakem", 
            "id": "sg:person.014160110027.06", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014160110027.06"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "KU Leuven", 
              "id": "https://www.grid.ac/institutes/grid.5596.f", 
              "name": [
                "Electrical Engineering Department, University of Leuven, Kasteelpark Arenberg 10, Leuven, Belgium"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Deconinck", 
            "givenName": "Geert", 
            "id": "sg:person.01022745130.75", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.01022745130.75"
            ], 
            "type": "Person"
          }
        ], 
        "citation": [
          {
            "id": "https://doi.org/10.1145/1216370.1216373", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1008453551"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1016/j.comcom.2012.04.008", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1008509147"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/997150.997156", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1020238858"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/1059513.1059517", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1021060330"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s12652-011-0091-x", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1021122170", 
              "https://doi.org/10.1007/s12652-011-0091-x"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/637201.637210", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1024279033"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/11909033_9", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1034173570", 
              "https://doi.org/10.1007/11909033_9"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/11909033_9", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1034173570", 
              "https://doi.org/10.1007/11909033_9"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/948109.948114", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1053280172"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/90.929847", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1061247592"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/jsac.2003.818778", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1061316500"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/tdsc.2008.13", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1061585172"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/tnet.2004.842221", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1061714510"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/tnet.2008.923716", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1061715032"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/tpds.2007.1014", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1061753058"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/iccias.2006.295444", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1093238444"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/icc.2009.5199191", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1093512027"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/infcomw.2011.5928950", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1093792229"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/infocom.2006.127", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1094040068"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/cvpr.2003.1211347", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1094946979"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/icc.2011.5963009", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1095002109"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/icnsc.2007.372823", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1095097734"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/pacrim.2007.4313218", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1095156541"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/iccsit.2010.5564874", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1095255201"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/781027.781067", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1098892941"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://app.dimensions.ai/details/publication/pub.1109387615", 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://app.dimensions.ai/details/publication/pub.1109387615", 
            "type": "CreativeWork"
          }
        ], 
        "datePublished": "2014-06", 
        "datePublishedReg": "2014-06-01", 
        "description": "In an application-layer distributed denial of service (DDoS) attack, zombie machines send a large number of legitimate requests to the victim server. Since these requests have legitimate formats and are sent through normal TCP connections, intrusion detection systems cannot detect them. In these attacks, an adversary does not saturate the bandwidth of the victim server through inbound traffic, but through outbound traffic. The next aim of the adversary is to consume and exhaust computational resources (e.g., CPU cycles), memory resources, TCP/IP stack, resources of input/output devices, etc. This paper proposes a novel scheme which is called ConnectionScore to resist such DDoS attacks. During the attack time, any connection is scored based on history and statistical analysis which has been done during the normal condition. The bottleneck resources are retaken from those connections which take lower scores. Our analysis shows that connections established by the adversary give low scores. In fact, the ConnectionScore technique can estimate legitimacy of connections with high probability. The rate of suspicious connections being dropped is adjusted based on the current level of overload of the server and a threshold-level of free resources. To evaluate the performance of the scheme, we perform experiments in the Emulab environment using real traceroute data of the ClarkNet WWW server (http://ita.ee.lbl.gov/html/contrib/ClarkNet-HTTP.html).", 
        "genre": "research_article", 
        "id": "sg:pub.10.1007/s12652-013-0196-5", 
        "inLanguage": [
          "en"
        ], 
        "isAccessibleForFree": false, 
        "isPartOf": [
          {
            "id": "sg:journal.1043999", 
            "issn": [
              "1868-5137", 
              "1868-5145"
            ], 
            "name": "Journal of Ambient Intelligence and Humanized Computing", 
            "type": "Periodical"
          }, 
          {
            "issueNumber": "3", 
            "type": "PublicationIssue"
          }, 
          {
            "type": "PublicationVolume", 
            "volumeNumber": "5"
          }
        ], 
        "name": "ConnectionScore: a statistical technique to resist application-layer DDoS attacks", 
        "pagination": "425-442", 
        "productId": [
          {
            "name": "readcube_id", 
            "type": "PropertyValue", 
            "value": [
              "f664c006094666d9e29b368f30d96a6d7ffe843b34f342349064e0b064401c4a"
            ]
          }, 
          {
            "name": "doi", 
            "type": "PropertyValue", 
            "value": [
              "10.1007/s12652-013-0196-5"
            ]
          }, 
          {
            "name": "dimensions_id", 
            "type": "PropertyValue", 
            "value": [
              "pub.1051725491"
            ]
          }
        ], 
        "sameAs": [
          "https://doi.org/10.1007/s12652-013-0196-5", 
          "https://app.dimensions.ai/details/publication/pub.1051725491"
        ], 
        "sdDataset": "articles", 
        "sdDatePublished": "2019-04-10T16:04", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000001_0000000264/records_8664_00000595.jsonl", 
        "type": "ScholarlyArticle", 
        "url": "http://link.springer.com/10.1007%2Fs12652-013-0196-5"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/s12652-013-0196-5'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/s12652-013-0196-5'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/s12652-013-0196-5'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/s12652-013-0196-5'


     

    This table displays all metadata directly associated to this object as RDF triples.

    147 TRIPLES      21 PREDICATES      52 URIs      19 LITERALS      7 BLANK NODES

    Subject Predicate Object
    1 sg:pub.10.1007/s12652-013-0196-5 schema:about anzsrc-for:08
    2 anzsrc-for:0801
    3 schema:author N697be4eca9964cbf98e35a83ebb6b26b
    4 schema:citation sg:pub.10.1007/11909033_9
    5 sg:pub.10.1007/s12652-011-0091-x
    6 https://app.dimensions.ai/details/publication/pub.1109387615
    7 https://doi.org/10.1016/j.comcom.2012.04.008
    8 https://doi.org/10.1109/90.929847
    9 https://doi.org/10.1109/cvpr.2003.1211347
    10 https://doi.org/10.1109/icc.2009.5199191
    11 https://doi.org/10.1109/icc.2011.5963009
    12 https://doi.org/10.1109/iccias.2006.295444
    13 https://doi.org/10.1109/iccsit.2010.5564874
    14 https://doi.org/10.1109/icnsc.2007.372823
    15 https://doi.org/10.1109/infcomw.2011.5928950
    16 https://doi.org/10.1109/infocom.2006.127
    17 https://doi.org/10.1109/jsac.2003.818778
    18 https://doi.org/10.1109/pacrim.2007.4313218
    19 https://doi.org/10.1109/tdsc.2008.13
    20 https://doi.org/10.1109/tnet.2004.842221
    21 https://doi.org/10.1109/tnet.2008.923716
    22 https://doi.org/10.1109/tpds.2007.1014
    23 https://doi.org/10.1145/1059513.1059517
    24 https://doi.org/10.1145/1216370.1216373
    25 https://doi.org/10.1145/637201.637210
    26 https://doi.org/10.1145/781027.781067
    27 https://doi.org/10.1145/948109.948114
    28 https://doi.org/10.1145/997150.997156
    29 schema:datePublished 2014-06
    30 schema:datePublishedReg 2014-06-01
    31 schema:description In an application-layer distributed denial of service (DDoS) attack, zombie machines send a large number of legitimate requests to the victim server. Since these requests have legitimate formats and are sent through normal TCP connections, intrusion detection systems cannot detect them. In these attacks, an adversary does not saturate the bandwidth of the victim server through inbound traffic, but through outbound traffic. The next aim of the adversary is to consume and exhaust computational resources (e.g., CPU cycles), memory resources, TCP/IP stack, resources of input/output devices, etc. This paper proposes a novel scheme which is called ConnectionScore to resist such DDoS attacks. During the attack time, any connection is scored based on history and statistical analysis which has been done during the normal condition. The bottleneck resources are retaken from those connections which take lower scores. Our analysis shows that connections established by the adversary give low scores. In fact, the ConnectionScore technique can estimate legitimacy of connections with high probability. The rate of suspicious connections being dropped is adjusted based on the current level of overload of the server and a threshold-level of free resources. To evaluate the performance of the scheme, we perform experiments in the Emulab environment using real traceroute data of the ClarkNet WWW server (http://ita.ee.lbl.gov/html/contrib/ClarkNet-HTTP.html).
    32 schema:genre research_article
    33 schema:inLanguage en
    34 schema:isAccessibleForFree false
    35 schema:isPartOf N6b41bd09c99b4299a0c7b4fb4ecae193
    36 Ne93fd85cb7154e20bcdd602f06401f05
    37 sg:journal.1043999
    38 schema:name ConnectionScore: a statistical technique to resist application-layer DDoS attacks
    39 schema:pagination 425-442
    40 schema:productId N4e674e2f2aad4d6bb2273706d93012ce
    41 Ndb96bc6524144d6da2c97aff705cd239
    42 Nf57bb798a0f24604b42e6498c0e00e68
    43 schema:sameAs https://app.dimensions.ai/details/publication/pub.1051725491
    44 https://doi.org/10.1007/s12652-013-0196-5
    45 schema:sdDatePublished 2019-04-10T16:04
    46 schema:sdLicense https://scigraph.springernature.com/explorer/license/
    47 schema:sdPublisher N01ab7e57b89d45b48ab59599d44975b2
    48 schema:url http://link.springer.com/10.1007%2Fs12652-013-0196-5
    49 sgo:license sg:explorer/license/
    50 sgo:sdDataset articles
    51 rdf:type schema:ScholarlyArticle
    52 N01ab7e57b89d45b48ab59599d44975b2 schema:name Springer Nature - SN SciGraph project
    53 rdf:type schema:Organization
    54 N2830950e853843b88e7d254eff231869 rdf:first sg:person.01022745130.75
    55 rdf:rest rdf:nil
    56 N4e674e2f2aad4d6bb2273706d93012ce schema:name readcube_id
    57 schema:value f664c006094666d9e29b368f30d96a6d7ffe843b34f342349064e0b064401c4a
    58 rdf:type schema:PropertyValue
    59 N697be4eca9964cbf98e35a83ebb6b26b rdf:first sg:person.014160110027.06
    60 rdf:rest N2830950e853843b88e7d254eff231869
    61 N6b41bd09c99b4299a0c7b4fb4ecae193 schema:issueNumber 3
    62 rdf:type schema:PublicationIssue
    63 Ndb96bc6524144d6da2c97aff705cd239 schema:name doi
    64 schema:value 10.1007/s12652-013-0196-5
    65 rdf:type schema:PropertyValue
    66 Ne93fd85cb7154e20bcdd602f06401f05 schema:volumeNumber 5
    67 rdf:type schema:PublicationVolume
    68 Nf57bb798a0f24604b42e6498c0e00e68 schema:name dimensions_id
    69 schema:value pub.1051725491
    70 rdf:type schema:PropertyValue
    71 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
    72 schema:name Information and Computing Sciences
    73 rdf:type schema:DefinedTerm
    74 anzsrc-for:0801 schema:inDefinedTermSet anzsrc-for:
    75 schema:name Artificial Intelligence and Image Processing
    76 rdf:type schema:DefinedTerm
    77 sg:journal.1043999 schema:issn 1868-5137
    78 1868-5145
    79 schema:name Journal of Ambient Intelligence and Humanized Computing
    80 rdf:type schema:Periodical
    81 sg:person.01022745130.75 schema:affiliation https://www.grid.ac/institutes/grid.5596.f
    82 schema:familyName Deconinck
    83 schema:givenName Geert
    84 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.01022745130.75
    85 rdf:type schema:Person
    86 sg:person.014160110027.06 schema:affiliation https://www.grid.ac/institutes/grid.449301.b
    87 schema:familyName Beitollahi
    88 schema:givenName Hakem
    89 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014160110027.06
    90 rdf:type schema:Person
    91 sg:pub.10.1007/11909033_9 schema:sameAs https://app.dimensions.ai/details/publication/pub.1034173570
    92 https://doi.org/10.1007/11909033_9
    93 rdf:type schema:CreativeWork
    94 sg:pub.10.1007/s12652-011-0091-x schema:sameAs https://app.dimensions.ai/details/publication/pub.1021122170
    95 https://doi.org/10.1007/s12652-011-0091-x
    96 rdf:type schema:CreativeWork
    97 https://app.dimensions.ai/details/publication/pub.1109387615 schema:CreativeWork
    98 https://doi.org/10.1016/j.comcom.2012.04.008 schema:sameAs https://app.dimensions.ai/details/publication/pub.1008509147
    99 rdf:type schema:CreativeWork
    100 https://doi.org/10.1109/90.929847 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061247592
    101 rdf:type schema:CreativeWork
    102 https://doi.org/10.1109/cvpr.2003.1211347 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094946979
    103 rdf:type schema:CreativeWork
    104 https://doi.org/10.1109/icc.2009.5199191 schema:sameAs https://app.dimensions.ai/details/publication/pub.1093512027
    105 rdf:type schema:CreativeWork
    106 https://doi.org/10.1109/icc.2011.5963009 schema:sameAs https://app.dimensions.ai/details/publication/pub.1095002109
    107 rdf:type schema:CreativeWork
    108 https://doi.org/10.1109/iccias.2006.295444 schema:sameAs https://app.dimensions.ai/details/publication/pub.1093238444
    109 rdf:type schema:CreativeWork
    110 https://doi.org/10.1109/iccsit.2010.5564874 schema:sameAs https://app.dimensions.ai/details/publication/pub.1095255201
    111 rdf:type schema:CreativeWork
    112 https://doi.org/10.1109/icnsc.2007.372823 schema:sameAs https://app.dimensions.ai/details/publication/pub.1095097734
    113 rdf:type schema:CreativeWork
    114 https://doi.org/10.1109/infcomw.2011.5928950 schema:sameAs https://app.dimensions.ai/details/publication/pub.1093792229
    115 rdf:type schema:CreativeWork
    116 https://doi.org/10.1109/infocom.2006.127 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094040068
    117 rdf:type schema:CreativeWork
    118 https://doi.org/10.1109/jsac.2003.818778 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061316500
    119 rdf:type schema:CreativeWork
    120 https://doi.org/10.1109/pacrim.2007.4313218 schema:sameAs https://app.dimensions.ai/details/publication/pub.1095156541
    121 rdf:type schema:CreativeWork
    122 https://doi.org/10.1109/tdsc.2008.13 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061585172
    123 rdf:type schema:CreativeWork
    124 https://doi.org/10.1109/tnet.2004.842221 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061714510
    125 rdf:type schema:CreativeWork
    126 https://doi.org/10.1109/tnet.2008.923716 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061715032
    127 rdf:type schema:CreativeWork
    128 https://doi.org/10.1109/tpds.2007.1014 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061753058
    129 rdf:type schema:CreativeWork
    130 https://doi.org/10.1145/1059513.1059517 schema:sameAs https://app.dimensions.ai/details/publication/pub.1021060330
    131 rdf:type schema:CreativeWork
    132 https://doi.org/10.1145/1216370.1216373 schema:sameAs https://app.dimensions.ai/details/publication/pub.1008453551
    133 rdf:type schema:CreativeWork
    134 https://doi.org/10.1145/637201.637210 schema:sameAs https://app.dimensions.ai/details/publication/pub.1024279033
    135 rdf:type schema:CreativeWork
    136 https://doi.org/10.1145/781027.781067 schema:sameAs https://app.dimensions.ai/details/publication/pub.1098892941
    137 rdf:type schema:CreativeWork
    138 https://doi.org/10.1145/948109.948114 schema:sameAs https://app.dimensions.ai/details/publication/pub.1053280172
    139 rdf:type schema:CreativeWork
    140 https://doi.org/10.1145/997150.997156 schema:sameAs https://app.dimensions.ai/details/publication/pub.1020238858
    141 rdf:type schema:CreativeWork
    142 https://www.grid.ac/institutes/grid.449301.b schema:alternateName Soran University
    143 schema:name Soran University, Kurdistan Region, Soran, Iraq
    144 rdf:type schema:Organization
    145 https://www.grid.ac/institutes/grid.5596.f schema:alternateName KU Leuven
    146 schema:name Electrical Engineering Department, University of Leuven, Kasteelpark Arenberg 10, Leuven, Belgium
    147 rdf:type schema:Organization
     




    Preview window. Press ESC to close (or click here)


    ...