{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T16:01:39Z","timestamp":1725552099718},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540332374"},{"type":"electronic","value":"9783540332381"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11732242_26","type":"book-chapter","created":{"date-parts":[[2006,3,3]],"date-time":"2006-03-03T15:12:37Z","timestamp":1141398757000},"page":"286-295","source":"Crossref","is-referenced-by-count":3,"title":["Tracing Denial of Service Origin: Ant Colony Approach"],"prefix":"10.1007","author":[{"given":"Chia-Mei","family":"Chen","sequence":"first","affiliation":[]},{"given":"Bing Chiang","family":"Jeng","sequence":"additional","affiliation":[]},{"given":"Chia Ru","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Gu Hsin","family":"Lai","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"26_CR1","unstructured":"Computer Security Institute, CSI\/FBI Computer Crime and Security Survey (2003), \n                    \n                      http:\/\/www.crime-research.org\/news\/11.06.2004\/423\/"},{"issue":"3","key":"26_CR2","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1109\/90.929847","volume":"9","author":"S. Savage","year":"2001","unstructured":"Savage, S., Wetherall, D., Karlin, A., Anderson, T.: Network Support for IP Traceback. IEEE\/ACM Trans. Networking\u00a09(3), 226\u2013237 (2001)","journal-title":"IEEE\/ACM Trans. Networking"},{"key":"26_CR3","first-page":"878","volume-title":"Proc. IEEE INFOCOM","author":"D. Song","year":"2001","unstructured":"Song, D., Perrig, A.: Advanced and Authenticated Marking Schemes for IP Traceback. In: Proc. IEEE INFOCOM, pp. 878\u2013886. IEEE CS Press, Los Alamitos (2001)"},{"issue":"6","key":"26_CR4","doi-asserted-by":"crossref","first-page":"721","DOI":"10.1109\/TNET.2002.804827","volume":"10","author":"A.C. Soneren","year":"2002","unstructured":"Soneren, A.C., Partridge, C., Sanchez, L.A., Jones, C.E., Tachakountio, F., Schwartz, B., Kent, S.T., Strayer, W.T.: Single-packet IP Traceback, IEEE\/ACM Trans. Networking, \u00a010(6), 721\u2013734 (2002)","journal-title":"IEEE\/ACM Trans. Networking"},{"key":"26_CR5","doi-asserted-by":"crossref","unstructured":"Strayer, W.T., Jones, C.E., Tachakountio, F., Schwartz, B., Clements, R.C., Condell, M., Partridge, C.: \u201dTraceback of Single IP Packets Using SPIE,\u201d Proc. DARPA information Survivability Conference and Exposition\u2013 vol. 2 April 22 -24, Washington, DC. pp. 266 (2003)","DOI":"10.1109\/DISCEX.2003.1194976"},{"key":"26_CR6","unstructured":"Upton, G.: Swarm Intelligence, \n                    \n                      http:\/\/www.cs.earlham.edu\/~uptongl\/project\/Swarm_Intelligence.html"},{"key":"26_CR7","unstructured":"Dorigo, M., Maniezzo, V., Colorni, A.: \u201d The Ant System: An Autocatalytic Optimizing Process,\u201d Technical Report No. 91-016 Revised, Politecnico di Milano, Italy (1991)"},{"key":"26_CR8","unstructured":"Gong, Y.: Detecting Worms and Abnormal Activities with NetFlow, \n                    \n                      http:\/\/www.securityfocus.com\/infocus\/1796"},{"key":"26_CR9","unstructured":"Scientific Linux, \n                    \n                      https:\/\/www.scientificlinux.org\/"},{"key":"26_CR10","unstructured":"Flow-tools information, \n                    \n                      http:\/\/www.splintered.net\/sw\/flow-tools\/"},{"key":"26_CR11","unstructured":"Stanford Stream data manager, \n                    \n                      http:\/\/www-db.stanford.edu\/stream\/"},{"key":"26_CR12","unstructured":"VMware, \n                    \n                      http:\/\/www.vmware.com\/"},{"key":"26_CR13","unstructured":"zebra, \n                    \n                      http:\/\/www.zebra.org\/"},{"key":"26_CR14","unstructured":"fprobe, \n                    \n                      http:\/\/fprobe.sourceforge.net\/"},{"key":"26_CR15","unstructured":"hping, \n                    \n                      http:\/\/www.hping.org\/"}],"container-title":["Lecture Notes in Computer Science","Applications of Evolutionary Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11732242_26.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:52:20Z","timestamp":1619506340000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11732242_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540332374","9783540332381"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/11732242_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}