{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,11]],"date-time":"2025-01-11T05:37:37Z","timestamp":1736573857777,"version":"3.32.0"},"publisher-location":"Berlin, Heidelberg","reference-count":7,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540457763"},{"type":"electronic","value":"9783540462330"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11876601_65","type":"book-chapter","created":{"date-parts":[[2006,9,26]],"date-time":"2006-09-26T14:46:45Z","timestamp":1159282005000},"page":"558-561","source":"Crossref","is-referenced-by-count":1,"title":["IP Traceback Algorithm for DoS\/DDoS Attack"],"prefix":"10.1007","author":[{"given":"Hong-bin","family":"Yim","sequence":"first","affiliation":[]},{"given":"Jae-il","family":"Jung","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"65_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1007\/978-3-540-39927-8_12","volume-title":"Information and Communications Security","author":"H.C.J. Lee","year":"2003","unstructured":"Lee, H.C.J., Thing, V.L.L., Xu, Y., Ma, M.: ICMP Traceback with Cumulative Path, an Efficient Solution for IP Traceback. In: Qing, S., Gollmann, D., Zhou, J. (eds.) ICICS 2003. LNCS, vol.\u00a02836, pp. 124\u2013135. Springer, Heidelberg (2003)"},{"key":"65_CR2","unstructured":"Internet Protocol : Darpa Internet Program Protocol Specificatio, RFC791"},{"key":"65_CR3","unstructured":"Park, K., Lee, H.: On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack. In: Proc. IEEE INFOCOM 2001, pp. 338\u2013347 (2001)"},{"key":"65_CR4","doi-asserted-by":"crossref","unstructured":"Song, D.X., Perrig, A.: Advanced and Authenticated Marking Scheme for IP Traceback. In: Proc. infocom, vol.\u00a02, pp. 878\u2013886 (2001)","DOI":"10.1109\/INFCOM.2001.916279"},{"key":"65_CR5","unstructured":"Kai, C., Xiaoxin, H., Ruibing, H.: DDoS Scouter: A Simple IP Traceback Scheme, http:\/\/blrc.edu.cn\/blrcweb\/publication\/kc1.pdf"},{"key":"65_CR6","doi-asserted-by":"crossref","unstructured":"Savage, S., Wetherall, D., Karlin, A., Anderson, T.: Practical Network Support for IP Traceback. In: SIGCOMM (2000)","DOI":"10.1145\/347059.347560"},{"key":"65_CR7","doi-asserted-by":"crossref","unstructured":"Stoica, I., Zhang, H.: Providing Guaranteed Services Without Per Flow Management. In: SIGCOMM (1999)","DOI":"10.21236\/ADA368424"}],"container-title":["Lecture Notes in Computer Science","Management of Convergence Networks and Services"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11876601_65","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,11]],"date-time":"2025-01-11T00:55:23Z","timestamp":1736556923000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11876601_65"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540457763","9783540462330"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/11876601_65","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}