{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T03:21:24Z","timestamp":1743132084215,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540494966"},{"type":"electronic","value":"9783540494973"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11935308_20","type":"book-chapter","created":{"date-parts":[[2006,11,15]],"date-time":"2006-11-15T06:26:42Z","timestamp":1163572002000},"page":"282-291","source":"Crossref","is-referenced-by-count":3,"title":["Mathematical Foundations for the Design of a Low-Rate DoS Attack to Iterative Servers (Short Paper)"],"prefix":"10.1007","author":[{"given":"Gabriel","family":"Maci\u00e1-Fern\u00e1ndez","sequence":"first","affiliation":[]},{"given":"Jes\u00fas E.","family":"D\u00edaz-Verdejo","sequence":"additional","affiliation":[]},{"given":"Pedro","family":"Garc\u00eda-Teodoro","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"20_CR1","unstructured":"CERT coordination Center. Denial of Service Attacks, available from: \n                    \n                      http:\/\/www.cert.org\/tech_tips\/denial_of_service.html"},{"key":"20_CR2","unstructured":"Williams, M.: Ebay, Amazon, Buy.com hit by attacks, 02\/09\/00. IDG News Service (02\/09\/2000), \n                    \n                      http:\/\/www.nwfusion.com\/news\/2000\/0209attack.html"},{"key":"20_CR3","unstructured":"Global Incident Analysis Center - Special Notice - Egress filtering, available from: \n                    \n                      http:\/\/www.sans.org\/y2k\/egress.htm"},{"key":"20_CR4","doi-asserted-by":"crossref","unstructured":"Ferguson, P., Senie, D.: Network ingress filtering: defeating Denial of Service attacks which employ IP source address spoofing. RFC 2827 (2001)","DOI":"10.17487\/rfc2827"},{"issue":"4","key":"20_CR5","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/6294.869381","volume":"2","author":"X. Geng","year":"2000","unstructured":"Geng, X., Whinston, A.B.: Defeating Distributed Denial of Service attacks. IEEE IT Professional\u00a02(4), 36\u201342 (2000)","journal-title":"IEEE IT Professional"},{"key":"20_CR6","unstructured":"Weiler, N.: Honeypots for Distributed Denial of Service. In: Proceedings of the Eleventh IEEE International Workshops Enabling Technologies: Infrastructure for Collaborative Enterprises 2002, Pitsburgh, PA, USA, June 2002, pp. 109\u2013114 (2002)"},{"key":"20_CR7","unstructured":"Axelsson, S.: Intrusion detection systems: a survey and taxonomy. Department of Computer Engineering, Chalmers University, Goteborg, Sweden. Technical Report 99-15 (March 2000)"},{"key":"20_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/11734666_5","volume-title":"Security in Pervasive Computing","author":"G. Maci\u00e1-Fern\u00e1ndez","year":"2006","unstructured":"Maci\u00e1-Fern\u00e1ndez, G., D\u00edaz-Verdejo, J.E., Garc\u00eda-Teodoro, P.: Low Rate DoS Attack to Monoprocess Servers. In: Clark, J.A., Paige, R.F., Polack, F.A.C., Brooke, P.J. (eds.) SPC 2006. LNCS, vol.\u00a03934, pp. 43\u201357. Springer, Heidelberg (2006)"},{"key":"20_CR9","doi-asserted-by":"crossref","unstructured":"Kuzmanovic, A., Knightly, E.: Low Rate TCP-targeted Denial of Service Attacks (The Shrew vs. the Mice and Elephants). In: Proc. ACM SIGCOMM 2003, August 2003, pp. 75\u201386 (2003)","DOI":"10.1145\/863965.863966"},{"key":"20_CR10","unstructured":"Sun, H., Lui, J.C.S., Yau, D.K.Y.: Defending Against Low-Rate TCP Attacks: Dynamic Detection and Protection. In: Proc. IEEE Conference on Network Protocols (ICNP 2004), October 2004, pp. 196\u2013205 (2004)"},{"issue":"4","key":"20_CR11","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1109\/LCOMM.2005.1413635","volume":"9","author":"A. Shevtekar","year":"2005","unstructured":"Shevtekar, A., Anantharam, K., Ansari, N.: Low Rate TCP Denial-of-Service Attack Detection at Edge Routers. IEEE Communications Letters\u00a09(4), 363\u2013365 (2005)","journal-title":"IEEE Communications Letters"},{"key":"20_CR12","unstructured":"Network Simulator 2, available at: \n                    \n                      http:\/\/www.isi.edu\/nsnam\/ns\/"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11935308_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,25]],"date-time":"2019-08-25T20:08:51Z","timestamp":1566763731000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11935308_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540494966","9783540494973"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/11935308_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}