{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T22:41:24Z","timestamp":1743028884456,"version":"3.40.3"},"publisher-location":"Boston, MA","reference-count":10,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9781441959058"},{"type":"electronic","value":"9781441959065"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-1-4419-5906-5_277","type":"book-chapter","created":{"date-parts":[[2011,10,27]],"date-time":"2011-10-27T13:50:45Z","timestamp":1319723445000},"page":"1279-1281","source":"Crossref","is-referenced-by-count":0,"title":["TCP Modulation Attacks"],"prefix":"10.1007","author":[{"given":"Angelos","family":"Stavrou","sequence":"first","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"277_CR1_277","doi-asserted-by":"publisher","first-page":"683","DOI":"10.1109\/TNET.2006.880180","volume":"14","author":"A Kuzmanovic","year":"2006","unstructured":"Kuzmanovic A, Knightly EW (2006) Low-rate TCP-targeted denial of service attacks and counter strategies. IEEE\/ACM Trans Netw 14(4):683\u2013696","journal-title":"IEEE\/ACM Trans Netw"},{"key":"277_CR2_277","unstructured":"Kuzmanovic A, Knightly EW (2003) Low-rate TCP-targeted denial of service attacks: the shrew vs. the mice and elephants. In: Proceedings of the 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications. Karlsruhe, Germany. SIGCOMM \u201903. ACM, New York, NY, pp\u00a075\u201386"},{"key":"277_CR3_277","first-page":"263","volume-title":"On estimating end-to-end network path properties","author":"M Allman","year":"1999","unstructured":"Allman M, Paxson V (1999) On estimating end-to-end network path properties. In: ACM SIGCOMM, Vancouver, BC, Canada, pp\u00a0263\u2013274"},{"issue":"4","key":"277_CR4_277","doi-asserted-by":"publisher","first-page":"364","DOI":"10.1145\/118544.118549","volume":"9","author":"P Karn","year":"1991","unstructured":"Karn P, Partridge C (1991) Improving round-trip time estimates in reliable transport protocol. ACM Trans Comput Syst 9(4):364\u2013373","journal-title":"ACM Trans Comput Syst"},{"key":"277_CR5_277","doi-asserted-by":"crossref","unstructured":"Paxson V, Allman M (2000) Computing TCP\u2019s retransmission timer. Internet RFC 2988","DOI":"10.17487\/rfc2988"},{"key":"277_CR6_277","first-page":"270","volume-title":"Improving the start-up behavior of a congestion control scheme for TCP","author":"J Hoe","year":"1996","unstructured":"Hoe J (1996) Improving the start-up behavior of a congestion control scheme for TCP. In: Proceedings of ACM SIGCOMM. Stanford, CA, pp\u00a0270\u2013280"},{"key":"277_CR7_277","doi-asserted-by":"crossref","unstructured":"Floyd S, Madhave J, Mathis M, Podolsky M (2000) An extension to the selective acknowledgement (SACK) option for TCP. Internet RFC 2883","DOI":"10.17487\/rfc2883"},{"issue":"3","key":"277_CR8_277","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1145\/235160.235162","volume":"5","author":"K Fall","year":"1996","unstructured":"Fall K, Floyd S (1996) Simulation-based comparison of Tahoe, Reno and SACK TCP. ACM Comput Commun Rev 5(3):5\u201321","journal-title":"ACM Comput Commun Rev"},{"key":"277_CR9_277","unstructured":"Pain R, Prabhakar B, Psounis K (2000) CHOKe, a stateless active queue management scheme for approximating fair bandwidth allocation. In: Proceedings of IEEE INFOCOM \u201900. Tel Aviv, Israel"},{"key":"277_CR10_277","unstructured":"Mahajan R, Floyd S, Wetherall D (2001) Controlling high-bandwidth flows at the congested router. In: Proceedings of IEEE ICNP \u201901, Riverside, CA"}],"container-title":["Encyclopedia of Cryptography and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4419-5906-5_277","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,2]],"date-time":"2020-06-02T00:18:41Z","timestamp":1591057121000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-1-4419-5906-5_277"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9781441959058","9781441959065"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-1-4419-5906-5_277","relation":{},"subject":[],"published":{"date-parts":[[2011]]}}}