{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T12:31:54Z","timestamp":1726057914766},"publisher-location":"Cham","reference-count":8,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030325909"},{"type":"electronic","value":"9783030325916"}],"license":[{"start":{"date-parts":[[2019,11,7]],"date-time":"2019-11-07T00:00:00Z","timestamp":1573084800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-32591-6_53","type":"book-chapter","created":{"date-parts":[[2019,11,6]],"date-time":"2019-11-06T13:03:30Z","timestamp":1573045410000},"page":"501-508","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Cache Based Countermeasure Against DDoS Attacks in Xen"],"prefix":"10.1007","author":[{"given":"Xiaomei","family":"Dong","sequence":"first","affiliation":[]},{"given":"Siming","family":"Du","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,11,7]]},"reference":[{"key":"53_CR1","doi-asserted-by":"crossref","unstructured":"Jadeja Y., Modi K.: Cloud computing\u2013concepts, architecture and challenges. In: 2012 International Conference on Computing, Electronics and Electrical Technologies (ICCEET), pp. 877\u2013880. IEEE (2012)","DOI":"10.1109\/ICCEET.2012.6203873"},{"issue":"4","key":"53_CR2","doi-asserted-by":"publisher","first-page":"472","DOI":"10.1109\/TSC.2011.30","volume":"5","author":"C Li","year":"2012","unstructured":"Li, C., Raghunathan, A., Jha, N.: A trusted virtual machine in an untrusted management environment. IEEE Trans. Serv. Comput. 5(4), 472\u2013483 (2012)","journal-title":"IEEE Trans. Serv. Comput."},{"key":"53_CR3","doi-asserted-by":"crossref","unstructured":"Bedi, H.S., Shiva, S.: Securing cloud infrastructure against co-resident DoS attacks using game theoretic defense mechanisms. In: Proceedings of the International Conference on Advances in Computing, Communications and Informatics, pp. 463\u2013469. ACM Press (2012)","DOI":"10.1145\/2345396.2345473"},{"key":"53_CR4","unstructured":"Tang, J.: Research on IP traceback in Denial-of-Service attacks. Central South University, Changsha (2008). ( in Chinese)"},{"key":"53_CR5","unstructured":"Wang, K.: Research on countermeasures to Denial of Service attack and IP traceback scheme. Shandong University of Science and Technology, Qingdao (2009). (in Chinese)"},{"key":"53_CR6","unstructured":"Santos, J.R., Turner, Y., Janakiraman, G., et al.: Bridging the gap between software and hardware techniques for I\/O virtualization. In: Proceedings of the USENIX 2008 Annual Technical Conference, pp. 29\u201342. IEEE Press (2008)"},{"key":"53_CR7","unstructured":"Pu, X., Liu, L., Mei, Y., et al.: Who is your neighbor: net I\/O performance interference in virtualized clouds. IEEE Trans. Serv. Comput. (99), 1\u201315 (2012)"},{"issue":"7","key":"53_CR8","first-page":"297","volume":"39","author":"P Xu","year":"2012","unstructured":"Xu, P., Qian, Z., Mao, B., et al.: Xen virtual machine scheduling enhancement by improving cache efficiency. Comput. Sci. 39(7), 297\u2013301 (2012). (in Chinese)","journal-title":"Comput. Sci."}],"container-title":["Advances in Intelligent Systems and Computing","Advances in Natural Computation, Fuzzy Systems and Knowledge Discovery"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-32591-6_53","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,6]],"date-time":"2019-11-06T13:17:46Z","timestamp":1573046266000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-32591-6_53"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,7]]},"ISBN":["9783030325909","9783030325916"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-32591-6_53","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2019,11,7]]},"assertion":[{"value":"7 November 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICNC-FSKD","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kunming","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icncfskd2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}