{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T03:34:36Z","timestamp":1761708876655,"version":"3.40.3"},"publisher-location":"Cham","reference-count":11,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319018539"},{"type":"electronic","value":"9783319018546"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-01854-6_55","type":"book-chapter","created":{"date-parts":[[2013,8,8]],"date-time":"2013-08-08T06:47:25Z","timestamp":1375944445000},"page":"537-546","source":"Crossref","is-referenced-by-count":9,"title":["SlowReq: A Weapon for Cyberwarfare Operations. Characteristics, Limits, Performance, Remediations"],"prefix":"10.1007","author":[{"given":"Maurizio","family":"Aiello","sequence":"first","affiliation":[]},{"given":"Gianluca","family":"Papaleo","sequence":"additional","affiliation":[]},{"given":"Enrico","family":"Cambiaso","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"55_CR1","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1145\/1859204.1859212","volume":"53","author":"S. Greengard","year":"2010","unstructured":"Greengard, S.: The new face of war. Communications of the ACM\u00a053, 20\u201322 (2010)","journal-title":"Communications of the ACM"},{"key":"55_CR2","first-page":"2","volume":"24","author":"T.M. Chen","year":"2010","unstructured":"Chen, T.M.: Stuxnet, the real start of cyber warfare? IEEE Network\u00a024, 2\u20133 (2010)","journal-title":"IEEE Network"},{"unstructured":"Combs, M.M.: Impact of the Stuxnet Virus on Industrial Control Systems. In: XIII International Forum Modern Information Society Formation Problems, Perspectives, Innovation Approaches, pp. 5\u201310 (2012)","key":"55_CR3"},{"doi-asserted-by":"crossref","unstructured":"Cambiaso, E., et al.: Slow DoS Attacks: Definition and Categorization. International Journal of Trust Management in Computing and Communications (in press article, 2013)","key":"55_CR4","DOI":"10.1504\/IJTMCC.2013.056440"},{"doi-asserted-by":"crossref","unstructured":"Kuzmanovic, A., Knightly, E.W.: Low-rate TCP-targeted denial of service attacks: the shrew vs. the mice and elephants. In: Proceedings of the 2003 conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, pp. 75\u201386 (2003)","key":"55_CR5","DOI":"10.1145\/863955.863966"},{"key":"55_CR6","doi-asserted-by":"publisher","first-page":"1013","DOI":"10.1016\/j.comnet.2006.07.002","volume":"51","author":"G. Macia-Fernandez","year":"2007","unstructured":"Macia-Fernandez, G., et al.: Evaluation of a low-rate DoS attack against iterative servers. Computer Networks\u00a051, 1013\u20131030 (2007)","journal-title":"Computer Networks"},{"key":"55_CR7","series-title":"CCIS","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1007\/978-3-642-34135-9_20","volume-title":"Recent Trends in Computer Networks and Distributed Systems Security","author":"E. Cambiaso","year":"2012","unstructured":"Cambiaso, E., Papaleo, G., Aiello, M.: Taxonomy of Slow DoS Attacks to Web Applications. In: Thampi, S.M., Zomaya, A.Y., Strufe, T., Alcaraz Calero, J.M., Thomas, T. (eds.) SNDS 2012. CCIS, vol.\u00a0335, pp. 195\u2013204. Springer, Heidelberg (2012)"},{"doi-asserted-by":"crossref","unstructured":"Damon, E., et al.: Hands-on denial of service lab exercises using SlowLoris and RUDY. In: Proceedings of the 2012 Information Security Curriculum Development Conference, pp. 21\u201329 (2012)","key":"55_CR8","DOI":"10.1145\/2390317.2390321"},{"unstructured":"MaxConnections - IIS 6.0, \n                    http:\/\/msdn.microsoft.com\/en-us\/library\/ms524491v=vs.90.aspx\n                   (accessed in 2013)","key":"55_CR9"},{"unstructured":"Slow request dos\/oom attack, \n                    http:\/\/download.lighttpd.net\/lighttpd\/security\/lighttpd_sa_2010_01.txt\n                   (accessed in 2013)","key":"55_CR10"},{"unstructured":"Apache MPM Common Directives - MaxClients Directive, \n                    http:\/\/httpd.apache.org\/docs\/2.2\/mod\/mpm_common.html-maxclients\n                   (accessed in 2013)","key":"55_CR11"}],"container-title":["Advances in Intelligent Systems and Computing","International Joint Conference SOCO\u201913-CISIS\u201913-ICEUTE\u201913"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-01854-6_55","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,19]],"date-time":"2023-02-19T15:09:26Z","timestamp":1676819366000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-01854-6_55"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319018539","9783319018546"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-01854-6_55","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2014]]}}}