{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T03:52:28Z","timestamp":1742961148582,"version":"3.40.3"},"publisher-location":"Cham","reference-count":7,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319270715"},{"type":"electronic","value":"9783319270722"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-27072-2_25","type":"book-chapter","created":{"date-parts":[[2015,12,29]],"date-time":"2015-12-29T07:40:18Z","timestamp":1451374818000},"page":"197-203","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Simulation Analysis of DoS, MITM and CDP Security Attacks and Countermeasures"],"prefix":"10.1007","author":[{"given":"Biljana","family":"Tanceska","sequence":"first","affiliation":[]},{"given":"Mitko","family":"Bogdanoski","sequence":"additional","affiliation":[]},{"given":"Aleksandar","family":"Risteski","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,30]]},"reference":[{"key":"25_CR1","doi-asserted-by":"crossref","unstructured":"Stojanoski, P., Bogdanoski, M., Risteski, A.: Wireless local area network behavior under RTS flood DoS attack. In: 20th Telecommunications Forum TELFOR 2012. IEEE (2012)","DOI":"10.1109\/TELFOR.2012.6419153"},{"key":"25_CR2","unstructured":"Bogdanoski, M., Risteski, A.: Wireless network behavior under ICMP ping flood DoS attack and mitigation techniques. Int. J. Commun. Netw. Inf. Secur. (IJCNIS) 3(1), 2 (2011)"},{"issue":"8","key":"25_CR3","first-page":"1","volume":"5","author":"M Bogdanoski","year":"2013","unstructured":"Bogdanoski, M., Suminoski, T., Risteski, A.: Analysis of the SYN flood DoS attack. Int. J. Comput. Netw. Inf. Secur. (IJCNIS) 5(8), 1\u201311 (2013)","journal-title":"Int. J. Comput. Netw. Inf. Secur. (IJCNIS)"},{"key":"25_CR4","unstructured":"Preimesburger, C.: DDoS Attack Volume Escalates as New Methods Emerge, 28 May 2014"},{"key":"25_CR5","unstructured":"TELELINK, Access Networking Threats, IT Threats (2013)"},{"key":"25_CR6","unstructured":"TELELINK, Corporate WAN Threats, IT Threats \u2013 Control Plane attack (2013)"},{"key":"25_CR7","unstructured":"Straatsma, P.: Rogue DHCP Server with DHCP Starvation and Rogue Routing, November 2013"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Future Access Enablers for Ubiquitous and Intelligent Infrastructures"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-27072-2_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T02:25:43Z","timestamp":1559355943000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-27072-2_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319270715","9783319270722"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-27072-2_25","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"30 December 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}