{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T03:29:47Z","timestamp":1761708587869},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540219590"},{"type":"electronic","value":"9783540246930"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24693-0_104","type":"book-chapter","created":{"date-parts":[[2010,9,11]],"date-time":"2010-09-11T02:02:45Z","timestamp":1284170565000},"page":"1263-1269","source":"Crossref","is-referenced-by-count":8,"title":["An Efficient Probabilistic Packet Marking Scheme for IP Traceback"],"prefix":"10.1007","author":[{"given":"Basheer","family":"Duwairi","sequence":"first","affiliation":[]},{"given":"Anirban","family":"Chakrabarti","sequence":"additional","affiliation":[]},{"given":"Govindarasu","family":"Manimaran","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"104_CR1","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1145\/362686.362692","volume":"13","author":"BH Bloom","year":"1970","unstructured":"B. H. Bloom, \u201cSpace\/time trade-offs in hash coding with allowable errors,\u201d in Communications of ACM 13, July 1970,422\u2013426.","journal-title":"Communications of ACM"},{"key":"104_CR2","first-page":"319","volume-title":"Proc. 2000 USENIX LISA Conf.","author":"H Burch","year":"2000","unstructured":"H. Burch and B. Cheswick, \u201cTracing anonymous packets to their approximate source,\u201d in Proc. 2000 USENIX LISA Conf., Dec. 2000, pp.319\u2013327."},{"key":"104_CR3","volume-title":"Network and Distributed System Security Symposium (NDSS \u201901)","author":"D Dean","year":"2001","unstructured":"D. Dean, M. Franklin, and A. Stubblefield, \u201cAn algebraic approach to IP traceback,\u201d in Network and Distributed System Security Symposium (NDSS \u201901), Feb. 2001."},{"key":"104_CR4","volume-title":"Proc. of ACM CCS 2002","author":"MT Goodrich","year":"2002","unstructured":"M. T. Goodrich, \u201cEfficient Packet Marking for Large-Scale IP Traceback,\u201d in Proc. of ACM CCS 2002, Nov. 2002."},{"key":"104_CR5","volume-title":"Proc. of IEEE INFOCOM 2001","author":"K Park","year":"2001","unstructured":"K. Park and H. Lee, \u201cOn the Effectiveness of Probabilistic Packet Marking for IP Traceback under Denial of Service Attack,\u201d in Proc. of IEEE INFOCOM 2001, Mar. 2001."},{"key":"104_CR6","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1145\/347059.347560","volume-title":"Proc. of ACM SIGCOMM","author":"S Savage","year":"2000","unstructured":"S. Savage, D. Wetherall, A. Karlin and T. Anderson, \u201cPractical network support for IP trace-back,\u201d in Proc. of ACM SIGCOMM, Aug. 2000, pp. 295\u2013306."},{"key":"104_CR7","volume-title":"Proc. of IEEE INFOCOMM 2001","author":"D Song","year":"2001","unstructured":"D. Song and A. Perrig, \u201cAdvanced and authenticated marking schemes for IP traceback,\u201d in Proc. of IEEE INFOCOMM 2001, April 2001."},{"key":"104_CR8","volume-title":"Proc. of 9th USENIX Security Symposium","author":"R Stone","year":"2000","unstructured":"R. Stone, \u201cCentertrack: An IP overlay network for tracking DoS floods,\u201d in Proc. of 9 th USENIX Security Symposium, Aug. 2000."},{"key":"104_CR9","volume-title":"Proc. of ACM SIGCOMM","author":"AC Snoeren","year":"2001","unstructured":"A. C. Snoeren, C. Partiridge, L. A. Sanchez, C. E. Jones, F. Tchhakountio, S. T. Kent, and W. T Strayer, \u201cHash-Based IP TraceBack,\u201d in Proc. of ACM SIGCOMM, Aug. 2001."}],"container-title":["Lecture Notes in Computer Science","NETWORKING 2004. Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24693-0_104.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,3]],"date-time":"2023-06-03T07:30:43Z","timestamp":1685777443000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24693-0_104"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540219590","9783540246930"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24693-0_104","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}