{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T12:18:11Z","timestamp":1742991491405,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540756637"},{"type":"electronic","value":"9783540756644"}],"license":[{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-75664-4_49","type":"book-chapter","created":{"date-parts":[[2007,9,14]],"date-time":"2007-09-14T03:27:01Z","timestamp":1189740421000},"page":"466-476","source":"Crossref","is-referenced-by-count":0,"title":["Integrated Notification Architecture Based on Overlay Against DDoS Attacks on Convergence Network"],"prefix":"10.1007","author":[{"given":"Mihui","family":"Kim","sequence":"first","affiliation":[]},{"given":"Jaewon","family":"Seo","sequence":"additional","affiliation":[]},{"given":"Kijoon","family":"Chae","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"49_CR1","unstructured":"Won, Y.: BcN security Issues. In: Proc of Korea Internet Conference (KRNET) (2006)"},{"issue":"2","key":"49_CR2","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1109\/TPDS.2006.19","volume":"17","author":"Z. Zhang","year":"2006","unstructured":"Zhang, Z., Chen, S., Ling, Y., Chow, R.: Capacity-Aware Multicast Algorithms on Heterogeneous Overlay Networks. IEEE Transactions on Parallel and Distributed Systems\u00a017(2), 135\u2013147 (2006)","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"49_CR3","doi-asserted-by":"crossref","unstructured":"Keromytis, A., Misra, V., Rubenstein, D.: SOS: An Architecture for Mitigating DDoS Attacks. IEEE JSAC\u00a022(1) (2004)","DOI":"10.1109\/JSAC.2003.818807"},{"key":"49_CR4","doi-asserted-by":"crossref","unstructured":"Yang, H., Luo, H., Yang, Y., Lu, S., Zhang, L.: HOURS: Achieving DoS Resilience in an Open Service Hierarchy. In: Proc. of DSN, pp. 83\u201392 (2004)","DOI":"10.1109\/DSN.2004.1311879"},{"key":"49_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"673","DOI":"10.1007\/978-3-540-24707-4_79","volume-title":"Proc. of ICCSA","author":"M. Kim","year":"2004","unstructured":"Kim, M., Chae, K.: Detection and Identification Mechanism against Spoofed Traffic Using Distributed Agents. In: Lagan\u00e0, A., Gavrilova, M., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds.) ICCSA 2004. LNCS, vol.\u00a03043, pp. 673\u2013682. Springer, Heidelberg (2004)"},{"key":"49_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"943","DOI":"10.1007\/978-3-540-25978-7_95","volume-title":"Proc. of ICOIN","author":"M. Kim","year":"2004","unstructured":"Kim, M., Na, H., Chae, K., Bang, H., Na, J.: A Combined Data Mining Approach for DDoS Attack Detection. In: Kahng, H.-K., Goto, S. (eds.) ICOIN 2004. LNCS, vol.\u00a03090, pp. 943\u2013950. Springer, Heidelberg (2004)"},{"key":"49_CR7","doi-asserted-by":"crossref","unstructured":"Xiong, J., Zhang, Y., Hong, P., Li, J., Guo, L.: Reduce Chord Routing Latency Issue in the Context of IPv6. IEEE comm.letters\u00a010(1) (2006)","DOI":"10.1109\/LCOMM.2006.1576571"},{"key":"49_CR8","unstructured":"GloMoSim, http:\/\/pcl.cs.ucla.edu\/projects\/glomosim\/"}],"container-title":["Lecture Notes in Computer Science","Software Technologies for Embedded and Ubiquitous Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-75664-4_49","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,2]],"date-time":"2019-05-02T21:55:00Z","timestamp":1556834100000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-75664-4_49"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540756637","9783540756644"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-75664-4_49","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2007]]}}}