{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T23:57:02Z","timestamp":1725494222645},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540768364"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-76837-1_55","type":"book-chapter","created":{"date-parts":[[2007,11,6]],"date-time":"2007-11-06T10:25:50Z","timestamp":1194344750000},"page":"508-517","source":"Crossref","is-referenced-by-count":2,"title":["Enhanced and Authenticated Deterministic Packet Marking for IP Traceback"],"prefix":"10.1007","author":[{"given":"Dan","family":"Peng","sequence":"first","affiliation":[]},{"given":"Zhicai","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Longming","family":"Tao","sequence":"additional","affiliation":[]},{"given":"Wu","family":"Ma","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"55_CR1","doi-asserted-by":"crossref","unstructured":"Belenky, A., Ansari, N.: IP Traceback with Deterministic Packet Marking. In: IEEE Communications Letters, pp. 162\u2013164 (2003)","DOI":"10.1109\/LCOMM.2003.811200"},{"key":"55_CR2","first-page":"49","volume-title":"Proc. IEEE Pacific Rim Conf. Commun.,Comp. and Sig.","author":"A. Belenky","year":"2003","unstructured":"Belenky, A., Ansari, N.: Tracing multiple attackers with deterministic packet marking (DPM). In: Proc. IEEE Pacific Rim Conf. Commun.,Comp. and Sig., pp. 49\u201352. IEEE Computer Society Press, Los Alamitos (2003)"},{"key":"55_CR3","first-page":"374","volume-title":"Proc. IEEE GLOBECOM","author":"A. Belenky","year":"2003","unstructured":"Belenky, A., Ansari, N.: Accommodating fragmentation with deterministic packet marking for IP traceback. In: Proc. IEEE GLOBECOM, pp. 374\u20131378. IEEE Computer Society Press, Los Alamitos (2003)"},{"key":"55_CR4","doi-asserted-by":"crossref","unstructured":"Gao, Z., Ansari, N.: Tracing cyber attacks from the practical perspective. IEEE Commun. Mag., 123\u2013131 (2005)","DOI":"10.1109\/MCOM.2005.1453433"},{"key":"55_CR5","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1016\/j.cose.2005.03.005","volume":"24","author":"L. Fu-Yuan","year":"2005","unstructured":"Fu-Yuan, L., Shiuhpyng, S.: Denfending against spoofed DDoS attacks with path fingerprint. Computers & Security\u00a024, 571\u2013586 (2005)","journal-title":"Computers & Security"},{"issue":"9","key":"55_CR6","doi-asserted-by":"publisher","first-page":"861","DOI":"10.1109\/TPDS.2003.1233709","volume":"14","author":"M. Sung","year":"2003","unstructured":"Sung, M., Xu, J.: IP traceback-based intelligent packet filtering: a novel technique for defending against internet DDoS attacks. IEEE Transactions on Parallel and Distributed Systems\u00a014(9), 861\u2013872 (2003)","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"55_CR7","doi-asserted-by":"crossref","unstructured":"Savage, S., Wetherall, D., Karlin, A., Anderson, T.: Network support for IP traceback. IEEE\/ACM Trans. Networking, 226-237 (2001)","DOI":"10.1109\/90.929847"},{"key":"55_CR8","doi-asserted-by":"crossref","unstructured":"Dae-Sun, K., Choong-eon, H., Yu, X.: An Intelligent Approach of Packet Marking at Edge Router for IP Traceback. Lecture Notes in Artificial Intelligence, 303\u2013309 (2005)","DOI":"10.1007\/11553939_44"},{"key":"55_CR9","unstructured":"Perrig, A., Canetti, R., Song, D., Tygar, D.: Efficient and secure source authentication for multicast. In: Network and Distributed System Security Symposium (2001)"},{"key":"55_CR10","volume-title":"An introduction to Probability Theory and its Applications","author":"W. Feller","year":"1968","unstructured":"Feller, W.: An introduction to Probability Theory and its Applications, 3rd edn. Addison- Wesley, Reading (1968)","edition":"3"}],"container-title":["Lecture Notes in Computer Science","Advanced Parallel Processing Technologies"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-76837-1_55.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T10:41:06Z","timestamp":1619520066000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-76837-1_55"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540768364"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-76837-1_55","relation":{},"subject":[]}}