{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T06:55:50Z","timestamp":1747810550248,"version":"3.37.3"},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642122132"},{"type":"electronic","value":"9783642122149"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-12214-9_47","type":"book-chapter","created":{"date-parts":[[2010,3,31]],"date-time":"2010-03-31T19:11:44Z","timestamp":1270062704000},"page":"290-296","source":"Crossref","is-referenced-by-count":2,"title":["A Cryptographic Approach to Defend against IP Spoofing"],"prefix":"10.1007","author":[{"given":"Mangalam","family":"Ravi","sequence":"first","affiliation":[]},{"given":"S.","family":"Narasimman","sequence":"additional","affiliation":[]},{"given":"G. K. Arun","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"D.","family":"Karthikeyan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"47_CR1","doi-asserted-by":"crossref","unstructured":"Wang, H., Jin, C., Shin, K.G.: Defense against Spoofed IP Traffic using Hop Count Filtering. IEEE transactions on networking (February 2007)","DOI":"10.1109\/TNET.2006.890133"},{"key":"47_CR2","unstructured":"Wang, W., Gombault, S.: Efficient Detection of DDoS Attacks with Important Attributes. \u00a92008 IEEE Transactions on Secure computing (2008)"},{"key":"47_CR3","doi-asserted-by":"crossref","unstructured":"Yaar, A.P., Song, D.: Pi: A path identification mechanism to defend against DDoS attacks. In: Proceedings of the IEEE Symposium on Security and Privacy, May 2003, pp. 93\u2013109 (2003)","DOI":"10.1109\/SECPRI.2003.1199330"},{"key":"47_CR4","unstructured":"Song, D.X., Perrig, A.: Advanced and authenticated marking schemes for IP traceback. In: Proceedings of IEEE INFOCOM 2001, April 2001, pp. 878\u2013886 (2001)"},{"issue":"10","key":"47_CR5","doi-asserted-by":"publisher","first-page":"741","DOI":"10.3844\/ajassp.2007.741.745","volume":"4","author":"C. Beak","year":"2007","unstructured":"Beak, C., Chaudhry, J.A., Lee, K., Park, S., Kim, M.: A Novel Packet Marketing Method in DDoS Attack Detection. American Journal of Applied Sciences\u00a04(10), 741\u2013745 (2007)","journal-title":"American Journal of Applied Sciences"},{"key":"47_CR6","doi-asserted-by":"crossref","unstructured":"Song, D., Perrig, A.: Advanced and authenticated marking schemes for IP traceback. In: Proc. IEEE INFOCOM, vol.\u00a02, pp. 878\u2013886 (2001)","DOI":"10.1109\/INFCOM.2001.916279"},{"key":"47_CR7","unstructured":"Chen, Y., Das, S., Dhar, P., Saddik, A.E., Nayak, A.: An effective defence mechanism against massively distributed denial of service attacks. In: The 9th World Conference on Integrated Design & Process Technology (IDPT 2006), SanDiego (June 2006)"},{"key":"47_CR8","doi-asserted-by":"crossref","unstructured":"Belenky, A., Ansari, N.: Tracing multiple attackers with deterministic packet marking (DPM). In: 2003 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM 2003), August 2003, pp. 49\u201352 (2003)","DOI":"10.1109\/PACRIM.2003.1235716"}],"container-title":["Communications in Computer and Information Science","Information Processing and Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-12214-9_47.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,19]],"date-time":"2025-02-19T20:11:29Z","timestamp":1739995889000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-12214-9_47"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642122132","9783642122149"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-12214-9_47","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2010]]}}}