{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:41:36Z","timestamp":1725550896782},"publisher-location":"Berlin, Heidelberg","reference-count":6,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642122132"},{"type":"electronic","value":"9783642122149"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-12214-9_56","type":"book-chapter","created":{"date-parts":[[2010,3,31]],"date-time":"2010-03-31T15:11:44Z","timestamp":1270048304000},"page":"349-355","source":"Crossref","is-referenced-by-count":0,"title":["Reactive Network Monitor for DDoS Attacks"],"prefix":"10.1007","author":[{"given":"P.","family":"Varalakshmi","sequence":"first","affiliation":[]},{"given":"P. Karthik","family":"Narayanan","sequence":"additional","affiliation":[]},{"given":"M.","family":"Hariharan","sequence":"additional","affiliation":[]},{"given":"P.","family":"Nagaraj","sequence":"additional","affiliation":[]},{"given":"K.","family":"Amritha","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"Kim, Y., Lau, W.C., Chuah, M.C., Jonathan Chao, H.: PacketScore: Statistics-based Overload Control against Distributed Denial-of-Service Attacks. In: Proceedings of IEEE INFOCOM (2004)","key":"56_CR1"},{"doi-asserted-by":"crossref","unstructured":"Wang, W., Gombault, S.: Efficient Detection of DDoS Attacks with Important Attributes. IEEE Transactions on Secure Computing (2008)","key":"56_CR2","DOI":"10.1109\/CRISIS.2008.4757464"},{"doi-asserted-by":"crossref","unstructured":"Wang, H., Jin, C., Shin, K.G.: Defense against Spoofed IP Traffic using Hop Count Filtering. IEEE Transactions on Networking (February 2007)","key":"56_CR3","DOI":"10.1109\/TNET.2006.890133"},{"unstructured":"Chen, Y., Hwang, K., Kuu, W.-S.: Collaborative Detection of DDoS Attacks over Multiple Network Domains. IEEE Transactions on Parallel and Distributed Systems, TPDS-0228-0806","key":"56_CR4"},{"issue":"5","key":"56_CR5","doi-asserted-by":"publisher","first-page":"577","DOI":"10.1109\/TPDS.2007.1014","volume":"18","author":"R. Chen","year":"2007","unstructured":"Chen, R., Park, J.-M., Marchany, R.: A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks. IEEE Transactions on Parallel and Distributed Systems\u00a018(5), 577\u2013588 (2007)","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"doi-asserted-by":"crossref","unstructured":"Thorat, S.A., Khandelwal, A.K., Bruhadeshwar, B., Kishore, K.: Payload Content based Network Anomaly Detection. In: IEEE CADIWT (2008)","key":"56_CR6","DOI":"10.1109\/ICADIWT.2008.4664331"}],"container-title":["Communications in Computer and Information Science","Information Processing and Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-12214-9_56.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T08:06:03Z","timestamp":1619769963000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-12214-9_56"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642122132","9783642122149"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-12214-9_56","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2010]]}}}