{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:30:23Z","timestamp":1725564623987},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642157653"},{"type":"electronic","value":"9783642157660"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-15766-0_9","type":"book-chapter","created":{"date-parts":[[2010,9,2]],"date-time":"2010-09-02T16:41:05Z","timestamp":1283445665000},"page":"55-61","source":"Crossref","is-referenced-by-count":0,"title":["An Optimizing Technique for MDGT Using DRSA Algorithm Association with IP Traceback Strategies"],"prefix":"10.1007","author":[{"given":"S.","family":"Karthik","sequence":"first","affiliation":[]},{"given":"V. P.","family":"Arunachalam","sequence":"additional","affiliation":[]},{"given":"T.","family":"Ravichandran","sequence":"additional","affiliation":[]},{"given":"M. L.","family":"Valarmathi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","unstructured":"Yaar, et al.: FTT: Fast Internet Trackback. In: IEEE INFOCOM 2005, Miami, Florida (March 2005)"},{"key":"9_CR2","unstructured":"Al\u2013Duwairi, B., et al.: Topology Based Packet Marking. In: IEEE Int. Conf. Computer Comm. and Networks, ICCN 2004 (October 2004)"},{"issue":"5","key":"9_CR3","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1109\/TPDS.2006.63","volume":"17","author":"B. Al-Duwairi","year":"2006","unstructured":"Al-Duwairi, B., et al.: Novel Hybrid Schemes Employing Packet Marking and bagging for IP Traceback. IEEE Transactions on Parallel and Distribution Systems\u00a017(5), 403\u2013418 (2006)","journal-title":"IEEE Transactions on Parallel and Distribution Systems"},{"key":"9_CR4","unstructured":"Meadows: A formal framework and evaluation method for network denial of service. In: Proceedings of the 12th IEEE Computer Security Foundations Workshop (June 8-10, 1999)"},{"key":"9_CR5","unstructured":"Cisco. Strategies to Protect Against Distributed Denial of Service Attacks, \n                    \n                      http:\/\/www.cisco.com\/en\/US\/tech\/tk59\/technologies_white_paper09186a0080174a5b.shtml"},{"key":"9_CR6","unstructured":"Cisco. Strategies to Protect Against Distributed Denial of Service Attacks, \n                    \n                      http:\/\/www.cisco.com\/warp\/public\/707\/newsflash.html"},{"key":"9_CR7","unstructured":"Computer Incident Advisory Capability. Network Intrusion Detector Overview, \n                    \n                      http:\/\/ciac.llnl.gov\/cstc\/nid\/intro.html"},{"key":"9_CR8","unstructured":"Song, D.X., Perrig, A.: Advanced and Authenticated Marking Schemes for IP Traceback. In: IEEE INFOCOM 2001 Anchorage AK, AP 2001, pp. 878\u2013886 (2001)"},{"issue":"8","key":"9_CR9","doi-asserted-by":"publisher","first-page":"646","DOI":"10.3844\/jcssp.2008.646.651","volume":"4","author":"S. Karthik","year":"2008","unstructured":"Karthik, S., Arunachalam, V.P., Ravichandran, T.: Multi directional geographical trace back within directions generalization. J. Compute. Sci.\u00a04(8), 646\u2013651 (2008) ISSN: 1549-3636","journal-title":"J. Compute. Sci."},{"key":"9_CR10","unstructured":"Karthik, S., Arunachalam, V.P., Bhavdharini, R.M.: Analyzing interaction between denial of service (dos) attacks and threats. In: Proceeding of the IEEE Int. Conf. on Computing, Communication and Networking, ICCCN 2008 (2008), 978-1-4244-3595-1\/08\/2008, doi:10.1109\/ICCCNET.2008. 4787663"},{"key":"9_CR11","unstructured":"Karthik, S., Arunachalam, V.P., Ravichandran, T.: Analyzing interaction between denial of service (dos) attacks and threats. Int. J. Soft Computing, 68\u201375 (2009) ISSN: 1816-9503"}],"container-title":["Communications in Computer and Information Science","Information and Communication Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-15766-0_9.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T09:05:42Z","timestamp":1619773542000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-15766-0_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642157653","9783642157660"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-15766-0_9","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2010]]}}}