{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T05:28:38Z","timestamp":1742966918892,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642176098"},{"type":"electronic","value":"9783642176104"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-17610-4_11","type":"book-chapter","created":{"date-parts":[[2010,11,24]],"date-time":"2010-11-24T07:57:18Z","timestamp":1290585438000},"page":"94-103","source":"Crossref","is-referenced-by-count":0,"title":["Probabilistic Route Selection Algorithm for IP Traceback"],"prefix":"10.1007","author":[{"given":"Hong-bin","family":"Yim","sequence":"first","affiliation":[]},{"given":"Jae-il","family":"Jung","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","doi-asserted-by":"publisher","DOI":"10.1002\/0470099747","volume-title":"Network Security","author":"C. Douligeri","year":"2007","unstructured":"Douligeri, C., Serpanos, D.N.: Network Security. IEEE Press, Los Alamitos (2007)"},{"key":"11_CR2","unstructured":"Bellovin, S.: The ICMP traceback message, Network Working Group, Internet draft (March 2000)"},{"key":"11_CR3","unstructured":"Burch, H., Cheswickk, H.: Tracing anonymous packets to their approximate source. In: Proceedings of USENIX LISA Conference, pp. 319\u2013327 (2000)"},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"Savage, S., Wetherall, D., Karlin, A., Anderson, T.: Network Support for IP traceback. IEEE\/ACM Transactions on Networking, 226\u2013237 (2001)","DOI":"10.1109\/90.929847"},{"key":"11_CR5","first-page":"3","volume-title":"Proceedings of the ACM SIGCOMM 2001 Conference on Applications, Technologies, Architectures and Protocols for Computer Communication","author":"A.C. Snoeren","year":"2001","unstructured":"Snoeren, A.C., Partridge, C., Sanchez, L.A., Jones, C.E., Tchakountio, F., Kent, S.T., Strayer, W.T.: Hash-based IP Traceback. In: Proceedings of the ACM SIGCOMM 2001 Conference on Applications, Technologies, Architectures and Protocols for Computer Communication, pp. 3\u201314. ACM Press, New York (2001)"},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"Wang, X., Reeves, D.S., Wu, S.F., Yuill, J.: Sleepy watermark tracing: An active network-based intrusion response framework. In: Proceedings of the Sixteenth International Conference of Information Security (IFIP\/SEC_ 2001), Paris (June 2001)","DOI":"10.1007\/0-306-46998-7_26"},{"key":"11_CR7","unstructured":"Stone, R.: CenterTrack: An IP overlay network for tracking DoS floods. In: Proceedings of the Ninth USENIX security symposium, pp. 199\u2013212 (2000)"},{"issue":"2","key":"11_CR8","first-page":"33","volume":"6","author":"J. Lee","year":"2004","unstructured":"Lee, J., Yoon, M., Lee, H.: Monitoring and Investigation of DoS Attack. KNOM Reveiw\u00a06(2), 33\u201340 (2004)","journal-title":"KNOM Reveiw"}],"container-title":["Communications in Computer and Information Science","Security Technology, Disaster Recovery and Business Continuity"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-17610-4_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T21:42:34Z","timestamp":1558388554000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-17610-4_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642176098","9783642176104"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-17610-4_11","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2010]]}}}