{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T19:02:52Z","timestamp":1767898972613,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642209307","type":"print"},{"value":"9783642209314","type":"electronic"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-20931-4_15","type":"book-chapter","created":{"date-parts":[[2011,10,18]],"date-time":"2011-10-18T10:14:52Z","timestamp":1318932892000},"page":"187-197","source":"Crossref","is-referenced-by-count":2,"title":["Remediating Anomalous Traffic Behaviour in Future Networked Environments"],"prefix":"10.1007","author":[{"given":"Angelos K.","family":"Marnerides","sequence":"first","affiliation":[]},{"given":"Matthew","family":"Jakeman","sequence":"additional","affiliation":[]},{"given":"David","family":"Hutchison","sequence":"additional","affiliation":[]},{"given":"Dimitrios P.","family":"Pezaros","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"7","key":"15_CR1","first-page":"281","volume":"7","author":"A. Asosheh","year":"2008","unstructured":"Asosheh, A., Ramezani, N.: A Comprehensive Taxonomy of DDoS Attacks and Defence Mechanism Applying in a Smart Classification. WSEAS Transactions on Computers\u00a07(7), 281\u2013290 (2008)","journal-title":"WSEAS Transactions on Computers"},{"key":"15_CR2","unstructured":"Autonomic Network Architecture (ANA) Project details, http:\/\/www.ana-project.org"},{"key":"15_CR3","doi-asserted-by":"crossref","unstructured":"Barabasi, A., Albert, L.: Emergence of scaling in random networks. Science, 509\u2013512 (October 1999)","DOI":"10.1126\/science.286.5439.509"},{"key":"15_CR4","unstructured":"Boston University Representative Internet Topology Generator (BRITE), http:\/\/www.cs.bu.edu\/brite"},{"key":"15_CR5","unstructured":"Bu, T., Towsley, D.: On distinguishing between Internet power law topology generators. In: IEEE INFOCOM 2002, New York, USA, June 23-27 (2002)"},{"key":"#cr-split#-15_CR6.1","unstructured":"De Figueiredo, L.H., Ierusalimschy, R., Celes, W.: LUA: An Extensible Embedded Language. Journal of Software Tools??21(12) (1996);"},{"key":"#cr-split#-15_CR6.2","unstructured":"National Center for Biotechnology, Information, http:\/\/www.ncbi.nlm.nih.gov"},{"key":"15_CR7","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1109\/90.251892","volume":"1","author":"S. Floyd","year":"1993","unstructured":"Floyd, S., Jacobson, V.: Random Early Detection gateways for Congestion Avoidance. IEEE\/ACM Transactions in Networking\u00a01, 397\u2013413 (1993)","journal-title":"IEEE\/ACM Transactions in Networking"},{"key":"15_CR8","unstructured":"Hutchison, D., Sterbenz, J.P.G., Jabbar, A., Sholler, M.: D3.2: Resilience\/Security Framework, Deliverable D3.2 ANA (December 2006)"},{"key":"15_CR9","doi-asserted-by":"crossref","unstructured":"Marnerides, A.K., Pezaros, D.P., Hutchison, D.: Detection and Mitigation of Abnormal Traffic Behaviour in Autonomic Networked Environments. In: 4th ACM SIGCOMM CoNEXT Student Workshop, Madrid, Spain, December 9-12 (2008)","DOI":"10.1145\/1544012.1544063"},{"key":"15_CR10","doi-asserted-by":"crossref","unstructured":"Marnerides, A.K., Pezaros, D.P., Hutchison, D.: Autonomic Diagnosis of Anomalous Network Traffic. In: 4th IEEE WoWMoM Workshop on Autonomic and Opportunistic Communications (AOC 2010), Montreal, Canada, June 14-17 (2010)","DOI":"10.1109\/WOWMOM.2010.5534933"},{"key":"15_CR11","unstructured":"Pezaros, D.P.: Cross-Layer Optimisation of Network Response at the Onset of Bursty Requests. In: Proceedings of Multi-Service Networks (MSN 2006), Cosener\u2019s House, Abingdon, UK, July 13-14 (2006)"},{"key":"15_CR12","unstructured":"Pezaros, D., P., Marnerides A., K., Hutchison D.: 2008 D3.10: Measurement-based Resilience Mechanisms, Deliverable D3.10 ANA (December 2008)"},{"key":"15_CR13","doi-asserted-by":"crossref","unstructured":"Pezaros, D.P., Mathy, L.: Explicit Application-Network Cross-layer Optimisation. In: 4th International Telecommunication NEtworking WorkShop (IT-NEWS) on QoS in Multiservice IP Networks (QoS-IP 2008), Venice, Italy, February 13-15 (2008)","DOI":"10.1109\/ITNEWS.2008.4488151"},{"key":"15_CR14","doi-asserted-by":"crossref","unstructured":"Sifalakis, M., Louca, A., Peluso, L., Mauthe, A., Zseby, T.: A Functional Composition Framework for Autonomic Network Architectures. In: Proceedings of 2nd IEEE International Workshop on Autonomic Communications and Network Management (IEEE NOMS\/ACNM 2008), Salvador, Bahia, Brazil, April 7-11 (2008)","DOI":"10.1109\/NOMSW.2007.51"},{"key":"15_CR15","unstructured":"The Network Simulator 2 (NS2), http:\/\/www.isi.edu\/nsnam\/ns\/"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Access Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-20931-4_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,17]],"date-time":"2019-06-17T18:39:51Z","timestamp":1560796791000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-20931-4_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642209307","9783642209314"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-20931-4_15","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"value":"1867-8211","type":"print"},{"value":"1867-822X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011]]}}}