{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T13:53:38Z","timestamp":1725803618562},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662449653"},{"type":"electronic","value":"9783662449660"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-44966-0_29","type":"book-chapter","created":{"date-parts":[[2014,8,27]],"date-time":"2014-08-27T11:41:36Z","timestamp":1409139696000},"page":"304-312","source":"Crossref","is-referenced-by-count":0,"title":["An Integrated Approach of E-RED and ANT Classification Methods for DRDoS Attacks"],"prefix":"10.1007","author":[{"given":"P.","family":"MohanaPriya","sequence":"first","affiliation":[]},{"given":"V.","family":"Akilandeswari","sequence":"additional","affiliation":[]},{"given":"G.","family":"Akilarasu","sequence":"additional","affiliation":[]},{"given":"S. Mercy","family":"Shalinie","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"29_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/LCOMM.2013.11.cover1","volume":"17","author":"X. Jiang","year":"2013","unstructured":"Jiang, X., Yang, J., Jin, G., Wei, W.: RED-FT A Scalable Random Early Detection Scheme with Flow Trust against DoS Attacks. IEEE Communication Letters\u00a017, 1\u20134 (2013)","journal-title":"IEEE Communication Letters"},{"key":"29_CR2","doi-asserted-by":"publisher","first-page":"1031","DOI":"10.1109\/TC.2012.49","volume":"62","author":"U. Ben-Porat","year":"2013","unstructured":"Ben-Porat, U., Bremler-Barr, A., Levy, H.: Vulnerability of network mechanisms to sophisticated DDoS attacks. IEEE Trans. Comp.\u00a062, 1031\u20131043 (2013)","journal-title":"IEEE Trans. Comp."},{"key":"29_CR3","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1109\/LCOMM.2012.121912.122257","volume":"17","author":"W. Wei","year":"2013","unstructured":"Wei, W., Chen, F., Xia, Y., Jin, G.: A Rank Correlation based Detection against Distributed Reflection DoS attacks. IEEE Communication Letters\u00a017, 173\u2013175 (2013)","journal-title":"IEEE Communication Letters"},{"key":"29_CR4","first-page":"2229","volume":"2","author":"R. Thandeeswaran","year":"2011","unstructured":"Thandeeswaran, R., Asha, A., Jeyanthi, N.: Novel Survey on Detection of DDoS Attack Using Traceback Technique in VoIP Networks. Mathematical Archive\u00a02, 2229\u20135046 (2011)","journal-title":"Mathematical Archive"},{"key":"29_CR5","doi-asserted-by":"publisher","first-page":"1312","DOI":"10.1016\/j.comcom.2012.04.008","volume":"35","author":"H. Beitollahi","year":"2012","unstructured":"Beitollahi, H., Deconinck, G.: Analyzing well-known counter measures against Distributed Denial of Service Attacks. Computer Communications\u00a035, 1312\u20131332 (2012)","journal-title":"Computer Communications"},{"key":"29_CR6","first-page":"1449","volume":"2","author":"R. Rani","year":"2012","unstructured":"Rani, R., Vatsa, A.K.: CARD (Continuous and Random Dropping) based DRDOS Attack Detection and Prevention Techniques in MANET. Engineering and Technology\u00a02, 1449\u20131456 (2012)","journal-title":"Engineering and Technology"},{"key":"29_CR7","doi-asserted-by":"publisher","first-page":"3299","DOI":"10.1016\/j.comcom.2008.05.033","volume":"31","author":"H. Tsunoda","year":"2008","unstructured":"Tsunoda, H., Ohta, K., Yamamoto, A., Ansari, N., Waizumi, Y., Nemoto, Y.: Detecting DRDoS attack by a simple response packet confirmation mechanism. Computer Communications\u00a031, 3299\u20133306 (2008)","journal-title":"Computer Communications"},{"key":"29_CR8","doi-asserted-by":"publisher","first-page":"2269","DOI":"10.1016\/j.comcom.2006.03.007","volume":"29","author":"B. Al-Duwairi","year":"2006","unstructured":"Al-Duwairi, B., Manimaran, G.: Distributed packet pairing for reflector based DDoS attack mitigation. Computer Communications\u00a029, 2269\u20132280 (2006)","journal-title":"Computer Communications"},{"key":"29_CR9","first-page":"890","volume":"2","author":"M. Reeta","year":"2012","unstructured":"Reeta, M.: Anticipation methods from DRDoS Attack. Computer Science and Information Technology\u00a02, 890\u2013894 (2012)","journal-title":"Computer Science and Information Technology"},{"key":"29_CR10","doi-asserted-by":"crossref","unstructured":"Larry, E.D., Lars, E.D.: Multiplayer Online games. In: Digital Forensics for Legal Professionals, pp. 301\u2013308 (2012)","DOI":"10.1016\/B978-1-59749-643-8.00041-9"},{"key":"29_CR11","doi-asserted-by":"publisher","first-page":"4047","DOI":"10.1016\/j.comnet.2013.09.003","volume":"57","author":"G. Shahabeddin","year":"2013","unstructured":"Shahabeddin, G., Mahmood, A.: Bloom Filter Applications in network security. Computer Networks\u00a057, 4047\u20134064 (2013)","journal-title":"Computer Networks"}],"container-title":["Communications in Computer and Information Science","Security in Computing and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-44966-0_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T17:41:13Z","timestamp":1558978873000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-44966-0_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783662449653","9783662449660"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-44966-0_29","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2014]]}}}