{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T07:36:00Z","timestamp":1743147360800,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":12,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811597381"},{"type":"electronic","value":"9789811597398"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-981-15-9739-8_36","type":"book-chapter","created":{"date-parts":[[2020,11,5]],"date-time":"2020-11-05T12:05:09Z","timestamp":1604577909000},"page":"475-488","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["SA Dots: A Sensitive and Self-adaptable Framework for Cross-Region DDoS Processing"],"prefix":"10.1007","author":[{"given":"Li","family":"Su","sequence":"first","affiliation":[]},{"given":"Meiling","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Li","sequence":"additional","affiliation":[]},{"given":"Peng","family":"Ran","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Sun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,4]]},"reference":[{"unstructured":"Akamai: How to protect against DDoS attacks - stop denial of service (2016). \nhttps:\/\/www.akamai.com\/us\/en\/resources\/protect-against-ddos-attacks.jsp\n\n. Accessed 10 Jan 2017","key":"36_CR1"},{"key":"36_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1007\/978-3-319-60774-0_19","volume-title":"Security of Networks and Services in an All-Connected World","author":"B Rodrigues","year":"2017","unstructured":"Rodrigues, B., Bocek, T., Stiller, B.: Multi-domain DDoS mitigation based on blockchains. In: Tuncer, D., Koch, R., Badonnel, R., Stiller, B. (eds.) AIMS 2017. LNCS, vol. 10356, pp. 185\u2013190. Springer, Cham (2017). \nhttps:\/\/doi.org\/10.1007\/978-3-319-60774-0_19"},{"key":"36_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-319-60774-0_2","volume-title":"Security of Networks and Services in an All-Connected World","author":"B Rodrigues","year":"2017","unstructured":"Rodrigues, B., Bocek, T., Lareida, A., Hausheer, D., Rafati, S., Stiller, B.: A blockchain-based architecture for collaborative DDoS mitigation with smart contracts. In: Tuncer, D., Koch, R., Badonnel, R., Stiller, B. (eds.) AIMS 2017. LNCS, vol. 10356, pp. 16\u201329. Springer, Cham (2017). \nhttps:\/\/doi.org\/10.1007\/978-3-319-60774-0_2"},{"unstructured":"Mortensen, A., Andreasen, F., Reddy, T., Teague, N., Compton, R.: Draft-ietf-dots-architecture [EB\/OL].\nhttps:\/\/tools.ietf.org\/html\/draft-ietf-dots-architecture-18","key":"36_CR4"},{"key":"36_CR5","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1007\/978-3-030-21373-2_41","volume-title":"Security and Privacy in New Computing Environments","author":"L Su","year":"2019","unstructured":"Su, L., Chen, M., Peng, J., Ran, P.: SE Dots: a sensitive and extensible framework for cross-region DDoS processing. In: Li, J., Liu, Z., Peng, H. (eds.) SPNCE 2019. LNICSSITE, vol. 284, pp. 509\u2013517. Springer, Cham (2019). \nhttps:\/\/doi.org\/10.1007\/978-3-030-21373-2_41"},{"unstructured":"Dobbins, R., Migault, D., Fouant, S., Moskowitz, R., Teague, N.: Draft-ietf-dots-use-cases [EB\/OL].\nhttps:\/\/tools.ietf.org\/html\/draft-ietf-dots-use-cases-25","key":"36_CR6"},{"unstructured":"Mortensen, A., Moskowitz, R., Reddy, T.: RFC 8612 [EB\/OL]. \nhttps:\/\/tools.ietf.org\/html\/draft-ietf-dots-requirements","key":"36_CR7"},{"doi-asserted-by":"crossref","unstructured":"Steinberger, J., Kuhnert, B., Sperotto, A., Baier, H., Pras, A.: Collaborative DDOS defense using flow-based security event information. In: NOMS 2016\u20132016 IEEE\/IFIP Network Operations and Management Symposium, pp. 516\u2013522, April 2016","key":"36_CR8","DOI":"10.1109\/NOMS.2016.7502852"},{"unstructured":"Grady, J., Christiansen, C.A., Price, C., Richmond, C.: Worldwide DDoS prevention products and services 2013\u20132017 forecast. IDC #239954e, vol. 1, March 2013","key":"36_CR9"},{"unstructured":"Fayaz, S.K., Tobioka, Y., Sekar, V.: Bohatei: flexible and elastic DDoS defense. In: 24th USENIX Security Symposium, August 2015","key":"36_CR10"},{"unstructured":"Reddy, T., Boucadair, M., Patil, P., Mortensen, A., Teague, N.: RFC 8782 [EB\/OL].\nhttps:\/\/tools.ietf.org\/html\/draft-ietf-dots-signal-channel","key":"36_CR11"},{"issue":"3\/4","key":"36_CR12","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1016\/j.rse.2004.03.014","volume":"91","author":"J Chen","year":"2004","unstructured":"Chen, J., Jonsson, P., Tamura, M., et al.: A simple method for reconstructing a high-quality NDVI time-series data set based on the Savitzky-Golay filter. Remote Sens. Environ. Interdisc. J. 91(3\/4), 332\u2013344 (2004)","journal-title":"Remote Sens. Environ. Interdisc. J."}],"container-title":["Communications in Computer and Information Science","Frontiers in Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-9739-8_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,5]],"date-time":"2020-11-05T12:18:28Z","timestamp":1604578708000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-15-9739-8_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9789811597381","9789811597398"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-9739-8_36","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"4 November 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Frontiers in Cyber Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tianjin","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 November 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 November 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fcs2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.icfcs.com.cn\/fcs2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}