{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T09:17:01Z","timestamp":1729675021624,"version":"3.28.0"},"reference-count":7,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/aina.2004.1283792","type":"proceedings-article","created":{"date-parts":[[2004,6,10]],"date-time":"2004-06-10T10:19:45Z","timestamp":1086862785000},"page":"227-230","source":"Crossref","is-referenced-by-count":8,"title":["A graph-based methodology for analyzing ip spoofing attack"],"prefix":"10.1109","volume":"2","author":[{"given":"V.","family":"Santiraveewan","sequence":"first","affiliation":[]},{"given":"Y.","family":"Permpoontanalarp","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2000.848455"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45600-7_36"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/ICON.2001.962345"},{"journal-title":"Egress Filtering V 0 2","year":"2000","key":"7"},{"key":"6","article-title":"Network ingress filtering: Defeating DOS attacks which employ IP source address spoofing","volume":"2827","author":"ferguson","year":"2000","journal-title":"RFC"},{"key":"5","doi-asserted-by":"crossref","DOI":"10.3233\/JCS-1999-7103","article-title":"NetSTAT: A network-based Intrusion detection system","volume":"7","author":"vigna","year":"1999","journal-title":"Journal of Computer Security"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1997.601327"}],"event":{"name":"18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.","location":"Fukuoka, Japan"},"container-title":["18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9028\/28653\/01283792.pdf?arnumber=1283792","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,5,30]],"date-time":"2018-05-30T08:07:09Z","timestamp":1527667629000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1283792\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":7,"URL":"https:\/\/doi.org\/10.1109\/aina.2004.1283792","relation":{},"subject":[]}}