{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T15:23:24Z","timestamp":1729610604629,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,11]]},"DOI":"10.1109\/atnac.2011.6096629","type":"proceedings-article","created":{"date-parts":[[2011,12,15]],"date-time":"2011-12-15T22:03:25Z","timestamp":1323986605000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Experiences from the MANIAC Challenge"],"prefix":"10.1109","author":[{"given":"Heiko","family":"Will","sequence":"first","affiliation":[]},{"given":"Felix","family":"Juraschek","sequence":"additional","affiliation":[]},{"given":"Mesut","family":"Gunes","sequence":"additional","affiliation":[]},{"given":"Jochen","family":"Schiller","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"19"},{"journal-title":"An analysis of Conficker's logic and rendezvous points","year":"0","author":"porras","key":"17"},{"journal-title":"BEP 5 - DHT Protocol","year":"0","author":"loewenstern","key":"18"},{"year":"0","author":"guha","key":"15"},{"year":"0","author":"guha","key":"16"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/1330107.1330131"},{"journal-title":"WITS Waikato Internet Traffic Storage","year":"0","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5766"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5245"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1644893.1644904"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1544012.1544024"},{"key":"1","article-title":"The impact and implications of the growth of residential user-to-user traffic","author":"cho","year":"2006","journal-title":"Proceedings of SIGCOMM'06 Sept 11-15 2006 Pisa Italy"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3489"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.17487\/rfc1918"},{"key":"6","article-title":"Address sharing - Coming to a network near you","volume":"5","author":"ford","year":"2009","journal-title":"IET Journal"},{"journal-title":"Common Requirements for IP Address Sharing Schemes","year":"0","author":"yamagata","key":"5"},{"key":"4","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1007\/978-3-540-31966-5_6","article-title":"Analysis of peer-to-peer traffic on ADSL","volume":"3431","author":"plissonneau","year":"2005","journal-title":"Passive and Active Network Measurement"},{"year":"0","key":"9"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.17487\/rfc1631"}],"event":{"name":"2011 Australasian Telecommunication Networks and Applications Conference (ATNAC 2011)","start":{"date-parts":[[2011,11,9]]},"location":"Melbourne, Australia","end":{"date-parts":[[2011,11,11]]}},"container-title":["2011 Australasian Telecommunication Networks and Applications Conference (ATNAC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6093308\/6096625\/06096629.pdf?arnumber=6096629","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T11:25:10Z","timestamp":1497957910000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6096629\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,11]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/atnac.2011.6096629","relation":{},"subject":[],"published":{"date-parts":[[2011,11]]}}}