{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T14:12:15Z","timestamp":1725459135049},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,1]]},"DOI":"10.1109\/ccnc.2010.5421839","type":"proceedings-article","created":{"date-parts":[[2010,3,2]],"date-time":"2010-03-02T19:38:06Z","timestamp":1267558686000},"page":"1-5","source":"Crossref","is-referenced-by-count":1,"title":["Demonstration Experiments Towards Practical IP Traceback on the Internet"],"prefix":"10.1109","author":[{"given":"Ken","family":"Wakasa","sequence":"first","affiliation":[]},{"given":"Keisuke","family":"Takemori","sequence":"additional","affiliation":[]},{"given":"Toshifumi","family":"Kai","sequence":"additional","affiliation":[]},{"given":"Hiroaki","family":"Hazeyama","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2006.29"},{"key":"ref11","article-title":"Message Forwarding Strategies for Inter-AS Packet Traceback Network","author":"hazeyama","year":"2007","journal-title":"Proceedings of The 2nd Joint Workshop on Information security"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/PACRIM.2007.4313217"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2001.932167"},{"key":"ref4","article-title":"ICMP traceback message","author":"bellovin","year":"2003","journal-title":"IETF Internet Draft draft-ietf-manetzrp-04 txt"},{"key":"ref3","article-title":"Ingress Filtering for Multihomed Networks","author":"baker","year":"2004","journal-title":"RFC 3704 (Best Current Practice)"},{"key":"ref6","article-title":"Advanced and authenticated marking schemes for IP traceback","author":"song","year":"2001","journal-title":"Proceedings of IEEE INFOCOMM 2001"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ADCOM.2007.103"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/383059.383060"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2007.910594"},{"key":"ref2","article-title":"Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing","author":"ferguson","year":"0","journal-title":"RFC 2827 (Best Current Practice) May 2000 updated by RFC 3704"},{"key":"ref1","article-title":"WorldWide Infrastructure Security Report","author":"mcpherson","year":"2008","journal-title":"Arbor Networks"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2007.911427"}],"event":{"name":"2010 7th IEEE Consumer Communications and Networking Conference (CCNC)","start":{"date-parts":[[2010,1,9]]},"location":"Las Vegas, NV, USA","end":{"date-parts":[[2010,1,12]]}},"container-title":["2010 7th IEEE Consumer Communications and Networking Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5419385\/5421566\/05421839.pdf?arnumber=5421839","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,19]],"date-time":"2017-03-19T04:23:38Z","timestamp":1489897418000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5421839\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,1]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/ccnc.2010.5421839","relation":{},"subject":[],"published":{"date-parts":[[2010,1]]}}}