{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,9]],"date-time":"2025-11-09T07:39:44Z","timestamp":1762673984050},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,1]]},"DOI":"10.1109\/ccnc.2014.6866596","type":"proceedings-article","created":{"date-parts":[[2014,7,30]],"date-time":"2014-07-30T21:10:57Z","timestamp":1406754657000},"page":"363-370","source":"Crossref","is-referenced-by-count":2,"title":["Topology-dependent performance of attack graph reconstruction in PPM-based IP traceback"],"prefix":"10.1109","author":[{"given":"Ankunda R.","family":"Kiremire","sequence":"first","affiliation":[]},{"given":"Matthias R.","family":"Brust","sequence":"additional","affiliation":[]},{"given":"Vir V.","family":"Phoha","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/49.12889"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.172501399"},{"key":"22","first-page":"638","article-title":"On distinguishing between internet power law topology generators","author":"bu","year":"2002","journal-title":"Proc of IEEE INFOCOM Conf"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.85.5234"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1016\/0012-365X(90)90358-O"},{"key":"15","doi-asserted-by":"crossref","first-page":"509","DOI":"10.1126\/science.286.5439.509","article-title":"Emergence of scaling in random networks","author":"barabasi","year":"1999","journal-title":"Science"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/MASCOT.2001.948886"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2007.892850"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2006.151"},{"key":"11","doi-asserted-by":"crossref","first-page":"824","DOI":"10.1126\/science.298.5594.824","article-title":"Network motifs: Simple building blocks of complex networks","author":"milo","year":"2002","journal-title":"Science"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1126\/science.1089167"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2007.70229"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/35.587723"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/90.929847"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511814068"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2007.910594"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2003.1215651"},{"key":"7","article-title":"Network topologies, power laws, and hierarchy","author":"tangmunarunkit","year":"2001","journal-title":"Comput Commun Rev"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2004.831336"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.5815\/ijcnis.2010.02.07"},{"key":"4","doi-asserted-by":"crossref","first-page":"3536","DOI":"10.1016\/j.comnet.2006.02.004","article-title":"Tabu marking scheme to speedup ip traceback","author":"ma","year":"2006","journal-title":"Computer Networks"},{"key":"9","first-page":"878","article-title":"Advanced and authenticated marking schemes for ip traceback","author":"song","year":"2001","journal-title":"Proc of IEEE INFOCOM Conf"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/LCNW.2012.6424039"}],"event":{"name":"2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)","start":{"date-parts":[[2014,1,10]]},"location":"Las Vegas, NV","end":{"date-parts":[[2014,1,13]]}},"container-title":["2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6858322\/6866537\/06866596.pdf?arnumber=6866596","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,13]],"date-time":"2019-08-13T11:04:19Z","timestamp":1565694259000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6866596\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,1]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/ccnc.2014.6866596","relation":{},"subject":[],"published":{"date-parts":[[2014,1]]}}}