{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:30:34Z","timestamp":1740101434432,"version":"3.37.3"},"reference-count":7,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,1,8]],"date-time":"2023-01-08T00:00:00Z","timestamp":1673136000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,1,8]],"date-time":"2023-01-08T00:00:00Z","timestamp":1673136000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100003725","name":"National Research Foundation (NRF) of Korea","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,1,8]]},"DOI":"10.1109\/ccnc51644.2023.10059724","type":"proceedings-article","created":{"date-parts":[[2023,3,17]],"date-time":"2023-03-17T17:17:55Z","timestamp":1679073475000},"page":"989-990","source":"Crossref","is-referenced-by-count":1,"title":["BACKWARD: A Victim-Centric DDoS Detection and Mitigation Scheme in Programmable Data Plane"],"prefix":"10.1109","author":[{"given":"Seoyul","family":"Oh","sequence":"first","affiliation":[{"name":"School of Electrical Engineering Korea University,Seoul,Korea"}]},{"given":"Sol","family":"Han","sequence":"additional","affiliation":[{"name":"School of Electrical Engineering Korea University,Seoul,Korea"}]},{"given":"Hochan","family":"Lee","sequence":"additional","affiliation":[{"name":"School of Electrical Engineering Korea University,Seoul,Korea"}]},{"given":"Sangheon","family":"Pack","sequence":"additional","affiliation":[{"name":"School of Electrical Engineering Korea University,Seoul,Korea"}]}],"member":"263","reference":[{"volume-title":"Netscout threat intelligence report","year":"2022","author":"Hummel","key":"ref1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656890"},{"key":"ref3","first-page":"393","article-title":"BUNGEE: An Adaptive Pushback Mechanism for DDoS Detection and Mitigation in P4 Data Planes","volume-title":"2021 IFIP\/IEEE International Symposium on Integrated Network Management (IM)","author":"Gonz\u00e1lez"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3073597"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3050220.3063772"},{"volume-title":"2018 UCSD Anonymized Internet Traces","key":"ref6"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2015.7140298"}],"event":{"name":"2023 IEEE 20th Consumer Communications & Networking Conference (CCNC)","start":{"date-parts":[[2023,1,8]]},"location":"Las Vegas, NV, USA","end":{"date-parts":[[2023,1,11]]}},"container-title":["2023 IEEE 20th Consumer Communications &amp; Networking Conference (CCNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10059462\/10059600\/10059724.pdf?arnumber=10059724","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,3]],"date-time":"2024-03-03T01:28:22Z","timestamp":1709429302000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10059724\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,8]]},"references-count":7,"URL":"https:\/\/doi.org\/10.1109\/ccnc51644.2023.10059724","relation":{},"subject":[],"published":{"date-parts":[[2023,1,8]]}}}