{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,6]],"date-time":"2024-08-06T02:45:00Z","timestamp":1722912300011},"reference-count":9,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/cdc.2002.1184719","type":"proceedings-article","created":{"date-parts":[[2003,8,27]],"date-time":"2003-08-27T11:38:00Z","timestamp":1061984280000},"page":"1428-1433","source":"Crossref","is-referenced-by-count":2,"title":["Optimal filtering for denial of service mitigation"],"prefix":"10.1109","volume":"2","author":[{"given":"B.","family":"Stephan","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"3","article-title":"Tracing anonymous packets to their approximate source","author":"burch","year":"0","journal-title":"Proc Usenix LISA 2000"},{"key":"2","article-title":"A novel approach to detection of S?Denial-of-serviceT? attacks via adaptive sequential and batch-sequential change-point detection methods","author":"blazek","year":"0","journal-title":"2001 IEEE Man Systems and Cybernetics Information Assurance Workshop 2001"},{"journal-title":"Nonlinear Programming","year":"1995","author":"bertsekas","key":"1"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/90.392383"},{"journal-title":"Hacking Exposed","year":"1999","author":"mcclure","key":"6"},{"year":"2001","key":"5"},{"year":"2001","key":"4"},{"key":"9","article-title":"CenterTrack: An IP overlay network for tracking DoS floods","author":"stone","year":"0","journal-title":"Proc of USENIX Security Symposium 2000"},{"key":"8","first-page":"295","article-title":"Practical network support for IP traceback","author":"savage","year":"2000","journal-title":"Proceedings of the 2000 ACM SIGCOMM Conference"}],"event":{"name":"IEEE Conference on Decision and Control","acronym":"CDC-02","location":"Las Vegas, NV, USA"},"container-title":["Proceedings of the 41st IEEE Conference on Decision and Control, 2002."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8437\/26567\/01184719.pdf?arnumber=1184719","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,13]],"date-time":"2017-03-13T18:37:57Z","timestamp":1489430277000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1184719\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":9,"URL":"https:\/\/doi.org\/10.1109\/cdc.2002.1184719","relation":{},"subject":[]}}