{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T16:39:03Z","timestamp":1725554343777},"reference-count":0,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,7]]},"DOI":"10.1109\/cit.2008.4594639","type":"proceedings-article","created":{"date-parts":[[2008,8,13]],"date-time":"2008-08-13T22:40:13Z","timestamp":1218667213000},"page":"3-3","source":"Crossref","is-referenced-by-count":1,"title":["Keynote III: Detection and traceback of DDoS attacks"],"prefix":"10.1109","author":[{"family":"Wanlei Zhou","sequence":"first","affiliation":[]}],"member":"263","event":{"name":"2008 8th IEEE International Conference on Computer and Information Technology (CIT)","start":{"date-parts":[[2008,7,8]]},"location":"Sydney, Australia","end":{"date-parts":[[2008,7,11]]}},"container-title":["2008 8th IEEE International Conference on Computer and Information Technology"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4586225\/4594630\/04594639.pdf?arnumber=4594639","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,16]],"date-time":"2017-03-16T15:32:41Z","timestamp":1489678361000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4594639\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,7]]},"references-count":0,"URL":"https:\/\/doi.org\/10.1109\/cit.2008.4594639","relation":{},"subject":[],"published":{"date-parts":[[2008,7]]}}}