{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T08:21:57Z","timestamp":1729671717274,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,1]]},"DOI":"10.1109\/comsnets.2013.6465570","type":"proceedings-article","created":{"date-parts":[[2013,3,1]],"date-time":"2013-03-01T08:29:54Z","timestamp":1362126594000},"page":"1-9","source":"Crossref","is-referenced-by-count":4,"title":["IP traceback in star colored networks"],"prefix":"10.1109","author":[{"given":"Sangita","family":"Roy","sequence":"first","affiliation":[]},{"given":"Anurag","family":"Singh","sequence":"additional","affiliation":[]},{"given":"Ashok Singh","family":"Sairam","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"An Efficient Distributed Algorithm to Identify and Traceback DDoS Traffic","year":"2006","author":"wong","key":"19"},{"journal-title":"Modeling topology of large internetworks","year":"0","key":"22"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2005.861250"},{"journal-title":"CAIDA's Router-Level Topology Measurements","year":"0","key":"23"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/1059513.1059517"},{"year":"0","key":"24"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177692405"},{"key":"16","doi-asserted-by":"crossref","first-page":"261","DOI":"10.1007\/BF02066689","article-title":"On the strength of connectedness of a random graph","volume":"12","author":"erdos","year":"1961","journal-title":"Acta Mathematica Scientia Hungary"},{"key":"13","first-page":"446","author":"niven","year":"1991","journal-title":"An Introduction to the Theory of Numbers"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2004.1401609"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2005.1498364"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/ICCI.1992.227702"},{"journal-title":"You Can Run but You Can't Hide An Effective Statistical Methodology to Trace Back DDoS Attackers","year":"2005","author":"law","key":"21"},{"key":"3","first-page":"319327","article-title":"Tracing anonymous packets to their approximate source","author":"burch","year":"2000","journal-title":"Proc 2000 USENIX LISA Conf"},{"journal-title":"On the origin of power laws in internet topologies","year":"2000","author":"medina","key":"20"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2002.1012363"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/90.929847"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/ICPADS.2006.31"},{"key":"7","first-page":"4952","article-title":"Tracing attackers with deterministic edge router marking (DERM)","author":"rayanchu","year":"2004","journal-title":"Proc 1st Int Conf Distrib Comput Internet Technol"},{"key":"6","first-page":"124","article-title":"ICMP traceback with cumulative path, an effcient solution for IP traceback","author":"lee","year":"2003","journal-title":"LNCS"},{"key":"5","article-title":"ICMP traceback messages","author":"bellovin","year":"2000","journal-title":"Internet Draft Draft-Ietf-Itrace-04 Txt"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/383059.383060"},{"key":"9","article-title":"Pi: A path identification mechanism to defend against ddos attacks","author":"yaar","year":"2003","journal-title":"Proceedings of IEEE Symposium on Security and Privacy"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2003.811200"}],"event":{"name":"2013 Fifth International Conference on Communication Systems and Networks (COMSNETS)","start":{"date-parts":[[2013,1,7]]},"location":"Bangalore, India","end":{"date-parts":[[2013,1,10]]}},"container-title":["2013 Fifth International Conference on Communication Systems and Networks (COMSNETS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6451320\/6465521\/06465570.pdf?arnumber=6465570","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T04:29:52Z","timestamp":1498019392000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6465570\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,1]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/comsnets.2013.6465570","relation":{},"subject":[],"published":{"date-parts":[[2013,1]]}}}