{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T11:14:09Z","timestamp":1725534849163},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,10]]},"DOI":"10.1109\/crisis.2008.4757488","type":"proceedings-article","created":{"date-parts":[[2009,1,20]],"date-time":"2009-01-20T21:03:38Z","timestamp":1232485418000},"page":"261-266","source":"Crossref","is-referenced-by-count":4,"title":["Comparing Chord, CAN, and Pastry overlay networks for resistance to DoS attacks"],"prefix":"10.1109","author":[{"given":"Hakem","family":"Beitollahi","sequence":"first","affiliation":[]},{"given":"Geert","family":"Deconinck","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2005.07.022"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/1036921.1036926"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/383059.383071"},{"article-title":"using overlay networks to resist denial-of-service attacks","year":"2003","author":"wang","key":"12"},{"journal-title":"The DoS project's trinoo distributed denial of service attack toll","year":"1999","author":"dittrich","key":"3"},{"journal-title":"Spectral Graph Theory","year":"1997","author":"chung","key":"2"},{"key":"1","article-title":"mayday:distributed filtering for internet services","author":"andersen","year":"2003","journal-title":"Proceedings of 4th Usenix Symposium on Internet Technologies and Systems"},{"key":"10","article-title":"internet indirection infrastructure","author":"stoica","year":"2002","journal-title":"Proceedings of the Conference on Applications Technologies Architectures and Protocols for Computer Communications (SIGCOMM'02)"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/383059.383072"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1132026.1132027"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/633025.633032"},{"journal-title":"CSI\/FBI Computer Crime and Security Survey","year":"2004","author":"gordon","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2005.01.005"},{"key":"8","article-title":"pastry: scalable, decentralized object location and routing for large-scale peer-to-peer systems","author":"rowstron","year":"2001","journal-title":"Proceedings of the 18th IFIP\/ACM International Conference on Distributed Systems Platforms (Middleware'01)"}],"event":{"name":"2008 Third International Conference on Risks and Security of Internet and Systems( CRiSIS)","start":{"date-parts":[[2008,10,28]]},"location":"Tozeur, Tunisia","end":{"date-parts":[[2008,10,30]]}},"container-title":["2008 Third International Conference on Risks and Security of Internet and Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4733895\/4757450\/04757488.pdf?arnumber=4757488","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,17]],"date-time":"2017-03-17T20:08:57Z","timestamp":1489781337000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4757488\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,10]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/crisis.2008.4757488","relation":{},"subject":[],"published":{"date-parts":[[2008,10]]}}}