{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T13:43:36Z","timestamp":1773150216693,"version":"3.50.1"},"reference-count":29,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/discex.2003.1194868","type":"proceedings-article","created":{"date-parts":[[2004,3,1]],"date-time":"2004-03-01T21:26:50Z","timestamp":1078176410000},"page":"2-13","source":"Crossref","is-referenced-by-count":58,"title":["Cossack: coordinated suppression of simultaneous attacks"],"prefix":"10.1109","author":[{"given":"C.","family":"Papadopoulos","sequence":"first","affiliation":[]},{"given":"R.","family":"Lindell","sequence":"additional","affiliation":[]},{"given":"J.","family":"Mehringer","sequence":"additional","affiliation":[]},{"given":"A.","family":"Hussain","sequence":"additional","affiliation":[]},{"given":"R.","family":"Govindan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Advanced and Authenticated Marking Schemes for IP Traceback","author":"song","year":"2000","journal-title":"Technical Report UCB\/CSD-00-1107"},{"key":"ref11","year":"0"},{"key":"ref12","year":"0"},{"key":"ref13","year":"0"},{"key":"ref14","year":"0"},{"key":"ref15","year":"0"},{"key":"ref16","year":"0"},{"key":"ref17","article-title":"CenterTrack: An IP Overlay Network for Tracking DoS Floods","author":"stone","year":"1999","journal-title":"Presentation at NANOG17"},{"key":"ref18","article-title":"A Study in Using Neural Networks for Anomaly and Misuse Detection","year":"1999","journal-title":"Proc USENIX"},{"key":"ref19","article-title":"ICMP traceback messages","author":"bellovin","year":"0","journal-title":"Internet Draft Draft-bellovinitrace-00 txt"},{"key":"ref28","year":"0"},{"key":"ref4","year":"0"},{"key":"ref27","article-title":"IETF Intrusion Detection working group","year":"0"},{"key":"ref3","year":"0"},{"key":"ref6","year":"0"},{"key":"ref29","article-title":"Fault-Tolerant Networking Through Intrusion Identification and Secure Compartments","year":"0"},{"key":"ref5","year":"0"},{"key":"ref8","article-title":"On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack","author":"park","year":"2000","journal-title":"Technical Report CSD-TR 00-013"},{"key":"ref7","article-title":"ICMP Traceback Messages","year":"2000","journal-title":"draft-belovin-itrace-00 txt work in progress"},{"key":"ref2","year":"0"},{"key":"ref9","article-title":"Practical Network Support for IP Traceback","author":"savage","year":"0","journal-title":"Proceedings of Sig-comm2000"},{"key":"ref1","year":"0"},{"key":"ref20","article-title":"Chris Chatfield. The Analysis of Time Series","year":"1996","journal-title":"Introduction Chapman and Hall texts in Statistical science series"},{"key":"ref22","article-title":"Attacking DDoS at the source","author":"reiher","year":"2002","journal-title":"10th IEEE International Conference on Network Protocols"},{"key":"ref21","article-title":"Implementing push-back: Router-based defense against DDoS attacks","author":"ioannidis","year":"2002","journal-title":"Proc Symp Network and Distributed System Security"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/383059.383061"},{"key":"ref23","article-title":"Introduction to Spectral Analysis","author":"stoica","year":"1997"},{"key":"ref26","doi-asserted-by":"crossref","DOI":"10.1145\/964723.383060","article-title":"Strayer. hash-Based IP Traceback","author":"snoeren","year":"2001","journal-title":"Proc of ACM SIGCOMM 2001"},{"key":"ref25","article-title":"Your Own Internet Distribution. Work in Progress","author":"francis","year":"0"}],"event":{"name":"DARPA Information Survivability Conference and Exposition","location":"Washington, DC, USA","acronym":"DISCEX-03"},"container-title":["Proceedings DARPA Information Survivability Conference and Exposition"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8503\/26875\/01194868.pdf?arnumber=1194868","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T00:04:38Z","timestamp":1497571478000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1194868\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/discex.2003.1194868","relation":{},"subject":[]}}