{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,24]],"date-time":"2025-03-24T06:43:20Z","timestamp":1742798600496},"reference-count":16,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/discex.2003.1194976","type":"proceedings-article","created":{"date-parts":[[2004,3,22]],"date-time":"2004-03-22T09:34:28Z","timestamp":1079948068000},"page":"266-270","source":"Crossref","is-referenced-by-count":2,"title":["Traceback of single IP packets using SPIE"],"prefix":"10.1109","volume":"2","author":[{"given":"W.T.","family":"Strayer","sequence":"first","affiliation":[]},{"given":"C.E.","family":"Jones","sequence":"additional","affiliation":[]},{"given":"F.","family":"Tchakountio","sequence":"additional","affiliation":[]},{"given":"A.C.","family":"Snoeren","sequence":"additional","affiliation":[]},{"given":"B.","family":"Schwartz","sequence":"additional","affiliation":[]},{"given":"R.C.","family":"Clements","sequence":"additional","affiliation":[]},{"given":"M.","family":"Condell","sequence":"additional","affiliation":[]},{"given":"C.","family":"Partridge","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Internet Protocol","author":"postel","year":"1981","journal-title":"IETF RFC 791"},{"key":"ref11","article-title":"Security fun with OCxmon and cflowd","author":"sager","year":"1998","journal-title":"Internet 2 Working Group Meeting"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2001.932167"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/90.929847"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/383059.383060"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2002.804827"},{"key":"ref16","article-title":"Advanced and authenticated marking schemes for IP traceback","author":"song","year":"2001","journal-title":"Proc IEEE INFOCOM '01"},{"key":"ref4","first-page":"271","article-title":"Trajectory sampling for direct traffic observation","author":"duffield","year":"2000","journal-title":"Proc ACM SIGCOMM '00"},{"key":"ref3","article-title":"Tracing anonymous packets to their approximate source","author":"burch","year":"2000","journal-title":"Proc USENIX LISA '00"},{"journal-title":"Stop 0A in tcpip sys when receiving out of band (OOB) data","year":"0","key":"ref6"},{"key":"ref5","article-title":"Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing","author":"ferguson","year":"1998","journal-title":"IETF RFC 2267"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/505659.505664"},{"journal-title":"Network Traffic Packet Header Traces","year":"0","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/362686.362692"},{"key":"ref1","article-title":"Icmp traceback messages","author":"bellovin","year":"2001","journal-title":"Internet Draft IETF"},{"key":"ref9","article-title":"Internet Control Message Protocol","author":"postel","year":"1981","journal-title":"IETF RFC 792"}],"event":{"name":"DARPA Information Survivability Conference and Exposition","acronym":"DISCEX-03","location":"Washington, DC, USA"},"container-title":["Proceedings DARPA Information Survivability Conference and Exposition"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8503\/26876\/01194976.pdf?arnumber=1194976","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,13]],"date-time":"2017-03-13T17:44:07Z","timestamp":1489427047000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1194976\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/discex.2003.1194976","relation":{},"subject":[]}}