{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T21:34:56Z","timestamp":1729632896072,"version":"3.28.0"},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1109\/eee.2004.1287330","type":"proceedings-article","created":{"date-parts":[[2004,6,10]],"date-time":"2004-06-10T10:19:45Z","timestamp":1086862785000},"page":"325-332","source":"Crossref","is-referenced-by-count":1,"title":["Multifunctioal ICMP messages for e-commerce"],"prefix":"10.1109","author":[{"family":"Bao-Tung Wang","sequence":"first","affiliation":[]},{"family":"Henning Schulzrinne","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/90.929847"},{"key":"2","article-title":"Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing","volume":"2827","author":"ferguson","year":"2000","journal-title":"RFC"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1998.674828"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/571697.571724"},{"key":"7","article-title":"CenterTrack: An IP overlay network for tracking DoS floods","author":"stone","year":"2000","journal-title":"The 2000 USENIX Security Symposium"},{"key":"6","doi-asserted-by":"crossref","DOI":"10.1145\/586110.586118","article-title":"Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols","author":"aiello","year":"2002","journal-title":"ACM CCS"},{"key":"5","article-title":"Advanced and authenticated marking schemes for IP traceback","author":"song","year":"2001","journal-title":"Infocom 2001"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2002.804827"},{"journal-title":"ICMP traceback messages","year":"2003","author":"bellovin","key":"9"},{"key":"8","doi-asserted-by":"crossref","DOI":"10.1109\/ICNP.2000.896310","article-title":"Malicious packet dropping: How it might impact the TCP performance and How we can detect it","author":"zhang","year":"0","journal-title":"Proc IEEE ICNP 2000"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/49.839934"}],"event":{"name":"IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004","start":{"date-parts":[[2004,3,31]]},"location":"Taipei, Taiwan","end":{"date-parts":[[2004,3,31]]}},"container-title":["IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9045\/28698\/01287330.pdf?arnumber=1287330","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,28]],"date-time":"2023-04-28T16:54:07Z","timestamp":1682700847000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1287330\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/eee.2004.1287330","relation":{},"subject":[],"published":{"date-parts":[[2004]]}}}