{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T17:11:02Z","timestamp":1729617062785,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,8]]},"DOI":"10.1109\/fskd.2014.6980970","type":"proceedings-article","created":{"date-parts":[[2014,12,30]],"date-time":"2014-12-30T16:43:41Z","timestamp":1419957821000},"page":"968-972","source":"Crossref","is-referenced-by-count":2,"title":["Bee-based IP traceback"],"prefix":"10.1109","author":[{"given":"M.","family":"Hamedi-Hamzehkolaie","sequence":"first","affiliation":[]},{"given":"Reza","family":"Sanei","sequence":"additional","affiliation":[]},{"given":"Chi","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Xue","family":"Tian","sequence":"additional","affiliation":[]},{"given":"Masoud Khalil","family":"Nezhad","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"A biologically-inspired optimization algorithm for ban evacuation planning in disaster management","author":"samadzadegan","year":"2010","journal-title":"Proceedings of ACRS"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/362686.362692"},{"key":"18","article-title":"Scalable packet digesting schemes for IP traceback","author":"lee","year":"2004","journal-title":"Proc in IEEE Int Conf on Commun (ICC)"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2010.97"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2002.804827"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2006.63"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2007.910594"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2006.1603385"},{"key":"12","article-title":"On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack","author":"park","year":"2001","journal-title":"Proc IEEE InfoCom"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.268"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxs124"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.232"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.98"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2223675"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2013.022713.120250"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1145\/2484313.2484366"},{"key":"27","doi-asserted-by":"crossref","first-page":"160","DOI":"10.1007\/3-540-45508-6_12","article-title":"Implementation of a bandwidth broker for dynamic end-to-end capacity reservation over multiple diffserv domains","volume":"2216","author":"khalil","year":"2001","journal-title":"Management of Multimedia on the Internet Lecture Notes in Computer Science"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2001.990763"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/90.929847"},{"key":"2","first-page":"319","article-title":"Tracing anonymous packets to their approximate source","author":"burch","year":"2000","journal-title":"Proc of the 14th USENIX Conf on Syst Adm (LISA 2000)"},{"key":"10","doi-asserted-by":"crossref","first-page":"400","DOI":"10.1007\/978-3-540-30555-2_47","article-title":"Tracing attackers with deterministic edge router marking (DERM)","author":"rayanchu","year":"2004","journal-title":"Distrib Comput and Internet Tech First Int Conf"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2009.03.090"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2005.1498364"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2005.114"},{"key":"5","first-page":"878","article-title":"Advanced and authenticated marking schemes for IP traceback","volume":"2","author":"song","year":"2001","journal-title":"Proc of the 20th Annu Jt Conf on IEEE Comput and Commun Soc"},{"key":"4","article-title":"Advanced and authenticated marking schemes for IP traceback","author":"song","year":"2000","journal-title":"Tech Rep No UCB\/CSD-00-1107"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/505586.505588"},{"key":"8","doi-asserted-by":"crossref","first-page":"2677","DOI":"10.1016\/j.comnet.2006.11.020","article-title":"On deterministic packet marking","volume":"51","author":"andrey","year":"2007","journal-title":"Int J of Comput Netw"}],"event":{"name":"2014 11th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD)","start":{"date-parts":[[2014,8,19]]},"location":"Xiamen, China","end":{"date-parts":[[2014,8,21]]}},"container-title":["2014 11th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6962871\/6980796\/06980970.pdf?arnumber=6980970","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T22:52:28Z","timestamp":1498171948000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6980970\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/fskd.2014.6980970","relation":{},"subject":[],"published":{"date-parts":[[2014,8]]}}}