{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,12]],"date-time":"2026-05-12T16:45:32Z","timestamp":1778604332903,"version":"3.51.4"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1109\/giis.2015.7347185","type":"proceedings-article","created":{"date-parts":[[2015,12,10]],"date-time":"2015-12-10T16:15:00Z","timestamp":1449764100000},"page":"1-6","source":"Crossref","is-referenced-by-count":30,"title":["Flowfence: a denial of service defense system for software defined networking"],"prefix":"10.1109","author":[{"given":"Andres Felipe Murillo","family":"Piedrahita","sequence":"first","affiliation":[]},{"given":"Sandra","family":"Rueda","sequence":"additional","affiliation":[]},{"given":"Diogo M. F.","family":"Mattos","sequence":"additional","affiliation":[]},{"given":"Otto Carlos M. B.","family":"Duarte","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2013.6831276"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516684"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2010.5735752"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1851182.1851214"},{"key":"ref14","article-title":"Efficient and Secure Source Authentication with Packet Passports","author":"liu","year":"2006","journal-title":"II Conference on Steps to Reducing Unwanted Traffic on the Internet"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2014.7037155"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1002\/9781119042655.ch3"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2010.5655108"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CATCH.2009.23"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1007\/978-3-642-04444-1_3","article-title":"The coremelt attack","volume":"5789","author":"studer","year":"2009","journal-title":"Computer Security - ESORICS 2009"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2371999"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.031413.00127"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7081075"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.bjp.2014.01.002"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/ColComCon.2014.6860412","article-title":"Automatic Network Reconfiguration Because of Security Events","author":"silva delgado","year":"2014","journal-title":"Proceedings IEEE Colombian Conference on Communications and Computing 2014"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2015.03.003"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"1344","DOI":"10.1016\/j.comnet.2012.12.017","article-title":"Cyber Security in the Smart Grid: Survey and Challenges","volume":"57","author":"wenye","year":"2013","journal-title":"Comp Net"},{"key":"ref1","year":"2015","journal-title":"Worldwide Infrastructure Security Report 2014 Report Arbor Networks"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICUFN.2014.6876752"}],"event":{"name":"2015 Global Information Infrastructure and Networking Symposium (GIIS)","location":"Guadalajara, Mexico","start":{"date-parts":[[2015,10,28]]},"end":{"date-parts":[[2015,10,30]]}},"container-title":["2015 Global Information Infrastructure and Networking Symposium (GIIS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7347054\/7347171\/07347185.pdf?arnumber=7347185","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T21:20:20Z","timestamp":1498252820000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7347185\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/giis.2015.7347185","relation":{},"subject":[],"published":{"date-parts":[[2015,10]]}}}