{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T21:54:43Z","timestamp":1775339683990,"version":"3.50.1"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1109\/glocomw.2013.6825115","type":"proceedings-article","created":{"date-parts":[[2014,6,17]],"date-time":"2014-06-17T01:53:24Z","timestamp":1402970004000},"page":"963-968","source":"Crossref","is-referenced-by-count":28,"title":["Decoupling malicious Interests from Pending Interest Table to mitigate Interest Flooding Attacks"],"prefix":"10.1109","author":[{"family":"Kai Wang","sequence":"first","affiliation":[]},{"family":"Huachun Zhou","sequence":"additional","affiliation":[]},{"family":"Yajuan Qin","sequence":"additional","affiliation":[]},{"family":"Jia Chen","sequence":"additional","affiliation":[]},{"family":"Hongke Zhang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"Bandwidth and storage sharing performance in information centric networking","author":"carofiglio","year":"2011","journal-title":"ACM Sigcomm Workshop on Information-Centric Networking (ICN)"},{"key":"22","author":"afanasyev","year":"2012","journal-title":"Ndnsim Ndn Simulator for ns-3"},{"key":"17","article-title":"Lessons from the past: Why data-driven states harm future information-centric networking","author":"wahlisch","year":"2013","journal-title":"Proc of IFIP Networking"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2003.822655"},{"key":"18","article-title":"Lads: Large-scale automated ddos detection system","author":"sekar","year":"2006","journal-title":"Proc of Usenix Technical Conference"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2013.6970722"},{"key":"16","author":"wahlisch","year":"2012","journal-title":"Backscatter from the Data Plane - Threats to Stability and Security in Information-Centric Networking"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2012.6363698"},{"key":"14","article-title":"Interest flooding attack and countermeasures in named data networking","author":"afanasyev","year":"2013","journal-title":"Proc of IFIP Networking"},{"key":"11","author":"lauinger","year":"2010","journal-title":"Security & Scalability of Content-Centric Networking"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1002\/sec.770"},{"key":"21","author":"carofiglio","year":"0","journal-title":"Modeling Data Transfer in Content Centric Networking(extended Version)"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1658978.1658992"},{"key":"20","article-title":"Modeling data transfer in content centric networking","author":"carofiglio","year":"2011","journal-title":"Proc of 23rd International Teletraffic Congress"},{"key":"2","article-title":"An information-centric design for the future internet","author":"dannewitz netinf","year":"2009","journal-title":"Proc 3rd GI\/ITG KuVS Workshop on the Future Internet"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/1282427.1282402"},{"key":"10","author":"gasti","year":"2012","journal-title":"DoS and DDoS in Named Data Networking"},{"key":"7","first-page":"75","article-title":"Publish\/subscribe for internet: PSIRP perspective","volume":"4","author":"lagutin","year":"2010","journal-title":"Towards the Future Internet Emerging Trends from European Research"},{"key":"6","year":"2010"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/2063176.2063204"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1658939.1658941"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.031413.00127"},{"key":"8","article-title":"Developing information networking further: From PSIRP to PURSUIT","author":"fotiou","year":"2010","journal-title":"Proc of Intl ICST Conf Broadband Communications Networks and Systems (BROADNETS) 2010 (Invited Paper)"}],"event":{"name":"2013 IEEE Globecom Workshops (GC Wkshps)","location":"Atlanta, GA","start":{"date-parts":[[2013,12,9]]},"end":{"date-parts":[[2013,12,13]]}},"container-title":["2013 IEEE Globecom Workshops (GC Wkshps)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6820092\/6824917\/06825115.pdf?arnumber=6825115","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T19:56:30Z","timestamp":1490298990000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6825115\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/glocomw.2013.6825115","relation":{},"subject":[],"published":{"date-parts":[[2013,12]]}}}