{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T13:47:57Z","timestamp":1725716877235},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1109\/glocomw.2014.7063387","type":"proceedings-article","created":{"date-parts":[[2015,3,20]],"date-time":"2015-03-20T17:21:39Z","timestamp":1426872099000},"page":"64-69","source":"Crossref","is-referenced-by-count":6,"title":["Web bugs in the cloud: Feasibility study of a new form of EDoS attack"],"prefix":"10.1109","author":[{"given":"Natalia","family":"Vlajic","sequence":"first","affiliation":[]},{"given":"Armin","family":"Slopek","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(13)70053-8"},{"journal-title":"A Computer Scientist in a Business School Blog","article-title":"The Google attack: How I attacked myself using Google Spreadsheets and I ramped up a $1000 bandwidth bill","year":"2012","key":"ref3"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.47"},{"journal-title":"MacAfee Blog Central","article-title":"Evolving DDoS Botnets: 1. BlackEnergy","year":"2011","key":"ref6"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2187836.2187918"},{"key":"ref5","first-page":"239","article-title":"Dirt Jumper: A key player in today's botnet-for-DDoS market","author":"andrade","year":"2012","journal-title":"World Congress on Internet Security (WorldCIS-2012) WorldCIS"},{"journal-title":"Amazon Web Services","article-title":"Amazon S3 Pricing","year":"2014","key":"ref12"},{"key":"ref8","article-title":"The Underground Economy of Spam: A Botmaster's Perspective of Coordinating Large-Scale Spam Campaigns","author":"stone-gross","year":"2011","journal-title":"4th Usenix Workshop on Large-Scale Exploits and Emergent Threats Boston UScrA"},{"article-title":"Cloudification of Web DDoS Attacks","year":"2014","author":"blog","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2012.43"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1455518.1477941"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/UCC.2011.17"}],"event":{"name":"2014 IEEE Globecom Workshops (GC Wkshps)","start":{"date-parts":[[2014,12,8]]},"location":"Austin, TX, USA","end":{"date-parts":[[2014,12,12]]}},"container-title":["2014 IEEE Globecom Workshops (GC Wkshps)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7050532\/7063320\/07063387.pdf?arnumber=7063387","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T23:30:55Z","timestamp":1490311855000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7063387\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/glocomw.2014.7063387","relation":{},"subject":[],"published":{"date-parts":[[2014,12]]}}}