{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T21:24:57Z","timestamp":1730237097303,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,10,25]]},"DOI":"10.1109\/iccta40200.2016.9513229","type":"proceedings-article","created":{"date-parts":[[2021,8,17]],"date-time":"2021-08-17T22:19:53Z","timestamp":1629238793000},"page":"32-37","source":"Crossref","is-referenced-by-count":0,"title":["Design and Implementation of a New Hybrid Defense Mechanism Against DDoS Attacks"],"prefix":"10.1109","author":[{"given":"Maha Talaat","family":"Ali","sequence":"first","affiliation":[]},{"given":"Essam","family":"El Fakharany","sequence":"additional","affiliation":[]},{"given":"Mohammed Emam","family":"Shehab","sequence":"additional","affiliation":[]},{"given":"Magdy","family":"El Hennawy","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"79","article-title":"Taxonomy of IP Traceback","author":"santhanam","year":"2006","journal-title":"Journal of Information Assurance and Security"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2010.97"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2007.910594"},{"key":"ref13","article-title":"Non-Cooperative load balancing in distributed systems","author":"daniel","year":"2005","journal-title":"Journal of Parallel and Distributing Computing"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.21236\/ADA439559"},{"key":"ref15","first-page":"368","article-title":"Performance Analysis of DiffServ based Quality of Service in a Multimedia Wired Network and VPN effect using OPNET [J]","volume":"9","author":"aamir","year":"2012","journal-title":"International Journal of Computer Science Issues"},{"journal-title":"Modeling DDoS Attacks with IP Spoofing and Hop-Count Defense Measure Using Opnet Modeler","year":"2013","author":"akhter","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICoICT.2013.6574541"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2011.2161615"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICRTIT.2012.6206778"},{"journal-title":"Technical Note","article-title":"ENGRESS AND INGRESS FILTERING","year":"2006","key":"ref8"},{"journal-title":"Procedure for Detection of and Response to DDOS Cyber Attacks on Complex Enterprise Systems","year":"2012","author":"hershey","key":"ref7"},{"key":"ref2","article-title":"Defense against DDoS Attacks Using IP Address Spoofing","volume":"3","author":"pimpalkar","year":"2015","journal-title":"Int J Inn Res Comput Commun Eng"},{"key":"ref1","article-title":"Cloud Security Countermeasures against Distributed Denial of Service Attacks","volume":"2","author":"porwal","year":"2015","journal-title":"Int J of Com Systems"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948116"}],"event":{"name":"2016 26th International Conference on Computer Theory and Applications (ICCTA)","start":{"date-parts":[[2016,10,25]]},"location":"Alexandria, Egypt","end":{"date-parts":[[2016,10,27]]}},"container-title":["2016 26th International Conference on Computer Theory and Applications (ICCTA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9513217\/9512933\/09513229.pdf?arnumber=9513229","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,8]],"date-time":"2021-11-08T23:23:32Z","timestamp":1636413812000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9513229\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,25]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/iccta40200.2016.9513229","relation":{},"subject":[],"published":{"date-parts":[[2016,10,25]]}}}