{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T21:52:25Z","timestamp":1730238745342,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,9]]},"DOI":"10.1109\/icdim.2013.6694018","type":"proceedings-article","created":{"date-parts":[[2014,1,6]],"date-time":"2014-01-06T17:10:38Z","timestamp":1389028238000},"page":"20-23","source":"Crossref","is-referenced-by-count":1,"title":["Secure DNS from amplification attack by using modified bloom filters"],"prefix":"10.1109","author":[{"given":"Uzma","family":"Sattar","sequence":"first","affiliation":[]},{"given":"Talha","family":"Naqash","sequence":"additional","affiliation":[]},{"given":"Muhammad Raheel","family":"Zafar","sequence":"additional","affiliation":[]},{"given":"Kashif","family":"Razzaq","sequence":"additional","affiliation":[]},{"given":"Faisal","family":"bin Ubaid","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","first-page":"94","article-title":"Formal analysis of the Kaminsky DNS cachepoisoning attackusing probabilistic model checking","author":"alexiou","year":"2010","journal-title":"IEEE Int Symposium on High-Assurance Systems Engineering (HASE'10)"},{"key":"2","article-title":"Formal modeling and analysis of DoS using probabilisticrewrite theories","author":"agha","year":"2005","journal-title":"Proc IEEE Workshop on Foundations of ComputerSecurity"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.101"},{"key":"1","first-page":"279","article-title":"Swift: A fast dynamic packet filter","author":"wu","year":"2008","journal-title":"Proc 5th USENIX Symposium on Networked Systems Design and Implementation (NSDI'08)"},{"key":"7","first-page":"1","article-title":"Efficient and low-cost hardwaredefense against DNS amplification attacks","author":"changhua","year":"2008","journal-title":"Proc IEEE GlobalTelecommunications Conf (GLOBECOM'08)"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2009.01.002"},{"key":"5","article-title":"Protocolmodifications for the DNS security extensions","author":"arends","year":"2005","journal-title":"RFC 4035"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2009.02.069"},{"key":"9","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1007\/978-3-540-89173-4_16","article-title":"Detect-ing DNS amplification attacks","volume":"5141","author":"kambourakis","year":"2008","journal-title":"Critical Information InfrastructuresSecurity"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-007-9267-2"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2003.1204223"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2008.321"}],"event":{"name":"2013 Eighth International Conference on Digital Information Management (ICDIM)","start":{"date-parts":[[2013,9,10]]},"location":"Islamabad","end":{"date-parts":[[2013,9,12]]}},"container-title":["Eighth International Conference on Digital Information Management (ICDIM 2013)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6684408\/6693962\/06694018.pdf?arnumber=6694018","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,5]],"date-time":"2019-04-05T01:48:25Z","timestamp":1554428905000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6694018\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,9]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/icdim.2013.6694018","relation":{},"subject":[],"published":{"date-parts":[[2013,9]]}}}