{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T00:24:10Z","timestamp":1730247850915,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1109\/icisa.2013.6579358","type":"proceedings-article","created":{"date-parts":[[2013,8,28]],"date-time":"2013-08-28T17:12:51Z","timestamp":1377709971000},"page":"1-4","source":"Crossref","is-referenced-by-count":2,"title":["Service-Oriented DDoS Detection Mechanism Using Pseudo State in a Flow Router"],"prefix":"10.1109","author":[{"given":"PyungKoo","family":"Park","sequence":"first","affiliation":[]},{"given":"SeongMin","family":"Yoo","sequence":"additional","affiliation":[]},{"given":"HoYong","family":"Ryu","sequence":"additional","affiliation":[]},{"given":"Cheol Hong","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Su-il","family":"Choi","sequence":"additional","affiliation":[]},{"given":"JaeCheol","family":"Ryou","sequence":"additional","affiliation":[]},{"given":"Jaehyung","family":"Park","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"13"},{"key":"11","article-title":"Graph and hashing algorithms for modern architectures: Design and performance","author":"black jr","year":"1998","journal-title":"Proceedings of the 2nd Workshop on Algorithm Engineering (WAE'98)"},{"key":"12","article-title":"Linear hashing: A new tool for file and table addressing","author":"litwin","year":"1980","journal-title":"IEEE"},{"key":"3","article-title":"Implementing pushback: Router-based defense against ddos attacks","author":"ioannidis","year":"2002","journal-title":"Proc NDSS'2002"},{"key":"2","first-page":"1530","article-title":"Detecting syn flooding attacks","author":"wang","year":"2002","journal-title":"Proc IEEE InfoCom"},{"key":"1","article-title":"A large-scale hidden semi-markov model for anomaly detection on user browsing behaviors","author":"xie","year":"2009","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"10","article-title":"Hashing rehashed: Is RAM speed making your hashing less efficient?","volume":"4","author":"binstock","year":"1996","journal-title":"Dr Dobb's Journal"},{"year":"0","key":"7"},{"year":"0","key":"6"},{"key":"5","article-title":"Low-rate tcp-targeted denial of service attacks and counter strategies","author":"kuzmanovic","year":"2001","journal-title":"IEEE\/ACM Transactions!!!!to Improve IP Lookups INFOCOM"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2007.70817"},{"key":"9","article-title":"Hill. Tools for cache-conscious pointer structures","author":"chilimbi","year":"1999","journal-title":"Proceedings of the 1999 ACM SIGPLAN Conference on Programming Language Design and Implementation"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2001.916641"}],"event":{"name":"2013 International Conference on Information Science and Applications (ICISA)","start":{"date-parts":[[2013,6,24]]},"location":"Suwon, Korea (South)","end":{"date-parts":[[2013,6,26]]}},"container-title":["2013 International Conference on Information Science and Applications (ICISA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6575223\/6579310\/06579358.pdf?arnumber=6579358","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T23:16:04Z","timestamp":1490224564000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6579358\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/icisa.2013.6579358","relation":{},"subject":[],"published":{"date-parts":[[2013,6]]}}}