{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T06:45:43Z","timestamp":1725432343927},"reference-count":9,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,10]]},"DOI":"10.1109\/icitcs.2014.7021760","type":"proceedings-article","created":{"date-parts":[[2015,1,27]],"date-time":"2015-01-27T10:31:52Z","timestamp":1422354712000},"page":"1-4","source":"Crossref","is-referenced-by-count":1,"title":["Dynamic Security Level Changing Strategy Using Attack Predictions - Case Study of TCP SYN Attacks"],"prefix":"10.1109","author":[{"given":"Sung-Hwa","family":"Lim","sequence":"first","affiliation":[]},{"given":"Jai-Hoon","family":"Kim","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.4236\/jis.2011.23013"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1002\/sec.365"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2013.6614127"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1997.601338"},{"journal-title":"Replication Schemes for Dependable and Effective Mobile Systems","year":"2008","author":"lim","key":"6"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2008.03.022"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1658939.1658941"},{"key":"9","article-title":"Requirements for internet hosts-communication layers","author":"branden","year":"1989","journal-title":"RFC 1122 Internet Engineering Task Force"},{"key":"8","article-title":"Transmission control protocol-darpa internet program protocol specification","author":"postel","year":"1981","journal-title":"RFC793 USC\/Information Sciences Institute"}],"event":{"name":"2014 International Conference on IT Convergence and Security (ICITCS)","start":{"date-parts":[[2014,10,28]]},"location":"Beijing, China","end":{"date-parts":[[2014,10,30]]}},"container-title":["2014 International Conference on IT Convergence and Security (ICITCS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7017939\/7021698\/07021760.pdf?arnumber=7021760","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T01:44:42Z","timestamp":1490319882000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7021760\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10]]},"references-count":9,"URL":"https:\/\/doi.org\/10.1109\/icitcs.2014.7021760","relation":{},"subject":[],"published":{"date-parts":[[2014,10]]}}}