{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T18:44:11Z","timestamp":1725389051695},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,9]]},"DOI":"10.1109\/icnss.2011.6059969","type":"proceedings-article","created":{"date-parts":[[2011,11,1]],"date-time":"2011-11-01T16:59:24Z","timestamp":1320166764000},"page":"129-136","source":"Crossref","is-referenced-by-count":0,"title":["Removing the blinders: Using information to mitigate adversaries in adaptive overlays"],"prefix":"10.1109","author":[{"given":"David","family":"Zage","sequence":"first","affiliation":[]},{"given":"Charles","family":"Killian","sequence":"additional","affiliation":[]},{"given":"Cristina","family":"Nita-Rotaru","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.231"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/1880022.1880032"},{"journal-title":"Codenomicon Tech Rep","article-title":"IPTV security and reliability challenge","year":"2008","key":"ref10"},{"journal-title":"Inside the attack that crippled Revision3","year":"2008","author":"louderback","key":"ref11"},{"key":"ref12","article-title":"Life, death, and the critical transition: Finding liveness bugs in systems code","author":"killian","year":"2007","journal-title":"Proc of NSDI"},{"journal-title":"Planetlab","year":"0","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1341731.1341736"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1328671.1328674"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1060289.1060317"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2007.912394"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2006.320193"},{"key":"ref28","article-title":"Low-rate TCP-targeted DOS attacks: the shrew vs. the mice and elephants","author":"kuzmanovic","year":"2003","journal-title":"SIGCOMM"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/345063.339337"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1060289.1060315"},{"key":"ref3","article-title":"Internet study 2008\/2009","author":"schulze","year":"2009","journal-title":"ipoque Tech Rep"},{"key":"ref6","article-title":"CoolStreaming\/DONet: A data-driven overlay network for peer-to-peer live media streaming","author":"zhang","year":"2005","journal-title":"INFOCOM"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2004.1348109"},{"key":"ref5","article-title":"Designing a DHT for low latency and high throughput","author":"dabek","year":"0","journal-title":"NSDI 2004"},{"journal-title":"2010 CyberSecurity watch survey","year":"0","key":"ref8"},{"key":"ref7","article-title":"SAAR: A shared control plane for overlay multicast","author":"nandi","year":"0","journal-title":"NSDI 2007"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79232-1_20"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2007.06.011"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1544012.1544024"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/P2P.2008.36"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2006.320199"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2009.5160955"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1113361.1113368"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/956993.956995"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/316194.316205"},{"key":"ref25","article-title":"Early experience with an internet broadcast system based on overlay multicast","author":"chu","year":"2004","journal-title":"USENIX ATC"}],"event":{"name":"2011 5th International Conference on Network and System Security (NSS)","start":{"date-parts":[[2011,9,6]]},"location":"Milan, Italy","end":{"date-parts":[[2011,9,8]]}},"container-title":["2011 5th International Conference on Network and System Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6044613\/6059944\/06059969.pdf?arnumber=6059969","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T11:30:05Z","timestamp":1490095805000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6059969\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,9]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/icnss.2011.6059969","relation":{},"subject":[],"published":{"date-parts":[[2011,9]]}}}