{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T03:27:43Z","timestamp":1730258863229,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,11]]},"DOI":"10.1109\/icsrs48664.2019.8987721","type":"proceedings-article","created":{"date-parts":[[2020,2,11]],"date-time":"2020-02-11T02:46:05Z","timestamp":1581389165000},"page":"81-85","source":"Crossref","is-referenced-by-count":0,"title":["A Reliable Lightweight Communication Method via Chain Verification"],"prefix":"10.1109","author":[{"given":"Xuewei","family":"Feng","sequence":"first","affiliation":[]},{"given":"Jin","family":"Li","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Automated attack discovery in tcp congestion control using a model-guided approach","author":"jero","year":"2018","journal-title":"NDSS"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2827"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.17487\/rfc7093"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4987"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAT.2014.34"},{"key":"ref15","first-page":"1581","article-title":"Off-path tcp exploit: How wireless routers can jeopardize your secrets","author":"chen","year":"2018","journal-title":"27th USENIX Security Symposium (USENIX Security 18)"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.29"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2597173"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8446"},{"key":"ref19","article-title":"The use of tls in censorship circumvention","author":"sergey","year":"2019","journal-title":"NDSS"},{"key":"ref4","first-page":"41","article-title":"Off-path attacking the web","author":"gilad","year":"2012","journal-title":"WOOT"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2018.2797081"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243790"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2013.6682711"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2445566.2445568"},{"key":"ref7","first-page":"254","article-title":"Towards adoption of dnssec: Availability and security challenges","volume":"2013","author":"herzberg","year":"2013","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.17487\/rfc0793"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.17487\/rfc0768"},{"key":"ref9","article-title":"Computer networking: A top-down approach","author":"kurose","year":"2011","journal-title":"Addison Wesley"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098842"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.21"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131368"},{"journal-title":"The C Programming Language","year":"1988","author":"k b","key":"ref23"}],"event":{"name":"2019 4th International Conference on System Reliability and Safety (ICSRS)","start":{"date-parts":[[2019,11,20]]},"location":"Rome, Italy","end":{"date-parts":[[2019,11,22]]}},"container-title":["2019 4th International Conference on System Reliability and Safety (ICSRS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8967508\/8987581\/08987721.pdf?arnumber=8987721","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T15:29:26Z","timestamp":1658158166000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8987721\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/icsrs48664.2019.8987721","relation":{},"subject":[],"published":{"date-parts":[[2019,11]]}}}