{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:17:37Z","timestamp":1763457457898},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,10]]},"DOI":"10.1109\/ictc.2014.6983147","type":"proceedings-article","created":{"date-parts":[[2014,12,30]],"date-time":"2014-12-30T23:52:42Z","timestamp":1419983562000},"source":"Crossref","is-referenced-by-count":25,"title":["Mitigating Denial of Service (DoS) attacks in OpenFlow networks"],"prefix":"10.1109","author":[{"given":"Yustus Eko","family":"Oktian","sequence":"first","affiliation":[]},{"given":"SangGon","family":"Lee","sequence":"additional","affiliation":[]},{"given":"HoonJae","family":"Lee","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","author":"cbench","year":"0"},{"key":"17","author":"open vswitch","year":"0"},{"key":"18","year":"0","journal-title":"Buffer Overflow Exception"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2010.5735752"},{"key":"16","author":"mininet","year":"0"},{"key":"13","author":"dover","year":"0","journal-title":"A Denial of Service Attack Against the Open Floodlight SDN Controller"},{"key":"14","author":"gkounis","year":"2014","journal-title":"Cross-domain DoS Link-flooding Attack Detection and Mitigation Using SDN Principles"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/2342441.2342466"},{"key":"12","article-title":"FRESCO: Modular composable security services for software-defined networks","author":"shin","year":"2013","journal-title":"NDSS"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1355734.1355746"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/2491185.2491199"},{"key":"1","author":"kerravala","year":"2002","journal-title":"Configuration management delivers business resiliency"},{"key":"10","doi-asserted-by":"crossref","DOI":"10.1145\/2508859.2516684","article-title":"AVANT-GUARD: Scalable and vigilant switch flow management in software-defined networks","author":"shin","year":"2013","journal-title":"Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security"},{"key":"7","author":"messmer","year":"2014","journal-title":"Massive Denial-of-service Attacks Pick Up Steam New Nefarious Techniques"},{"key":"6","author":"van buskirk","year":"2009","journal-title":"Facebook Confirms Denial-of- Service Attack (Updated)"},{"key":"5","author":"van buskirk","year":"2009","journal-title":"Denial-of-Service Attack Knocks Twitter Offline (Updated)"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/2491185.2491189"},{"key":"9","author":"wang","year":"0","journal-title":"OF-GUARD A DoS Attack Prevention Extension in Software-Defined Networks"},{"key":"8","author":"cid","year":"2014","journal-title":"More Than 162 000 WordPress Sites Used for Distributed Denial of Service Attack"}],"event":{"name":"2014 International Conference on Information and Communication Technology Convergence (ICTC)","location":"Busan, South Korea","start":{"date-parts":[[2014,10,22]]},"end":{"date-parts":[[2014,10,24]]}},"container-title":["2014 International Conference on Information and Communication Technology Convergence (ICTC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6966882\/6983064\/06983147.pdf?arnumber=6983147","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T02:53:35Z","timestamp":1498186415000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6983147\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/ictc.2014.6983147","relation":{},"subject":[],"published":{"date-parts":[[2014,10]]}}}