{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T15:44:48Z","timestamp":1775144688099,"version":"3.50.1"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,4]]},"DOI":"10.1109\/infocom.2016.7524507","type":"proceedings-article","created":{"date-parts":[[2016,7,28]],"date-time":"2016-07-28T20:47:54Z","timestamp":1469738874000},"page":"1-9","source":"Crossref","is-referenced-by-count":57,"title":["A novel framework for modeling and mitigating distributed link flooding attacks"],"prefix":"10.1109","author":[{"given":"Christos","family":"Liaskos","sequence":"first","affiliation":[]},{"given":"Vasileios","family":"Kotronis","sequence":"additional","affiliation":[]},{"given":"Xenofontas","family":"Dimitropoulos","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1023\/A:1014852026591"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1002\/net.20070"},{"key":"ref12","article-title":"Designing a Predictable Internet Backbone Network","author":"zhang-shen","year":"2004","journal-title":"ACM HotNets"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2405178.2405181"},{"key":"ref14","author":"luke","year":"2013","journal-title":"Essentials of Metaheuristics Lulu"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2014.6838227"},{"key":"ref16","author":"megiddo","year":"1986","journal-title":"The complexity of linear programming"},{"key":"ref17","article-title":"The AnyLogic Simulator","year":"2015","journal-title":"XJ Technologies"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2011.111002"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-60761-175-2_12"},{"key":"ref4","article-title":"Routing, Flow, and Capacity Design in Communication and Computer Networks","author":"pi\u00f3ro","year":"2004","journal-title":"Elsevier Kaufman"},{"key":"ref27","article-title":"Cross-domain DoS Link-flooding Attack Detection and Mitigation Using SDN Principles","author":"gkounis","year":"2014"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04444-1_3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5934956"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/11753810_7"},{"key":"ref8","first-page":"81","article-title":"Towards Detecting Target Link Flooding Attack","author":"xue","year":"0","journal-title":"ACM USENIX 2014 ser LISA'14"},{"key":"ref7","author":"tow","year":"2003","journal-title":"SQL Tuning"},{"key":"ref2","article-title":"The Crossfire Attack","author":"kang","year":"0","journal-title":"IEEE SPd 2013"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2011.5928950"},{"key":"ref1","article-title":"The DDoS That Almost Broke The Internet","year":"0"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00296-0_5"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.031413.00127"},{"key":"ref21","article-title":"Detecting Distributed Denial of Service Attacks: Methods, Tools and Future Directions","author":"bhuyan","year":"2013","journal-title":"Computer Jrnl"},{"key":"ref24","first-page":"55","article-title":"Handling Intrusion and DDoS Attacks in SDNs using Machine Learning","author":"ashraf","year":"2014","journal-title":"IEEE NSEC"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2010.5735752"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2535372.2535398"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICUFN.2014.6876752"}],"event":{"name":"IEEE INFOCOM 2016 - IEEE Conference on Computer Communications","location":"San Francisco, CA, USA","start":{"date-parts":[[2016,4,10]]},"end":{"date-parts":[[2016,4,14]]}},"container-title":["IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7515093\/7524326\/07524507.pdf?arnumber=7524507","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,9,30]],"date-time":"2016-09-30T00:03:18Z","timestamp":1475193798000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7524507\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,4]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/infocom.2016.7524507","relation":{},"subject":[],"published":{"date-parts":[[2016,4]]}}}