{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T22:16:45Z","timestamp":1729635405893,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,5]]},"DOI":"10.1109\/inm.2015.7140370","type":"proceedings-article","created":{"date-parts":[[2015,7,6]],"date-time":"2015-07-06T21:19:27Z","timestamp":1436217567000},"page":"762-765","source":"Crossref","is-referenced-by-count":4,"title":["Investigating unique flow marking for tracing back DDoS attacks"],"prefix":"10.1109","author":[{"given":"Vahid","family":"Aghaei-Foroushani","sequence":"first","affiliation":[]},{"given":"A. Nur","family":"Zincir-Heywood","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2169960"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2005.1498364"},{"journal-title":"The caida anonymized internet traces 2014 dataset","year":"0","key":"ref12"},{"journal-title":"The caida &#x201C;ddos attack 2007&#x201D; dataset","year":"0","key":"ref13"},{"journal-title":"Tcpreplay Suite","year":"0","author":"turner","key":"ref14"},{"journal-title":"Riverbed technology winpcap the industry-standard windows packet capture library","year":"0","key":"ref15"},{"key":"ref4","article-title":"Tdfa: Traceback-based defense against ddos flooding attacks","author":"aghaei-foroushani","year":"2014","journal-title":"IEEE International Conference on Advanced Information Networking and Applications (AINA)"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2013.13"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2002.804827"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICRTIT.2011.5972268"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/90.929847"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2003.1215651"},{"key":"ref2","doi-asserted-by":"crossref","DOI":"10.1109\/AINA.2013.60","article-title":"Deterministic and authenticated flow marking for ip traceback","volume":"5","author":"aghaei-foroushani","year":"2013","journal-title":"The 27th IEEE International Conference on Advanced Information Networking and Applications (AINA)"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1186\/1687-417X-2013-5"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2006.11.020"}],"event":{"name":"2015 IFIP\/IEEE International Symposium on Integrated Network Management (IM)","start":{"date-parts":[[2015,5,11]]},"location":"Ottawa, ON, Canada","end":{"date-parts":[[2015,5,15]]}},"container-title":["2015 IFIP\/IEEE International Symposium on Integrated Network Management (IM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7121095\/7140257\/07140370.pdf?arnumber=7140370","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,4]],"date-time":"2020-09-04T18:14:08Z","timestamp":1599243248000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7140370\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,5]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/inm.2015.7140370","relation":{},"subject":[],"published":{"date-parts":[[2015,5]]}}}