{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T02:41:39Z","timestamp":1725417699777},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,6]]},"DOI":"10.1109\/lanman.2007.4295999","type":"proceedings-article","created":{"date-parts":[[2007,8,29]],"date-time":"2007-08-29T15:41:52Z","timestamp":1188402112000},"page":"200-205","source":"Crossref","is-referenced-by-count":4,"title":["MIDAS: An Impact Scale for DDoS attacks"],"prefix":"10.1109","author":[{"given":"Rangarajan","family":"Vasudevan","sequence":"first","affiliation":[]},{"given":"Z. Morley","family":"Mao","sequence":"additional","affiliation":[]},{"given":"Oliver","family":"Spatscheck","sequence":"additional","affiliation":[]},{"given":"Jacobus","family":"Van der Merwe","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","article-title":"Reval: A tool for real-time evaluation of ddos mitigation strategies","author":"vasudevan","year":"2006","journal-title":"USENIX Annual Technical Conference"},{"key":"ref3","doi-asserted-by":"crossref","DOI":"10.1145\/285237.285291","article-title":"Modeling TCP Throughput: A Simple Model and its Empirical Validation","author":"padhye","year":"1998","journal-title":"Proceedings of SIGCOMM'98"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ENABL.2004.11"},{"key":"ref6","article-title":"Service availability in IP networks","author":"diot","year":"2003","journal-title":"Sprint ATL Research Report RR03-ATL-071888 Sprint ATL"},{"key":"ref5","article-title":"A Simulation Model for Managing Survivability of Networked Infoimation Systems","author":"moitra","year":"2000","journal-title":"CMU Technical Report CMU\/SEI-2000-TR-020"},{"key":"ref8","article-title":"Defeating DDoS Attacks by Fixing the Incentive Chain","author":"huang","year":"2006","journal-title":"ACM Trans on Internet Technology"},{"key":"ref7","article-title":"Random Flow Network Modeling and Simulations for DDoS Attack Mitigation","author":"kong","year":"2003","journal-title":"Proc ICC"},{"key":"ref2","article-title":"Applicability Statement for Traffic Engineering with MPLS","author":"boyle","year":"2002","journal-title":"RFC3346"},{"key":"ref9","article-title":"Incident Cost Analysis and Modeling Project (I-CAMP H) &#x2014; A Report to the USENIX Association","author":"rezmierski","year":"2000","journal-title":"ICAMPReport2"},{"key":"ref1","article-title":"Firms Join Forces Against Hackers","author":"richmond","year":"2005","journal-title":"Wall Street Journal"}],"event":{"name":"2007 15th IEEE Workshop on Local & Metropolitan Area Networks","start":{"date-parts":[[2007,6,10]]},"location":"New York, NY, USA","end":{"date-parts":[[2007,6,13]]}},"container-title":["2007 15th IEEE Workshop on Local &amp; Metropolitan Area Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4295958\/4295959\/04295999.pdf?arnumber=4295999","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,17]],"date-time":"2017-06-17T18:25:45Z","timestamp":1497723945000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4295999\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,6]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/lanman.2007.4295999","relation":{},"subject":[],"published":{"date-parts":[[2007,6]]}}}