{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T09:34:52Z","timestamp":1729676092690,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,10]]},"DOI":"10.1109\/lcn.2013.6761258","type":"proceedings-article","created":{"date-parts":[[2014,3,13]],"date-time":"2014-03-13T22:14:59Z","timestamp":1394748899000},"page":"316-319","source":"Crossref","is-referenced-by-count":0,"title":["UAS: Universal anti-spoofing by incorporating existing mechanisms"],"prefix":"10.1109","author":[{"family":"Hyok An","sequence":"first","affiliation":[]},{"family":"Heejo Lee","sequence":"additional","affiliation":[]},{"given":"Adrian","family":"Perrig","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"13","DOI":"10.1109\/SECPRI.2003.1199330"},{"doi-asserted-by":"publisher","key":"11","DOI":"10.1109\/90.929847"},{"key":"12","first-page":"1999","article-title":"Providing guaranteed services without per flow management","volume":"29","author":"stoica","year":"0","journal-title":"ACM SIGCOMM"},{"doi-asserted-by":"publisher","key":"3","DOI":"10.1145\/1644893.1644936"},{"key":"2","first-page":"2004","article-title":"Ingress filtering for multihomed networks","volume":"3704","author":"baker","year":"0","journal-title":"RFC"},{"year":"2013","journal-title":"The CAIDA UCSD macroscopic topology dataset","key":"1"},{"key":"10","doi-asserted-by":"crossref","DOI":"10.1145\/347059.347560","article-title":"Practical network support for ip traceback","author":"savage","year":"2000","journal-title":"ACM SIGCOMM"},{"year":"0","author":"markoff","journal-title":"Firm Is Accused of Sending Spam and Fight Jams Internet","key":"7"},{"year":"2006","author":"mangla","journal-title":"Distributed reflection denial of service A bandwidth attack","key":"6"},{"key":"5","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1145\/1229285.1229293","article-title":"BASE: An incrementally deployable mechanism for viable IP spoofing prevention","author":"lee","year":"2007","journal-title":"Proceedings of the 2nd ACM Symposium on Information Computer and Communications Security ASIACCS '07"},{"key":"4","article-title":"Network ingress filtering: Defeating denial of service attacks which employ ip source address spoofing","author":"ferguson","year":"2000","journal-title":"Internet Request for Comments"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1145\/1282380.1282413"},{"doi-asserted-by":"publisher","key":"8","DOI":"10.1145\/383059.383061"}],"event":{"name":"38th Annual IEEE Conference on Local Computer Networks (LCN 2013)","start":{"date-parts":[[2013,10,21]]},"location":"Sydney, NSW","end":{"date-parts":[[2013,10,24]]}},"container-title":["38th Annual IEEE Conference on Local Computer Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6745315\/6761208\/06761258.pdf?arnumber=6761258","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T09:34:50Z","timestamp":1498124090000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6761258\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/lcn.2013.6761258","relation":{},"subject":[],"published":{"date-parts":[[2013,10]]}}}