{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T17:15:12Z","timestamp":1773249312619,"version":"3.50.1"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1109\/lcn.2015.7366286","type":"proceedings-article","created":{"date-parts":[[2016,1,7]],"date-time":"2016-01-07T22:15:34Z","timestamp":1452204934000},"page":"82-90","source":"Crossref","is-referenced-by-count":20,"title":["ELDA: Towards efficient and lightweight detection of cache pollution attacks in NDN"],"prefix":"10.1109","author":[{"given":"Zhiwei","family":"Xu","sequence":"first","affiliation":[]},{"given":"Bo","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Ninghan","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yujun","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Zhongcheng","family":"Li","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"ndnsim: Ndn simulator for ns-3","author":"afanasyev","year":"2012","journal-title":"Technical report UCLA"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(85)90041-8"},{"key":"ref12","article-title":"Hyperloglog: the analysis of a near-optimal cardinality estimation algorithm","author":"flajolet","year":"2008","journal-title":"DMTCS"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.2307\/2280232"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2013.6614127"},{"key":"ref15","author":"papoulis","year":"2002","journal-title":"Probability random variables and stochastic processes"},{"key":"ref16","article-title":"The design of rijndael. information security and cryptography","author":"daemen","year":"2002","journal-title":"Text and Monographs"},{"key":"ref17","article-title":"Approximate models for general cache networks","author":"elisha","year":"2010","journal-title":"INFOCOM"},{"key":"ref18","year":"2015"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICPP.2003.1240591"},{"key":"ref4","article-title":"Named data networking (ndn) project","author":"lixia","year":"2010","journal-title":"Technical Report PARC"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1658939.1658941"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2006.320198"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SUPERC.1990.130005"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2013.07.034"},{"key":"ref7","article-title":"Enhancing cache robustness for content-centric networking","author":"xie","year":"2012","journal-title":"INFOCOM"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s12243-009-0109-y"},{"key":"ref1","article-title":"The digital universe in 2020: Big data, bigger digital shadows, and biggest growth in the far east","author":"gantz","year":"2012","journal-title":"EMCoS Tech Rep"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2015.01.020"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"3192","DOI":"10.1016\/j.comnet.2013.07.009","article-title":"Backscatter from the data plane - threats to stability and security in information-centric network infrastructure","volume":"57","author":"schmidt","year":"2013","journal-title":"Computer Networks"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2012.6363885"}],"event":{"name":"2015 IEEE 40th Conference on Local Computer Networks (LCN)","location":"Clearwater Beach, FL","start":{"date-parts":[[2015,10,26]]},"end":{"date-parts":[[2015,10,29]]}},"container-title":["2015 IEEE 40th Conference on Local Computer Networks (LCN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7360816\/7366232\/07366286.pdf?arnumber=7366286","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T03:15:20Z","timestamp":1498274120000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7366286\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/lcn.2015.7366286","relation":{},"subject":[],"published":{"date-parts":[[2015,10]]}}}