{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T16:16:10Z","timestamp":1774541770628,"version":"3.50.1"},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,11,16]],"date-time":"2020-11-16T00:00:00Z","timestamp":1605484800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,11,16]],"date-time":"2020-11-16T00:00:00Z","timestamp":1605484800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,11,16]],"date-time":"2020-11-16T00:00:00Z","timestamp":1605484800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,11,16]]},"DOI":"10.1109\/lcn48667.2020.9314797","type":"proceedings-article","created":{"date-parts":[[2021,1,15]],"date-time":"2021-01-15T21:00:57Z","timestamp":1610744457000},"page":"279-285","source":"Crossref","is-referenced-by-count":5,"title":["Cloud-based Deception against Network Reconnaissance Attacks using SDN and NFV"],"prefix":"10.1109","author":[{"given":"Abdullah","family":"Aydeger","sequence":"first","affiliation":[]},{"given":"Nico","family":"Saputro","sequence":"additional","affiliation":[]},{"given":"Kemal","family":"Akkaya","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2784"},{"key":"ref11","first-page":"817","article-title":"Bohatei: Flexible and elastic ddos defense","author":"fayaz","year":"2015","journal-title":"24th USENIX Security Symposium USENIX Security 15"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2467358"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2016.219"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM.2014.6918979"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.19"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SecTech.2014.9"},{"key":"ref17","first-page":"37","article-title":"The coremelt attack","author":"studer","year":"2009","journal-title":"European symposium on research in computer security"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2487361"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.031413.00127"},{"key":"ref4","year":"2009","journal-title":"National Cyber Leap Year Summit 2009 Exploring Paths to New Cyber Security Paradigms Draft Report of Participants' Ideas"},{"key":"ref3","year":"0"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2018.8599803"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1177080.1177086"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2014.6883401"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.11.045"},{"key":"ref2","year":"0"},{"key":"ref1","year":"0"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2096149.2096161"}],"event":{"name":"2020 IEEE 45th Conference on Local Computer Networks (LCN)","location":"Sydney, NSW, Australia","start":{"date-parts":[[2020,11,16]]},"end":{"date-parts":[[2020,11,19]]}},"container-title":["2020 IEEE 45th Conference on Local Computer Networks (LCN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9314696\/9314766\/09314797.pdf?arnumber=9314797","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T21:58:23Z","timestamp":1656453503000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9314797\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,16]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/lcn48667.2020.9314797","relation":{},"subject":[],"published":{"date-parts":[[2020,11,16]]}}}