{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T07:29:28Z","timestamp":1729668568259,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,10]]},"DOI":"10.1109\/lcnw.2012.6424039","type":"proceedings-article","created":{"date-parts":[[2013,2,8]],"date-time":"2013-02-08T16:29:20Z","timestamp":1360340960000},"page":"1022-1029","source":"Crossref","is-referenced-by-count":2,"title":["A prediction based approach to IP traceback"],"prefix":"10.1109","author":[{"given":"Ankunda R.","family":"Kiremire","sequence":"first","affiliation":[]},{"given":"Matthias R.","family":"Brust","sequence":"additional","affiliation":[]},{"given":"Vir V.","family":"Phoha","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","article-title":"Brite: An approach to universal topology generation","author":"medina","year":"2001","journal-title":"Proc of the Int Symposium in Modeling Analysis and Simulation of Computer and Telecommunication Systems"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/49.12889"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2003.1215651"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2004.831336"},{"key":"3","doi-asserted-by":"crossref","DOI":"10.1109\/ICNP.2005.15","article-title":"Efficient probabilistic packet marking","author":"dong","year":"2005","journal-title":"Proc of IEEE Int Conf on Network Protocols"},{"journal-title":"Anonymous Attacks Indian Government Websites","year":"2012","key":"2"},{"journal-title":"123-reg Hosted Websites Go Offline after 'China Attack'","year":"2012","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/1851182.1851237"},{"key":"7","doi-asserted-by":"crossref","first-page":"3536","DOI":"10.1016\/j.comnet.2006.02.004","article-title":"Tabu marking scheme to speedup ip traceback","volume":"50","author":"ma","year":"2006","journal-title":"Computer Networks"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2005.1498364"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/347057.347560"},{"key":"4","first-page":"878","article-title":"Advanced and authenticated marking schemes for ip traceback","volume":"2","author":"song","year":"2001","journal-title":"Proc of INFOCOM Conf"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1163593.1163602"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2007.70229"}],"event":{"name":"2012 IEEE 37th Conference on Local Computer Networks Workshops (LCN Workshops)","start":{"date-parts":[[2012,10,22]]},"location":"Clearwater, FL, USA","end":{"date-parts":[[2012,10,25]]}},"container-title":["37th Annual IEEE Conference on Local Computer Networks -- Workshops"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6415465\/6424021\/06424039.pdf?arnumber=6424039","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,9]],"date-time":"2019-07-09T09:09:51Z","timestamp":1562663391000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6424039\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/lcnw.2012.6424039","relation":{},"subject":[],"published":{"date-parts":[[2012,10]]}}}