{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:36:10Z","timestamp":1759091770794,"version":"3.37.3"},"reference-count":16,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"7","license":[{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100003329","name":"Spanish Ministry of Economy and Competitiveness","doi-asserted-by":"publisher","award":["TEC2016-80339-R (TEXEO Project)","RED2018- 102585-T (Go2Edge network)"],"award-info":[{"award-number":["TEC2016-80339-R (TEXEO Project)","RED2018- 102585-T (Go2Edge network)"]}],"id":[{"id":"10.13039\/501100003329","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100008433","name":"Madrid Community Research Project TAPIR-CM","doi-asserted-by":"publisher","award":["P2018\/TCS-4496"],"award-info":[{"award-number":["P2018\/TCS-4496"]}],"id":[{"id":"10.13039\/501100008433","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Commun. Lett."],"published-print":{"date-parts":[[2020,7]]},"DOI":"10.1109\/lcomm.2020.2983405","type":"journal-article","created":{"date-parts":[[2020,3,26]],"date-time":"2020-03-26T19:40:46Z","timestamp":1585251646000},"page":"1428-1432","source":"Crossref","is-referenced-by-count":17,"title":["Denial of Service Attack on Cuckoo Filter Based Networking Systems"],"prefix":"10.1109","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2540-5234","authenticated-orcid":false,"given":"Pedro","family":"Reviriego","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4983-0243","authenticated-orcid":false,"given":"David","family":"Larrabeiti","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354235"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CRISIS.2012.6378946"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30045-5_11"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2015.21"},{"journal-title":"Redis The Definitive Guide Data Modeling Caching and Messaging","year":"2015","author":"kreibich","key":"ref14"},{"journal-title":"RedisBloom","year":"0","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611975055.4"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2019.2930508"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.jalgor.2003.12.002"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2016.7562258"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1049\/iet-net.2017.0037"},{"key":"ref8","first-page":"29","article-title":"Denial of service via algorithmic complexity attacks","author":"crosby","year":"2003","journal-title":"Proc Usenix Secur Symp"},{"key":"ref7","first-page":"373","article-title":"Towards application of cuckoo filters in network security monitoring","author":"grash\u00f6fer","year":"2018","journal-title":"Proc 14th Int Conf Netw Service Manage (CNSM)"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2674005.2674994"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2889329"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48000-7_28"}],"container-title":["IEEE Communications Letters"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4234\/9137748\/09047946.pdf?arnumber=9047946","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T15:47:00Z","timestamp":1651074420000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9047946\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7]]},"references-count":16,"journal-issue":{"issue":"7"},"URL":"https:\/\/doi.org\/10.1109\/lcomm.2020.2983405","relation":{},"ISSN":["1089-7798","1558-2558","2373-7891"],"issn-type":[{"type":"print","value":"1089-7798"},{"type":"electronic","value":"1558-2558"},{"type":"electronic","value":"2373-7891"}],"subject":[],"published":{"date-parts":[[2020,7]]}}}