{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T15:08:58Z","timestamp":1759072138680,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,11]]},"DOI":"10.1109\/nca.2018.8548136","type":"proceedings-article","created":{"date-parts":[[2018,11,29]],"date-time":"2018-11-29T23:47:51Z","timestamp":1543535271000},"page":"1-4","source":"Crossref","is-referenced-by-count":5,"title":["LAMP: Prompt Layer 7 Attack Mitigation with Programmable Data Planes"],"prefix":"10.1109","author":[{"given":"Garegin","family":"Grigoryan","sequence":"first","affiliation":[]},{"given":"Yaoqing","family":"Liu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Behavioral model repository","year":"2017","key":"ref10"},{"journal-title":"Cisco Data Center Traffic To Quadruple Thanks To Clouds","year":"2012","author":"morgan","key":"ref11"},{"journal-title":"Barefoot","article-title":"Simple switch","year":"2012","key":"ref12"},{"key":"ref13","first-page":"139","article-title":"Mininet as software defined networking testing platform","author":"kaur","year":"2014","journal-title":"International Conference on Communication Computing & Systems (ICCCS)"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1355734.1355746"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-5225-2296-6.ch004"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.bjp.2013.10.014"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICUFN.2014.6876752"},{"journal-title":"Layer 7 DDoS Attacks Detection And Mitigation","year":"2013","key":"ref4"},{"journal-title":"Imperva Incapsula","article-title":"Q1 2017 Global DDoS Threat Landscape Report","year":"2017","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3019612.3019919"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2015.240"},{"key":"ref8","article-title":"Skyshield: A sketch-based defense system against application layer ddos attacks","author":"wang","year":"2017","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.5120\/1101-1443"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"807","DOI":"10.15439\/2017F288","article-title":"Analysis of ddos-capable iot malwares","volume":"11","author":"spognardi","year":"2017","journal-title":"Annals of Computer Science and Information Systems"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICITST.2015.7412116"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656890"}],"event":{"name":"2018 IEEE 17th International Symposium on Network Computing and Applications (NCA)","start":{"date-parts":[[2018,11,1]]},"location":"Cambridge, MA","end":{"date-parts":[[2018,11,3]]}},"container-title":["2018 IEEE 17th International Symposium on Network Computing and Applications (NCA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8533540\/8548052\/08548136.pdf?arnumber=8548136","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T15:53:02Z","timestamp":1643298782000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8548136\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/nca.2018.8548136","relation":{},"subject":[],"published":{"date-parts":[[2018,11]]}}}