{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:08:24Z","timestamp":1740100104882,"version":"3.37.3"},"reference-count":16,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,6,28]],"date-time":"2021-06-28T00:00:00Z","timestamp":1624838400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,6,28]],"date-time":"2021-06-28T00:00:00Z","timestamp":1624838400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100000780","name":"European Commission","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000780","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,6,28]]},"DOI":"10.1109\/netsoft51509.2021.9492545","type":"proceedings-article","created":{"date-parts":[[2021,7,27]],"date-time":"2021-07-27T00:30:02Z","timestamp":1627345802000},"page":"443-449","source":"Crossref","is-referenced-by-count":2,"title":["Leveraging the 5G architecture to mitigate amplification attacks"],"prefix":"10.1109","author":[{"given":"Matteo","family":"Repetto","sequence":"first","affiliation":[{"name":"CNR - Imati"}]},{"given":"Alessandro","family":"Carrega","sequence":"additional","affiliation":[{"name":"Cnit - S3ITI"}]},{"given":"Guerino","family":"Lamanna","sequence":"additional","affiliation":[{"name":"Infocom Srl"}]},{"given":"Jaloliddin","family":"Yusupov","sequence":"additional","affiliation":[{"name":"Turin Polytechnic University in Tashkent"}]},{"given":"Orazio","family":"Toscano","sequence":"additional","affiliation":[{"name":"Ericsson Telecomunicazioni"}]},{"given":"Gianmarco","family":"Bruno","sequence":"additional","affiliation":[{"name":"Ericsson Telecomunicazioni"}]},{"given":"Michele","family":"Nuovo","sequence":"additional","affiliation":[{"name":"Ericsson Telecomunicazioni"}]},{"given":"Marco","family":"Cappelli","sequence":"additional","affiliation":[{"name":"Ericsson Telecomunicazioni"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/WINCOM.2016.7777224"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/NETSOFT.2019.8806653"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICTC46691.2019.8939897"},{"key":"ref13","doi-asserted-by":"crossref","DOI":"10.1109\/ISMSIT.2019.8932809","article-title":"SDN-based detection and mitigation system for DNS amplification attacks","author":"\u00f6zdin cer","year":"2019","journal-title":"3rd International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT)"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SmartWorld-UIC-ATC-SCALCOM-IOP-SCI.2019.00145"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2018.8554459"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICACC.2014.54"},{"journal-title":"ETSI Tech Rep TS 123 501 V15 3 0","article-title":"5g; system architecture for the 5g system","year":"2018","key":"ref4"},{"key":"ref3","article-title":"Final astrid architecture","volume":"1 0","author":"repetto","year":"2020","journal-title":"The ASTRID Consortium Tech Rep D1 3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2018.2874896"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2663716.2663717"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/IMIS.2016.88"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23233"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2018.10320"},{"journal-title":"Sigfox Technical Overview whitepaper","article-title":"Cloud DDoS protection service: attack lifecycle under the hood","year":"2016","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2017.8170802"}],"event":{"name":"2021 IEEE 7th International Conference on Network Softwarization (NetSoft)","start":{"date-parts":[[2021,6,28]]},"location":"Tokyo, Japan","end":{"date-parts":[[2021,7,2]]}},"container-title":["2021 IEEE 7th International Conference on Network Softwarization (NetSoft)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9492309\/9492525\/09492545.pdf?arnumber=9492545","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,23]],"date-time":"2022-05-23T21:25:13Z","timestamp":1653341113000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9492545\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,28]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/netsoft51509.2021.9492545","relation":{},"subject":[],"published":{"date-parts":[[2021,6,28]]}}}