{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T13:53:04Z","timestamp":1762955584842,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,4]]},"DOI":"10.1109\/noms.2016.7502804","type":"proceedings-article","created":{"date-parts":[[2016,7,4]],"date-time":"2016-07-04T17:07:22Z","timestamp":1467652042000},"page":"121-128","source":"Crossref","is-referenced-by-count":6,"title":["Autonomous system based flow marking scheme for IP-Traceback"],"prefix":"10.1109","author":[{"given":"Vahid","family":"Aghaei-Foroushani","sequence":"first","affiliation":[]},{"given":"A. Nur","family":"Zincir-Heywood","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/BF01386390"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/90.929847"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2006.11.020"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2169960"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2005.1498364"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2004.1283944"},{"year":"0","key":"ref15"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1504\/IJSN.2007.012828","article-title":"Single Packet IP Traceback in AS-level Partial Deployment Scenario","volume":"2","author":"gong","year":"2007","journal-title":"International Journal of Security and Networks"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2007.69"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2009.4804322"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAT.2013.6521995"},{"year":"2015","key":"ref28"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"597","DOI":"10.1109\/AINA.2014.73","article-title":"Tdfa: Traceback-based defense against ddos flooding attacks","author":"aghaei-foroushani","year":"2014","journal-title":"The 28th IEEE InternationalConference on Advanced Information Networking and Applications (AINA) Victoria Canada"},{"year":"2015","key":"ref27"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1186\/1687-417X-2013-5"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/RNDM.2015.7325234"},{"year":"2015","key":"ref29"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2015.7140370"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2002.804827"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICRTIT.2011.5972268"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2013.13"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2003.1215651"},{"key":"ref1","first-page":"25","article-title":"Deterministic and authenticated flow marking for ip traceback","volume":"5","author":"aghaei-foroushani","year":"2013","journal-title":"The 27th IEEE InternationalConference on Advanced Information Networking and Applications (AINA) Barcelona"},{"year":"2015","key":"ref20"},{"year":"2015","key":"ref22"},{"key":"ref21","article-title":"A Border Gateway Protocol 4","author":"rekhter","year":"1995","journal-title":"RFC 1771"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/90.929847"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2006.06.003"},{"key":"ref26","article-title":"A Selective Introduction to Border Gateway Protocol (BGP) Security Issues","author":"wan","year":"2007","journal-title":"Proceedings of NATO Advanced Study Institute on Network Security and Intrusion Detection Nork"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"582","DOI":"10.1109\/49.839934","article-title":"Secure Border Gateway Protocol (Secure-BGP)","volume":"18","author":"kent","year":"2001","journal-title":"IEEE Journal on Selected Areas in Communications"}],"event":{"name":"NOMS 2016 - 2016 IEEE\/IFIP Network Operations and Management Symposium","start":{"date-parts":[[2016,4,25]]},"location":"Istanbul, Turkey","end":{"date-parts":[[2016,4,29]]}},"container-title":["NOMS 2016 - 2016 IEEE\/IFIP Network Operations and Management Symposium"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7499631\/7502779\/07502804.pdf?arnumber=7502804","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T13:47:57Z","timestamp":1498312077000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7502804\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,4]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/noms.2016.7502804","relation":{},"subject":[],"published":{"date-parts":[[2016,4]]}}}