{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T13:51:42Z","timestamp":1762955502594,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1109\/rndm.2015.7325234","type":"proceedings-article","created":{"date-parts":[[2015,11,12]],"date-time":"2015-11-12T23:12:08Z","timestamp":1447369928000},"page":"229-236","source":"Crossref","is-referenced-by-count":4,"title":["Probabilistic flow marking for IP traceback (PFM)"],"prefix":"10.1109","author":[{"given":"Vahid","family":"Aghaei-Foroushani","sequence":"first","affiliation":[]},{"given":"A. Nur","family":"Zincir-Heywood","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2005.1498364"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2004.831336"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2006.06.003"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/icc.2011.5962652"},{"key":"ref14","first-page":"878","article-title":"Advanced and authenticated marking schemes for ip traceback","volume":"2","author":"song","year":"2001","journal-title":"Twentieth Annual Joint Conference of the IEEE Computer and Communications INFOCOM"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1145\/586110.586128","article-title":"Efficient packet marking for large-scale ip traceback","author":"goodrich","year":"2002","journal-title":"Proceedings of the 9th ACM conference on Computer and communications security"},{"key":"ref16","article-title":"Tdfa: Traceback-based defense against ddos flooding attacks","author":"aghaei-foroushani","year":"2014","journal-title":"IEEE International Conference on Advanced Information Networking and Applications (AINA)"},{"key":"ref17","first-page":"25","article-title":"Deterministic and authenticated flow marking for ip traceback","volume":"5","author":"aghaei-foroushani","year":"2013","journal-title":"The 27th IEEE International Conference on Advanced Information Networking and Applications (AINA)"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2013.13"},{"journal-title":"Tcpreplay Suite","year":"0","author":"turner","key":"ref19"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICRTIT.2011.5972268"},{"journal-title":"The CAIDA DDoS Attack 2007 Dataset","year":"0","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2003.1215651"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2002.804827"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2006.11.020"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/90.929847"},{"journal-title":"CAIDA Anonymized Internet Traces 2012 Dataset","year":"0","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1186\/1687-417X-2013-5"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2169960"},{"journal-title":"Riverbed technology winpcap the industry-standard windows packet capture library","year":"0","key":"ref20"}],"event":{"name":"2015 7th International Workshop on Reliable Networks Design and Modeling (RNDM)","start":{"date-parts":[[2015,10,5]]},"location":"Munich, Germany","end":{"date-parts":[[2015,10,7]]}},"container-title":["2015 7th International Workshop on Reliable Networks Design and Modeling (RNDM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7311668\/7324297\/07325234.pdf?arnumber=7325234","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,26]],"date-time":"2022-05-26T00:58:27Z","timestamp":1653526707000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7325234\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/rndm.2015.7325234","relation":{},"subject":[],"published":{"date-parts":[[2015,10]]}}}