{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T20:40:16Z","timestamp":1765485616123,"version":"3.28.0"},"reference-count":32,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,6]]},"DOI":"10.1109\/seams.2012.6224398","type":"proceedings-article","created":{"date-parts":[[2012,7,9]],"date-time":"2012-07-09T19:34:37Z","timestamp":1341862477000},"page":"119-128","source":"Crossref","is-referenced-by-count":21,"title":["Model-based adaptive DoS attack mitigation"],"prefix":"10.1109","author":[{"given":"Cornel","family":"Barna","sequence":"first","affiliation":[]},{"given":"Mark","family":"Shtern","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Smit","sequence":"additional","affiliation":[]},{"given":"Vassilios","family":"Tzerpos","sequence":"additional","affiliation":[]},{"given":"Marin","family":"Litoiu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/800189.805475"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/32.403785"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/512840.512844"},{"key":"15","first-page":"310","article-title":"Mitigating denial-of-service attacks in MANET by incentive-based packet filtering: A game-theoretic approach","author":"wu","year":"2007","journal-title":"Proc Third Int Conf Security and Privacy in Communications Networks and the Workshops SecureComm 2007"},{"key":"16","article-title":"Mitigation of Denial of Servers (DoS) Attack","volume":"11","author":"jain","year":"2011","journal-title":"IJCEM International Journal of Compuational Engineering & Managment"},{"key":"13","first-page":"2339","article-title":"Mitigating performance degradation of network-based control systems under denial of service attacks","volume":"3","author":"m","year":"2004","journal-title":"Proc 30th Annual Conf of IEEE Industrial Electronics Society IECON 2004"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/TECHSYM.2011.5783861"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ATC.2011.6027461"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/ITRE.2003.1270623"},{"journal-title":"Quantitative System Performance Computer System Analysis Using Queueing Network Models","year":"1984","author":"lazowska","key":"21"},{"key":"20","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1145\/357360.357363","article-title":"Performance bound hierarchies for queueing networks","volume":"1","author":"eager","year":"1983","journal-title":"ACM Trans Comput Syst"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1145\/322186.322195"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1016\/S0166-5316(97)00005-9"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/32.888630"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1145\/1998582.1998598"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1145\/1082983.1083071"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/QEST.2005.40"},{"key":"28","first-page":"334","article-title":"Tracking time-varying parameters in software systems with extended kalman filters","author":"zheng","year":"2005","journal-title":"CASCON '05 Proceedings of the 2005 conference of the Centre for Advanced Studies on Collaborative research"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1115\/1.3662552"},{"key":"3","first-page":"210","article-title":"Launching distributed denial of service attacks by network protocol exploitation","author":"roman","year":"2011","journal-title":"AICT'11"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/371920.372148"},{"key":"10","article-title":"Client Puzzles: A Cryptographic Countermeasure Against Connection Depletion Attacks","author":"juels","year":"1999","journal-title":"Network and Distributed System Security Symposium (NDSS)"},{"journal-title":"WorldWide Infrastructure Security Report","year":"0","key":"1"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/CISIS.2010.53"},{"journal-title":"D-WARD Ddos Network Attack Recognition and Defense","year":"2002","author":"mirkovic?","key":"7"},{"year":"0","key":"6"},{"journal-title":"Application Performance Evaluation and Resource Allocator (APERA)","year":"2009","key":"32"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948114"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1145\/1958746.1958774"},{"journal-title":"Distributed Denial of Service Attacks Against Independent Media and Human Rights Sites","year":"2010","author":"zuckerman","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/IWQoS.2002.1006573"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.5120\/1918-2561"}],"event":{"name":"2012 7th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS)","start":{"date-parts":[[2012,6,4]]},"location":"Zurich, Switzerland","end":{"date-parts":[[2012,6,5]]}},"container-title":["2012 7th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6220308\/6224384\/06224398.pdf?arnumber=6224398","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T21:07:21Z","timestamp":1497992841000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6224398\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,6]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/seams.2012.6224398","relation":{},"subject":[],"published":{"date-parts":[[2012,6]]}}}