{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T16:38:16Z","timestamp":1768322296043,"version":"3.49.0"},"reference-count":30,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2017,4,1]],"date-time":"2017-04-01T00:00:00Z","timestamp":1491004800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"name":"TENACE PRIN"},{"name":"Italian MIUR","award":["20103P34XC"],"award-info":[{"award-number":["20103P34XC"]}]},{"name":"Project Tackling Mobile Malware with Innovative Machine Learning Techniques"},{"name":"University of Padua"},{"DOI":"10.13039\/501100000780","name":"Marie Curie Fellowship funded by the European Commission","doi-asserted-by":"publisher","award":["PCIG11-GA-2012-321980"],"award-info":[{"award-number":["PCIG11-GA-2012-321980"]}],"id":[{"id":"10.13039\/501100000780","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE\/ACM Trans. Networking"],"published-print":{"date-parts":[[2017,4]]},"DOI":"10.1109\/tnet.2016.2626287","type":"journal-article","created":{"date-parts":[[2016,11,29]],"date-time":"2016-11-29T19:14:13Z","timestamp":1480446853000},"page":"1206-1219","source":"Crossref","is-referenced-by-count":95,"title":["LineSwitch: Tackling Control Plane Saturation Attacks in Software-Defined Networking"],"prefix":"10.1109","volume":"25","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2520-9092","authenticated-orcid":false,"given":"Moreno","family":"Ambrosin","sequence":"first","affiliation":[]},{"given":"Mauro","family":"Conti","sequence":"additional","affiliation":[]},{"given":"Fabio","family":"De Gaspari","sequence":"additional","affiliation":[]},{"given":"Radha","family":"Poovendran","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref30","first-page":"5","article-title":"My botnet is bigger than yours (maybe, better than yours): Why size estimates remain challenging","author":"rajab","year":"2007","journal-title":"Proc of HotBots"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2491185.2491199"},{"key":"ref11","first-page":"161","article-title":"Revisiting traffic anomaly detection using software defined networking","author":"mehdi","year":"2011","journal-title":"Proc RAID"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2619239.2631469"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2010.5735752"},{"key":"ref14","year":"2016","journal-title":"NOX Network Control Platform"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2674005.2675002"},{"key":"ref16","year":"2015","journal-title":"Open Vswitch"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2620728.2620735"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2658260.2658276"},{"key":"ref19","first-page":"24","article-title":"dFence: Transparent network-based denial of service mitigation","author":"mahimkar","year":"2007","journal-title":"Proc USENIX NSDI"},{"key":"ref28","year":"2015","journal-title":"Mininet"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516684"},{"key":"ref27","year":"2015","journal-title":"Openflow Software Switch"},{"key":"ref3","year":"0","journal-title":"OpenFlow Switch Specification V1 3 1"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1216370.1216373"},{"key":"ref29","year":"2016","journal-title":"POX Network Controller"},{"key":"ref5","first-page":"1","article-title":"OF-GUARD: A DoS attack prevention extension in software-defined networks","author":"wang","year":"2014","journal-title":"Proc USENIX Open Netw Summit"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2491185.2491222"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2013.6733671"},{"key":"ref2","year":"2015","journal-title":"OpenFlow whitepaper"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"639","DOI":"10.1145\/2714576.2714612","article-title":"LineSwitch: Efficiently managing switch flow in software-defined networking while effectively tackling DoS attacks","author":"ambrosin","year":"2015","journal-title":"Proc ACM ASIA CCS"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1355734.1355746"},{"key":"ref20","author":"bernstein","year":"2014","journal-title":"Syn cookies"},{"key":"ref22","year":"6528","journal-title":"Defending Against Sequence Number Attacks"},{"key":"ref21","year":"1981","journal-title":"Transmission control protocol"},{"key":"ref24","year":"2018","journal-title":"TCP selective acknowledgment options"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/52324.52356"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/633025.633055"},{"key":"ref25","year":"7323","journal-title":"TCP extensions for high performance"}],"container-title":["IEEE\/ACM Transactions on Networking"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/90\/7900486\/07762225.pdf?arnumber=7762225","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,15]],"date-time":"2022-07-15T13:21:04Z","timestamp":1657891264000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7762225\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,4]]},"references-count":30,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tnet.2016.2626287","relation":{},"ISSN":["1063-6692","1558-2566"],"issn-type":[{"value":"1063-6692","type":"print"},{"value":"1558-2566","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,4]]}}}