{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T11:06:01Z","timestamp":1769943961584,"version":"3.49.0"},"reference-count":43,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100008982","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1359125"],"award-info":[{"award-number":["CNS-1359125"]}],"id":[{"id":"10.13039\/501100008982","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Thomson Reuters"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Serv. Manage."],"published-print":{"date-parts":[[2020,6]]},"DOI":"10.1109\/tnsm.2020.2978425","type":"journal-article","created":{"date-parts":[[2020,3,4]],"date-time":"2020-03-04T21:13:12Z","timestamp":1583356392000},"page":"890-903","source":"Crossref","is-referenced-by-count":33,"title":["Frequency-Minimal Utility-Maximal Moving Target Defense Against DDoS in SDN-Based Systems"],"prefix":"10.1109","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4783-119X","authenticated-orcid":false,"given":"Saptarshi","family":"Debroy","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7666-5389","authenticated-orcid":false,"given":"Prasad","family":"Calyam","sequence":"additional","affiliation":[]},{"given":"Minh","family":"Nguyen","sequence":"additional","affiliation":[]},{"given":"Roshan Lal","family":"Neupane","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1809-3482","authenticated-orcid":false,"given":"Bidyut","family":"Mukherjee","sequence":"additional","affiliation":[]},{"given":"Ajay Kumar","family":"Eeralla","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2310-2558","authenticated-orcid":false,"given":"Khaled","family":"Salah","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-68711-7_18"},{"key":"ref38","first-page":"1","article-title":"Automating DDoS experimentation","author":"mirkovic","year":"2007","journal-title":"Proc USENIX Demo"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2001.932182"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2013.6759960"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-31032-9"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2487361"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2008.12"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2014.2352260"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/WSC.2007.4419720"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2002.1004377"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2005.1498364"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2046660.2046676"},{"key":"ref40","author":"bertsekas","year":"1992","journal-title":"Data Networks"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2011.45"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1456508.1456514"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1250662.1250723"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2005.50"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1109\/TDSC.2006.25","article-title":"PacketScore: A statistics-based packet filtering scheme against distributed denial-of-service attacks","volume":"3","author":"kim","year":"2006","journal-title":"IEEE Trans Depend Secure Comput"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2014.6883401"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2014.03.009"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2016.7860486"},{"key":"ref4","year":"2020"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ISRCS.2013.6623770"},{"key":"ref3","first-page":"284","article-title":"A new approach to intrusion detection system","volume":"36","author":"kartit","year":"2012","journal-title":"J Theor Appl Inf Technol"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM.2014.6918979"},{"key":"ref6","year":"2020"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SC.Companion.2012.341"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3365609.3365860"},{"key":"ref8","year":"2013","journal-title":"The Notorious Nine Cloud Computing Top Threats in 2013"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.bjp.2013.12.037"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04117-4"},{"key":"ref9","first-page":"287","article-title":"Botz-4-sale: Surviving organized DDoS attacks that mimic flash crowds","volume":"2","author":"kandula","year":"2005","journal-title":"Proc Symp Netw Syst Design Implementation (NSDI)"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SysCon.2012.6189438"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2018.8638054"},{"key":"ref22","first-page":"81","article-title":"GRAPHENE: Packing and dependency-aware scheduling for data-parallel clusters","author":"grandl","year":"2016","journal-title":"Proc 12th USENIX Conf Oper Syst Design Implement (OSDI)"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2014.35"},{"key":"ref24","first-page":"817","article-title":"Bohatei: Flexible and elastic DDoS defense","author":"fayaz","year":"2015","journal-title":"24th USENIX Security Symp"},{"key":"ref42","year":"2020","journal-title":"Really Simple Syndication"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3341302.3342080"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2015.2408613"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2342441.2342467"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2805600"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2016.7440635"}],"container-title":["IEEE Transactions on Network and Service Management"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/4275028\/9114348\/9023955-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4275028\/9114348\/09023955.pdf?arnumber=9023955","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T17:04:33Z","timestamp":1651079073000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9023955\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6]]},"references-count":43,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tnsm.2020.2978425","relation":{},"ISSN":["1932-4537","2373-7379"],"issn-type":[{"value":"1932-4537","type":"electronic"},{"value":"2373-7379","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,6]]}}}