{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T10:04:31Z","timestamp":1766484271510,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,11,28]],"date-time":"2023-11-28T00:00:00Z","timestamp":1701129600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,11,28]],"date-time":"2023-11-28T00:00:00Z","timestamp":1701129600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,11,28]]},"DOI":"10.1109\/vcc60689.2023.10474735","type":"proceedings-article","created":{"date-parts":[[2024,3,26]],"date-time":"2024-03-26T19:50:45Z","timestamp":1711482645000},"page":"43-48","source":"Crossref","is-referenced-by-count":5,"title":["QUICShield: A Rapid Detection Mechanism Against QUIC-Flooding Attacks"],"prefix":"10.1109","author":[{"given":"Benjamin","family":"Teyssier","sequence":"first","affiliation":[{"name":"Concordia Institute for Information Systems Engineering (CIISE) Concordia University,Montreal,Canada"}]},{"given":"Y A","family":"Joarder","sequence":"additional","affiliation":[{"name":"Concordia Institute for Information Systems Engineering (CIISE) Concordia University,Montreal,Canada"}]},{"given":"Carol","family":"Fung","sequence":"additional","affiliation":[{"name":"Concordia Institute for Information Systems Engineering (CIISE) Concordia University,Montreal,Canada"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/863955.863968"},{"key":"ref2","article-title":"Quic: A udp-based secure and reliable transport for http\/2","volume-title":"IETF","author":"Iyengar","year":"2015"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.031413.00127"},{"issue":"9","key":"ref4","first-page":"1438","article-title":"Detection of syn flooding attacks using linear prediction analysis","volume":"54","author":"Brodsky","year":"2010","journal-title":"Computer Networks"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.2307\/2333009"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098842"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177693055"},{"volume-title":"Detection of Abrupt Changes: Theory and Application","year":"1993","author":"Basseville","key":"ref8"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.17487\/RFC9000"},{"key":"ref10","first-page":"103675","article-title":"Quic-flooding: Exploring and mitigating quics inherent security vulnerability","volume":"8","author":"Zhang","year":"2020","journal-title":"IEEE Access"},{"issue":"12","key":"ref11","first-page":"2784","article-title":"Defending against tcp syn flooding attacks under different types of traffic","volume":"31","author":"Lee","year":"2008","journal-title":"Computer Communications"},{"issue":"1","key":"ref12","first-page":"289","article-title":"A generalized likelihood ratio test for change point detection","volume":"57","author":"Rice","year":"2004","journal-title":"Journal of the Royal Statistical Society: Series B (Statistical Methodology)"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-022-00630-6"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.17487\/RFC9000"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/jsait.2021.3072962"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICNICONSMCL.2006.72"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/JSAIT.2021.3072962"},{"article-title":"aioquic","year":"2019","author":"Lain\u00e9","key":"ref18"}],"event":{"name":"2023 IEEE Virtual Conference on Communications (VCC)","start":{"date-parts":[[2023,11,28]]},"location":"NY, USA","end":{"date-parts":[[2023,11,30]]}},"container-title":["2023 IEEE Virtual Conference on Communications (VCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10474593\/10474603\/10474735.pdf?arnumber=10474735","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,28]],"date-time":"2024-03-28T20:21:38Z","timestamp":1711657298000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10474735\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,28]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/vcc60689.2023.10474735","relation":{},"subject":[],"published":{"date-parts":[[2023,11,28]]}}}