{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:55:28Z","timestamp":1750308928406,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2003,10,31]],"date-time":"2003-10-31T00:00:00Z","timestamp":1067558400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2003,10,31]]},"DOI":"10.1145\/1036921.1036926","type":"proceedings-article","created":{"date-parts":[[2005,1,30]],"date-time":"2005-01-30T17:55:16Z","timestamp":1107107716000},"page":"43-52","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["Tolerating denial-of-service attacks using overlay networks"],"prefix":"10.1145","author":[{"given":"Ju","family":"Wang","sequence":"first","affiliation":[{"name":"University of California, San Diego"}]},{"given":"Linyuan","family":"Lu","sequence":"additional","affiliation":[{"name":"University of California, San Diego"}]},{"given":"Andrew A.","family":"Chien","sequence":"additional","affiliation":[{"name":"University of California, San Diego"}]}],"member":"320","published-online":{"date-parts":[[2003,10,31]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/380752.380858"},{"volume-title":"Cambridge University Press","year":"1993","author":"Biggs N.","key":"e_1_3_2_1_2_1"},{"key":"e_1_3_2_1_3_1","unstructured":"CERT. \"code red ii:\" another worm exploiting buffer overflow in its indexing service dll 2001.  CERT. \"code red ii:\" another worm exploiting buffer overflow in its indexing service dll 2001."},{"key":"e_1_3_2_1_4_1","unstructured":"CERT. \"code red\" worm exploiting buffer overflow in iis indexing service dll 2001.  CERT. \"code red\" worm exploiting buffer overflow in iis indexing service dll 2001."},{"key":"e_1_3_2_1_5_1","unstructured":"CERT. Cert advisory ca-2003-04 ms-sql server worm 2003.  CERT. Cert advisory ca-2003-04 ms-sql server worm 2003."},{"volume-title":"AMS Publications","year":"1997","author":"Chung F.","key":"e_1_3_2_1_6_1"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0937490100"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"A.\n       \n      Crisanti G.\n       \n      Paladin and \n      \n      \n      A.\n       \n      Vulpiani\n      \n  \n  . \n  Products of Random Matrices in Statistical Physics\n  . \n  Springer Series in Solid-State Sciences\n  . \n  Springer Berlin 1993\n  .  A. Crisanti G. Paladin and A. Vulpiani. Products of Random Matrices in Statistical Physics. Springer Series in Solid-State Sciences. Springer Berlin 1993.","DOI":"10.1007\/978-3-642-84942-8"},{"key":"e_1_3_2_1_9_1","unstructured":"D. Dittrich. The dos project's \"trinoo\" distributed denial of service attack tool 1999.  D. Dittrich. The dos project's \"trinoo\" distributed denial of service attack tool 1999."},{"key":"e_1_3_2_1_10_1","unstructured":"D. Dittrich. The \"tribe flood network\" distributed denial of service attack tool 1999.  D. Dittrich. The \"tribe flood network\" distributed denial of service attack tool 1999."},{"key":"e_1_3_2_1_11_1","first-page":"264","article-title":"Graphs with points of prescribed degrees","volume":"11","author":"ErdHos P.","year":"1961","journal-title":"Mat. Lapok"},{"key":"e_1_3_2_1_12_1","unstructured":"B. Fonseca. Yahoo outage raises web concerns 2000.  B. Fonseca. Yahoo outage raises web concerns 2000."},{"volume-title":"European Conference on Computer Vision","year":"2002","author":"Fowlkes C.","key":"e_1_3_2_1_13_1"},{"key":"e_1_3_2_1_14_1","unstructured":"D. Frank. Cybersecurity called key to homeland defense 2001.  D. Frank. Cybersecurity called key to homeland defense 2001."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02579329"},{"issue":"051903","key":"e_1_3_2_1_16_1","article-title":"Spectra and eigenvectors of scale-free networks","volume":"64","author":"Goh K.-I.","year":"2001","journal-title":"Phy. Rev. E"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/633025.633032"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"F. Kirchhoff. \u00dcber die aufl\u00f6sung der gleichungen auf welche man bei der untersuchung der linearen verteilung galvanischer str\u00f6me gef\u00fchrt wird. Ann. Phys. chem. 72:497-508 1847.  F. Kirchhoff. \u00dcber die aufl\u00f6sung der gleichungen auf welche man bei der untersuchung der linearen verteilung galvanischer str\u00f6me gef\u00fchrt wird. Ann. Phys. chem. 72:497-508 1847.","DOI":"10.1002\/andp.18471481202"},{"volume-title":"Proc. 9th ACM-SIAM Symposium on Discrete Algorithms, 199","author":"Kleinberg J.","key":"e_1_3_2_1_19_1"},{"key":"e_1_3_2_1_20_1","unstructured":"J. Miller. 2004 it budget request focuses on homeland defense cybersecurity 01\/20\/2003 2003.  J. Miller. 2004 it budget request focuses on homeland defense cybersecurity 01\/20\/2003 2003."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/383059.383072"},{"volume-title":"Proceedings of the 18th IFIP\/ACM International Conference on Distributed Systems Platforms (Middleware 2001","year":"2001","author":"Druschel P.","key":"e_1_3_2_1_22_1"},{"volume-title":"National Academy Press","year":"1999","author":"Schneider F. B.","key":"e_1_3_2_1_23_1"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/964725.633033"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/383059.383071"},{"volume-title":"University of California","year":"2003","author":"Wang J.","key":"e_1_3_2_1_26_1"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.2307\/1970008"},{"key":"e_1_3_2_1_28_1","unstructured":"M. Williams. Ebay amazon buy.com hit by attacks 2000.  M. Williams. Ebay amazon buy.com hit by attacks 2000."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2003.818784"}],"event":{"name":"CCS03: Tenth ACM Conference on Computer and Communications Security 2003","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Fairfax VA","acronym":"CCS03"},"container-title":["Proceedings of the 2003 ACM workshop on Survivable and self-regenerative systems: in association with 10th ACM Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1036921.1036926","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1036921.1036926","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T21:36:48Z","timestamp":1750282608000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1036921.1036926"}},"subtitle":["impact of topology"],"short-title":[],"issued":{"date-parts":[[2003,10,31]]},"references-count":29,"alternative-id":["10.1145\/1036921.1036926","10.1145\/1036921"],"URL":"https:\/\/doi.org\/10.1145\/1036921.1036926","relation":{},"subject":[],"published":{"date-parts":[[2003,10,31]]},"assertion":[{"value":"2003-10-31","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}