{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:55:29Z","timestamp":1750308929297,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2003,10,31]],"date-time":"2003-10-31T00:00:00Z","timestamp":1067558400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2003,10,31]]},"DOI":"10.1145\/1036921.1036928","type":"proceedings-article","created":{"date-parts":[[2005,1,30]],"date-time":"2005-01-30T17:55:16Z","timestamp":1107107716000},"page":"64-71","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Attack resistant cache replacement for survivable services"],"prefix":"10.1145","author":[{"given":"Vinay","family":"Manivel","sequence":"first","affiliation":[{"name":"Georgia Institute of Technology, GA"}]},{"given":"Mustaque","family":"Ahamad","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, GA"}]},{"given":"H.","family":"Venkateswaran","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, GA"}]}],"member":"320","published-online":{"date-parts":[[2003,10,31]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Denning, \"Operating Systems Theory","author":"Coffman Edward G.","year":"1973","unstructured":"Edward G. Coffman Jr ., and Peter J . Denning, \"Operating Systems Theory \", Prentice-Hall, Inc. , 1973 . Edward G. Coffman Jr., and Peter J. Denning, \"Operating Systems Theory\", Prentice-Hall, Inc., 1973."},{"key":"e_1_3_2_1_2_1","volume-title":"ISSN 1395-2048 BRICS lecture series","author":"Albers Susanne","year":"1996","unstructured":"Susanne Albers , \" Competitive Online Algorithms\" , ISSN 1395-2048 BRICS lecture series , 1996 . Susanne Albers, \"Competitive Online Algorithms\", ISSN 1395-2048 BRICS lecture series, 1996."},{"key":"e_1_3_2_1_3_1","article-title":"Replacement Policies For A Proxy Cache","author":"Lorenzetti Paolo","year":"1998","unstructured":"Paolo Lorenzetti , Luigi Rizzo , and Lorenzo Vicisano , \" Replacement Policies For A Proxy Cache \", IEEE\/ACM Transactions on networking , 1998 . Paolo Lorenzetti, Luigi Rizzo, and Lorenzo Vicisano, \"Replacement Policies For A Proxy Cache\", IEEE\/ACM Transactions on networking, 1998.","journal-title":"IEEE\/ACM Transactions on networking"},{"key":"e_1_3_2_1_4_1","unstructured":"Boeing proxy logs. http:\/\/www.web-caching.com\/traces-logs.html  Boeing proxy logs. http:\/\/www.web-caching.com\/traces-logs.html"},{"key":"e_1_3_2_1_6_1","unstructured":"Squid Web Proxy Cache http:\/\/www.squid-cache.org.  Squid Web Proxy Cache http:\/\/www.squid-cache.org."},{"key":"e_1_3_2_1_7_1","unstructured":"IRCACHE - the NLANR Web Caching Project http:\/\/www.ircache.net  IRCACHE - the NLANR Web Caching Project http:\/\/www.ircache.net"},{"key":"e_1_3_2_1_8_1","volume-title":"Technical Report GIT-CC-01-10","author":"Xu Jun","year":"2001","unstructured":"Jun Xu , \" Sustaining Availability Of Web Services Under Severe Denial Of Service Attacks\" , Technical Report GIT-CC-01-10 , 2001 . Jun Xu, \"Sustaining Availability Of Web Services Under Severe Denial Of Service Attacks\", Technical Report GIT-CC-01-10, 2001."},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of the 2001 USENIX security symposium","author":"Moore David","year":"2001","unstructured":"David Moore , Geoffrey M. Voelker , and Stefan Savage , \" Inferring Internet Denial Of Service Activity\" , Proceedings of the 2001 USENIX security symposium , 2001 . David Moore, Geoffrey M. Voelker, and Stefan Savage, \"Inferring Internet Denial Of Service Activity\", Proceedings of the 2001 USENIX security symposium, 2001."},{"key":"e_1_3_2_1_10_1","unstructured":"Denial of Service (DOS) Attack Resources http:\/\/www.denialinfo.com.  Denial of Service (DOS) Attack Resources http:\/\/www.denialinfo.com."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1177\/003754979706800109"},{"key":"e_1_3_2_1_12_1","first-page":"01","article-title":"A Game Theoretic Approach to Attack Prediction","volume":"2","author":"Liu Peng","year":"2002","unstructured":"Peng Liu and Lunquan Li , \" A Game Theoretic Approach to Attack Prediction \", Technical Report, PSU-S 2-2002 - 01 , Penn State University, 2002 . Peng Liu and Lunquan Li, \"A Game Theoretic Approach to Attack Prediction\", Technical Report, PSU-S2-2002-01, Penn State University, 2002.","journal-title":"Technical Report, PSU-S"},{"key":"e_1_3_2_1_13_1","volume-title":"Proceedings of the Fifth International WWW Conference","author":"Markatos Evangelos P.","year":"1996","unstructured":"Evangelos P. Markatos , \" Main Memory Caching Of Web Documents\" , Proceedings of the Fifth International WWW Conference , 1996 . Evangelos P. Markatos, \"Main Memory Caching Of Web Documents\", Proceedings of the Fifth International WWW Conference, 1996."},{"key":"e_1_3_2_1_14_1","volume-title":"Department of Commerce \"Digital Economy 2000","author":"Economics and Statistics Administration","year":"2000","unstructured":"Economics and Statistics Administration , U. S. Department of Commerce \"Digital Economy 2000 \" June 2000 . Economics and Statistics Administration, U.S. Department of Commerce \"Digital Economy 2000\" June 2000."},{"key":"e_1_3_2_1_15_1","unstructured":"D.J. Bernstein and Eric Schenk \"SYN Cookies Firewall Project\" http:\/\/www.bronzesoft.org\/projects\/scfw.  D.J. Bernstein and Eric Schenk \"SYN Cookies Firewall Project\" http:\/\/www.bronzesoft.org\/projects\/scfw."},{"key":"e_1_3_2_1_16_1","volume-title":"TR 98-17","author":"Axelsson X.","year":"1999","unstructured":"X. Axelsson , \" Research in Intrusion Detection Systems : A survey \", TR 98-17 , Chalmers University , Sweden , 1999 . X. Axelsson, \"Research in Intrusion Detection Systems: A survey\", TR 98-17, Chalmers University, Sweden, 1999."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/170035.170081"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/1090694.1090708"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/332159.332161"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/347059.347560"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/371920.372148"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/0169-7552(96)00035-9"},{"key":"e_1_3_2_1_23_1","volume-title":"Proceedings of the IEEE SDNE","author":"Azer Bestavros","year":"1995","unstructured":"Azer Bestavros et. al., \" Application-Level Document Caching in the Internet \", Proceedings of the IEEE SDNE 1995 . Azer Bestavros et. al., \"Application-Level Document Caching in the Internet\", Proceedings of the IEEE SDNE 1995."}],"event":{"name":"CCS03: Tenth ACM Conference on Computer and Communications Security 2003","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Fairfax VA","acronym":"CCS03"},"container-title":["Proceedings of the 2003 ACM workshop on Survivable and self-regenerative systems: in association with 10th ACM Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1036921.1036928","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1036921.1036928","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T21:36:48Z","timestamp":1750282608000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1036921.1036928"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003,10,31]]},"references-count":22,"alternative-id":["10.1145\/1036921.1036928","10.1145\/1036921"],"URL":"https:\/\/doi.org\/10.1145\/1036921.1036928","relation":{},"subject":[],"published":{"date-parts":[[2003,10,31]]},"assertion":[{"value":"2003-10-31","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}