{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:40:10Z","timestamp":1750308010815,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2006,7,3]],"date-time":"2006-07-03T00:00:00Z","timestamp":1151884800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,7,3]]},"DOI":"10.1145\/1143549.1143620","type":"proceedings-article","created":{"date-parts":[[2007,1,17]],"date-time":"2007-01-17T01:15:56Z","timestamp":1168996556000},"page":"355-360","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Tracers placement for IP traceback against DDoS attacks"],"prefix":"10.1145","author":[{"given":"Chun-Hsin","family":"Wang","sequence":"first","affiliation":[{"name":"Chung Hua University, Hsin Chu, Taiwan, R.O.C."}]},{"given":"Chang-Wu","family":"Yu","sequence":"additional","affiliation":[{"name":"Chung Hua University, Hsin Chu, Taiwan, R.O.C."}]},{"given":"Chiu-Kuo","family":"Liang","sequence":"additional","affiliation":[{"name":"Chung Hua University, Hsin Chu, Taiwan, R.O.C."}]},{"given":"Kun-Min","family":"Yu","sequence":"additional","affiliation":[{"name":"Chung Hua University, Hsin Chu, Taiwan, R.O.C."}]},{"given":"Wen","family":"Ouyang","sequence":"additional","affiliation":[{"name":"Chung Hua University, Hsin Chu, Taiwan, R.O.C."}]},{"given":"Ching-Hsien","family":"Hsu","sequence":"additional","affiliation":[{"name":"Chung Hua University, Hsin Chu, Taiwan, R.O.C."}]},{"given":"Yu-Guang","family":"Chen","sequence":"additional","affiliation":[{"name":"Chung Hua University, Hsin Chu, Taiwan, R.O.C."}]}],"member":"320","published-online":{"date-parts":[[2006,7,3]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/997150.997156"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2002.1039856"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2003.1215651"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.929847"},{"key":"e_1_3_2_1_5_1","first-page":"878","volume-title":"INFOCOM","volume":"2","author":"Song D. X.","year":"2001","unstructured":"D. X. Song and A. Perring , \" Advanced and Authenticated Marking Schemes for IP Traceback,\" Proc . INFOCOM , 2001 , vol. 2 , pp. 878 -- 886 . D. X. Song and A. Perring, \"Advanced and Authenticated Marking Schemes for IP Traceback,\" Proc. INFOCOM, 2001, vol. 2, pp. 878--86."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2005.1498364"},{"key":"e_1_3_2_1_7_1","unstructured":"S. M. Bellovin \"ICMP Traceback Messages \" IETF draft 2000; http:\/\/www.research.att.com\/smb\/papers\/draft-bellovin-itrace-00.txt.  S. M. Bellovin \"ICMP Traceback Messages \" IETF draft 2000; http:\/\/www.research.att.com\/smb\/papers\/draft-bellovin-itrace-00.txt."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2002.804827"},{"key":"e_1_3_2_1_9_1","volume-title":"Australasian Computer Science Conference (ACSC2003)","volume":"16","author":"Tupakula U. K.","unstructured":"U. K. Tupakula and V. Varadharajan , \" A proactical method to counteract denial of service attacks,\" in Proc . Australasian Computer Science Conference (ACSC2003) , Adeliaide, australia. Conference in Research and Practice in Information Technology , vol. 16 . U. K. Tupakula and V. Varadharajan, \"A proactical method to counteract denial of service attacks,\" in Proc. Australasian Computer Science Conference (ACSC2003), Adeliaide, australia. Conference in Research and Practice in Information Technology, vol. 16."},{"key":"e_1_3_2_1_10_1","volume-title":"Symp. Integrated Net. Mgmt.","author":"Chang H. Y.","year":"1999","unstructured":"H. Y. Chang : Decentralized Source Identification for Network-Based Intrusion,\" Proc. 6th IFIP\/IEEE Int'l , Symp. Integrated Net. Mgmt. , 1999 . H. Y. Chang et al., \"Deciduous: Decentralized Source Identification for Network-Based Intrusion,\" Proc. 6th IFIP\/IEEE Int'l, Symp. Integrated Net. Mgmt., 1999."},{"key":"e_1_3_2_1_11_1","volume-title":"Security Architecture for the Internet Protocol. RFC","author":"Kent S.","year":"1998","unstructured":"S. Kent and R. Atkinson . Security Architecture for the Internet Protocol. RFC 2401, November 1998 . S. Kent and R. Atkinson. Security Architecture for the Internet Protocol. RFC 2401, November 1998."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1002\/nem.543"},{"key":"e_1_3_2_1_13_1","first-page":"319","volume-title":"9th USENIX Sec. Symp.","author":"Stone R.","year":"2000","unstructured":"R. Stone , \"Center track : An IP Overlay Network for Tracing DoS Floods,\" Proc . 9th USENIX Sec. Symp. , 2000 , pp. 319 -- 327 . R. Stone, \"Centertrack: An IP Overlay Network for Tracing DoS Floods,\" Proc. 9th USENIX Sec. Symp., 2000, pp. 319--27."},{"key":"e_1_3_2_1_14_1","volume-title":"Computers and Intractability","author":"Garey M. R.","year":"1979","unstructured":"M. R. Garey and D. S. Johnson , Computers and Intractability , San Francisco, CA : Freeman , 1979 . M. R. Garey and D. S. Johnson, Computers and Intractability, San Francisco, CA: Freeman, 1979."},{"key":"e_1_3_2_1_15_1","first-page":"249","article-title":"On the graph-theorem of Tur\u00e1n","volume":"21","author":"Erd\u00f6s P.","year":"1970","unstructured":"P. Erd\u00f6s , \" On the graph-theorem of Tur\u00e1n ,\" Math. Lapok , vol. 21 , pp. 249 -- 251 , 1970 P. Erd\u00f6s, \"On the graph-theorem of Tur\u00e1n,\" Math. Lapok, vol. 21, pp. 249--251, 1970","journal-title":"Math. Lapok"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-349-03521-2","volume-title":"Graph Theory with Applications","author":"Bondy J.A.","year":"1976","unstructured":"J.A. Bondy and U. S. R. Murty , Graph Theory with Applications , Macmillan , London , 1976 . J.A. Bondy and U. S. R. Murty, Graph Theory with Applications, Macmillan, London, 1976."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/882459.882563"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/49.12889"}],"event":{"name":"IWCMC06: 2006 International Wireless Communications and Mobile Computing Conference","sponsor":["ACM Association for Computing Machinery"],"location":"Vancouver British Columbia Canada","acronym":"IWCMC06"},"container-title":["Proceedings of the 2006 international conference on Wireless communications and mobile computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1143549.1143620","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1143549.1143620","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T15:06:35Z","timestamp":1750259195000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1143549.1143620"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,7,3]]},"references-count":18,"alternative-id":["10.1145\/1143549.1143620","10.1145\/1143549"],"URL":"https:\/\/doi.org\/10.1145\/1143549.1143620","relation":{},"subject":[],"published":{"date-parts":[[2006,7,3]]},"assertion":[{"value":"2006-07-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}