{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:38:14Z","timestamp":1767339494452,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,6,13]],"date-time":"2007-06-13T00:00:00Z","timestamp":1181692800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,6,13]]},"DOI":"10.1145\/1281700.1281708","type":"proceedings-article","created":{"date-parts":[[2012,10,11]],"date-time":"2012-10-11T15:35:23Z","timestamp":1349969723000},"page":"8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":33,"title":["Towards user-centric metrics for denial-of-service measurement"],"prefix":"10.1145","author":[{"given":"Jelena","family":"Mirkovic","sequence":"first","affiliation":[{"name":"University of Delaware"}]},{"given":"Alefiya","family":"Hussain","sequence":"additional","affiliation":[{"name":"SPARTA, Inc."}]},{"given":"Brett","family":"Wilson","sequence":"additional","affiliation":[{"name":"SPARTA, Inc."}]},{"given":"Sonia","family":"Fahmy","sequence":"additional","affiliation":[{"name":"Purdue University"}]},{"given":"Peter","family":"Reiher","sequence":"additional","affiliation":[{"name":"UCLA"}]},{"given":"Roshan","family":"Thomas","sequence":"additional","affiliation":[{"name":"SPARTA, Inc."}]},{"given":"Wei-Min","family":"Yao","sequence":"additional","affiliation":[{"name":"Purdue University"}]},{"given":"Stephen","family":"Schwab","sequence":"additional","affiliation":[{"name":"SPARTA, Inc."}]}],"member":"320","published-online":{"date-parts":[[2007,6,13]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"3GPP. The 3rd Generation Partnership Project (3GPP).  3GPP. The 3rd Generation Partnership Project (3GPP) ."},{"key":"e_1_3_2_1_2_1","volume-title":"1541-QOSM -- Y.1541 QoS Model for Networks Using Y.1541 QoS Classes","author":"Ash J.","year":"2006","unstructured":"J. Ash , M. Dolly , C. Dvorak , A. Morton , P. Taraporte , and Y. E. Mghazli . Y. 1541-QOSM -- Y.1541 QoS Model for Networks Using Y.1541 QoS Classes . NSIS Working Group , Internet Draft , Work in progress, May 2006 . J. Ash, M. Dolly, C. Dvorak, A. Morton, P. Taraporte, and Y. E. Mghazli. Y.1541-QOSM -- Y.1541 QoS Model for Networks Using Y.1541 QoS Classes. NSIS Working Group, Internet Draft, Work in progress, May 2006."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1016540.1016556"},{"key":"e_1_3_2_1_4_1","volume-title":"Experiences With DETER: A Testbed for Security Research. In 2nd IEEE TridentCom Conference","author":"Benzel T.","year":"2006","unstructured":"T. Benzel , R. Braden , D. Kim , C. Neuman , A. Joseph , K. Sklower , R. Ostrenga , and S. Schwab . Experiences With DETER: A Testbed for Security Research. In 2nd IEEE TridentCom Conference , March 2006 . T. Benzel, R. Braden, D. Kim, C. Neuman, A. Joseph, K. Sklower, R. Ostrenga, and S. Schwab. Experiences With DETER: A Testbed for Security Research. In 2nd IEEE TridentCom Conference, March 2006."},{"key":"e_1_3_2_1_6_1","volume-title":"Integrated Services in the Internet Architecture: an Overview. RFC","author":"Braden R.","year":"1994","unstructured":"R. Braden , D. Clark , and S. Shenker . Integrated Services in the Internet Architecture: an Overview. RFC 1633, June 1994 . http:\/\/www.ietf.org\/rfc\/rfc1633.txt. R. Braden, D. Clark, and S. Shenker. Integrated Services in the Internet Architecture: an Overview. RFC 1633, June 1994. http:\/\/www.ietf.org\/rfc\/rfc1633.txt."},{"key":"e_1_3_2_1_7_1","volume-title":"Debojyoti Dutta. The Effect of Malicious Traffic on the Network. In Passive and Active Measurement Workshop (PAM)","author":"Lan Kun","year":"2003","unstructured":"Kun chan Lan , Alefiya Hussain , and Debojyoti Dutta. The Effect of Malicious Traffic on the Network. In Passive and Active Measurement Workshop (PAM) , April 2003 . Kun chan Lan, Alefiya Hussain, and Debojyoti Dutta. The Effect of Malicious Traffic on the Network. In Passive and Active Measurement Workshop (PAM), April 2003."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1159913.1159959"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TRIDNT.2006.1649164"},{"key":"e_1_3_2_1_10_1","volume-title":"User-centric Performance Analysis of Market-based Cluster Batch Schedulers. In In Proceedings of the 2nd IEEE International Symposium on Cluster Computing and the Grid","author":"Chun B. N.","year":"2002","unstructured":"B. N. Chun and D. E. Culler . User-centric Performance Analysis of Market-based Cluster Batch Schedulers. In In Proceedings of the 2nd IEEE International Symposium on Cluster Computing and the Grid , May 2002 . B. N. Chun and D. E. Culler. User-centric Performance Analysis of Market-based Cluster Batch Schedulers. In In Proceedings of the 2nd IEEE International Symposium on Cluster Computing and the Grid, May 2002."},{"key":"e_1_3_2_1_11_1","unstructured":"Cooperative Association for Internet Data Analysis. CAIDA Web page http:\/\/www.caida.org.  Cooperative Association for Internet Data Analysis. CAIDA Web page http:\/\/www.caida.org."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/65.494557"},{"key":"e_1_3_2_1_13_1","unstructured":"IRTF TMRG group. The Transport Modeling Research Group's Web Page http:\/\/www.icir.org\/tmrg\/.  IRTF TMRG group. The Transport Modeling Research Group's Web Page http:\/\/www.icir.org\/tmrg\/."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/1025124.1025891"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/863955.863988"},{"key":"e_1_3_2_1_16_1","volume-title":"NSDI","author":"Kandula Srikanth","year":"2005","unstructured":"Srikanth Kandula , Dina Katabi , Matthias Jacob , and Arthur Berger . Botz-4-Sale : Surviving Organized DDoS Attacks that Mimic Flash Crowds . In NSDI , 2005 . Srikanth Kandula, Dina Katabi, Matthias Jacob, and Arthur Berger. Botz-4-Sale: Surviving Organized DDoS Attacks that Mimic Flash Crowds. In NSDI, 2005."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/354871.354874"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/863955.863966"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2004.80"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/571697.571724"},{"volume-title":"QoS Performance requirements for UMTS. The 3rd Generation Partnership Project (3GPP)","author":"Networks Nortel","key":"e_1_3_2_1_21_1","unstructured":"Nortel Networks . QoS Performance requirements for UMTS. The 3rd Generation Partnership Project (3GPP) . http:\/\/www.3gpp.org\/ftp\/tsg_sa\/WGl_Serv\/TSGS1_03-HCourt\/Docs\/Docs\/si-99362.pdf Nortel Networks. QoS Performance requirements for UMTS. The 3rd Generation Partnership Project (3GPP). http:\/\/www.3gpp.org\/ftp\/tsg_sa\/WGl_Serv\/TSGS1_03-HCourt\/Docs\/Docs\/si-99362.pdf"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/592637.592640"},{"key":"e_1_3_2_1_23_1","unstructured":"The Network Simulator ns 2. NS-2 Web page. http:\/\/www.isi.edu\/nsnam\/ns\/.  The Network Simulator ns 2. NS-2 Web page. http:\/\/www.isi.edu\/nsnam\/ns\/."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2006.5"},{"key":"e_1_3_2_1_25_1","unstructured":"WIDE Project. MAWI Working Group Traffic Archive. http:\/\/tracer.cs1.sony.co.jp\/mawi\/.  WIDE Project. MAWI Working Group Traffic Archive. http:\/\/tracer.cs1.sony.co.jp\/mawi\/."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/963900.963901"},{"key":"e_1_3_2_1_27_1","volume-title":"NDSS","author":"Stavrou Angelos","year":"2005","unstructured":"Angelos Stavrou , Angelos D. Keromytis , Jason Nieh , Vishal Misra , and Dan Rubenstein . MOVE : An End-to-End Solution to Network Denial of Service . In NDSS , 2005 . Angelos Stavrou, Angelos D. Keromytis, Jason Nieh, Vishal Misra, and Dan Rubenstein. MOVE: An End-to-End Solution to Network Denial of Service. In NDSS, 2005."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301320"},{"key":"e_1_3_2_1_29_1","volume-title":"In Proceedings of EXPERT ATM Traffic Symposium","author":"Yamamoto L.","year":"1997","unstructured":"L. Yamamoto and J. G. Beerends . Impact of network performance parameters on the end-to-end perceived speech quality . In In Proceedings of EXPERT ATM Traffic Symposium , September 1997 . L. Yamamoto and J. G. Beerends. Impact of network performance parameters on the end-to-end perceived speech quality. In In Proceedings of EXPERT ATM Traffic Symposium, September 1997."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1080091.1080120"}],"event":{"name":"ExpCS07: Workshop on Experimental Computer Science","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems","SIGARCH ACM Special Interest Group on Computer Architecture","SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","SIGCOMM ACM Special Interest Group on Data Communication"],"location":"San Diego California","acronym":"ExpCS07"},"container-title":["Proceedings of the 2007 workshop on Experimental computer science"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1281700.1281708","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1281700.1281708","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T14:57:47Z","timestamp":1750258667000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1281700.1281708"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,6,13]]},"references-count":29,"alternative-id":["10.1145\/1281700.1281708","10.1145\/1281700"],"URL":"https:\/\/doi.org\/10.1145\/1281700.1281708","relation":{},"subject":[],"published":{"date-parts":[[2007,6,13]]},"assertion":[{"value":"2007-06-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}