{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:31:22Z","timestamp":1750307482530,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,10,3]],"date-time":"2010-10-03T00:00:00Z","timestamp":1286064000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000016","name":"U.S. Department of Health and Human Services","doi-asserted-by":"publisher","award":["90TR0003-01"],"award-info":[{"award-number":["90TR0003-01"]}],"id":[{"id":"10.13039\/100000016","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CNS 09-64392CNS 09-17218CNS 07-16626CNS 07-16421CNS 05-24695"],"award-info":[{"award-number":["CNS 09-64392CNS 09-17218CNS 07-16626CNS 07-16421CNS 05-24695"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,10,3]]},"DOI":"10.1145\/1879082.1879093","type":"proceedings-article","created":{"date-parts":[[2010,11,9]],"date-time":"2010-11-09T15:01:31Z","timestamp":1289314891000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Tiered incentives for integrity based queuing"],"prefix":"10.1145","author":[{"given":"Fariba","family":"Khan","sequence":"first","affiliation":[{"name":"University of Illinois at Urbana-Champaign"}]},{"given":"Carl A.","family":"Gunter","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign"}]}],"member":"320","published-online":{"date-parts":[[2010,10,3]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Feb 02","author":"Voice","year":"2006","unstructured":"Voice over ip - per call bandwidth consumption , document id: 7934 , Feb 02 2006 . Voice over ip - per call bandwidth consumption, document id: 7934, Feb 02 2006."},{"key":"e_1_3_2_1_2_1","volume-title":"Iranian hacker attack: What will it cost twitter? Christian Science Monitor (Dec 18","author":"Belsie L.","year":"2009","unstructured":"Belsie , L. Iranian hacker attack: What will it cost twitter? Christian Science Monitor (Dec 18 2009 ). Belsie, L. Iranian hacker attack: What will it cost twitter? Christian Science Monitor (Dec 18 2009)."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/1361436.1361441"},{"key":"e_1_3_2_1_4_1","volume-title":"SRUTI'05: Proceedings of the Steps to Reducing Unwanted Traffic on the Internet on Steps to Reducing Unwanted Traffic on the Internet Workshop","author":"Beverly R.","year":"2005","unstructured":"Beverly , R. , and Bauer , S . The spoofer project: inferring the extent of source address filtering on the internet . In SRUTI'05: Proceedings of the Steps to Reducing Unwanted Traffic on the Internet on Steps to Reducing Unwanted Traffic on the Internet Workshop ( Berkeley, CA, USA , 2005 ), USENIX Association, pp. 8--8. Beverly, R., and Bauer, S. The spoofer project: inferring the extent of source address filtering on the internet. In SRUTI'05: Proceedings of the Steps to Reducing Unwanted Traffic on the Internet on Steps to Reducing Unwanted Traffic on the Internet Workshop (Berkeley, CA, USA, 2005), USENIX Association, pp. 8--8."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/75246.75248"},{"key":"e_1_3_2_1_6_1","volume-title":"May","author":"Ferguson P.","year":"2000","unstructured":"Ferguson , P. , and Senie , D . Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing. RFC 2827 (Best Current Practice) , May 2000 . Updated by RFC 3704. Ferguson, P., and Senie, D. Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing. RFC 2827 (Best Current Practice), May 2000. Updated by RFC 3704."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.793002"},{"key":"e_1_3_2_1_8_1","volume-title":"Dec.","author":"Kent S.","year":"2005","unstructured":"Kent , S. , and Seo , K . Security Architecture for the Internet Protocol. RFC 4301 (Proposed Standard) , Dec. 2005 . Kent, S., and Seo, K. Security Architecture for the Internet Protocol. RFC 4301 (Proposed Standard), Dec. 2005."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1403027.1403034"},{"key":"e_1_3_2_1_10_1","volume-title":"NSDI'08: Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation","author":"Liu X.","year":"2008","unstructured":"Liu , X. , Li , A. , Yang , X. , and Wetherall , D . Passport: secure and adoptable source authentication . In NSDI'08: Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation ( Berkeley, CA, USA , 2008 ), USENIX Association, pp. 365--378. Liu, X., Li, A., Yang, X., and Wetherall, D. Passport: secure and adoptable source authentication. In NSDI'08: Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation (Berkeley, CA, USA, 2008), USENIX Association, pp. 365--378."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1402946.1402981"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/571697.571724"},{"key":"e_1_3_2_1_13_1","volume-title":"Facebook attack targeted one user. cnet news (August 6","author":"Mills E.","year":"2009","unstructured":"Mills , E. Twitter , Facebook attack targeted one user. cnet news (August 6 2009 ). Mills, E. Twitter, Facebook attack targeted one user. cnet news (August 6 2009)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1132026.1132027"},{"key":"e_1_3_2_1_15_1","volume-title":"Jan.","author":"Nagle J.","year":"1984","unstructured":"Nagle , J. Congestion control in IP\/TCP internetworks. RFC 896 () , Jan. 1984 . Nagle, J. Congestion control in IP\/TCP internetworks. RFC 896 (), Jan. 1984."},{"key":"e_1_3_2_1_16_1","volume-title":"Georgia accuses russia of waging cyber-war. The Times Online (August 11","author":"Richards J.","year":"2008","unstructured":"Richards , J. Georgia accuses russia of waging cyber-war. The Times Online (August 11 2008 ). Richards, J. Georgia accuses russia of waging cyber-war. The Times Online (August 11 2008)."},{"key":"e_1_3_2_1_17_1","volume-title":"Steps up Effort on Digital Defenses. New York Times Online (April 28","author":"Sanger D. E.","year":"2009","unstructured":"Sanger , D. E. , Markoff , J. , and Shanker , T. U.S . Steps up Effort on Digital Defenses. New York Times Online (April 28 2009 ). Sanger, D. E., Markoff, J., and Shanker, T. U.S. Steps up Effort on Digital Defenses. New York Times Online (April 28 2009)."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/1323128.1323137"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2002.808414"},{"key":"e_1_3_2_1_20_1","unstructured":"Svensson P. Comcast blocks some Internet traffic.  Svensson P. Comcast blocks some Internet traffic."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/829515.830562"},{"key":"e_1_3_2_1_22_1","volume-title":"Eighth ACM Workshop on SIGCOMM Hot Topics in Networks (HotNets-VIII)","author":"Yang X.","year":"2009","unstructured":"Yang , X. , and Liu , X . Internet protocol made accountable . In Eighth ACM Workshop on SIGCOMM Hot Topics in Networks (HotNets-VIII) ( 2009 ), ACM SIGCOMM. Yang, X., and Liu, X. Internet protocol made accountable. In Eighth ACM Workshop on SIGCOMM Hot Topics in Networks (HotNets-VIII) (2009), ACM SIGCOMM."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2007.914506"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/99517.99525"}],"event":{"name":"NetEcon '10: Workshop on the Economics of Networks, Systems, and Computation","sponsor":["USENIX Assoc USENIX Assoc","SIGecom Special Interest Group on Economics and Computation"],"location":"Vancouver British Columbia Canada","acronym":"NetEcon '10"},"container-title":["Proceedings of the 2010 Workshop on Economics of Networks, Systems, and Computation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1879082.1879093","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1879082.1879093","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:09:05Z","timestamp":1750248545000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1879082.1879093"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,10,3]]},"references-count":24,"alternative-id":["10.1145\/1879082.1879093","10.1145\/1879082"],"URL":"https:\/\/doi.org\/10.1145\/1879082.1879093","relation":{},"subject":[],"published":{"date-parts":[[2010,10,3]]},"assertion":[{"value":"2010-10-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}