{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T20:54:32Z","timestamp":1768337672011,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,3,22]],"date-time":"2011-03-22T00:00:00Z","timestamp":1300752000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100004963","name":"Seventh Framework Programme","doi-asserted-by":"publisher","award":["216471"],"award-info":[{"award-number":["216471"]}],"id":[{"id":"10.13039\/501100004963","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,3,22]]},"DOI":"10.1145\/1966913.1966955","type":"proceedings-article","created":{"date-parts":[[2011,4,7]],"date-time":"2011-04-07T09:36:11Z","timestamp":1302168971000},"page":"326-333","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":16,"title":["Formal modelling and automatic detection of resource exhaustion attacks"],"prefix":"10.1145","author":[{"given":"Bogdan","family":"Groza","sequence":"first","affiliation":[{"name":"Politehnica University and Institute e-Austria, Timi\u015foara, Romania"}]},{"given":"Marius","family":"Minea","sequence":"additional","affiliation":[{"name":"Politehnica University and Institute e-Austria, Timi\u015foara, Romania"}]}],"member":"320","published-online":{"date-parts":[[2011,3,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/996943.996946"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-007-0041-y"},{"key":"e_1_3_2_1_3_1","first-page":"170","volume-title":"8th International Workshop on Security Protocols (SP'00)","volume":"2133","author":"Aura T.","year":"2001"},{"key":"e_1_3_2_1_4_1","unstructured":"The AVANTSSAR project. http:\/\/avantssar.eu\/.  The AVANTSSAR project. http:\/\/avantssar.eu\/."},{"key":"e_1_3_2_1_5_1","unstructured":"The AVISPA project. http:\/\/avispa-project.org\/.  The AVISPA project. http:\/\/avispa-project.org\/."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-004-0055-7"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10366-7_30"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00124891"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1007\/3-540-48071-4_10","volume-title":"Advances in Cryptology: CRYPTO, LNCS","author":"Dwork C.","year":"1993"},{"key":"e_1_3_2_1_10_1","volume-title":"DERA\/RHUL Workshop on Secure Architectures and Information Flow","author":"Focardi R.","year":"1999"},{"key":"e_1_3_2_1_11_1","first-page":"79","volume-title":"Dependable Computing for Critical Applications 5","author":"Gong L.","year":"1998"},{"key":"e_1_3_2_1_12_1","first-page":"151","volume-title":"Network and Distributed Systems Security Symposium","author":"Juels A.","year":"1999"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/794196.795056"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/794197.795075"},{"key":"e_1_3_2_1_15_1","unstructured":"W. Mao and K. G. Paterson. On the plausible deniability feature of Internet protocols. Published online 2002.  W. Mao and K. G. Paterson. On the plausible deniability feature of Internet protocols. Published online 2002."},{"key":"e_1_3_2_1_16_1","first-page":"466","volume-title":"International Symposium on Information Theory and Its Applications (ISITA)","author":"Matsuura K.","year":"1998"},{"key":"e_1_3_2_1_17_1","first-page":"167","volume-title":"Pre-Proceedings of Internet Workshop (IWS 2000","author":"Matsuura K.","year":"2000"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/374742.374757"},{"key":"e_1_3_2_1_19_1","first-page":"35","volume-title":"Network and Distributed System Security Symposium (NDSS)","author":"Perrig A.","year":"2001"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/882494.884425"},{"key":"e_1_3_2_1_22_1","first-page":"125","volume-title":"4th Australasian Information Security Workshop","author":"Smith J.","year":"2006"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02620-1_27"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1002\/nem.561"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/11805618_21"}],"event":{"name":"ASIA CCS '11: 6th ACM Symposium on Information, Compuer and Communications Security","location":"Hong Kong China","acronym":"ASIA CCS '11","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1966913.1966955","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1966913.1966955","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:52:25Z","timestamp":1750243945000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1966913.1966955"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,3,22]]},"references-count":24,"alternative-id":["10.1145\/1966913.1966955","10.1145\/1966913"],"URL":"https:\/\/doi.org\/10.1145\/1966913.1966955","relation":{},"subject":[],"published":{"date-parts":[[2011,3,22]]},"assertion":[{"value":"2011-03-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}