{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T04:55:12Z","timestamp":1764996912141,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,3,21]],"date-time":"2011-03-21T00:00:00Z","timestamp":1300665600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100004963","name":"Seventh Framework Programme","doi-asserted-by":"publisher","award":["257007"],"award-info":[{"award-number":["257007"]}],"id":[{"id":"10.13039\/501100004963","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,3,21]]},"DOI":"10.1145\/1982185.1982297","type":"proceedings-article","created":{"date-parts":[[2011,5,17]],"date-time":"2011-05-17T12:59:14Z","timestamp":1305637154000},"page":"520-527","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["CluB"],"prefix":"10.1145","author":[{"given":"Zhang","family":"Fu","sequence":"first","affiliation":[{"name":"Chalmers University of Technology, Gothenburg Sweden"}]},{"given":"Marina","family":"Papatriantafilou","sequence":"additional","affiliation":[{"name":"Chalmers University of Technology, Gothenburg Sweden"}]},{"given":"Philippas","family":"Tsigas","sequence":"additional","affiliation":[{"name":"Chalmers University of Technology, Gothenburg Sweden"}]}],"member":"320","published-online":{"date-parts":[[2011,3,21]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Crypto++ 5.6.0 benchmarks http:\/\/www.cryptopp.com\/benchmarks.html 2009.  Crypto++ 5.6.0 benchmarks http:\/\/www.cryptopp.com\/benchmarks.html 2009."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/972374.972382"},{"key":"e_1_3_2_1_3_1","volume-title":"In Proceedings of Workshop on Hot Topics in Networks (HotNets-IV)","author":"Argyraki K.","year":"2005","unstructured":"K. Argyraki and D. Cheriton . Network capability: The good, the bad and the ugly . In In Proceedings of Workshop on Hot Topics in Networks (HotNets-IV) , November 2005 . K. Argyraki and D. Cheriton. Network capability: The good, the bad and the ugly. In In Proceedings of Workshop on Hot Topics in Networks (HotNets-IV), November 2005."},{"key":"e_1_3_2_1_4_1","first-page":"10","volume-title":"Proceedings of the annual conference on USENIX Annual Technical Conference","author":"Argyraki K.","year":"2005","unstructured":"K. Argyraki and D. R. Cheriton . Active internet traffic filtering: real-time response to denial-of-service attacks . In Proceedings of the annual conference on USENIX Annual Technical Conference , pages 10 -- 10 . USENIX Association , 2005 . K. Argyraki and D. R. Cheriton. Active internet traffic filtering: real-time response to denial-of-service attacks. In Proceedings of the annual conference on USENIX Annual Technical Conference, pages 10--10. USENIX Association, 2005."},{"key":"e_1_3_2_1_5_1","volume-title":"EPFL","author":"Boudec J.-Y. L.","year":"2000","unstructured":"J.-Y. L. Boudec . Rate adaptation, congestion control and fairness: A tutorial , EPFL , December 2000 . J.-Y. L. Boudec. Rate adaptation, congestion control and fairness: A tutorial, EPFL, December 2000."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2007.1111"},{"key":"e_1_3_2_1_7_1","first-page":"15879","article-title":"The average distances in random graphs with given expected degrees","volume":"1","author":"Chung F.","year":"2002","unstructured":"F. Chung and L. Lu . The average distances in random graphs with given expected degrees . Internet Mathematics , 1 : 15879 -- 15882 , 2002 . F. Chung and L. Lu. The average distances in random graphs with given expected degrees. Internet Mathematics, 1: 15879--15882, 2002.","journal-title":"Internet Mathematics"},{"issue":"4","key":"e_1_3_2_1_8_1","first-page":"486","article-title":"Visa protocols for controlling interorganizational datagram flow. Selected Areas in Communications","volume":"7","author":"Estrin D.","year":"1989","unstructured":"D. Estrin , J. Mogul , and G. Tsudik . Visa protocols for controlling interorganizational datagram flow. Selected Areas in Communications , IEEE Journal on , 7 ( 4 ): 486 -- 498 , May 1989 . D. Estrin, J. Mogul, and G. Tsudik. Visa protocols for controlling interorganizational datagram flow. Selected Areas in Communications, IEEE Journal on, 7(4): 486--498, May 1989.","journal-title":"IEEE Journal on"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/316188.316229"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2008.30"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1774088.1774234"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1015467.1015488"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/964725.633032"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402981"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/571697.571724"},{"key":"e_1_3_2_1_17_1","first-page":"636","volume-title":"Internet Mathematics","author":"Mitzenmacher A. B. I. M.","year":"2002","unstructured":"A. B. I. M. Mitzenmacher . Network applications of bloom filters: A survey . In Internet Mathematics , pages 636 -- 646 , 2002 . A. B. I. M. Mitzenmacher. Network applications of bloom filters: A survey. In Internet Mathematics, pages 636--646, 2002."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282413"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030194.1015487"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/347057.347560"},{"key":"e_1_3_2_1_21_1","first-page":"878","volume-title":"IEEE INFOCOM","volume":"2","author":"Song D. X.","year":"2001","unstructured":"D. X. Song and A. Perrig . Advanced and authenticated marking schemes for ip traceback . In IEEE INFOCOM 2001 ., volume 2 , pages 878 -- 886 vol. 2, 2001. D. X. Song and A. Perrig. Advanced and authenticated marking schemes for ip traceback. In IEEE INFOCOM 2001., volume 2, pages 878--886 vol. 2, 2001."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102153"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301320"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1080091.1080120"}],"event":{"name":"SAC'11: The 2011 ACM Symposium on Applied Computing","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"location":"TaiChung Taiwan","acronym":"SAC'11"},"container-title":["Proceedings of the 2011 ACM Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1982185.1982297","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1982185.1982297","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:52:21Z","timestamp":1750243941000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1982185.1982297"}},"subtitle":["a cluster based framework for mitigating distributed denial of service attacks"],"short-title":[],"issued":{"date-parts":[[2011,3,21]]},"references-count":23,"alternative-id":["10.1145\/1982185.1982297","10.1145\/1982185"],"URL":"https:\/\/doi.org\/10.1145\/1982185.1982297","relation":{},"subject":[],"published":{"date-parts":[[2011,3,21]]},"assertion":[{"value":"2011-03-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}