{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T17:55:26Z","timestamp":1768413326205,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":5,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,4,13]],"date-time":"2014-04-13T00:00:00Z","timestamp":1397347200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,4,13]]},"DOI":"10.1145\/2592791.2592794","type":"proceedings-article","created":{"date-parts":[[2014,4,28]],"date-time":"2014-04-28T14:18:30Z","timestamp":1398694710000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":27,"title":["On measuring the impact of DDoS botnets"],"prefix":"10.1145","author":[{"given":"Arne","family":"Welzel","sequence":"first","affiliation":[{"name":"VU University Amsterdam, The Netherlands"}]},{"given":"Christian","family":"Rossow","sequence":"additional","affiliation":[{"name":"VU University Amsterdam, The Netherlands"}]},{"given":"Herbert","family":"Bos","sequence":"additional","affiliation":[{"name":"VU University Amsterdam, The Netherlands"}]}],"member":"320","published-online":{"date-parts":[[2014,4,13]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Arbor Networks. http:\/\/ddos.arbornetworks.com\/.  Arbor Networks. http:\/\/ddos.arbornetworks.com\/."},{"key":"e_1_3_2_1_2_1","volume-title":"Proceedings of the 5th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET)","author":"B\u00fcscher A.","year":"2012"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/997150.997156"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978672.1978682"},{"key":"e_1_3_2_1_5_1","volume-title":"Proceedings of the International Conference on Parallel and Distributed Computing (and Communications) Systems (ISCA PDCS)","author":"Specht S. M.","year":"2004"}],"event":{"name":"EuroSys 2014: Ninth Eurosys Conference 2014","location":"Amsterdam The Netherlands","acronym":"EuroSys 2014","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems"]},"container-title":["Proceedings of the Seventh European Workshop on System Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2592791.2592794","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2592791.2592794","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:55:58Z","timestamp":1750229758000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2592791.2592794"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,4,13]]},"references-count":5,"alternative-id":["10.1145\/2592791.2592794","10.1145\/2592791"],"URL":"https:\/\/doi.org\/10.1145\/2592791.2592794","relation":{},"subject":[],"published":{"date-parts":[[2014,4,13]]},"assertion":[{"value":"2014-04-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}