{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T08:19:30Z","timestamp":1759133970791,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,4,8]],"date-time":"2014-04-08T00:00:00Z","timestamp":1396915200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000006","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N000141310401"],"award-info":[{"award-number":["N000141310401"]}],"id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000005","name":"U.S. Department of Defense","doi-asserted-by":"publisher","award":["FA8721-05-C-0003"],"award-info":[{"award-number":["FA8721-05-C-0003"]}],"id":[{"id":"10.13039\/100000005","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000183","name":"Army Research Office","doi-asserted-by":"publisher","award":["W911NF-09-1-0273, W911NF-13-1-0154"],"award-info":[{"award-number":["W911NF-09-1-0273, W911NF-13-1-0154"]}],"id":[{"id":"10.13039\/100000183","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,4,8]]},"DOI":"10.1145\/2600176.2600181","type":"proceedings-article","created":{"date-parts":[[2014,8,12]],"date-time":"2014-08-12T13:53:50Z","timestamp":1407851630000},"page":"1-12","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":28,"title":["Architecture-based self-protection"],"prefix":"10.1145","author":[{"given":"Bradley","family":"Schmerl","sequence":"first","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA"}]},{"given":"Javier","family":"C\u00e1mara","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA"}]},{"given":"Jeffrey","family":"Gennari","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA"}]},{"given":"David","family":"Garlan","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA"}]},{"given":"Paulo","family":"Casanova","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA"}]},{"given":"Gabriel A.","family":"Moreno","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA"}]},{"given":"Thomas J.","family":"Glazier","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA"}]},{"given":"Jeffrey M.","family":"Barnes","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA"}]}],"member":"320","published-online":{"date-parts":[[2014,4,8]]},"reference":[{"key":"e_1_3_2_1_1_1","series-title":"Lecture Notes in Computer Science","first-page":"88","volume-title":"FORMATS","author":"Andova S.","year":"2003","unstructured":"S. Andova , H. Hermanns , and J.-P. Katoen . Discrete-time rewards model-checked . In FORMATS , volume 2791 of Lecture Notes in Computer Science , pages 88 -- 104 . Springer , 2003 . S. Andova, H. Hermanns, and J.-P. Katoen. Discrete-time rewards model-checked. In FORMATS, volume 2791 of Lecture Notes in Computer Science, pages 88--104. Springer, 2003."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2004.54"},{"key":"e_1_3_2_1_3_1","volume-title":"Principles of Model Checking","author":"Baier C.","year":"2008","unstructured":"C. Baier and J.-P. Katoen . Principles of Model Checking . MIT Press , 2008 . C. Baier and J.-P. Katoen. Principles of Model Checking. MIT Press, 2008."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SEAMS.2012.6224398"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/2487336.2487342"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2012.02.060"},{"key":"e_1_3_2_1_8_1","series-title":"LNCS","volume-title":"Proceedings of the Conference on Self-Star Properties in Complex Information Systems","author":"Cheng S.-W.","year":"2005","unstructured":"S.-W. Cheng , D. Garlan , and B. Schmerl . Making self-adaptation an engineering reality . In O. Babaoghu, M. Jelasity, A. Montroser, C. Fetzer, S. Leonardi, and A. Van Moorsel, editors, Proceedings of the Conference on Self-Star Properties in Complex Information Systems , volume 3460 of LNCS . Springer-Verlag , 2005 . S.-W. Cheng, D. Garlan, and B. Schmerl. Making self-adaptation an engineering reality. In O. Babaoghu, M. Jelasity, A. Montroser, C. Fetzer, S. Leonardi, and A. Van Moorsel, editors, Proceedings of the Conference on Self-Star Properties in Complex Information Systems, volume 3460 of LNCS. Springer-Verlag, 2005."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1137677.1137679"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"B.\n      Claudel N.\n      Palma R.\n      Lachaize and \n      D.\n      Hagimont\n  . \n  Self-protection for distributed component-based applications\n  . In A. Datta and M. Gradinariu editors Stabilization Safety and Security of Distributed Systems volume \n  4280\n   of \n  Lecture Notes in Computer Science pages \n  184\n  --\n  198\n  . \n  Springer Berlin Heidelberg 2006\n  .   B. Claudel N. Palma R. Lachaize and D. Hagimont. Self-protection for distributed component-based applications. In A. Datta and M. Gradinariu editors Stabilization Safety and Security of Distributed Systems volume 4280 of Lecture Notes in Computer Science pages 184--198. Springer Berlin Heidelberg 2006.","DOI":"10.1007\/978-3-540-49823-0_13"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/582128.582133"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/360933.360975"},{"key":"e_1_3_2_1_13_1","volume-title":"January","author":"Ferguson P.","year":"1998","unstructured":"P. Ferguson and D. Senie . Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing. RFC 2267 (Informational) , January 1998 . Obsoleted by RFC 2827. P. Ferguson and D. Senie. Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing. RFC 2267 (Informational), January 1998. Obsoleted by RFC 2827."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","DOI":"10.21236\/AD0708563","volume-title":"Utility Theory for Decision Making","author":"Fishburn P. C.","year":"1970","unstructured":"P. C. Fishburn . Utility Theory for Decision Making . John Wiley & Sons, Inc. , 1970 . P. C. Fishburn. Utility Theory for Decision Making. John Wiley & Sons, Inc., 1970."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2004.175"},{"key":"e_1_3_2_1_16_1","volume-title":"August","author":"Glenn M.","year":"2003","unstructured":"M. Glenn . A summary of DoS\/DDoS prevention , monitoring and mitigation techniques in a service provider environment. Posted on the SANS Institute Reading Room site , August 2003 . M. Glenn. A summary of DoS\/DDoS prevention, monitoring and mitigation techniques in a service provider environment. Posted on the SANS Institute Reading Room site, August 2003."},{"key":"e_1_3_2_1_17_1","volume-title":"Internet Engineering Task Force","author":"Handley M.","year":"2006","unstructured":"M. Handley and E. Rescorla . RFC 4732: DoS Considerations . Internet Engineering Task Force , Nov. 2006 . M. Handley and E. Rescorla. RFC 4732: DoS Considerations. Internet Engineering Task Force, Nov. 2006."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2003.1160055"},{"key":"e_1_3_2_1_19_1","series-title":"LNCS","first-page":"585","volume-title":"Proc. 23rd International Conference on Computer Aided Verification (CAV'11)","author":"Kwiatkowska M.","year":"2011","unstructured":"M. Kwiatkowska , G. Norman , and D. Parker . PRISM 4.0: Verification of probabilistic real-time systems . In G. Gopalakrishnan and S. Qadeer, editors, Proc. 23rd International Conference on Computer Aided Verification (CAV'11) , volume 6806 of LNCS , pages 585 -- 591 . Springer , 2011 . M. Kwiatkowska, G. Norman, and D. Parker. PRISM 4.0: Verification of probabilistic real-time systems. In G. Gopalakrishnan and S. Qadeer, editors, Proc. 23rd International Conference on Computer Aided Verification (CAV'11), volume 6806 of LNCS, pages 585--591. Springer, 2011."},{"key":"e_1_3_2_1_20_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1007\/3-540-60406-5_12","volume-title":"Software Engineering --- ESEC '95","author":"Magee J.","year":"1995","unstructured":"J. Magee , N. Dulay , S. Eisenbach , and J. Kramer . Specifying distributed software architectures . In W. Sch\u00e4fer and P. Botella, editors, Software Engineering --- ESEC '95 , volume 989 of Lecture Notes in Computer Science , pages 137 -- 153 . Springer Berlin Heidelberg , 1995 . J. Magee, N. Dulay, S. Eisenbach, and J. Kramer. Specifying distributed software architectures. In W. Sch\u00e4fer and P. Botella, editors, Software Engineering --- ESEC '95, volume 989 of Lecture Notes in Computer Science, pages 137--153. Springer Berlin Heidelberg, 1995."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948114"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSNW.2011.5958859"},{"issue":"3","key":"e_1_3_2_1_23_1","first-page":"200","article-title":"A tutorial introduction to decision theory. Systems Science and Cybernetics","volume":"4","author":"North D.","year":"1968","unstructured":"D. North . A tutorial introduction to decision theory. Systems Science and Cybernetics , IEEE Transactions on , 4 ( 3 ): 200 -- 210 , 1968 . D. North. A tutorial introduction to decision theory. Systems Science and Cybernetics, IEEE Transactions on, 4(3):200--210, 1968.","journal-title":"IEEE Transactions on"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/5254.769885"},{"key":"e_1_3_2_1_25_1","volume-title":"Retrieved","author":"Philips D.","year":"2014","unstructured":"D. Philips . Secureimage : PHP CAPTCHA. http:\/\/www.phpcaptcha.org\/, 2012 . Retrieved March 21, 2014 . D. Philips. Secureimage: PHP CAPTCHA. http:\/\/www.phpcaptcha.org\/, 2012. Retrieved March 21, 2014."},{"volume-title":"Retrieved","year":"2014","key":"e_1_3_2_1_26_1","unstructured":"RSnake. Slowloris HTTP DoS. http:\/\/ha.ckers.org\/slowloris, 2014 . Retrieved March 21, 2014 . RSnake. Slowloris HTTP DoS. http:\/\/ha.ckers.org\/slowloris, 2014. Retrieved March 21, 2014."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"H.\n      Seo\n     and \n      T.\n      Cho\n  . \n  Modeling and simulation for detecting a distributed denial of service attack\n  . In B. McKay and J. Slaney editors AI \n  2002\n  : Advances in Artificial Intelligence volume \n  2557\n   of \n  Lecture Notes in Computer Science pages \n  179\n  --\n  190\n  . \n  Springer Berlin Heidelberg 2002.   H. Seo and T. Cho. Modeling and simulation for detecting a distributed denial of service attack. In B. McKay and J. Slaney editors AI 2002: Advances in Artificial Intelligence volume 2557 of Lecture Notes in Computer Science pages 179--190. Springer Berlin Heidelberg 2002.","DOI":"10.1007\/3-540-36187-1_16"},{"key":"e_1_3_2_1_28_1","volume-title":"Software Architecture: Perspectives on an Emerging Discipline","author":"Shaw M.","year":"1996","unstructured":"M. Shaw and D. Garlan . Software Architecture: Perspectives on an Emerging Discipline . Prentice Hall , Apr. 1996 . M. Shaw and D. Garlan. Software Architecture: Perspectives on an Emerging Discipline. Prentice Hall, Apr. 1996."},{"key":"e_1_3_2_1_29_1","volume-title":"http:\/\/jmeter.apache.org\/","author":"Foundation The Apache","year":"2013","unstructured":"The Apache Foundation . Apache JMeter#8482;. http:\/\/jmeter.apache.org\/ , 2013 . Retrieved March 21, 2014. The Apache Foundation. Apache JMeter#8482;. http:\/\/jmeter.apache.org\/, 2013. Retrieved March 21, 2014."},{"key":"e_1_3_2_1_30_1","volume-title":"Retrieved","author":"Foundation The Apache","year":"2014","unstructured":"The Apache Foundation . Apache Module mod_proxy. http:\/\/httpd.apache.org\/docs\/2.2\/mod\/mod_proxy.html, 2014 . Retrieved March 21, 2014 . The Apache Foundation. Apache Module mod_proxy. http:\/\/httpd.apache.org\/docs\/2.2\/mod\/mod_proxy.html, 2014. Retrieved March 21, 2014."},{"volume-title":"Retrieved","year":"2014","key":"e_1_3_2_1_31_1","unstructured":"Trustwave. modsecurity : Open source web application firewall. http:\/\/www.modsecurity.org\/, 2013 . Retrieved March 21, 2014 . Trustwave. modsecurity: Open source web application firewall. http:\/\/www.modsecurity.org\/, 2013. Retrieved March 21, 2014."},{"key":"e_1_3_2_1_32_1","first-page":"294","volume-title":"Eurocrypt","author":"von Ahn L.","year":"2003","unstructured":"L. von Ahn , M. Blum , N. J. Hopper , and J. Langford . CAPTCHA: Using hard AI problems for security . In Eurocrypt , pages 294 -- 311 . Springer-Verlag , 2003 . L. von Ahn, M. Blum, N. J. Hopper, and J. Langford. CAPTCHA: Using hard AI problems for security. In Eurocrypt, pages 294--311. Springer-Verlag, 2003."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.55087"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2555611"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2465478.2465479"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2009.5270307"}],"event":{"name":"HotSoS '14: Symposium and Bootcamp on the Science of Security","sponsor":["No. Carolina State Univeresity North Carolina State University"],"location":"Raleigh North Carolina USA","acronym":"HotSoS '14"},"container-title":["Proceedings of the 2014 Symposium and Bootcamp on the Science of Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2600176.2600181","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2600176.2600181","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:10:25Z","timestamp":1750234225000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2600176.2600181"}},"subtitle":["composing and reasoning about denial-of-service mitigations"],"short-title":[],"issued":{"date-parts":[[2014,4,8]]},"references-count":35,"alternative-id":["10.1145\/2600176.2600181","10.1145\/2600176"],"URL":"https:\/\/doi.org\/10.1145\/2600176.2600181","relation":{},"subject":[],"published":{"date-parts":[[2014,4,8]]},"assertion":[{"value":"2014-04-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}