{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:13:10Z","timestamp":1750306390019,"version":"3.41.0"},"publisher-location":"New York, New York, USA","reference-count":7,"publisher":"ACM Press","license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1145\/2801694.2801709","type":"proceedings-article","created":{"date-parts":[[2015,8,27]],"date-time":"2015-08-27T20:08:52Z","timestamp":1440706132000},"page":"28-30","source":"Crossref","is-referenced-by-count":2,"title":["Guard Mounting"],"prefix":"10.1145","author":[{"given":"Ricardo","family":"Macedo","sequence":"first","affiliation":[]},{"given":"Aldri","family":"Santos","sequence":"additional","affiliation":[]},{"given":"Yacine","family":"Ghamri-Doudane","sequence":"additional","affiliation":[]},{"given":"Michele","family":"Nogueira","sequence":"additional","affiliation":[]}],"member":"320","reference":[{"key":"key-10.1145\/2801694.2801709-1","doi-asserted-by":"crossref","unstructured":"S. Saroiu and A. Wolman, \"Enabling new mobile applications with location proofs,\" in Proceedings of the 10th Workshop on Mobile Computing Systems and Applications. New York, NY, USA: ACM, 2009, pp. 3:1--3:6.","DOI":"10.1145\/1514411.1514414"},{"key":"key-10.1145\/2801694.2801709-2","doi-asserted-by":"crossref","unstructured":"A. Lonea, H. Tianfield, and D. Popescu, \"Identity management for cloud computing,\" in New Concepts and Applications in Soft Computing. Springer, 2013, vol. 417, pp. 175--199.","DOI":"10.1007\/978-3-642-28959-0_11"},{"key":"key-10.1145\/2801694.2801709-3","doi-asserted-by":"crossref","unstructured":"M. K. Rafsanjani and N. Kazeminejad, \"Distributed denial of service attacks and detection mechanisms,\" J. Comp. Methods in Sci. and Eng., vol. 14, no. 6, pp. 329--345, Jan. 2014.","DOI":"10.3233\/JCM-140510"},{"key":"key-10.1145\/2801694.2801709-4","doi-asserted-by":"crossref","unstructured":"A. Alsumayt and J. Haggerty, \"A survey of the mitigation methods against dos attacks on manets,\" in Science and Information Conference, Aug 2014, pp. 538--544.","DOI":"10.1109\/SAI.2014.6918239"},{"key":"key-10.1145\/2801694.2801709-5","doi-asserted-by":"crossref","unstructured":"Q. Jia, H. Wang, D. Fleck, F. Li, A. Stavrou, and W. Powell, \"Catch me if you can: A cloud-enabled ddos defense,\" in IEEE\/IFIP International Conference on Dependable Systems and Networks, June 2014, pp. 264--275.","DOI":"10.1109\/DSN.2014.35"},{"key":"key-10.1145\/2801694.2801709-6","doi-asserted-by":"crossref","unstructured":"K. Giotis, C. Argyropoulos, G. Androulidakis, D. Kalogeras, and V. Maglaris, \"Combining openflow and sflow for an effective and scalable anomaly detection and mitigation mechanism on sdn environments,\" Computer Networks, vol. 62, no. 0, pp. 122 -- 136, 2014.","DOI":"10.1016\/j.bjp.2013.10.014"},{"key":"key-10.1145\/2801694.2801709-7","unstructured":"\"CAFe Statistical Information,\" https:\/\/portal.rnp.br\/web\/servicos\/estatisticas, last access: Jan. 2015."}],"event":{"number":"2015","sponsor":["SIGMOBILE, ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"acronym":"S3 '15","name":"the 2015 Workshop","start":{"date-parts":[[2015,9,11]]},"location":"Paris, France","end":{"date-parts":[[2015,9,11]]}},"container-title":["Proceedings of the 2015 Workshop on Wireless of the Students, by the Students, &amp; for the Students - S3 '15"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2801694.2801709","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/dl.acm.org\/ft_gateway.cfm?id=2801709&amp;ftid=1616566&amp;dwn=1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:07:13Z","timestamp":1750223233000},"score":1,"resource":{"primary":{"URL":"http:\/\/dl.acm.org\/citation.cfm?doid=2801694.2801709"}},"subtitle":["Reorganizations to Mitigate DDoS Attacks over Identity Providers Clustering"],"proceedings-subject":"Wireless of the Students, by the Students, & for the Students","short-title":[],"issued":{"date-parts":[[2015]]},"references-count":7,"URL":"https:\/\/doi.org\/10.1145\/2801694.2801709","relation":{},"subject":[],"published":{"date-parts":[[2015]]}}}