{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,20]],"date-time":"2025-11-20T12:34:38Z","timestamp":1763642078379,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,6,15]],"date-time":"2016-06-15T00:00:00Z","timestamp":1465948800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100003093","name":"Ministry of Higher Education, Malaysia","doi-asserted-by":"publisher","award":["KPT(BS) 790405085321"],"award-info":[{"award-number":["KPT(BS) 790405085321"]}],"id":[{"id":"10.13039\/501100003093","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,6,15]]},"DOI":"10.1145\/2935663.2935666","type":"proceedings-article","created":{"date-parts":[[2016,6,10]],"date-time":"2016-06-10T21:50:36Z","timestamp":1465595436000},"page":"83-89","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Protecting DNS services from IP spoofing"],"prefix":"10.1145","author":[{"given":"Nm","family":"Sahri","sequence":"first","affiliation":[{"name":"Department of Advanced Information Technology, Graduate School of Information Science and Electrical Engineering, Kyushu University, Japan"}]},{"given":"Koji","family":"Okamura","sequence":"additional","affiliation":[{"name":"Research Institute for Information Technology, Kyushu University, Japan"}]}],"member":"320","published-online":{"date-parts":[[2016,6,15]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Arbor Networks. Q1 2015 Infrastructure Security Report. {Online}. Available: http:\/\/preview.tinyurl.com\/kvacqcv  Arbor Networks. Q1 2015 Infrastructure Security Report. {Online}. Available: http:\/\/preview.tinyurl.com\/kvacqcv"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89173-4_16"},{"key":"e_1_3_2_1_3_1","unstructured":"RFC 2827 \"Network Ingress Filtering. Defeating Denial of Service Attacks Which Employ IP Source Address Spoofing.\" Network Working Group IETF  RFC 2827 \"Network Ingress Filtering. Defeating Denial of Service Attacks Which Employ IP Source Address Spoofing.\" Network Working Group IETF"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2006.78"},{"key":"e_1_3_2_1_5_1","unstructured":"J. Ioannidis and S. M. Bellovin \"Implementing pushback: Router-based defense against ddos attacks \" in Proc. of the Symposium on Network and Distributed Systems Security (NDSS 2002) 2002.  J. Ioannidis and S. M. Bellovin \"Implementing pushback: Router-based defense against ddos attacks \" in Proc. of the Symposium on Network and Distributed Systems Security (NDSS 2002) 2002."},{"key":"e_1_3_2_1_6_1","first-page":"2004","author":"Yaar A.","year":"2004","journal-title":"of IEEE Symposium on Security and Privacy"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1355734.1355746"},{"key":"e_1_3_2_1_8_1","unstructured":"POX. {Online}. Available: http:\/\/www.noxrepo.org\/pox\/about-pox\/  POX. {Online}. Available: http:\/\/www.noxrepo.org\/pox\/about-pox\/"},{"key":"e_1_3_2_1_9_1","unstructured":"OpenFlow Switch Specification Version 1.3.0 (Wire Protocol 0x04). {Online}. Available: https:\/\/www.opennetworking.org\/images\/stories\/downloads\/specification\/openflow-spec-v1.3.0.pdf  OpenFlow Switch Specification Version 1.3.0 (Wire Protocol 0x04). {Online}. Available: https:\/\/www.opennetworking.org\/images\/stories\/downloads\/specification\/openflow-spec-v1.3.0.pdf"},{"key":"e_1_3_2_1_10_1","unstructured":"Mininet. (2013 Mar). An Instant Virtual Network on your Laptop (or other PC). {Online}. Available: http:\/\/mininet.org  Mininet. (2013 Mar). An Instant Virtual Network on your Laptop (or other PC). {Online}. Available: http:\/\/mininet.org"},{"key":"e_1_3_2_1_11_1","unstructured":"SCAPY. &lt;http:\/\/hg.secdev.org\/scapy&gt;.  SCAPY. &lt;http:\/\/hg.secdev.org\/scapy&gt;."}],"event":{"name":"CFI '16: The 11th International Conference on Future Internet Technologies","sponsor":["AsiaFI Asia Future Internet"],"location":"Nanjing China","acronym":"CFI '16"},"container-title":["Proceedings of the 11th International Conference on Future Internet Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2935663.2935666","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2935663.2935666","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:39:56Z","timestamp":1750217996000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2935663.2935666"}},"subtitle":["SDN collaborative authentication approach"],"short-title":[],"issued":{"date-parts":[[2016,6,15]]},"references-count":11,"alternative-id":["10.1145\/2935663.2935666","10.1145\/2935663"],"URL":"https:\/\/doi.org\/10.1145\/2935663.2935666","relation":{},"subject":[],"published":{"date-parts":[[2016,6,15]]},"assertion":[{"value":"2016-06-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}