{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:34:15Z","timestamp":1750221255237,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":5,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,8,7]],"date-time":"2018-08-07T00:00:00Z","timestamp":1533600000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"the National Science Foundation of China","award":["No.61472213"],"award-info":[{"award-number":["No.61472213"]}]},{"name":"National Key R\\&D Program of China","award":["2017YFB0801701"],"award-info":[{"award-number":["2017YFB0801701"]}]},{"name":"CERNET Innovation Project","award":["NGII20160123"],"award-info":[{"award-number":["NGII20160123"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,8,7]]},"DOI":"10.1145\/3234200.3234205","type":"proceedings-article","created":{"date-parts":[[2018,8,8]],"date-time":"2018-08-08T19:13:06Z","timestamp":1533755586000},"page":"51-53","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Filtering Spoofed IP Traffic Using Switching ASICs"],"prefix":"10.1145","author":[{"given":"Jiasong","family":"Bai","sequence":"first","affiliation":[{"name":"Institute for Network Sciences and Cyberspace, Tsinghua University, Department of Computer Science and Technology, Tsinghua University, Beijing National Research Center for Information Science and Technology (BNRist)"}]},{"given":"Jun","family":"Bi","sequence":"additional","affiliation":[{"name":"Institute for Network Sciences and Cyberspace, Tsinghua University, Department of Computer Science and Technology, Tsinghua University, Beijing National Research Center for Information Science and Technology (BNRist)"}]},{"given":"Menghao","family":"Zhang","sequence":"additional","affiliation":[{"name":"Institute for Network Sciences and Cyberspace, Tsinghua University, Department of Computer Science and Technology, Tsinghua University, Beijing National Research Center for Information Science and Technology (BNRist)"}]},{"given":"Guanyu","family":"Li","sequence":"additional","affiliation":[{"name":"Institute for Network Sciences and Cyberspace, Tsinghua University, Department of Computer Science and Technology, Tsinghua University, Beijing National Research Center for Information Science and Technology (BNRist)"}]}],"member":"320","published-online":{"date-parts":[[2018,8,7]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Noah Davids. 2018. default TTL values. http:\/\/noahdavids.org\/self_published\/TTL_values.html. (2018)."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3185467.3190785"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","unstructured":"Cheng Jin and et al. 2003. Hop-count filtering: an effective defense against spoofed DDoS traffic. In CCS. ACM 30--41. 10.1145\/948109.948116","DOI":"10.1145\/948109.948116"},{"key":"e_1_3_2_1_4_1","unstructured":"Barefoot Networks. 2018. Tofino. https:\/\/barefootnetworks.com\/products\/brief-tofino\/. (2018)."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2006.890133"}],"event":{"name":"SIGCOMM '18: ACM SIGCOMM 2018 Conference","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"],"location":"Budapest Hungary","acronym":"SIGCOMM '18"},"container-title":["Proceedings of the ACM SIGCOMM 2018 Conference on Posters and Demos"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3234200.3234205","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3234200.3234205","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:08:04Z","timestamp":1750212484000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3234200.3234205"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8,7]]},"references-count":5,"alternative-id":["10.1145\/3234200.3234205","10.1145\/3234200"],"URL":"https:\/\/doi.org\/10.1145\/3234200.3234205","relation":{},"subject":[],"published":{"date-parts":[[2018,8,7]]},"assertion":[{"value":"2018-08-07","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}