{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T19:27:26Z","timestamp":1770751646550,"version":"3.50.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,1,15]],"date-time":"2018-01-15T00:00:00Z","timestamp":1515974400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,1,15]]},"DOI":"10.1145\/3268966.3268968","type":"proceedings-article","created":{"date-parts":[[2018,10,16]],"date-time":"2018-10-16T13:23:10Z","timestamp":1539696190000},"page":"80-89","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["In-design Resilient SDN Control Plane and Elastic Forwarding Against Aggressive DDoS Attacks"],"prefix":"10.1145","author":[{"given":"Fida","family":"Gillani","sequence":"first","affiliation":[{"name":"University of North Carolina at Charlotte, Charlotte, NC, USA"}]},{"given":"Ehab","family":"Al-Shaer","sequence":"additional","affiliation":[{"name":"University of North Carolina at Charlotte, Charlotte, NC, USA"}]},{"given":"Qi","family":"Duan","sequence":"additional","affiliation":[{"name":"University of North Carolina at Charlotte, Charlotte, NC, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,1,15]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Brite topology generator. http:\/\/cs.bu.edu\/brite\/.  Brite topology generator. http:\/\/cs.bu.edu\/brite\/."},{"key":"e_1_3_2_1_2_1","unstructured":"Global onos and sdn-ip deployment. http:\/\/onosproject.org\/wpcontent\/ uploads\/2015\/06\/PoC_global-deploy.pdf.  Global onos and sdn-ip deployment. http:\/\/onosproject.org\/wpcontent\/ uploads\/2015\/06\/PoC_global-deploy.pdf."},{"key":"e_1_3_2_1_3_1","unstructured":"Mininet: An instant virtual network on your laptop (or other pc). http:\/\/mininet.org\/.  Mininet: An instant virtual network on your laptop (or other pc). http:\/\/mininet.org\/."},{"key":"e_1_3_2_1_4_1","unstructured":"Pox controller. http:\/\/openflow.stanford.edu\/display\/ONL\/POX+Wiki.  Pox controller. http:\/\/openflow.stanford.edu\/display\/ONL\/POX+Wiki."},{"key":"e_1_3_2_1_5_1","unstructured":"Rocketfuel. http:\/\/research.cs.washington.edu\/networking\/rocketfuel\/.  Rocketfuel. http:\/\/research.cs.washington.edu\/networking\/rocketfuel\/."},{"key":"e_1_3_2_1_6_1","unstructured":"Scapy. http:\/\/secdev.org\/projects\/scapy\/.  Scapy. http:\/\/secdev.org\/projects\/scapy\/."},{"key":"e_1_3_2_1_7_1","unstructured":"Software-defined networking (sdn). http:\/\/sdxcentral.com\/resources\/sdn\/whatthedefinition- of-software-defined-networking-sdn\/.  Software-defined networking (sdn). http:\/\/sdxcentral.com\/resources\/sdn\/whatthedefinition- of-software-defined-networking-sdn\/."},{"key":"e_1_3_2_1_8_1","unstructured":"Technical details behind a 400gbps ntp amplification ddos attack. http:\/\/blog.cloudflare.com\/technical-details-behind-a- 400gbps-ntp-amplification-ddos-attack.  Technical details behind a 400gbps ntp amplification ddos attack. http:\/\/blog.cloudflare.com\/technical-details-behind-a- 400gbps-ntp-amplification-ddos-attack."},{"key":"e_1_3_2_1_9_1","unstructured":"Z3 theorm prover. http:\/\/research.microsoft.com\/enus\/ um\/redmond\/projects\/z3\/.  Z3 theorm prover. http:\/\/research.microsoft.com\/enus\/ um\/redmond\/projects\/z3\/."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2620728.2620756"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043164.2018466"},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of NDSS","author":"Mohan","year":"2015"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.02.019"},{"key":"e_1_3_2_1_14_1","volume-title":"IEEE Symposium on Quality of Service (IWQoS)","author":"Jie","year":"2014"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2534169.2486019"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.19"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1995376.1995394"},{"key":"e_1_3_2_1_18_1","volume-title":"Journal of Communications","author":"Bo","year":"2006"},{"key":"e_1_3_2_1_19_1","volume-title":"Heavy Reading","author":"Perrin Sterling","year":"2013"},{"key":"e_1_3_2_1_20_1","unstructured":"Mahajan Ratul and et.al. Achieving high utilization using software-driven wan (extended version). Technical report June 2013.  Mahajan Ratul and et.al. Achieving high utilization using software-driven wan (extended version). Technical report June 2013."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516684"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2674005.2675002"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1851275.1851224"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.322"}],"event":{"name":"CCS '18: 2018 ACM SIGSAC Conference on Computer and Communications Security","location":"Toronto Canada","acronym":"CCS '18","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 5th ACM Workshop on Moving Target Defense"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3268966.3268968","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3268966.3268968","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:07:19Z","timestamp":1750212439000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3268966.3268968"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,1,15]]},"references-count":24,"alternative-id":["10.1145\/3268966.3268968","10.1145\/3268966"],"URL":"https:\/\/doi.org\/10.1145\/3268966.3268968","relation":{},"subject":[],"published":{"date-parts":[[2018,1,15]]},"assertion":[{"value":"2018-01-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}